Author of the publication

I Know Where You All Are! Exploiting Mobile Social Apps for Large-Scale Location Privacy Probing.

, , , , , , and . ACISP (1), volume 9722 of Lecture Notes in Computer Science, page 3-19. Springer, (2016)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Revisiting why Kad lookup fails., , , , , and . P2P, page 37-42. IEEE, (2012)Deep Learning-based Moving Object Segmentation: Recent Progress and Research Prospects., , , , , and . Int. J. Autom. Comput., 20 (3): 335-369 (2023)Mining Constrained Gradients in Large Databases., , , , , and . IEEE Trans. Knowl. Data Eng., 16 (8): 922-938 (2004)End-to-end Flow Correlation Tracking with Spatial-temporal Attention., , , and . CoRR, (2017)Large-Scale Third-Party Library Detection in Android Markets., , , , , , , , and . IEEE Trans. Software Eng., 46 (9): 981-1003 (2020)On the Ruin Problem in an Erlang(2) Risk Model with Delayed Claims., and . ICICA (1), volume 105 of Communications in Computer and Information Science, page 54-61. Springer, (2010)An Analysis of Decoding for Attention-Based End-to-End Mandarin Speech Recognition., , , , and . ISCSLP, page 384-388. IEEE, (2018)Identity-based Linkable Blind Ring Signature Scheme on Lattice., , , , , , , and . ICCNS, page 51-57. ACM, (2022)Dual Mean-Teacher: An Unbiased Semi-Supervised Framework for Audio-Visual Source Localization., , , , , , , and . CoRR, (2024)Analyzing Robustness of End-to-End Neural Models for Automatic Speech Recognition., and . CoRR, (2022)