Discovery - Top 10
By people
HKU Organizations
- 294 hku musketeers foundation institu...
- 16 faculty of engineering
- 15 school of computing and data science
- 5 department of electrical and elec...
- 3 department of mathematics
- 3 faculty of science
- 3 faculty of social sciences
- 2 department of geography
- 2 school of biological sciences
- 1 department of family medicine and...
Browse
Collection's Items (Sorted by Submit Date in Descending order): 61 to 80 of 294
Title | Author(s) | Issue Date | |
---|---|---|---|
AppShield: Enabling multi-entity access control cross platforms for mobile app management Proceeding/Conference:Lecture Notes of the Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering, LNICST | 2017 | ||
On the origin of mobile apps: Network provenance for android applications Proceeding/Conference:CODASPY 2016 - Proceedings of the 6th ACM Conference on Data and Application Security and Privacy | 2016 | ||
FineDroid: Enforcing permissions with system-wide application execution context Proceeding/Conference:Lecture Notes of the Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering, LNICST | 2015 | ||
Noncespaces: Using Randomization to Enforce Information Flow Tracking and Thwart Cross-Site Scripting Attacks Proceeding/Conference:Proceedings of the Symposium on Network and Distributed System Security, NDSS 2009 | 2009 | ||
Defending against sensor-sniffing attacks on mobile phones Proceeding/Conference:SIGCOMM 2009 - Proceedings of the 2009 SIGCOMM Conference and Co-Located Workshops, MobiHeld 2009 | 2009 | ||
Asking for (and about) permissions used by android apps Proceeding/Conference:IEEE International Working Conference on Mining Software Repositories | 2013 | ||
RevDroid: Code analysis of the side effects after dynamic permission revocation of android apps Proceeding/Conference:ASIA CCS 2016 - Proceedings of the 11th ACM Asia Conference on Computer and Communications Security | 2016 | ||
TouchLogger: Inferring keystrokes on touch screen from smartphone motion Proceeding/Conference:HotSec 2011 - 6th USENIX Workshop on Hot Topics in Security | 2011 | ||
Predictive eviction: a novel policy for optimizing tls session cache performance Proceeding/Conference:Proceedings - IEEE Global Communications Conference, GLOBECOM | 2015 | ||
MAdFraud: Investigating ad fraud in Android applications Proceeding/Conference:MobiSys 2014 - Proceedings of the 12th Annual International Conference on Mobile Systems, Applications, and Services | 2014 | ||
Using and asking: APIs used in the Android market and asked about in StackOverflow Proceeding/Conference:Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) | 2013 | ||
A Quantitative Study of Forum Spamming Using Context-based Analysis Proceeding/Conference:Proceedings of the Symposium on Network and Distributed System Security, NDSS 2007 | 2007 | ||
Mitigating DoS attacks on the paging channel by efficient encoding in page messages Proceeding/Conference:Lecture Notes of the Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering | 2009 | ||
RetroSkeleton: Retrofitting android apps Proceeding/Conference:MobiSys 2013 - Proceedings of the 11th Annual International Conference on Mobile Systems, Applications, and Services | 2013 | ||
AnDarwin: Scalable detection of semantically similar Android applications Proceeding/Conference:Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) | 2013 | ||
Privacy-preserving alibi systems Proceeding/Conference:ASIACCS 2012 - 7th ACM Symposium on Information, Computer and Communications Security | 2012 | ||
Gesture authentication with touch input for mobile devices Proceeding/Conference:Lecture Notes of the Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering | 2012 | ||
Attack of the clones: Detecting cloned applications on Android markets Proceeding/Conference:Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) | 2012 | ||
SQUEEZE TRAINING FOR ADVERSARIAL ROBUSTNESS Proceeding/Conference:11th International Conference on Learning Representations, ICLR 2023 | 2023 | ||
Good Neighbor: Secure Pairing of Nearby Wireless Devices by Multiple Antennas<sup>∗</sup> Proceeding/Conference:Proceedings of the Symposium on Network and Distributed System Security, NDSS 2011 | 2011 |
Collection's Items (Sorted by Submit Date in Descending order): 61 to 80 of 294