Toward Cleansing Backdoored Neural Networks in Federated Learning | 0 | 0.34 | 2022 |
Toward Hybrid Static-Dynamic Detection of Vulnerabilities in IoT Firmware | 0 | 0.34 | 2021 |
Dynamic Control of Fraud Information Spreading in Mobile Social Networks | 2 | 0.37 | 2021 |
Towards Automatic Detection of Nonfunctional Sensitive Transmissions in Mobile Applications | 0 | 0.34 | 2021 |
Security Analysis of Cryptocurrency Wallets in Android-Based Applications | 0 | 0.34 | 2020 |
Understanding The Manipulation On Recommender Systems Through Web Injection | 0 | 0.34 | 2020 |
Privacy Risk Analysis and Mitigation of Analytics Libraries in the Android Ecosystem | 1 | 0.35 | 2020 |
Android-based Cryptocurrency Wallets: Attacks and Countermeasures | 0 | 0.34 | 2020 |
A Study on Smart Online Frame Forging Attacks against Video Surveillance System. | 1 | 0.40 | 2019 |
Protecting mobile devices from physical memory attacks with targeted encryption | 0 | 0.34 | 2019 |
LeakDoctor: Toward Automatically Diagnosing Privacy Leaks in Mobile Applications | 1 | 0.36 | 2019 |
A Machine Learning Based Approach for Mobile App Rating Manipulation Detection. | 0 | 0.34 | 2019 |
Automated Hybrid Analysis of Android Malware Through Augmenting Fuzzing With Forced Execution | 2 | 0.39 | 2019 |
Preserving Location Privacy in Ride-Hailing Service. | 0 | 0.34 | 2018 |
Android STAR: An Efficient Interaction-Preserving Record-Replay System For Messenger App Usage Surveillance. | 0 | 0.34 | 2018 |
Server-Based Manipulation Attacks Against Machine Learning Models. | 0 | 0.34 | 2018 |
An Evaluation Framework for Moving Target Defense Based on Analytic Hierarchy Process. | 0 | 0.34 | 2018 |
Backdoor Embedding in Convolutional Neural Network Models via Invisible Perturbation. | 3 | 0.41 | 2018 |
Defence Mechanisms for Public Systems. | 0 | 0.34 | 2018 |
WindowGuard: Systematic Protection of GUI Security in Android. | 6 | 0.46 | 2017 |
INSPIRED: Intention-based Privacy-preserving Permission Model. | 0 | 0.34 | 2017 |
SweetDroid: Toward a Context-Sensitive Privacy Policy Enforcement Framework for Android OS. | 0 | 0.34 | 2017 |
Deviation-Based Obfuscation-Resilient Program Equivalence Checking With Application to Software Plagiarism Detection. | 4 | 0.39 | 2016 |
Alde: Privacy Risk Analysis of Analytics Libraries in the Android Ecosystem. | 0 | 0.34 | 2016 |
You can promote, but you can't hide: large-scale abused app detection in mobile app stores. | 2 | 0.36 | 2016 |
Repackage-Proofing Android Apps | 2 | 0.36 | 2016 |
AppWatcher: unveiling the underground market of trading mobile app reviews | 10 | 0.53 | 2015 |
Program Characterization Using Runtime Values and Its Application to Software Plagiarism Detection | 8 | 0.47 | 2015 |
DroidJust: automated functionality-aware privacy leakage analysis for Android applications | 12 | 0.51 | 2015 |
Uncovering the Dilemmas on Antivirus Software Design in Modern Mobile Platforms. | 0 | 0.34 | 2014 |
M-cluster and X-ray: Two methods for multi-jammer localization in wireless sensor networks | 11 | 0.54 | 2014 |
GroupTie: toward hidden collusion group discovery in app stores | 9 | 0.60 | 2014 |
Self-healing wireless networks under insider jamming attacks | 0 | 0.34 | 2014 |
Semantics-based obfuscation-resilient binary code similarity comparison with applications to software plagiarism detection | 51 | 1.08 | 2014 |
GlobalTrust: An attack-resilient reputation system for tactical networks | 1 | 0.38 | 2014 |
Program Logic Based Software Plagiarism Detection | 15 | 0.52 | 2014 |
ViewDroid: towards obfuscation-resilient mobile application repackaging detection | 32 | 0.98 | 2014 |
Zigzag: Partial mutual revocation based trust management in tactical ad hoc networks | 2 | 0.40 | 2013 |
A Framework for Evaluating Mobile App Repackaging Detection Algorithms. | 37 | 1.33 | 2013 |
Is this app safe for children?: a comparison study of maturity ratings on Android and iOS applications | 14 | 0.78 | 2013 |
Towards statistically strong source anonymity for sensor networks | 46 | 1.21 | 2013 |
AK-PPM: an authenticated packet attribution scheme for mobile ad hoc networks | 2 | 0.36 | 2012 |
TapLogger: inferring user inputs on smartphone touchscreens using on-board motion sensors | 142 | 4.17 | 2012 |
Replacement attacks: automatically evading behavior-based software birthmark | 1 | 0.35 | 2012 |
An Algorithm for Jammer Localization in Wireless Sensor Networks | 12 | 0.63 | 2012 |
A first step towards algorithm plagiarism detection | 28 | 0.94 | 2012 |
Towards Trusted Services: Result Verification Schemes for MapReduce | 13 | 0.63 | 2012 |
The power of obfuscation techniques in malicious JavaScript code: A measurement study | 22 | 0.97 | 2012 |
Semantics-Aware Storage and Replication of Trust Metadata in Mobile Ad-hoc Networks | 1 | 0.36 | 2012 |
Value-based program characterization and its application to software plagiarism detection | 37 | 1.55 | 2011 |