The evolution of android malware and android analysis techniques

K Tam, A Feizollah, NB Anuar, R Salleh… - ACM Computing …, 2017 - dl.acm.org
With the integration of mobile devices into daily life, smartphones are privy to increasing
amounts of sensitive information. Sophisticated mobile malware, particularly Android …

Securing android: a survey, taxonomy, and challenges

Sufatrio, DJJ Tan, TW Chua, VLL Thing - ACM Computing Surveys …, 2015 - dl.acm.org
Recent years have seen a global adoption of smart mobile devices, particularly those based
on Android. However, Android's widespread adoption is marred with increasingly rampant …

Aff-wild: valence and arousal'In-the-Wild'challenge

S Zafeiriou, D Kollias, MA Nicolaou… - Proceedings of the …, 2017 - openaccess.thecvf.com
Abstract The Affect-in-the-Wild (Aff-Wild) Challenge proposes a new comprehensive
benchmark for assessing the performance of facial affect/behaviour analysis …

Location privacy protection based on differential privacy strategy for big data in industrial internet of things

C Yin, J **, R Sun, J Wang - IEEE Transactions on Industrial …, 2017 - ieeexplore.ieee.org
In the research of location privacy protection, the existing methods are mostly based on the
traditional anonymization, fuzzy and cryptography technology, and little success in the big …

Dissecting android malware: Characterization and evolution

Y Zhou, X Jiang - 2012 IEEE symposium on security and …, 2012 - ieeexplore.ieee.org
The popularity and adoption of smart phones has greatly stimulated the spread of mobile
malware, especially on the popular platforms such as Android. In light of their rapid growth …

An Exhibition of Hidden Stories: The Young Voices Soundscape-Examining Sound and Silence as a Collective Experience in Sound Art Installation

P Demetriou - HARTS & Minds, 2014 - research-information.bris.ac.uk
In this paper I explore the concepts of sound and silence focusing upon creative modalities
for the dissemination of oral history materials. In doing so I focus upon two sound …

Pscout: analyzing the android permission specification

KWY Au, YF Zhou, Z Huang, D Lie - … of the 2012 ACM conference on …, 2012 - dl.acm.org
Modern smartphone operating systems (OSs) have been developed with a greater
emphasis on security and protecting privacy. One of the mechanisms these systems use to …

Taintdroid: an information-flow tracking system for realtime privacy monitoring on smartphones

W Enck, P Gilbert, S Han, V Tendulkar… - ACM Transactions on …, 2014 - dl.acm.org
Today's smartphone operating systems frequently fail to provide users with visibility into how
third-party applications collect and share their private data. We address these shortcomings …

[PDF][PDF] Hey, you, get off of my market: detecting malicious apps in official and alternative android markets.

Y Zhou, Z Wang, W Zhou, X Jiang - NDSS, 2012 - cs.umd.edu
In this paper, we present a systematic study for the detection of malicious applications (or
apps) on popular Android Markets. To this end, we first propose a permissionbased …

Riskranker: scalable and accurate zero-day android malware detection

M Grace, Y Zhou, Q Zhang, S Zou, X Jiang - Proceedings of the 10th …, 2012 - dl.acm.org
Smartphone sales have recently experienced explosive growth. Their popularity also
encourages malware authors to penetrate various mobile marketplaces with malicious …