Author of the publication

A fine-grained permission control mechanism for external storage of Android.

, , , and . SMC, page 2911-2916. IEEE, (2016)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Cooperative Game Theory Based Coalitional Agent Negotiation Model in Network Service., and . CSCWD (Selected Papers), volume 4402 of Lecture Notes in Computer Science, page 447-458. Springer, (2006)A Grid Information Services Architecture Based on Structured P2P Systems., , and . CSCWD (Selected Papers), volume 5236 of Lecture Notes in Computer Science, page 374-383. Springer, (2007)A Replica Replacement Algorithm Based on Value-Cost Prediction., , and . CSCWD (Selected Papers), volume 5236 of Lecture Notes in Computer Science, page 365-373. Springer, (2007)AIM: A New Privacy Preservation Algorithm for Incomplete Microdata Based on Anatomy., , and . ICPCA/SWS, volume 7719 of Lecture Notes in Computer Science, page 194-208. Springer, (2012)Courseware Recommendation in E-Learning System., , and . ICWL, volume 4181 of Lecture Notes in Computer Science, page 10-24. Springer, (2006)MPSL: A Mobile Phone-Based Physical-Social Location Verification System., , , , and . WASA, volume 7405 of Lecture Notes in Computer Science, page 488-499. Springer, (2012)A novel active website fingerprinting attack against Tor anonymous system., , , , and . CSCWD, page 112-117. IEEE, (2014)Semi-online Task Allocation Algorithm among Cooperative Agents., , and . CSCWD, page 488-493. IEEE, (2006)QAECN: Dynamically Tuning ECN Threshold with Micro-burst in Multi-queue Data Centers., , , , , and . CSCWD, page 398-403. IEEE, (2019)Data Anonymization Based on Natural Equivalent Class., , , , and . CSCWD, page 22-27. IEEE, (2019)