Author of the publication

UIPicker: User-Input Privacy Identification in Mobile Applications.

, , , , , and . USENIX Security Symposium, page 993-1008. USENIX Association, (2015)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A statistical feature based approach to distinguish PRCG from photographs., , , , and . Computer Vision and Image Understanding, (2014)A Novel Multi-Layer Level Set Method for Image Segmentation., and . J. UCS, 14 (14): 2427-2452 (2008)A Distribute and Geographic Information Based Routing Algorithm for LEO Satellite Constellation Networks., , , , , , , and . IMIS, page 433-438. IEEE Computer Society, (2012)Transform coefficient coding design for AVS2 video coding standard., , , and . VCIP, page 1-6. IEEE, (2013)Abox Inference for Large Scale OWL-Lite Data., , , and . SKG, page 30. IEEE Computer Society, (2006)Security, trust, and resilience of distributed networks and systems., , , and . Security and Communication Networks, 8 (10): 1829-1830 (2015)From agile to lean: the perspectives of the two agile online communities of interest., , and . ECIS, (2011)Organizing for agility: A complex adaptive systems perspective on agile software development process., and . ECIS, page 1316-1327. (2006)A decoupled design in distributed control of uncertain networked control systems., and . ACC, page 6497-6502. IEEE, (2012)Decentralized event-triggered consensus of Linear Multi-agent Systems under Directed Graphs., , , and . ACC, page 5764-5769. IEEE, (2015)