acl optimization |
1 |
acl partitioning |
1 |
adversarial attacks |
1 |
adversarial examples |
1 |
adversarial transferability |
1 |
advertisement syndication |
1 |
advertising |
1 |
android |
1 |
android security |
1 |
anomaly detection |
1 |
anonymous credentials |
1 |
app testing |
1 |
application context |
1 |
audit |
1 |
authentication |
1 |
automated test generation |
1 |
backpressure-based scheduling |
1 |
binary-level |
1 |
browser |
1 |
browsing history |
1 |
bytecode |
1 |
captcha |
1 |
cellular networks |
1 |
click fraud |
1 |
client-side policy enforcement |
1 |
clustering |
1 |
code similarity |
1 |
code synthesis |
1 |
cold-start recommendation |
1 |
communication |
1 |
concurrent logic bomb (clb) |
1 |
concurrent program spectre (concspectre) |
1 |
concurrent programs |
1 |
containers |
1 |
controllable probabilistic activation (cpa) |
1 |
coverage based fuzzing |
1 |
cross-site scripting |
1 |
daemon analysis |
1 |
dalvik |
1 |
data mining |
1 |
data privacy |
1 |
data transformation |
1 |
deep convolutional network |
1 |
deep learning security |
1 |
deep neural networks |
1 |
defense |
1 |
delay distribution |
1 |
deniability |
1 |
distributed |
1 |
dji |
1 |
dos attacks |
1 |
dynamic analysis |
1 |
face recognition |
1 |
fairness |
1 |
feature maps |
1 |
file system |
1 |
fingerprint |
1 |
fires |
1 |
firewall management |
1 |
firewall optimization |
1 |
fuzzing |
1 |
gcn |
1 |
general page message |
1 |
generalization ability |
1 |
generative modeling |
1 |
gestures |
1 |
greybox fuzzing |
1 |
handoff. |
1 |
hooking |
1 |
image transformation |
1 |
information flow tracking |
1 |
inspection |
1 |
instant messaging |
1 |
integer errors |
1 |
internet |
1 |
internet of things |
1 |
interpreter |
1 |
library detection |
1 |
mashup |
1 |
measurement |
1 |
membership inference |
1 |
membership inference attack |
1 |
microphone |
1 |
microservices |
1 |
mobile |
1 |
mobile app |
1 |
mobile applications |
1 |
mobile authentication |
1 |
multi-party |
1 |
network traffic classification |
1 |
neural style transfer |
1 |
obfuscation resilience |
1 |
object abstraction |
1 |
on-device |
1 |
online advertising |
1 |
openid |
1 |
opportunistic scheduling |
1 |
optimization |
1 |
paging |
1 |
partitioning algorithms |
1 |
permission enforcement |
1 |
permission over-claim |
1 |
permission revocation |
1 |
phishing |
1 |
plagiarism |
1 |
plagiarism detection |
1 |
policy framework |
1 |
privacy |
1 |
private mode |
1 |
program analysis |
1 |
proportional fair |
1 |
protection |
1 |
quick paging |
1 |
recommender system |
1 |
redirection and cloaking |
1 |
revdroid |
1 |
rewriting |
1 |
robustness |
1 |
rpc |
1 |
same origin policy |
1 |
search spam |
1 |
security |
1 |
security model |
1 |
security vulnerabilities |
1 |
sendroid |
1 |
sensor |
1 |
servers |
1 |
simulation analysis |
1 |
single sign on |
1 |
sniffing |
1 |
software security |
1 |
spam |
1 |
statistics |
1 |
sybil attacks |
1 |
taint analysis |
1 |
temporal fair |
1 |
time spoofing attacks |
1 |
token transfer |
1 |
traffic signal control |
1 |
transferability |
1 |
underground economy |
1 |
unmanned aerial vehicles |
1 |
usable security |
1 |
user clustering |
1 |
vm |
1 |
vulnerability detection |
1 |
vulnrability detection |
1 |
web |
1 |
web application |
1 |
web authentication |
1 |
web spam |
1 |
world wide web |
1 |