P-Shake: Towards Secure Authentication and Communication between Mobile Devices | 0 | 0.34 | 2021 |
Exploring Sequential And Collaborative Contexts For Next Point-Of-Interest Recommendation | 0 | 0.34 | 2021 |
DPVGeo: Delay-based Public Verification of Cloud Data Geolocation | 0 | 0.34 | 2020 |
Tainting-Assisted and Context-Migrated Symbolic Execution of Android Framework for Vulnerability Discovery and Exploit Generation | 1 | 0.35 | 2020 |
VoteGeo: An IoT-based Voting Approach to Verify the Geographic Location of Cloud Hosts | 0 | 0.34 | 2019 |
How to Make Information-Flow Analysis Based Defense Ineffective: An ART Behavior-Mask Attack. | 0 | 0.34 | 2017 |
System Service Call-oriented Symbolic Execution of Android Framework with Applications to Vulnerability Discovery and Exploit Generation. | 2 | 0.36 | 2017 |
Context-aware System Service Call-oriented Symbolic Execution of Android Framework with Application to Exploit Generation. | 0 | 0.34 | 2016 |
Implementing a Covert Timing Channel Based on Mimic Function | 1 | 0.37 | 2014 |