Author of the publication

Identifying User-Input Privacy in Mobile Applications at a Large Scale.

, , , , , , , and . IEEE Trans. Information Forensics and Security, 12 (3): 647-661 (2017)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Segmentation of measured point data using a parametric quadric surface approximation., and . Computer-Aided Design, 31 (7): 449-457 (1999)Approximate controllability of Riemann-Liouville fractional differential inclusions., and . Applied Mathematics and Computation, (2016)Two-time level ADI finite volume method for a class of second-order hyperbolic problems.. Applied Mathematics and Computation, 215 (9): 3239-3248 (2010)Authorship Attribution for Forensic Investigation with Thousands of Authors., and . SEC, volume 428 of IFIP Advances in Information and Communication Technology, page 339-350. Springer, (2014)Design of Proportional Congestion Control for High-Speed Networks with Variable Delays., , , and . ICC (3), page 1435-1439. IEEE, (2000)Relevant Fact Selection for QA via Sequence Labeling., , , , and . KSEM, volume 10412 of Lecture Notes in Computer Science, page 399-409. Springer, (2017)Quantify the Landscape Effect of Rural Region Planning Near Metropolis Using High Spatial Resolution Remote Sensing-Case Study in Gaoliying Town in Beijing., , , and . CCTA (1), volume 293 of IFIP Advances in Information and Communication Technology, page 365-373. Springer, (2008)Public Bicycle Prediction Based on Generalized Regression Neural Network., , and . IOV, volume 9502 of Lecture Notes in Computer Science, page 363-373. Springer, (2015)Distributed Grid-Based K Nearest Neighbour Query Processing Over Moving Objects., , and . WAIM, volume 9098 of Lecture Notes in Computer Science, page 350-361. Springer, (2015)We Still Don't Have Secure Cross-Domain Requests: an Empirical Study of CORS., , , , , , and . USENIX Security Symposium, page 1079-1093. USENIX Association, (2018)