Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Automated anterior segment OCT image analysis for Angle Closure Glaucoma mechanisms classification., , , , , , , and . Computer Methods and Programs in Biomedicine, (2016)Picking Up My Tab: Understanding and Mitigating Synchronized Token Lifting and Spending in Mobile Payment., , , , , , , , and . USENIX Security Symposium, page 593-608. USENIX Association, (2017)Saliency-Based Defect Detection in Industrial Images by Using Phase Spectrum., , , , and . IEEE Trans. Industrial Informatics, 10 (4): 2135-2145 (2014)WebC: toward a portable framework for deploying legacy code in web browsers., , , and . SCIENCE CHINA Information Sciences, 58 (7): 1-15 (2015)Learning ECOC Code Matrix for Multiclass Classification with Application to Glaucoma Diagnosis., , , , , , , , and . J. Medical Systems, 40 (4): 78:1-78:10 (2016)Apple ZeroConf Holes: How Hackers Can Steal iPhone Photos., , , , , , and . IEEE Security & Privacy, 15 (2): 42-49 (2017)Privacy Loss in Apple's Implementation of Differential Privacy on MacOS 10.12., , , , and . CoRR, (2017)Sensor Guardian: prevent privacy inference on Android sensors., , and . EURASIP J. Information Security, (2017)Debugopt: Debugging fully optimized natively compiled programs using multistage instrumentation., , , , , and . Sci. Comput. Program., (2019)Different is Good: Detecting the Use of Uninitialized Variables through Differential Replay., , , , , , and . CCS, page 1883-1897. ACM, (2019)