Showing results 1 to 20 of 23
next >
| Title | Author(s) | Issue Date | |
|---|---|---|---|
A Survey on Access Control in Fog Computing Journal:IEEE Communications Magazine | 2018 | ||
An adaptive gas cost mechanism for ethereum to defend against under-priced DoS attacks Proceeding/Conference:Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) | 2017 | ||
AndroidPerf: A cross-layer profiling system for Android applications Proceeding/Conference:2015 IEEE 23rd International Symposium on Quality of Service, IWQoS 2015 | 2016 | ||
AutoFlowLeaker: Circumventing web censorship through automation services Proceeding/Conference:Proceedings of the IEEE Symposium on Reliable Distributed Systems | 2017 | ||
CherryPicker: A Parallel Solving and State Sharing Hybrid Fuzzing System Journal:IEEE Transactions on Dependable and Secure Computing | 1-Jan-2025 | ||
CloudBot: Advanced mobile botnets using ubiquitous cloud technologies Journal:Pervasive and Mobile Computing | 2017 | ||
CRONUS: Fault-isolated, Secure and High-performance Heterogeneous Computing for Trusted Execution Environment Proceeding/Conference:2022 55th IEEE/ACM International Symposium on Microarchitecture (MICRO) (01/10/2022-05/10/2022, Chicago) | 5-Oct-2022 | ||
CydiOS: a model-based testing framework for iOS apps Proceeding/Conference:International Symposium on Software Testing and Analysis - ISSTA 2023 (17/07/2023-21/07/2023, Seattle) | 13-Jul-2023 | ||
ECStore: Achieving Efficient and Compressible Indexing on Outsourced Encrypted Databases Journal:IEEE Transactions on Knowledge and Data Engineering | 1-Jan-2025 | ||
Enhancing the Description-to-Behavior Fidelity in Android Apps with Privacy Policy Journal:IEEE Transactions on Software Engineering | 2018 | ||
I know where you all are! exploiting mobile social apps for large-scale location privacy probing Proceeding/Conference:Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) | 2016 | ||
Muse: Towards robust and stealthy mobile botnets via multiple message push services Proceeding/Conference:Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) | 2016 | ||
NDroid: Toward tracking information flows across multiple android contexts Journal:IEEE Transactions on Information Forensics and Security | 2019 | ||
On measuring one-way path metrics from a web server Proceeding/Conference:Proceedings - International Conference on Network Protocols, ICNP | 2014 | ||
On tracking information flows through JNI in android applications Proceeding/Conference:Proceedings of the International Conference on Dependable Systems and Networks | 2014 | ||
Revisiting Automotive Attack Surfaces: a Practitioners’ Perspective Proceeding/Conference:IEEE Symposium on Security and Privacy 2024 (20/05/2024-23/05/2024, San Francisco) | 20-May-2024 | ||
Revisiting the description-to-behavior fidelity in android applications Proceeding/Conference:2016 IEEE 23rd International Conference on Software Analysis, Evolution, and Reengineering, SANER 2016 | 2016 | ||
RootGuard: Protecting rooted android phones Journal:Computer | 2014 | ||
SLARM: SLA-aware, Reliable and Efficient Transaction Dissemination for Permissioned Blockchains Journal:IEEE Transactions on Services Computing | 24-Jul-2025 | ||
SOTER: Guarding Black-box Inference for General Neural Networks at the Edge Proceeding/Conference:2022 USENIX Annual Technical Conference (11/07/2022-13/07/2022, Carlsbad) | 13-Jul-2022 |
