Discovery - Top 10
By people
HKU Organizations
- 261 hku musketeers foundation institu...
- 14 faculty of engineering
- 13 school of computing and data science
- 5 department of electrical and elec...
- 3 department of mathematics
- 3 faculty of science
- 3 faculty of social sciences
- 2 department of geography
- 2 school of biological sciences
- 1 department of family medicine and...
Browse
Collection's Items (Sorted by Submit Date in Descending order): 41 to 60 of 261
Title | Author(s) | Issue Date | |
---|---|---|---|
RetroSkeleton: Retrofitting android apps Proceeding/Conference:MobiSys 2013 - Proceedings of the 11th Annual International Conference on Mobile Systems, Applications, and Services | 2013 | ||
AnDarwin: Scalable detection of semantically similar Android applications Proceeding/Conference:Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) | 2013 | ||
Privacy-preserving alibi systems Proceeding/Conference:ASIACCS 2012 - 7th ACM Symposium on Information, Computer and Communications Security | 2012 | ||
Gesture authentication with touch input for mobile devices Proceeding/Conference:Lecture Notes of the Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering | 2012 | ||
Attack of the clones: Detecting cloned applications on Android markets Proceeding/Conference:Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) | 2012 | ||
SQUEEZE TRAINING FOR ADVERSARIAL ROBUSTNESS Proceeding/Conference:11th International Conference on Learning Representations, ICLR 2023 | 2023 | ||
Good Neighbor: Secure Pairing of Nearby Wireless Devices by Multiple Antennas<sup>∗</sup> Proceeding/Conference:Proceedings of the Symposium on Network and Distributed System Security, NDSS 2011 | 2011 | ||
Opaak: Using mobile phones to limit anonymous identities online Proceeding/Conference:MobiSys'12 - Proceedings of the 10th International Conference on Mobile Systems, Applications, and Services | 2012 | ||
On the practicality of motion based keystroke inference attack Proceeding/Conference:Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) | 2012 | ||
AndroidLeaks: Automatically detecting potential privacy leaks in Android applications on a large scale Proceeding/Conference:Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) | 2012 | ||
CapAuth: A capability-based handover scheme Proceeding/Conference:Proceedings - IEEE INFOCOM | 2010 | ||
Exploiting Opportunistic Scheduling in Cellular Data Networks Proceeding/Conference:Proceedings of the Symposium on Network and Distributed System Security, NDSS 2008 | 2008 | ||
Membership Inference Attack in Face of Data Transformations Proceeding/Conference:2022 IEEE Conference on Communications and Network Security, CNS 2022 | 2022 | ||
Secure file system services for web 2.0 applications Proceeding/Conference:Proceedings of the ACM Conference on Computer and Communications Security | 2009 | ||
Multi-party off-the-record messaging Proceeding/Conference:Proceedings of the ACM Conference on Computer and Communications Security | 2009 | ||
Noise injection for search privacy protection Proceeding/Conference:Proceedings - 12th IEEE International Conference on Computational Science and Engineering, CSE 2009 | 2009 | ||
OMash: Enabling secure web mashups via object abstractions Proceeding/Conference:Proceedings of the ACM Conference on Computer and Communications Security | 2008 | ||
Distributed authentication for low-cost wireless networks Proceeding/Conference:HotMobile 2008: 9th Workshop on Mobile Computing Systems and Applications | 2008 | ||
Back to the future: A framework for automatic malware removal and system repair Proceeding/Conference:Proceedings - Annual Computer Security Applications Conference, ACSAC | 2006 | ||
Feature omission vulnerabilities: Thwarting signature generation for polymorphic worms Proceeding/Conference:Proceedings - Annual Computer Security Applications Conference, ACSAC | 2007 |
Collection's Items (Sorted by Submit Date in Descending order): 41 to 60 of 261