Author of the publication

Detection and Auto-protection of Cache File Privacy Leakage for Mobile Social Networking Applications in Android.

, , , and . HCI (22), volume 10292 of Lecture Notes in Computer Science, page 703-721. Springer, (2017)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Structures of the Ribosome in Intermediate States of Ratcheting, , and . Science, 325 (5943): 1014-1017 (2009)Fuzzy control design for thermostatically controlled loads considering consumers' thermal comfort., , , , and . FSKD, page 165-170. IEEE, (2014)Existence of infinitely many solutions for a quasilinear elliptic equation., , and . Appl. Math. Lett., (2014)One kind of fast acquisition technology research based on parallel pseudo-code acquisition., and . CISP-BMEI, page 1118-1122. IEEE, (2016)Automatic identification and extraction of forest road through advanced LoG matching techniques., , and . IGARSS, page 799-801. IEEE, (2016)DRETOM: developer recommendation based on topic models for bug resolution., , , and . PROMISE, page 19-28. ACM, (2012)Leveraging social networks to detect anomalous insider actions in collaborative environments., , , and . ISI, page 119-124. IEEE, (2011)Graph Neural Networks for User Identity Linkage., , , and . CoRR, (2019)Multi-step Prediction of Financial Asset Return Volatility Using Parsimonious Autoregressive Sequential Model., , , , and . MIDAS@PKDD, volume 11985 of Lecture Notes in Computer Science, page 107-121. Springer, (2019)Modeling Fluency and Faithfulness for Diverse Neural Machine Translation., , , , , , and . CoRR, (2019)