HKU Musketeers Foundation Institute of Data Science: Conference papers Collection home page

Browse
Subscribe to this collection to receive daily e-mail notification of new additions RSS Feed RSS Feed RSS Feed
Collection's Items (Sorted by Submit Date in Descending order): 41 to 60 of 261
TitleAuthor(s)Issue Date
RetroSkeleton: Retrofitting android apps
Proceeding/Conference:MobiSys 2013 - Proceedings of the 11th Annual International Conference on Mobile Systems, Applications, and Services
2013
AnDarwin: Scalable detection of semantically similar Android applications
Proceeding/Conference:Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
2013
Privacy-preserving alibi systems
Proceeding/Conference:ASIACCS 2012 - 7th ACM Symposium on Information, Computer and Communications Security
2012
Gesture authentication with touch input for mobile devices
Proceeding/Conference:Lecture Notes of the Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering
2012
Attack of the clones: Detecting cloned applications on Android markets
Proceeding/Conference:Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
2012
SQUEEZE TRAINING FOR ADVERSARIAL ROBUSTNESS
Proceeding/Conference:11th International Conference on Learning Representations, ICLR 2023
2023
Good Neighbor: Secure Pairing of Nearby Wireless Devices by Multiple Antennas<sup>∗</sup>
Proceeding/Conference:Proceedings of the Symposium on Network and Distributed System Security, NDSS 2011
2011
Opaak: Using mobile phones to limit anonymous identities online
Proceeding/Conference:MobiSys'12 - Proceedings of the 10th International Conference on Mobile Systems, Applications, and Services
2012
On the practicality of motion based keystroke inference attack
Proceeding/Conference:Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
2012
AndroidLeaks: Automatically detecting potential privacy leaks in Android applications on a large scale
Proceeding/Conference:Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
2012
CapAuth: A capability-based handover scheme
Proceeding/Conference:Proceedings - IEEE INFOCOM
2010
Exploiting Opportunistic Scheduling in Cellular Data Networks
Proceeding/Conference:Proceedings of the Symposium on Network and Distributed System Security, NDSS 2008
2008
Membership Inference Attack in Face of Data Transformations
Proceeding/Conference:2022 IEEE Conference on Communications and Network Security, CNS 2022
2022
Secure file system services for web 2.0 applications
Proceeding/Conference:Proceedings of the ACM Conference on Computer and Communications Security
2009
Multi-party off-the-record messaging
Proceeding/Conference:Proceedings of the ACM Conference on Computer and Communications Security
2009
Noise injection for search privacy protection
Proceeding/Conference:Proceedings - 12th IEEE International Conference on Computational Science and Engineering, CSE 2009
2009
OMash: Enabling secure web mashups via object abstractions
Proceeding/Conference:Proceedings of the ACM Conference on Computer and Communications Security
2008
Distributed authentication for low-cost wireless networks
Proceeding/Conference:HotMobile 2008: 9th Workshop on Mobile Computing Systems and Applications
2008
Back to the future: A framework for automatic malware removal and system repair
Proceeding/Conference:Proceedings - Annual Computer Security Applications Conference, ACSAC
2006
Feature omission vulnerabilities: Thwarting signature generation for polymorphic worms
Proceeding/Conference:Proceedings - Annual Computer Security Applications Conference, ACSAC
2007
Collection's Items (Sorted by Submit Date in Descending order): 41 to 60 of 261