Author of the publication

An Empirical Study of Web Resource Manipulation in Real-world Mobile Applications.

, , , , , , , , and . USENIX Security Symposium, page 1183-1198. USENIX Association, (2018)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Mining hidden connections among biomedical concepts from disjoint biomedical literature sets through semantic-based association rule., , , , and . Int. J. Intell. Syst., 25 (2): 207-223 (2010)A robust approach to detect digital forgeries by exploring correlation patterns., , , and . Pattern Anal. Appl., 18 (2): 351-365 (2015)Optimal eighth-order Steffensen type methods for solving nonlinear equations., and . J. Comput. Meth. in Science and Engineering, 14 (4-5): 277-287 (2014)An efficient iterative method with order five for solving nonlinear systems., , , and . J. Comput. Meth. in Science and Engineering, 14 (6): 363-372 (2014)On event design in event-triggered feedback systems., and . Automatica, 47 (10): 2319-2322 (2011)Transform coefficient coding design for AVS2 video coding standard., , , and . VCIP, page 1-6. IEEE, (2013)Opening up the Agile Innovation Process., , , and . Human Benefit through the Diffusion of Information Systems Design Science Research, volume 318 of IFIP Advances in Information and Communication Technology, page 348-349. Springer, (2010)Security, trust, and resilience of distributed networks and systems., , , and . Security and Communication Networks, 8 (10): 1829-1830 (2015)Abox Inference for Large Scale OWL-Lite Data., , , and . SKG, page 30. IEEE Computer Society, (2006)From agile to lean: the perspectives of the two agile online communities of interest., , and . ECIS, (2011)