|
acl optimization |
1 |
|
acl partitioning |
1 |
|
adversarial attacks |
1 |
|
adversarial examples |
1 |
|
adversarial transferability |
1 |
|
advertisement syndication |
1 |
|
advertising |
1 |
|
android |
1 |
|
android security |
1 |
|
anomaly detection |
1 |
|
anonymous credentials |
1 |
|
app testing |
1 |
|
application context |
1 |
|
audit |
1 |
|
authentication |
1 |
|
automated test generation |
1 |
|
backpressure-based scheduling |
1 |
|
binary-level |
1 |
|
browser |
1 |
|
browsing history |
1 |
|
bytecode |
1 |
|
captcha |
1 |
|
cellular networks |
1 |
|
click fraud |
1 |
|
client-side policy enforcement |
1 |
|
clustering |
1 |
|
code similarity |
1 |
|
code synthesis |
1 |
|
cold-start recommendation |
1 |
|
communication |
1 |
|
concurrent logic bomb (clb) |
1 |
|
concurrent program spectre (concspectre) |
1 |
|
concurrent programs |
1 |
|
containers |
1 |
|
controllable probabilistic activation (cpa) |
1 |
|
coverage based fuzzing |
1 |
|
cross-site scripting |
1 |
|
daemon analysis |
1 |
|
dalvik |
1 |
|
data mining |
1 |
|
data privacy |
1 |
|
data transformation |
1 |
|
deep convolutional network |
1 |
|
deep learning security |
1 |
|
deep neural networks |
1 |
|
defense |
1 |
|
delay distribution |
1 |
|
deniability |
1 |
|
distributed |
1 |
|
dji |
1 |
|
dos attacks |
1 |
|
dynamic analysis |
1 |
|
face recognition |
1 |
|
fairness |
1 |
|
feature maps |
1 |
|
file system |
1 |
|
fingerprint |
1 |
|
fires |
1 |
|
firewall management |
1 |
|
firewall optimization |
1 |
|
fuzzing |
1 |
|
gcn |
1 |
|
general page message |
1 |
|
generalization ability |
1 |
|
generative modeling |
1 |
|
gestures |
1 |
|
graph-induced ranks |
1 |
|
greybox fuzzing |
1 |
|
handoff. |
1 |
|
high-dimensional data |
1 |
|
hooking |
1 |
|
image transformation |
1 |
|
information flow tracking |
1 |
|
inspection |
1 |
|
instant messaging |
1 |
|
integer errors |
1 |
|
internet |
1 |
|
internet of things |
1 |
|
interpreter |
1 |
|
library detection |
1 |
|
mashup |
1 |
|
measurement |
1 |
|
membership inference |
1 |
|
membership inference attack |
1 |
|
microphone |
1 |
|
microservices |
1 |
|
mobile |
1 |
|
mobile app |
1 |
|
mobile applications |
1 |
|
mobile authentication |
1 |
|
multi-party |
1 |
|
network data |
1 |
|
network traffic classification |
1 |
|
neural style transfer |
1 |
|
obfuscation resilience |
1 |
|
object abstraction |
1 |
|
on-device |
1 |
|
online advertising |
1 |
|
openid |
1 |
|
opportunistic scheduling |
1 |
|
optimization |
1 |
|
paging |
1 |
|
partitioning algorithms |
1 |
|
permission enforcement |
1 |
|
permission over-claim |
1 |
|
permission revocation |
1 |
|
phishing |
1 |
|
plagiarism |
1 |
|
plagiarism detection |
1 |
|
policy framework |
1 |
|
privacy |
1 |
|
private mode |
1 |
|
program analysis |
1 |
|
proportional fair |
1 |
|
protection |
1 |
|
quick paging |
1 |
|
recommender system |
1 |
|
redirection and cloaking |
1 |
|
revdroid |
1 |
|
rewriting |
1 |
|
robustness |
1 |
|
rpc |
1 |
|
same origin policy |
1 |
|
search spam |
1 |
|
security |
1 |
|
security model |
1 |
|
security vulnerabilities |
1 |
|
sendroid |
1 |
|
sensor |
1 |
|
servers |
1 |
|
simulation analysis |
1 |
|
single sign on |
1 |
|
sniffing |
1 |
|
software security |
1 |
|
spam |
1 |
|
statistics |
1 |
|
sybil attacks |
1 |
|
tail probability |
1 |
|
taint analysis |
1 |
|
temporal fair |
1 |
|
time spoofing attacks |
1 |
|
token transfer |
1 |
|
traffic signal control |
1 |
|
transferability |
1 |
|
underground economy |
1 |
|
unmanned aerial vehicles |
1 |
|
usable security |
1 |
|
user clustering |
1 |
|
vm |
1 |
|
vulnerability detection |
1 |
|
vulnrability detection |
1 |
|
web |
1 |
|
web application |
1 |
|
web authentication |
1 |
|
web spam |
1 |
|
world wide web |
1 |