Xinjie Ma

According to our database1, Xinjie Ma authored at least 5 papers between 2014 and 2017.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2017
Enhanced speaker verification using an adaptive multiple low-rank representation based on the modified adaptive Gaussian mixture model framework.
Clust. Comput., 2017

2016
On the Effectiveness of Code-Reuse-Based Android Application Obfuscation.
Proceedings of the Information Security and Cryptology - ICISC 2016 - 19th International Conference, Seoul, South Korea, November 30, 2016

2015
Stack Layout Randomization with Minimal Rewriting of Android Binaries.
Proceedings of the Information Security and Cryptology - ICISC 2015, 2015

Software Watermarking using Return-Oriented Programming.
Proceedings of the 10th ACM Symposium on Information, 2015

2014
Control Flow Obfuscation Using Neural Network to Fight Concolic Testing.
Proceedings of the International Conference on Security and Privacy in Communication Networks, 2014


  Loading...