Author of the publication

Securing Android App Markets via Modeling and Predicting Malware Spread Between Markets.

, , , , and . IEEE Trans. Information Forensics and Security, 14 (7): 1944-1959 (2019)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Semantic Data Parallel Query Method Based on Hadoop., , , , , and . WISE (1), volume 10041 of Lecture Notes in Computer Science, page 396-404. (2016)Strip-oriented asynchronous prefetching for parallel disk systems., , , , and . Journal of Zhejiang University - Science C, 13 (11): 799-815 (2012)CMOS Phase-Locked Loop Circuits and Hot Carrier Effects., and . J. Low Power Electronics, 8 (3): 304-316 (2012)A Game-Based Approach for PCTL* Stochastic Model Checking with Evidence., , and . J. Comput. Sci. Technol., 31 (1): 198-216 (2016)Scalable Distributed Processing of K Nearest Neighbor Queries over Moving Objects., , , and . IEEE Trans. Knowl. Data Eng., 27 (5): 1383-1396 (2015)A new time-space domain high-order finite-difference method for the acoustic wave equation., and . J. Comput. Physics, 228 (23): 8779-8806 (2009)Existence and global exponential stability of almost periodic solutions to Cohen-Grossberg neural networks with distributed delays on time scales., , , and . Neurocomputing, (2014)Controllability of Boolean control networks with time delays both in states and inputs., , and . Neurocomputing, (2014)A comparative study of video-based object recognition from an egocentric viewpoint., , , and . Neurocomputing, (2016)A probabilistic model of active learning with multiple noisy oracles., , , , and . Neurocomputing, (2013)