Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
Dynamic security analysis on android: A systematic literature review
Dynamic analysis is a technique that is used to fully understand the internals of a system at
runtime. On Android, dynamic security analysis involves real-time assessment and active …
runtime. On Android, dynamic security analysis involves real-time assessment and active …
[HTML][HTML] Threaten me softly: A review of potential dating app risks
A Phan, K Seigfried-Spellar, KKR Choo - Computers in human behavior …, 2021 - Elsevier
The potential abuse of dating applications (apps), including during the current lockdowns
due to COVID-19, has resulted in a growing community of research to learn to what extent …
due to COVID-19, has resulted in a growing community of research to learn to what extent …
Predicting personality from patterns of behavior collected with smartphones
Smartphones enjoy high adoption rates around the globe. Rarely more than an arm's length
away, these sensor-rich devices can easily be repurposed to collect rich and extensive …
away, these sensor-rich devices can easily be repurposed to collect rich and extensive …
Are iphones really better for privacy? comparative study of ios and android apps
While many studies have looked at privacy properties of the Android and Google Play app
ecosystem, comparatively much less is known about iOS and the Apple App Store, the most …
ecosystem, comparatively much less is known about iOS and the Apple App Store, the most …
Actions speak louder than words:{Entity-Sensitive} privacy policy and data flow analysis with {PoliCheck}
Identifying privacy-sensitive data leaks by mobile applications has been a topic of great
research interest for the past decade. Technically, such data flows are not “leaks” if they are …
research interest for the past decade. Technically, such data flows are not “leaks” if they are …
The android platform security model
R Mayrhofer, JV Stoep, C Brubaker… - ACM Transactions on …, 2021 - dl.acm.org
Android is the most widely deployed end-user focused operating system. With its growing
set of use cases encompassing communication, navigation, media consumption …
set of use cases encompassing communication, navigation, media consumption …
Share first, ask later (or never?) studying violations of {GDPR's} explicit consent in android apps
Since the General Data Protection Regulation (GDPR) went into effect in May 2018, online
services are required to obtain users' explicit consent before sharing users' personal data …
services are required to obtain users' explicit consent before sharing users' personal data …
Developers say the darnedest things: Privacy compliance processes followed by developers of child-directed apps
We investigate the privacy compliance processes followed by developers of child-directed
mobile apps. While children's online privacy laws have existed for decades in the US, prior …
mobile apps. While children's online privacy laws have existed for decades in the US, prior …
From parental control to joint family oversight: Can parents and teens manage mobile online safety and privacy as equals?
Our research aims to highlight and alleviate the complex tensions around online safety,
privacy, and smartphone usage in families so that parents and teens can work together to …
privacy, and smartphone usage in families so that parents and teens can work together to …
Stuck in the permissions with you: Developer & end-user perspectives on app permissions & their privacy ramifications
While the literature on permissions from the end-user perspective is rich, there is a lack of
empirical research on why developers request permissions, their conceptualization of …
empirical research on why developers request permissions, their conceptualization of …