Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Static discovery and remediation of code-embedded resource dependencies., , , , , , and . Integrated Network Management, page 233-240. IEEE, (2011)Efficient Fusion of Sparse and Complementary Convolutions for Object Recognition and Detection., , , and . CoRR, (2018)FASE: functionality-aware security enforcement., , , , and . ACSAC, page 471-483. ACM, (2016)Visual Configuration of Mobile Privacy Policies., , , , and . FASE, volume 10202 of Lecture Notes in Computer Science, page 338-355. Springer, (2017)UI X-Ray: Interactive Mobile UI Testing Based on Computer Vision., , , , , and . IUI, page 245-255. ACM, (2017)ShamDroid: gracefully degrading functionality in the presence of limited resource access., , , and . OOPSLA, page 316-331. ACM, (2015)Dynamic detection of inter-application communication vulnerabilities in Android., , and . ISSTA, page 118-128. ACM, (2015)More Is Less: Learning Efficient Video Representations by Big-Little Network and Depthwise Temporal Aggregation., , , , and . NeurIPS, page 2261-2270. (2019)A survey of static analysis methods for identifying security vulnerabilities in software systems., , , and . IBM Systems Journal, 46 (2): 265-288 (2007)PLAS 2008 paper abstracts., and . SIGPLAN Notices, 43 (12): 5-8 (2008)