Author of the publication

Android App Protection via Interpretation Obfuscation.

, , , and . DASC, page 63-68. IEEE Computer Society, (2014)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A measurement study of a campus Wi-Fi network with mixed handheld and non-handheld traffic., , , , , , and . CCECE, page 848-853. IEEE, (2015)Optimal Control of Mixed-state Quantum Systems based on Lyapunov Method., , and . BIOSIGNALS, page 22-30. SciTePress, (2011)Estimate PM2.5 concentration in 500m resolution from satellite data and ground observation., , , , , and . IGARSS, page 5716-5719. IEEE, (2016)An Improved Two-Party Authentication Key Exchange Protocol for Mobile Environment., , and . Wireless Personal Communications, 85 (3): 1399-1409 (2015)Predicting pilot behavior during midair encounters using recognition primed decision model., , and . Inf. Sci., (2018)An Empirical Study of Cohesion and Coupling: Balancing Optimization and Disruption., , , and . IEEE Trans. Evolutionary Computation, 22 (3): 394-414 (2018)Multishot person reidentification using joint group sparse representation., , , and . J. Electronic Imaging, 27 (06): 063012 (2018)NativeSpeaker: Identifying Crypto Misuses in Android Native Code Libraries., , , , , , and . Inscrypt, volume 10726 of Lecture Notes in Computer Science, page 301-320. Springer, (2017)Burn After Reading: Expunging Execution Footprints of Android Apps., , , and . NSS, volume 11058 of Lecture Notes in Computer Science, page 46-63. Springer, (2018)A Secure Data Deduplication Scheme Based on Differential Privacy., , , , and . ICPADS, page 1241-1246. IEEE, (2016)