Author of the publication

Divide and conquer: recovering contextual information of behaviors in Android apps around limited-quantity audit logs.

, , , , , and . ICSE (Companion Volume), page 230-231. IEEE / ACM, (2019)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Network agile preference-based prefetching for mobile devices., , , , and . IPCCC, page 1-8. IEEE Computer Society, (2014)Infinite Choices of Data Aggregations with Linear Number of Keys., and . CoRR, (2013)MIS2: Misinformation and Misbehavior Mining on the Web., , , , and . WSDM, page 799-800. ACM, (2018)It starts with iGaze: visual attention driven networking with smart glasses., , , , , , , , and . MobiCom, page 91-102. ACM, (2014)Continuous user identification via touch and movement behavioral biometrics., , , , , and . IPCCC, page 1-8. IEEE Computer Society, (2014)Privacy Inference on Knowledge Graphs: Hardness and Approximation., , , , and . MSN, page 132-138. IEEE Computer Society, (2016)Exploiting Computation Power of Blockchain for Biomedical Image Segmentation., , , , and . CVPR Workshops, page 0. Computer Vision Foundation / IEEE, (2019)FairTrade: Efficient Atomic Exchange-based Fair Exchange Protocol for Digital Data Trading., , and . Blockchain, page 38-46. IEEE, (2021)Control Cloud Data Access Privilege and Anonymity With Fully Anonymous Attribute-Based Encryption., , , and . IEEE Trans. Information Forensics and Security, 10 (1): 190-199 (2015)Enabling privacy-preserving auctions in big data., and . INFOCOM Workshops, page 173-178. IEEE, (2015)