Author of the publication

An Empirical Study of Dangerous Behaviors in Firefox Extensions.

, , , , , , and . ISC, volume 7483 of Lecture Notes in Computer Science, page 188-203. Springer, (2012)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Affective experience modeling based on interactive synergetic dependence in big data., , and . Future Generation Comp. Syst., (2016)Experimental Study of Web Service Availability Based on WSDL Documents., , and . EIDWT, page 356-362. (2013)Information Flow Analysis of Web Service Net., , , , and . CIT, page 1622-1626. IEEE Computer Society, (2010)Discrete location-aware power control for D2D underlaid cellular networks., , , , and . WCNC, page 1-6. IEEE, (2016)Modulation classification of mixed signals using fast independent component analysis., , , , and . WCNC, page 1-5. IEEE, (2016)Throughput scaling laws of hybrid wireless networks with proximity preference., , , , and . WCNC, page 1-6. IEEE, (2016)Channel occupancy cognition based adaptive channel access and back-off scheme for LTE system on unlicensed band., , , , and . WCNC, page 1-6. IEEE, (2016)A Seamless Vertical Handover Scheme for End-to-End Reconfigurability Systems., , and . VTC Spring, page 2152-2156. IEEE, (2008)Network Security Situation Awareness Based on Semantic Ontology and User-Defined Rules for Internet of Things., , , , and . IEEE Access, (2017)Spectrum Management for MmWave Enabled UAV Swarm Networks: Challenges and Opportunities., , , and . IEEE Communications Magazine, 57 (1): 146-153 (2019)