Author of the publication

DECAF: Detecting and Characterizing Ad Fraud in Mobile Apps.

, , , and . NSDI, page 57-70. USENIX Association, (2014)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Efficient Privilege De-Escalation for Ad Libraries in Mobile Apps., , , and . MobiSys, page 89-103. ACM, (2015)Multiobjective sorting-based learning particle swarm optimization for continuous optimization., , , , and . Natural Computing, 18 (2): 313-331 (2019)The Research on Consolidated Financial Evaluation about Corporate Social Responsibility Based on Fuzzy-AHP., , and . HIS (3), page 447-450. IEEE Computer Society, (2009)An efficient hybrid multi-objective particle swarm optimization with a multi-objective dichotomy line search., , , , and . J. Computational Applied Mathematics, (2015)DECAF: Detecting and Characterizing Ad Fraud in Mobile Apps., , , and . NSDI, page 57-70. USENIX Association, (2014)Moving Object Detection for Moving Cameras on Superpixel Level., , and . ICIG, page 307-312. IEEE Computer Society, (2013)MOS-Based Channel Allocation Schemes for Mixed Services over Cognitive Radio Networks., , , , and . ICIG, page 832-837. IEEE Computer Society, (2013)High Precision Image Rotation Angle Estimation with Periodicity of Pixel Variance., , , and . ICIG, page 106-111. IEEE Computer Society, (2013)AHP and game theory based approach for network selection in heterogeneous wireless networks., , , and . CCNC, page 501-506. IEEE, (2014)Transferring Landmarks to Individual Foot Using Deformable Template Models., , , and . ICYCS, page 677-682. IEEE Computer Society, (2008)