HKU Musketeers Foundation Institute of Data Science: Conference papers Collection home page

Browse
Subscribe to this collection to receive daily e-mail notification of new additions RSS Feed RSS Feed RSS Feed
Collection's Items (Sorted by Submit Date in Descending order): 61 to 80 of 294
TitleAuthor(s)Issue Date
AppShield: Enabling multi-entity access control cross platforms for mobile app management
Proceeding/Conference:Lecture Notes of the Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering, LNICST
2017
On the origin of mobile apps: Network provenance for android applications
Proceeding/Conference:CODASPY 2016 - Proceedings of the 6th ACM Conference on Data and Application Security and Privacy
2016
FineDroid: Enforcing permissions with system-wide application execution context
Proceeding/Conference:Lecture Notes of the Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering, LNICST
2015
Noncespaces: Using Randomization to Enforce Information Flow Tracking and Thwart Cross-Site Scripting Attacks
Proceeding/Conference:Proceedings of the Symposium on Network and Distributed System Security, NDSS 2009
2009
Defending against sensor-sniffing attacks on mobile phones
Proceeding/Conference:SIGCOMM 2009 - Proceedings of the 2009 SIGCOMM Conference and Co-Located Workshops, MobiHeld 2009
2009
Asking for (and about) permissions used by android apps
Proceeding/Conference:IEEE International Working Conference on Mining Software Repositories
2013
RevDroid: Code analysis of the side effects after dynamic permission revocation of android apps
Proceeding/Conference:ASIA CCS 2016 - Proceedings of the 11th ACM Asia Conference on Computer and Communications Security
2016
TouchLogger: Inferring keystrokes on touch screen from smartphone motion
Proceeding/Conference:HotSec 2011 - 6th USENIX Workshop on Hot Topics in Security
2011
Predictive eviction: a novel policy for optimizing tls session cache performance
Proceeding/Conference:Proceedings - IEEE Global Communications Conference, GLOBECOM
2015
MAdFraud: Investigating ad fraud in Android applications
Proceeding/Conference:MobiSys 2014 - Proceedings of the 12th Annual International Conference on Mobile Systems, Applications, and Services
2014
Using and asking: APIs used in the Android market and asked about in StackOverflow
Proceeding/Conference:Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
2013
A Quantitative Study of Forum Spamming Using Context-based Analysis
Proceeding/Conference:Proceedings of the Symposium on Network and Distributed System Security, NDSS 2007
2007
Mitigating DoS attacks on the paging channel by efficient encoding in page messages
Proceeding/Conference:Lecture Notes of the Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering
2009
RetroSkeleton: Retrofitting android apps
Proceeding/Conference:MobiSys 2013 - Proceedings of the 11th Annual International Conference on Mobile Systems, Applications, and Services
2013
AnDarwin: Scalable detection of semantically similar Android applications
Proceeding/Conference:Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
2013
Privacy-preserving alibi systems
Proceeding/Conference:ASIACCS 2012 - 7th ACM Symposium on Information, Computer and Communications Security
2012
Gesture authentication with touch input for mobile devices
Proceeding/Conference:Lecture Notes of the Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering
2012
Attack of the clones: Detecting cloned applications on Android markets
Proceeding/Conference:Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
2012
SQUEEZE TRAINING FOR ADVERSARIAL ROBUSTNESS
Proceeding/Conference:11th International Conference on Learning Representations, ICLR 2023
2023
Good Neighbor: Secure Pairing of Nearby Wireless Devices by Multiple Antennas<sup>∗</sup>
Proceeding/Conference:Proceedings of the Symposium on Network and Distributed System Security, NDSS 2011
2011
Collection's Items (Sorted by Submit Date in Descending order): 61 to 80 of 294