Author of the publication

D2Taint: Differentiated and dynamic information flow tracking on smartphones for numerous data sources.

, , , , , , and . INFOCOM, page 791-799. IEEE, (2013)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Directed Coverage in Wireless Sensor Networks: Concept and Quality., , , , , and . Ad Hoc & Sensor Wireless Networks, 11 (3-4): 173-197 (2011)E-Shadow: Lubricating Social Interaction Using Mobile Phones., , , , and . ICDCS, page 909-918. IEEE Computer Society, (2011)Cross Segment Decoding for Improved Quality of Experience for Video Applications., , , , , , and . DCC, page 231-240. IEEE, (2013)Region-based temporally consistent video post-processing., , , and . CVPR, page 714-722. IEEE Computer Society, (2015)Pattern mutation in wireless sensor deployment., , , , and . IEEE/ACM Trans. Netw., 20 (6): 1964-1977 (2012)An Invisible Localization Attack to Internet Threat Monitors., , , , and . IEEE Trans. Parallel Distrib. Syst., 20 (11): 1611-1625 (2009)A Routing Protocol for Anycast Messages., , , and . IEEE Trans. Parallel Distrib. Syst., 11 (6): 571-588 (2000)iLOC: An invisible LOCalization Attack to Internet Threat Monitoring Systems., , , , and . INFOCOM, page 1930-1938. IEEE, (2008)Search-based physical attacks in sensor networks., , , , and . ICCCN, page 489-496. IEEE, (2005)A dynamic geographic hash table for data-centric storage in sensor networks., , , and . WCNC, page 2168-2174. IEEE, (2006)