Author of the publication

PERUIM: understanding mobile application privacy with permission-UI mapping.

, , and . UbiComp, page 682-693. ACM, (2016)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Keep Passwords Away from Memory: Password Caching and Verification Using TPM., , , and . AINA, page 755-762. IEEE Computer Society, (2008)Context-aware usage control for web of things., , , , and . Security and Communication Networks, 7 (12): 2696-2712 (2014)Context-Aware Usage Control for Android., , , , and . SecureComm, volume 50 of Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, page 326-343. Springer, (2010)An Exponential-Rayleigh Model for RSS-Based Device-Free Localization and Tracking., , , , , and . IEEE Trans. Mob. Comput., 14 (3): 484-494 (2015)Fixing sensor-related energy bugs through automated sensing policy instrumentation., , , and . ISLPED, page 321-326. IEEE, (2015)Uniport: A Uniform Programming Support Framework for Mobile Cloud Computing., , and . MobileCloud, page 71-80. IEEE Computer Society, (2015)Cooperative Transmission in Small Cell Networks Using Network Coding., and . IEEE Wireless Commun. Letters, 7 (4): 510-513 (2018)Synchronization coherence: A transparent hardware mechanism for cache coherence and fine-grained synchronization., , , , and . J. Parallel Distrib. Comput., 68 (2): 165-181 (2008)Understanding the Purpose of Permission Use in Mobile Apps., , , , and . ACM Trans. Inf. Syst., 35 (4): 43:1-43:40 (2017)FrauDroid: An Accurate and Scalable Approach to Automated Mobile Ad Fraud Detection., , , , , , and . CoRR, (2017)