Author of the publication

Trinity: High-Performance Mobile Emulation through Graphics Projection.

, , , , , , , and . OSDI, page 285-301. USENIX Association, (2022)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Enhancing the Performance of Indoor Device-Free Passive Localization., , , , , , and . IJDSN, (2015)Experiences of landing machine learning onto market-scale mobile malware detection., , , , , , , and . EuroSys, page 2:1-2:14. ACM, (2020)Supervision of Webcasting-Anchor Behavior Evaluation Based on Barrage Emotion Analysis., , , , and . BigCom, page 66-71. IEEE Computer Society, (2018)LAMP: Lightweight and Accurate Malicious Access Points Localization via Channel Phase Information., , , , , , and . WASA, volume 10874 of Lecture Notes in Computer Science, page 748-753. Springer, (2018)An Android Malicious Code Detection Method Based on Improved DCA Algorithm., , , , , and . Entropy, 19 (2): 65 (2017)Malware Detection Based on Dynamic Multi-Feature Using Ensemble Learning at Hypervisor., , , , , , and . GLOBECOM, page 1-6. IEEE, (2018)Towards System Implementation and Data Analysis for Crowdsensing Based Outdoor RSS Maps., , , , , , and . IEEE Access, (2018)An adaptive wireless passive human detection via fine-grained physical layer information., , , , , , and . Ad Hoc Networks, (2016)Trinity: High-Performance Mobile Emulation through Graphics Projection., , , , , , , and . OSDI, page 285-301. USENIX Association, (2022)A Survey on Security of Cloud Environment: Threats, Solutions, and Innovation., , , and . DSC, page 910-916. IEEE, (2018)