Browsing by Author Luo, Xiapu

Jump to: 0-9 A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
Showing results 1 to 15 of 15
TitleAuthor(s)Issue DateViews
 
A Survey on Access Control in Fog Computing
Journal:IEEE Communications Magazine
2018
26
An adaptive gas cost mechanism for ethereum to defend against under-priced DoS attacks
Proceeding/Conference:Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
2017
17
AndroidPerf: A cross-layer profiling system for Android applications
Proceeding/Conference:2015 IEEE 23rd International Symposium on Quality of Service, IWQoS 2015
2016
8
AutoFlowLeaker: Circumventing web censorship through automation services
Proceeding/Conference:Proceedings of the IEEE Symposium on Reliable Distributed Systems
2017
8
 
2017
13
 
2018
5
I know where you all are! exploiting mobile social apps for large-scale location privacy probing
Proceeding/Conference:Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
2016
10
Muse: Towards robust and stealthy mobile botnets via multiple message push services
Proceeding/Conference:Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
2016
10
 
NDroid: Toward tracking information flows across multiple android contexts
Journal:IEEE Transactions on Information Forensics and Security
2019
12
On measuring one-way path metrics from a web server
Proceeding/Conference:Proceedings - International Conference on Network Protocols, ICNP
2014
3
On tracking information flows through JNI in android applications
Proceeding/Conference:Proceedings of the International Conference on Dependable Systems and Networks
2014
3
Revisiting the description-to-behavior fidelity in android applications
Proceeding/Conference:2016 IEEE 23rd International Conference on Software Analysis, Evolution, and Reengineering, SANER 2016
2016
4
 
2014
3
Towards a scalable resource-driven approach for detecting repackaged android applications
Proceeding/Conference:Proceedings of the 30th Annual Computer Security Applications Conference
2014
7
 
2015
7