Author of the publication

Hare Hunting in the Wild Android: A Study on the Threat of Hanging Attribute References.

, , , , , , , , and . CCS, page 1248-1259. ACM, (2015)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Hare Hunting in the Wild Android: A Study on the Threat of Hanging Attribute References., , , , , , , , and . CCS, page 1248-1259. ACM, (2015)Decision model of mine shaft development mode based on ISM-GAHP-FCA., , , , and . J. Intell. Fuzzy Syst., 44 (1): 1323-1336 (2023)Before Unrooting your Android Phone, Patching up Permission System First!. WISA, volume 8909 of Lecture Notes in Computer Science, page 41-54. Springer, (2014)Divergence Prior and Vessel-tree Reconstruction., , , and . CoRR, (2018)Research on numerical analysis for color matching in textile dyeing based on least square Fitting., , , , , and . ISI, page 289-292. IEEE, (2011)A Scalable Anonymity Scheme Based on DHT Distributed Inquiry., , , and . TrustCom, page 1358-1363. IEEE Computer Society, (2012)Revisiting Discriminative Entropy Clustering and its relation to K-means., and . CoRR, (2023)Understanding the Impact of Internet Media on Patient-Clinician Trust: Model Development and Research Design., , and . ICIS, Association for Information Systems, (2011)Improved Preamble-Based Symbol Timing Synchronization Schemes for GFDM Systems., , , and . CSPS (2), volume 516 of Lecture Notes in Electrical Engineering, page 535-543. Springer, (2018)MeadDroid: Detecting Monetary Theft Attacks in Android by DVM Monitoring., , , , and . ICISC, volume 7839 of Lecture Notes in Computer Science, page 78-91. Springer, (2012)