Author of the publication

An Empirical Study of Web Resource Manipulation in Real-world Mobile Applications.

, , , , , , , , and . USENIX Security Symposium, page 1183-1198. USENIX Association, (2018)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Physically based modeling and animation of landslides with MPM., , , , , and . The Visual Computer, 35 (9): 1223-1235 (2019)MKBoost: A Framework of Multiple Kernel Boosting., and . IEEE Trans. Knowl. Data Eng., 25 (7): 1574-1586 (2013)Direction-of-Arrival Estimation of Virtual Array Signals Based on Doppler Effect., , and . IJDSN, (2015)Selfish Routing with Oblivious Users., , , and . SIROCCO, volume 4474 of Lecture Notes in Computer Science, page 318-327. Springer, (2007)Online multimodal deep similarity learning with application to image retrieval., , , , , and . ACM Multimedia, page 153-162. ACM, (2013)BCST-APTS: Blockchain and CP-ABE Empowered Data Supervision, Sharing, and Privacy Protection Scheme for Secure and Trusted Agricultural Product Traceability System., , , , , , , and . Secur. Commun. Networks, (2022)Using Multiple Barometers to Detect the Floor Location of Smart Phones with Built-in Barometric Sensors for Indoor Positioning., , , , and . Sensors, 15 (4): 7857-7877 (2015)An Effective Optimization Scheme for ECG Signal Denoising via Low-Rank Matrix Decomposition., , , , , and . CSSP, 38 (1): 138-152 (2019)Deep Learning Based Improved Classification System for Designing Tomato Harvesting Robot., , , , , and . IEEE Access, (2018)Pedestrian detection algorithm based on multi-scale feature extraction and attention feature fusion., , , , and . Digit. Signal Process., (2022)