HKU Musketeers Foundation Institute of Data Science: Conference papers Collection home page

Browse
Subscribe to this collection to receive daily e-mail notification of new additions RSS Feed RSS Feed RSS Feed
Collection's Items (Sorted by Submit Date in Descending order): 81 to 100 of 294
TitleAuthor(s)Issue Date
Opaak: Using mobile phones to limit anonymous identities online
Proceeding/Conference:MobiSys'12 - Proceedings of the 10th International Conference on Mobile Systems, Applications, and Services
2012
On the practicality of motion based keystroke inference attack
Proceeding/Conference:Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
2012
AndroidLeaks: Automatically detecting potential privacy leaks in Android applications on a large scale
Proceeding/Conference:Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
2012
CapAuth: A capability-based handover scheme
Proceeding/Conference:Proceedings - IEEE INFOCOM
2010
Exploiting Opportunistic Scheduling in Cellular Data Networks
Proceeding/Conference:Proceedings of the Symposium on Network and Distributed System Security, NDSS 2008
2008
Membership Inference Attack in Face of Data Transformations
Proceeding/Conference:2022 IEEE Conference on Communications and Network Security, CNS 2022
2022
Secure file system services for web 2.0 applications
Proceeding/Conference:Proceedings of the ACM Conference on Computer and Communications Security
2009
Multi-party off-the-record messaging
Proceeding/Conference:Proceedings of the ACM Conference on Computer and Communications Security
2009
Noise injection for search privacy protection
Proceeding/Conference:Proceedings - 12th IEEE International Conference on Computational Science and Engineering, CSE 2009
2009
OMash: Enabling secure web mashups via object abstractions
Proceeding/Conference:Proceedings of the ACM Conference on Computer and Communications Security
2008
Distributed authentication for low-cost wireless networks
Proceeding/Conference:HotMobile 2008: 9th Workshop on Mobile Computing Systems and Applications
2008
Back to the future: A framework for automatic malware removal and system repair
Proceeding/Conference:Proceedings - Annual Computer Security Applications Conference, ACSAC
2006
Feature omission vulnerabilities: Thwarting signature generation for polymorphic worms
Proceeding/Conference:Proceedings - Annual Computer Security Applications Conference, ACSAC
2007
Exploiting MMS vulnerabilities to stealthily exhaust mobile phone's battery
Proceeding/Conference:2006 Securecomm and Workshops
2006
Spam double-funnel: Connecting web spammers with advertisers
Proceeding/Conference:16th International World Wide Web Conference, WWW2007
2007
FIREMAN: A toolkit for firewall modeling and analysis
Proceeding/Conference:Proceedings - IEEE Symposium on Security and Privacy
2006
AdRob: Examining the landscape and impact of android application plagiarism
Proceeding/Conference:MobiSys 2013 - Proceedings of the 11th Annual International Conference on Mobile Systems, Applications, and Services
2013
 
On Reinforcement Learning in Stabilizability of Probabilistic Boolean Control Networks
Proceeding/Conference:2023 International Conference on Machine Learning and Cybernetics (ICMLC) (09/07/2023-11/07/2023, , , Adelaide)
28-Nov-2023
Generalizing Word Embeddings using Bag of Subwords
Proceeding/Conference:Proceedings of the 2018 Conference on Empirical Methods in Natural Language Processing, EMNLP 2018
2018
Stratified Adversarial Robustness with Rejection
Proceeding/Conference:Proceedings of Machine Learning Research
2023
Collection's Items (Sorted by Submit Date in Descending order): 81 to 100 of 294