Less is More: A privacy-respecting Android malware classifier using federated learning. | 0 | 0.34 | 2021 |
Malicious cryptocurrency miners: Status and Outlook. | 0 | 0.34 | 2019 |
MineSweeper: An In-depth Look into Drive-by Cryptocurrency Mining and Its Defense. | 14 | 0.91 | 2018 |
Systematic Classification of Side-Channel Attacks: A Case Study for Mobile Devices. | 22 | 0.75 | 2018 |
No Free Charge Theorem: a Covert Channel via USB Charging Cable on Mobile Devices. | 6 | 0.43 | 2017 |
SoK: Systematic Classification of Side-Channel Attacks on Mobile Devices. | 0 | 0.34 | 2016 |
New directions in IoT privacy using attribute-based authentication. | 4 | 0.39 | 2016 |
New directions in IoT privacy using attribute-based authentication | 1 | 0.35 | 2016 |
Mining permission patterns for contrasting clean and malicious android applications. | 25 | 0.85 | 2014 |
An Analysis Of Tracking Settings In Blackberry 10 And Windows Phone 8 Smartphones | 7 | 0.54 | 2014 |
Contrasting Permission Patterns between Clean and Malicious Android Applications. | 4 | 0.38 | 2013 |
Can Smartphone Users Turn Off Tracking Service Settings? | 2 | 0.52 | 2013 |
Towards an understanding of the impact of advertising on data leaks | 13 | 0.71 | 2012 |
A Comparison of the Classification of Disparate Malware Collected in Different Time Periods. | 4 | 0.38 | 2012 |
Feature reduction to speed up malware classification | 5 | 0.53 | 2011 |