Author of the publication

Toward Engineering a Secure Android Ecosystem: A Survey of Existing Techniques.

, , , , , , , , , , , and . ACM Comput. Surv., 49 (2): 38:1-38:47 (2016)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

No persons found for author name Duan, Ruian
add a person with the name Duan, Ruian
 

Other publications of authors with the same name

Approaching optimal compression with fast update for large scale routing tables., , , , , , and . IWQoS, page 1-9. IEEE, (2012)Virtual routing tables polymerization for lookup and update., , , , , , , and . ICNP, page 1-2. IEEE Computer Society, (2012)The Betrayal At Cloud City: An Empirical Analysis Of Cloud-Based Mobile Backends., , , , , and . USENIX Security Symposium, page 551-566. USENIX Association, (2019)Automating Patching of Vulnerable Open-Source Software Versions in Application Binaries., , , , , , , and . NDSS, The Internet Society, (2019)Toward Engineering a Secure Android Ecosystem: A Survey of Existing Techniques., , , , , , , , , and 2 other author(s). ACM Comput. Surv., 49 (2): 38:1-38:47 (2016)An ultra-fast universal incremental update algorithm for trie-based routing lookup., , , , , , , and . ICNP, page 1-10. IEEE Computer Society, (2012)Towards practical use of Bloom Filter based IP lookup in operational network., , , , and . NOMS, page 1-4. IEEE, (2014)CLUE: Achieving Fast Update over Compressed Table for Parallel Lookup with Reduced Dynamic Redundancy., , , , , and . ICDCS, page 678-687. IEEE Computer Society, (2012)Cloaker Catcher: A Client-based Cloaking Detection System., , and . CoRR, (2017)Identifying Open-Source License Violation and 1-day Security Risk at Large Scale., , , , and . ACM Conference on Computer and Communications Security, page 2169-2185. ACM, (2017)