Showing results 1 to 19 of 19
Title | Author(s) | Issue Date | |
---|---|---|---|
A Survey on Access Control in Fog Computing Journal:IEEE Communications Magazine | 2018 | ||
An adaptive gas cost mechanism for ethereum to defend against under-priced DoS attacks Proceeding/Conference:Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) | 2017 | ||
AndroidPerf: A cross-layer profiling system for Android applications Proceeding/Conference:2015 IEEE 23rd International Symposium on Quality of Service, IWQoS 2015 | 2016 | ||
AutoFlowLeaker: Circumventing web censorship through automation services Proceeding/Conference:Proceedings of the IEEE Symposium on Reliable Distributed Systems | 2017 | ||
CloudBot: Advanced mobile botnets using ubiquitous cloud technologies Journal:Pervasive and Mobile Computing | 2017 | ||
CRONUS: Fault-isolated, Secure and High-performance Heterogeneous Computing for Trusted Execution Environment Proceeding/Conference:2022 55th IEEE/ACM International Symposium on Microarchitecture (MICRO) (01/10/2022-05/10/2022, Chicago) | 5-Oct-2022 | ||
CydiOS: a model-based testing framework for iOS apps Proceeding/Conference:International Symposium on Software Testing and Analysis - ISSTA 2023 (17/07/2023-21/07/2023, Seattle) | 13-Jul-2023 | ||
Enhancing the Description-to-Behavior Fidelity in Android Apps with Privacy Policy Journal:IEEE Transactions on Software Engineering | 2018 | ||
I know where you all are! exploiting mobile social apps for large-scale location privacy probing Proceeding/Conference:Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) | 2016 | ||
Muse: Towards robust and stealthy mobile botnets via multiple message push services Proceeding/Conference:Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) | 2016 | ||
NDroid: Toward tracking information flows across multiple android contexts Journal:IEEE Transactions on Information Forensics and Security | 2019 | ||
On measuring one-way path metrics from a web server Proceeding/Conference:Proceedings - International Conference on Network Protocols, ICNP | 2014 | ||
On tracking information flows through JNI in android applications Proceeding/Conference:Proceedings of the International Conference on Dependable Systems and Networks | 2014 | ||
Revisiting Automotive Attack Surfaces: a Practitioners’ Perspective Proceeding/Conference:IEEE Symposium on Security and Privacy 2024 (20/05/2024-23/05/2024, San Francisco) | 20-May-2024 | ||
Revisiting the description-to-behavior fidelity in android applications Proceeding/Conference:2016 IEEE 23rd International Conference on Software Analysis, Evolution, and Reengineering, SANER 2016 | 2016 | ||
RootGuard: Protecting rooted android phones Journal:Computer | 2014 | ||
SOTER: Guarding Black-box Inference for General Neural Networks at the Edge Proceeding/Conference:2022 USENIX Annual Technical Conference (11/07/2022-13/07/2022, Carlsbad) | 13-Jul-2022 | ||
Towards a scalable resource-driven approach for detecting repackaged android applications Proceeding/Conference:Proceedings of the 30th Annual Computer Security Applications Conference | 2014 | ||
VulHunter: Toward discovering vulnerabilities in android applications Journal:IEEE Micro | 2015 |