Author of the publication

An Empirical Study of Web Resource Manipulation in Real-world Mobile Applications.

, , , , , , , , and . USENIX Security Symposium, page 1183-1198. USENIX Association, (2018)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Two-time level ADI finite volume method for a class of second-order hyperbolic problems.. Applied Mathematics and Computation, 215 (9): 3239-3248 (2010)Approximate controllability of Riemann-Liouville fractional differential inclusions., and . Applied Mathematics and Computation, (2016)Segmentation of measured point data using a parametric quadric surface approximation., and . Computer-Aided Design, 31 (7): 449-457 (1999)Evolutionary ciphers against differential power analysis and differential fault analysis., , , , , , and . SCIENCE CHINA Information Sciences, 55 (11): 2555-2569 (2012)ORDER: Object centRic DEterministic Replay for Java., , , , and . USENIX Annual Technical Conference, USENIX Association, (2011)PICC: A Secure Mobile Agent Framework Based on Garbled Circuit., , , , , and . AINA, page 357-362. IEEE Computer Society, (2005)Non-local means theory based Perona-Malik model for image denosing., , , , , , and . Neurocomputing, (2013)A shape analysis and template matching of building features by the Fourier transform method., , , and . Computers, Environment and Urban Systems, (2013)The Novel Integrating Sphere Type Near-Infrared Moisture Determination Instrument Based on LabVIEW., , , , and . CCTA (3), volume 346 of IFIP Advances in Information and Communication Technology, page 123-131. Springer, (2010)Array Bounds Check Elimination for Java Based on Sparse Representation., , and . SERA, page 189-196. IEEE Computer Society, (2009)