The evolution of android malware and android analysis techniques
With the integration of mobile devices into daily life, smartphones are privy to increasing
amounts of sensitive information. Sophisticated mobile malware, particularly Android …
amounts of sensitive information. Sophisticated mobile malware, particularly Android …
Securing android: a survey, taxonomy, and challenges
Recent years have seen a global adoption of smart mobile devices, particularly those based
on Android. However, Android's widespread adoption is marred with increasingly rampant …
on Android. However, Android's widespread adoption is marred with increasingly rampant …
Aff-wild: valence and arousal'In-the-Wild'challenge
Abstract The Affect-in-the-Wild (Aff-Wild) Challenge proposes a new comprehensive
benchmark for assessing the performance of facial affect/behaviour analysis …
benchmark for assessing the performance of facial affect/behaviour analysis …
Location privacy protection based on differential privacy strategy for big data in industrial internet of things
C Yin, J **, R Sun, J Wang - IEEE Transactions on Industrial …, 2017 - ieeexplore.ieee.org
In the research of location privacy protection, the existing methods are mostly based on the
traditional anonymization, fuzzy and cryptography technology, and little success in the big …
traditional anonymization, fuzzy and cryptography technology, and little success in the big …
Dissecting android malware: Characterization and evolution
The popularity and adoption of smart phones has greatly stimulated the spread of mobile
malware, especially on the popular platforms such as Android. In light of their rapid growth …
malware, especially on the popular platforms such as Android. In light of their rapid growth …
An Exhibition of Hidden Stories: The Young Voices Soundscape-Examining Sound and Silence as a Collective Experience in Sound Art Installation
P Demetriou - HARTS & Minds, 2014 - research-information.bris.ac.uk
In this paper I explore the concepts of sound and silence focusing upon creative modalities
for the dissemination of oral history materials. In doing so I focus upon two sound …
for the dissemination of oral history materials. In doing so I focus upon two sound …
Pscout: analyzing the android permission specification
Modern smartphone operating systems (OSs) have been developed with a greater
emphasis on security and protecting privacy. One of the mechanisms these systems use to …
emphasis on security and protecting privacy. One of the mechanisms these systems use to …
Taintdroid: an information-flow tracking system for realtime privacy monitoring on smartphones
Today's smartphone operating systems frequently fail to provide users with visibility into how
third-party applications collect and share their private data. We address these shortcomings …
third-party applications collect and share their private data. We address these shortcomings …
[PDF][PDF] Hey, you, get off of my market: detecting malicious apps in official and alternative android markets.
In this paper, we present a systematic study for the detection of malicious applications (or
apps) on popular Android Markets. To this end, we first propose a permissionbased …
apps) on popular Android Markets. To this end, we first propose a permissionbased …
Riskranker: scalable and accurate zero-day android malware detection
Smartphone sales have recently experienced explosive growth. Their popularity also
encourages malware authors to penetrate various mobile marketplaces with malicious …
encourages malware authors to penetrate various mobile marketplaces with malicious …