Showing
1 - 10
results of
10
for search '
MA, Haoyu
'
Skip to content
AUNILO IRDS | AUNILO Institutional Repository Discovery Service
FAQs
|
Search Tips
|
Feedback
Your Account
Log Out
Login
Theme
Bootstrap
Aunilo
Language
English
中文(繁體)
اللغة العربية
Toggle navigation
Home
Search/Browse Options
Search History
Advanced Search
About
About AUNILO IRDS
Content Sources
Statistics
Technical Team
Disclaimer
Privacy & Security Policy
All Fields
Title
Author
Subject
Call Number
ISBN/ISSN
Tag
Find
Advanced
Author
MA, Haoyu
Showing
1 - 10
results of
10
for search '
MA, Haoyu
'
, query time: 0.01s
Refine Results
Sort
Relevance
Date Descending
Date Ascending
Call Number
Author
Title
1
Walls have ears: Eavesdropping user behaviors via graphics-interrupt-based side channel
by
MA
,
Haoyu
,
TIAN, Jianwen
,
GAO, Debin
,
JIA Chunfu
Published 2020
Get full text
Get full text
text
Save to List
Saved in:
2
Secure repackage-proofing framework for Android apps using Collatz conjecture
by
MA
,
Haoyu
,
LI, Shijia
,
GAO, Debin
,
JIA, Chunfu
Published 2021
Get full text
Get full text
text
Save to List
Saved in:
3
On the effectiveness of using graphics interrupt as a side channel for user behavior snooping
by
MA
,
Haoyu
,
TIAN, Jianwen
,
GAO, Debin
,
JIA, Chunfu
Published 2022
Get full text
Get full text
text
Save to List
Saved in:
4
Integrated software fingerprinting via neural-network-based control flow obfuscation
by
MA
,
Haoyu
,
LI, Ruiqi
,
YU, Xiaoxu
,
JIA, Chunfu
,
GAO, Debin
Published 2016
Get full text
Get full text
text
Save to List
Saved in:
5
Peep with a mirror: Breaking the integrity of Android app sandboxing via unprivileged cache side channel
by
LIN, Yan
,
WONG, Joshua
,
LI, Xiang
,
MA
,
Haoyu
,
GAO, Debin
Published 2024
Get full text
Get full text
text
Save to List
Saved in:
6
Software Watermarking using Return-Oriented Programming
by
Ma
,
Haoyu
,
Lu, Kangjie
,
Ma, Xinjie
,
Zhang, Haining
,
Jia, Chunfu
,
GAO, Debin
Published 2015
Get full text
Get full text
text
Save to List
Saved in:
7
Control Flow Obfuscation using Neural Network to Fight Concolic Testing
by
Ma
,
Haoyu
,
Ma, Xinjie
,
Liu, Weijie
,
Huang, Zhipeng
,
GAO, Debin
,
Jia, Chunfu
Published 2014
Get full text
Get full text
text
Save to List
Saved in:
8
TypeSqueezer: When static recovery of function signatures for binary executables meets dynamic analysis
by
LIN, Ziyi
,
LI, Jinku
,
LI, Bowen
,
MA
,
Haoyu
,
GAO, Debin
,
MA, Jianfeng
Published 2023
Get full text
Get full text
text
Save to List
Saved in:
9
Active warden attack: On the (in)effectiveness of Android app repackage-proofing
by
MA
,
Haoyu
,
LI, Shijia
,
GAO, Debin
,
WU, Daoyuan
,
JIA, Qiaowen
,
JIA, Chunfu
Published 2022
Get full text
Get full text
text
Save to List
Saved in:
10
Deep-learning-based app sensitive behavior surveillance for Android powered cyber-physical systems
by
MA
,
Haoyu
,
TIAN, Jianwen
,
QIU, Kefan
,
LO, David
,
GAO, Debin
,
WU, Daoyuan
,
JIA, Chunfu
,
BAKER, Thar
Published 2020
Get full text
Get full text
text
Save to List
Saved in:
Search Tools:
Get RSS Feed
—
Email this Search
—
×
Loading...