Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

QDASH: a QoE-aware DASH system., , , and . MMSys, page 11-22. ACM, (2012)I Know Where You All Are! Exploiting Mobile Social Apps for Large-Scale Location Privacy Probing., , , , , , and . ACISP (1), volume 9722 of Lecture Notes in Computer Science, page 3-19. Springer, (2016)Identifying Crashing Fault Residence Based on Cross Project Model., , , , , , , and . ISSRE, page 183-194. IEEE, (2019)Parema: an unpacking framework for demystifying VM-based Android packers., , , , , , and . ISSTA, page 152-164. ACM, (2021)Poster: Uncovering Vulnerabilities in Wasm Smart Contracts., , , , , and . ICDCS, page 1073-1074. IEEE, (2023)CLACK: A Network Covert Channel Based on Partial Acknowledgment Encoding., , and . ICC, page 1-5. IEEE, (2009)MalWhiteout: Reducing Label Errors in Android Malware Detection., , , and . ASE, page 69:1-69:13. ACM, (2022)UI Obfuscation and Its Effects on Automated UI Analysis for Android Apps., , , , , , and . ASE, page 199-210. IEEE, (2020)Characterizing Promotional Attacks in Mobile App Store., , , , and . ATIS, volume 719 of Communications in Computer and Information Science, page 113-127. Springer, (2017)Structural Attack against Graph Based Android Malware Detection., , , , , , , , and . CCS, page 3218-3235. ACM, (2021)