Author of the publication

Enpublic Apps: Security Threats Using iOS Enterprise and Developer Certificates.

, , , , and . AsiaCCS, page 463-474. ACM, (2015)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Transmit signal design for optimal deconvolution., and . ICASSP (2), page 553-556. IEEE, (2004)Dynamic Reconfiguration Algorithm: Dynamically Tuning Multiple Buffer Pools., , , , and . DEXA, volume 1873 of Lecture Notes in Computer Science, page 92-101. Springer, (2000)A trust routing protocol based on D-S evidence theory in mobile ad hoc network., , , and . ICCC, page 786-790. IEEE, (2014)Enpublic Apps: Security Threats Using iOS Enterprise and Developer Certificates., , , , and . AsiaCCS, page 463-474. ACM, (2015)The Influence of Time-delay for the Bifurcation of the Fractional Neuron Network., , , and . ICSAI, page 821-826. IEEE, (2019)M4D: A Malware Detection Method Using Multimodal Features., , , , and . FCS, volume 1105 of Communications in Computer and Information Science, page 228-238. Springer, (2019)SwiftAvatar: Efficient Auto-Creation of Parameterized Stylized Character on Arbitrary Avatar Engines., , , , , , , , , and 1 other author(s). AAAI, page 6101-6109. AAAI Press, (2023)POP and PUSH: Demystifying and Defending against (Mach) Port-oriented Programming., , , , and . NDSS, The Internet Society, (2021)Face Liveness Verification Based on Hyperspectrum Analysis., , and . AINA Workshops, page 612-615. IEEE Computer Society, (2017)Multimodality sensing for eating recognition., , , , , and . PervasiveHealth, page 130-137. ACM, (2016)