Author of the publication

Understanding In-App Ads and Detecting Hidden Attacks through the Mobile App-Web Interface.

, , , , , , and . IEEE Trans. Mob. Comput., 17 (11): 2675-2688 (2018)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Traffic assignment algorithm for multi-path routing in Cognitive Radio Ad Hoc Networks., , and . WCNC, page 1168-1173. IEEE, (2013)An enhanced buffer forwarding control scheme in smooth handover to improve TCP performance., , , , and . PIMRC, page 476-481. IEEE, (2003)An effective behavior-based Android malware detection system., , and . Security and Communication Networks, 8 (12): 2079-2089 (2015)A fuzzy-based algorithm to remove clock skew and reset from one-way delay measurement [Internet end-to-end performance measurement]., , , , and . GLOBECOM, page 1425-1430. IEEE, (2004)A Survey on Secure Wireless Body Area Networks., , , , , and . Security and Communication Networks, (2017)A Relay-Aided Media Access (RAMA) Protocol in Multirate Wireless Networks., , , , , and . IEEE Trans. Vehicular Technology, 55 (5): 1657-1667 (2006)Reportcoin: A Novel Blockchain-Based Incentive Anonymous Reporting System., , , , and . IEEE Access, (2019)A New Trust Framework Based on Reputation for Unstructured P2P Networks., , , and . IPCCC, page 209-216. IEEE Computer Society, (2008)Relax, but Do Not Sleep: A new perspective on Green Wireless Networking., , , , , and . INFOCOM, page 907-915. IEEE, (2014)VirtualKnotter: Online virtual machine shuffling for congestion resolving in virtualized datacenter., , , , , , , and . Computer Networks, (2014)