Author of the publication

ActivityShielder: An Activity Hijacking Defense Scheme for Android Devices.

, , and . ICCCN, page 1-9. IEEE, (2018)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A New Projected Variant of the Deflated Block Conjugate Gradient Method., , and . J. Sci. Comput., 80 (2): 1116-1138 (2019)Short-term load forecasting based on data mining., , , and . CSCWD, page 170-173. IEEE, (2016)Study on the optimization and management of electricity purchase in jiangxi province based on the electricity markets., , , and . CSCWD, page 566-569. IEEE, (2016)A real-time blind source separation scheme and its application to reverberant and noisy acoustic environments., , , and . Signal Processing, 86 (6): 1260-1277 (2006)Research on theory and key technology of trusted computing platform security testing and evaluation., , , , , , and . SCIENCE CHINA Information Sciences, 53 (3): 434-453 (2010)Community Discovery Based on Social Actors' Interests and Social Relationships., , , , and . SKG, page 79-86. IEEE Computer Society, (2008)Developing a model of driver's uncertainty in lane change situations for trustworthy lane change decision aid systems., , , and . Intelligent Vehicles Symposium, page 406-411. IEEE, (2016)Impact of railway disruption predictions and rescheduling on passenger delays., , , , , and . JRTPM, 8 (2): 103-122 (2018)Testing Method of Code Redundancy Simplification Based on Program Dependency Graph., , , and . TrustCom, page 1895-1900. IEEE Computer Society, (2012)Efficient 3D morphable face model fitting., , , , , , and . Pattern Recognition, (2017)