Author of the publication

Upgrading Your Android, Elevating My Malware: Privilege Escalation through Mobile OS Updating.

, , , , and . IEEE Symposium on Security and Privacy, page 393-408. IEEE Computer Society, (2014)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

On event design in event-triggered feedback systems., and . Automatica, 47 (10): 2319-2322 (2011)Optimal eighth-order Steffensen type methods for solving nonlinear equations., and . J. Comput. Meth. in Science and Engineering, 14 (4-5): 277-287 (2014)A robust approach to detect digital forgeries by exploring correlation patterns., , , and . Pattern Anal. Appl., 18 (2): 351-365 (2015)An efficient iterative method with order five for solving nonlinear systems., , , and . J. Comput. Meth. in Science and Engineering, 14 (6): 363-372 (2014)Mining hidden connections among biomedical concepts from disjoint biomedical literature sets through semantic-based association rule., , , , and . Int. J. Intell. Syst., 25 (2): 207-223 (2010)Security, trust, and resilience of distributed networks and systems., , , and . Security and Communication Networks, 8 (10): 1829-1830 (2015)A statistical feature based approach to distinguish PRCG from photographs., , , , and . Computer Vision and Image Understanding, (2014)Efficient n-point iterative methods with memory for solving nonlinear equations., and . Numerical Algorithms, 70 (2): 357-375 (2015)Seventh-order derivative-free iterative method for solving nonlinear systems., , , and . Numerical Algorithms, 70 (3): 545-558 (2015)A Novel Multi-Layer Level Set Method for Image Segmentation., and . J. UCS, 14 (14): 2427-2452 (2008)