Author of the publication

A System for Linking Ground Truth to Mobile Network Traffic.

, , , and . MobiQuitous, page 292-293. ACM, (2016)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Steal This Movie: Automatically Bypassing DRM Protection in Streaming Media Services., , , and . USENIX Security Symposium, page 687-702. USENIX Association, (2013)Real-time Soft Robot 3D Proprioception via Deep Vision-based Sensing., , , , , and . CoRR, (2019)A System for Linking Ground Truth to Mobile Network Traffic., , , and . MobiQuitous, page 292-293. ACM, (2016)HeapHopper: Bringing Bounded Model Checking to Heap Implementation Security., , , , , and . USENIX Security Symposium, page 99-116. USENIX Association, (2018)Classifying imbalanced Internet traffic based PCDD: a per concept drift detection method., , and . Smart CR, 3 (2): 112-122 (2013)Sleak: automating address space layout derandomization., , , , , and . ACSAC, page 190-202. ACM, (2019)SmoteAdaNL: a learning method for network traffic classification., , and . J. Ambient Intelligence and Humanized Computing, 7 (1): 121-130 (2016)LogProv: Logging events as provenance of big data analytics pipelines with trustworthiness., , , , and . BigData, page 1402-1411. IEEE Computer Society, (2016)BinTrimmer: Towards Static Binary Debloating Through Abstract Interpretation., , , , , and . DIMVA, volume 11543 of Lecture Notes in Computer Science, page 482-501. Springer, (2019)Equilibrium Analysis of the M/M/1 Queues with Setup Times Under N-Policy., , , and . QTNA, volume 10591 of Lecture Notes in Computer Science, page 3-17. Springer, (2017)