SemaDroid: A Privacy-Aware Sensor Management Framework for Smartphones
暂无分享,去创建一个
Zhi Xu | Sencun Zhu | Sencun Zhu | Zhi Xu
[1] Seungyeop Han,et al. These aren't the droids you're looking for: retrofitting android to protect data from imperious applications , 2011, CCS '11.
[2] Jie Liu,et al. SpeakerSense: Energy Efficient Unobtrusive Speaker Identification on Mobile Phones , 2011, Pervasive.
[3] Vitaly Shmatikov,et al. A Scanner Darkly: Protecting User Privacy from Perceptual Applications , 2013, 2013 IEEE Symposium on Security and Privacy.
[4] Christian Schaefer,et al. A Policy Language for Distributed Usage Control , 2007, ESORICS.
[5] Matthai Philipose,et al. Courteous glass , 2014, UbiComp Adjunct.
[6] Tao Xie,et al. WHYPER: Towards Automating Risk Assessment of Mobile Applications , 2013, USENIX Security Symposium.
[7] Alastair R. Beresford,et al. MockDroid: trading privacy for application functionality on smartphones , 2011, HotMobile '11.
[8] Zhi Xu,et al. TapLogger: inferring user inputs on smartphone touchscreens using on-board motion sensors , 2012, WISEC '12.
[9] Swarat Chaudhuri,et al. A Study of Android Application Security , 2011, USENIX Security Symposium.
[10] Patrick D. McDaniel,et al. Semantically Rich Application-Centric Security in Android , 2009, 2009 Annual Computer Security Applications Conference.
[11] Ahmad-Reza Sadeghi,et al. Practical and lightweight domain isolation on Android , 2011, SPSM '11.
[12] Andrew T. Campbell,et al. Bewell: A smartphone application to monitor, model and promote wellbeing , 2011, PervasiveHealth 2011.
[13] Deborah Estrin,et al. Personal data vaults: a locus of control for personal data streams , 2010, CoNEXT.
[14] Tyler Moore,et al. The Economics of Information Security , 2006, Science.
[15] Xinwen Zhang,et al. Apex: extending Android permission model and enforcement with user-defined runtime constraints , 2010, ASIACCS '10.
[16] Romit Roy Choudhury,et al. MoVi: mobile phone based video highlights via collaborative sensing , 2010, MobiSys '10.
[17] Jun Han,et al. ACComplice: Location inference using accelerometers on smartphones , 2012, 2012 Fourth International Conference on Communication Systems and Networks (COMSNETS 2012).
[18] Steve Hanna,et al. Android permissions demystified , 2011, CCS '11.
[19] Yajin Zhou,et al. Taming Information-Stealing Smartphone Applications (on Android) , 2011, TRUST.
[20] Jun Han,et al. ACCessory: password inference using accelerometers on smartphones , 2012, HotMobile '12.
[21] Apu Kapadia,et al. Soundcomber: A Stealthy and Context-Aware Sound Trojan for Smartphones , 2011, NDSS.
[22] Andreas Krause,et al. The next big one: Detecting earthquakes and other rare events from community-based sensors , 2011, Proceedings of the 10th ACM/IEEE International Conference on Information Processing in Sensor Networks.
[23] Suman Nath,et al. Privacy-aware personalization for mobile advertising , 2012, CCS.
[24] Ye Xu,et al. Enabling large-scale human activity inference on smartphones using community similarity networks (csn) , 2011, UbiComp '11.
[25] Fan Zhang,et al. Stealthy video capturer: a new video-based spyware in 3G smartphones , 2009, WiSec '09.
[26] Christian Schaefer,et al. DUKE--Distributed Usage Control Enforcement , 2007, Eighth IEEE International Workshop on Policies for Distributed Systems and Networks (POLICY'07).
[27] Henri E. Bal,et al. ContextDroid: an Expression-Based Context Framework for Android , 2010 .
[28] Hao Chen,et al. TouchLogger: Inferring Keystrokes on Touch Screen from Smartphone Motion , 2011, HotSec.
[29] John Krumm,et al. Inference Attacks on Location Tracks , 2007, Pervasive.
[30] Qing Guo,et al. Balancing energy, latency and accuracy for mobile sensor data classification , 2011, SenSys.
[31] Kai Lung Hui,et al. Online Information Privacy: Measuring the Cost-Benefit Trade-Off , 2002, ICIS.
[32] Emiliano Miluzzo,et al. A survey of mobile phone sensing , 2010, IEEE Communications Magazine.
[33] Wei Pan,et al. SoundSense: scalable sound sensing for people-centric applications on mobile phones , 2009, MobiSys '09.
[34] Alessandro Acquisti,et al. Privacy Attitudes and Privacy Behavior - Losses, Gains, and Hyperbolic Discounting , 2004, Economics of Information Security.
[35] J CulnanMary. How did they get my name , 1993 .
[36] Philippe Golle,et al. On the Anonymity of Home/Work Location Pairs , 2009, Pervasive.
[37] Patrick Traynor,et al. (sp)iPhone: decoding vibrations from nearby keyboards using mobile phone accelerometers , 2011, CCS '11.
[38] Ramnath K. Chellappa,et al. Personalization versus Privacy: An Empirical Examination of the Online Consumer’s Dilemma , 2005, Inf. Technol. Manag..
[39] Mary J. Culnan,et al. "How Did They Get My Name?": An Exploratory Investigation of Consumer Attitudes Toward Secondary Information Use , 1993, MIS Q..
[40] David J. Crandall,et al. Reactive security: responding to visual stimuli from wearable cameras , 2014, UbiComp Adjunct.