HKU Musketeers Foundation Institute of Data Science: Conference papers Collection home page

Browse
Subscribe to this collection to receive daily e-mail notification of new additions RSS Feed RSS Feed RSS Feed
Collection's Items (Sorted by Submit Date in Descending order): 21 to 40 of 178
TitleAuthor(s)Issue Date
MAdFraud: Investigating ad fraud in Android applications
Proceeding/Conference:MobiSys 2014 - Proceedings of the 12th Annual International Conference on Mobile Systems, Applications, and Services
2014
Using and asking: APIs used in the Android market and asked about in StackOverflow
Proceeding/Conference:Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
2013
A Quantitative Study of Forum Spamming Using Context-based Analysis
Proceeding/Conference:Proceedings of the Symposium on Network and Distributed System Security, NDSS 2007
2007
Mitigating DoS attacks on the paging channel by efficient encoding in page messages
Proceeding/Conference:Lecture Notes of the Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering
2009
RetroSkeleton: Retrofitting android apps
Proceeding/Conference:MobiSys 2013 - Proceedings of the 11th Annual International Conference on Mobile Systems, Applications, and Services
2013
Privacy-preserving alibi systems
Proceeding/Conference:ASIACCS 2012 - 7th ACM Symposium on Information, Computer and Communications Security
2012
On the practicality of motion based keystroke inference attack
Proceeding/Conference:Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
2012
AndroidLeaks: Automatically detecting potential privacy leaks in Android applications on a large scale
Proceeding/Conference:Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
2012
Membership Inference Attack in Face of Data Transformations
Proceeding/Conference:2022 IEEE Conference on Communications and Network Security, CNS 2022
2022
Secure file system services for web 2.0 applications
Proceeding/Conference:Proceedings of the ACM Conference on Computer and Communications Security
2009
Back to the future: A framework for automatic malware removal and system repair
Proceeding/Conference:Proceedings - Annual Computer Security Applications Conference, ACSAC
2006
Exploiting MMS vulnerabilities to stealthily exhaust mobile phone's battery
Proceeding/Conference:2006 Securecomm and Workshops
2006
Spam double-funnel: Connecting web spammers with advertisers
Proceeding/Conference:16th International World Wide Web Conference, WWW2007
2007
 
On Reinforcement Learning in Stabilizability of Probabilistic Boolean Control Networks
Proceeding/Conference:2023 International Conference on Machine Learning and Cybernetics (ICMLC) (09/07/2023-11/07/2023, , , Adelaide)
28-Nov-2023
Generalizing Word Embeddings using Bag of Subwords
Proceeding/Conference:Proceedings of the 2018 Conference on Empirical Methods in Natural Language Processing, EMNLP 2018
2018
Stratified Adversarial Robustness with Rejection
Proceeding/Conference:Proceedings of Machine Learning Research
2023
A THEORETICAL ANALYSIS ON FEATURE LEARNING IN NEURAL NETWORKS: EMERGENCE FROM INPUTS AND ADVANTAGE OVER FIXED FEATURES
Proceeding/Conference:ICLR 2022 - 10th International Conference on Learning Representations
2022
Deep Online Fused Video Stabilization
Proceeding/Conference:Proceedings - 2022 IEEE/CVF Winter Conference on Applications of Computer Vision, WACV 2022
2022
ATOM: Robustifying Out-of-Distribution Detection Using Outlier Mining
Proceeding/Conference:Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
2021
Sketching Transformed Matrices with Applications to Natural Language Processing
Proceeding/Conference:Proceedings of Machine Learning Research
2020
Collection's Items (Sorted by Submit Date in Descending order): 21 to 40 of 178