-
1
-
-
84907023845
-
-
http://developer.android.com/.
-
-
-
-
2
-
-
84907023844
-
-
http://en.wikipedia.org/wiki/cohen's-kappa.
-
-
-
-
3
-
-
84907023843
-
-
http://en.wikipedia.org/wiki/google-play.
-
-
-
-
4
-
-
84907023842
-
-
https://play.google.com/apps.
-
-
-
-
5
-
-
80755127060
-
Short paper: A look at smartphone permission models
-
New York, NY, USA, ACM
-
K. W. Y. Au, Y. F. Zhou, Z. Huang, P. Gill, and D. Lie. Short paper: a look at smartphone permission models. In Proceedings of the 1st ACM workshop on Security and privacy in smartphones and mobile devices, SPSM '11, pages 63-68, New York, NY, USA, 2011. ACM.
-
(2011)
Proceedings of the 1st ACM Workshop on Security and Privacy in Smartphones and Mobile Devices, SPSM '11
, pp. 63-68
-
-
Au, K.W.Y.1
Zhou, Y.F.2
Huang, Z.3
Gill, P.4
Lie, D.5
-
6
-
-
79955570859
-
Taintdroid: An information-flow tracking system for realtime privacy monitoring on smartphones
-
Berkeley, CA, USA, USENIX Association
-
W. Enck, P. Gilbert, B.-G. Chun, L. P. Cox, J. Jung, P. McDaniel, and A. N. Sheth. Taintdroid: an information-flow tracking system for realtime privacy monitoring on smartphones. In Proceedings of the 9th USENIX conference on Operating systems design and implementation, OSDI'10, pages 1-6, Berkeley, CA, USA, 2010. USENIX Association.
-
(2010)
Proceedings of the 9th USENIX Conference on Operating Systems Design and Implementation, OSDI'10
, pp. 1-6
-
-
Enck, W.1
Gilbert, P.2
Chun, B.-G.3
Cox, L.P.4
Jung, J.5
McDaniel, P.6
Sheth, A.N.7
-
7
-
-
74049155830
-
On lightweight mobile phone application certification
-
New York, NY, USA, ACM
-
W. Enck, M. Ongtang, and P. McDaniel. On lightweight mobile phone application certification. In Proceedings of the 16th ACM conference on Computer and communications security, CCS '09, pages 235-245, New York, NY, USA, 2009. ACM.
-
(2009)
Proceedings of the 16th ACM Conference on Computer and Communications Security, CCS '09
, pp. 235-245
-
-
Enck, W.1
Ongtang, M.2
McDaniel, P.3
-
8
-
-
80755187788
-
Android permissions demystified
-
New York, NY, USA, ACM
-
A. P. Felt, E. Chin, S. Hanna, D. Song, and D. Wagner. Android permissions demystified. In Proceedings of the 18th ACM conference on Computer and communications security, CCS '11, pages 627-638, New York, NY, USA, 2011. ACM.
-
(2011)
Proceedings of the 18th ACM Conference on Computer and Communications Security, CCS '11
, pp. 627-638
-
-
Felt, A.P.1
Chin, E.2
Hanna, S.3
Song, D.4
Wagner, D.5
-
9
-
-
0242456822
-
Optimizing search engines using clickthrough data
-
New York, NY, USA, ACM
-
T. Joachims. Optimizing search engines using clickthrough data. In Proceedings of the Eighth ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, KDD '02, pages 133-142, New York, NY, USA, 2002. ACM.
-
(2002)
Proceedings of the Eighth ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, KDD '02
, pp. 133-142
-
-
Joachims, T.1
-
10
-
-
84871090829
-
Climbing the app wall: Enabling mobile app discovery through context-aware recommendations
-
New York, NY, USA, ACM
-
A. Karatzoglou, L. Baltrunas, K. Church, and M. Böhmer. Climbing the app wall: enabling mobile app discovery through context-aware recommendations. In Proceedings of the 21st ACM international conference on Information and knowledge management, CIKM '12, pages 2527-2530, New York, NY, USA, 2012. ACM.
-
(2012)
Proceedings of the 21st ACM International Conference on Information and Knowledge Management, CIKM '12
, pp. 2527-2530
-
-
Karatzoglou, A.1
Baltrunas, L.2
Church, K.3
Böhmer, M.4
-
11
-
-
78651302642
-
Detecting product review spammers using rating behaviors
-
New York, NY, USA, ACM
-
E.-P. Lim, V.-A. Nguyen, N. Jindal, B. Liu, and H. W. Lauw. Detecting product review spammers using rating behaviors. In Proceedings of the 19th ACM international conference on Information and knowledge management, CIKM '10, pages 939-948, New York, NY, USA, 2010. ACM.
-
(2010)
Proceedings of the 19th ACM International Conference on Information and Knowledge Management, CIKM '10
, pp. 939-948
-
-
Lim, E.-P.1
Nguyen, V.-A.2
Jindal, N.3
Liu, B.4
Lauw, H.W.5
-
12
-
-
80052656350
-
Enhancing investment decisions in p2p lending: An investor composition perspective
-
New York, NY, USA, ACM
-
C. Luo, H. Xiong, W. Zhou, Y. Guo, and G. Deng. Enhancing investment decisions in p2p lending: An investor composition perspective. In Proceedings of the 17th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, KDD '11, pages 292-300, New York, NY, USA, 2011. ACM.
-
(2011)
Proceedings of the 17th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, KDD '11
, pp. 292-300
-
-
Luo, C.1
Xiong, H.2
Zhou, W.3
Guo, Y.4
Deng, G.5
-
13
-
-
84862909641
-
Attacks on webview in the android system
-
New York, NY, USA, ACM
-
T. Luo, H. Hao, W. Du, Y. Wang, and H. Yin. Attacks on webview in the android system. In Proceedings of the 27th Annual Computer Security Applications Conference, ACSAC '11, pages 343-352, New York, NY, USA, 2011. ACM.
-
(2011)
Proceedings of the 27th Annual Computer Security Applications Conference, ACSAC '11
, pp. 343-352
-
-
Luo, T.1
Hao, H.2
Du, W.3
Wang, Y.4
Yin, H.5
-
14
-
-
84869432690
-
Using probabilistic generative models for ranking risks of android apps
-
New York, NY, USA, ACM
-
H. Peng, C. Gates, B. Sarma, N. Li, Y. Qi, R. Potharaju, C. Nita-Rotaru, and I. Molloy. Using probabilistic generative models for ranking risks of android apps. In Proceedings of the 2012 ACM Conference on Computer and Communications Security, CCS '12, pages 241-252, New York, NY, USA, 2012. ACM.
-
(2012)
Proceedings of the 2012 ACM Conference on Computer and Communications Security, CCS '12
, pp. 241-252
-
-
Peng, H.1
Gates, C.2
Sarma, B.3
Li, N.4
Qi, Y.5
Potharaju, R.6
Nita-Rotaru, C.7
Molloy, I.8
-
15
-
-
84866026647
-
Getjar mobile application recommendations with very sparse datasets
-
New York, NY, USA, ACM
-
K. Shi and K. Ali. Getjar mobile application recommendations with very sparse datasets. In Proceedings of the 18th ACM SIGKDD international conference on Knowledge discovery and data mining, KDD '12, pages 204-212, New York, NY, USA, 2012. ACM.
-
(2012)
Proceedings of the 18th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, KDD '12
, pp. 204-212
-
-
Shi, K.1
Ali, K.2
-
16
-
-
72449155619
-
Portfolio theory of information retrieval
-
New York, NY, USA, ACM
-
J. Wang and J. Zhu. Portfolio theory of information retrieval. In Proceedings of the 32Nd International ACM SIGIR Conference on Research and Development in Information Retrieval, SIGIR '09, pages 115-122, New York, NY, USA, 2009. ACM.
-
(2009)
Proceedings of the 32Nd International ACM SIGIR Conference on Research and Development in Information Retrieval, SIGIR '09
, pp. 115-122
-
-
Wang, J.1
Zhu, J.2
-
17
-
-
79961035462
-
Appjoy: Personalized mobile application discovery
-
New York, NY, USA, ACM
-
B. Yan and G. Chen. Appjoy: personalized mobile application discovery. In Proceedings of the 9th international conference on Mobile systems, applications, and services, MobiSys '11, pages 113-126, New York, NY, USA, 2011. ACM.
-
(2011)
Proceedings of the 9th International Conference on Mobile Systems, Applications, and Services, MobiSys '11
, pp. 113-126
-
-
Yan, B.1
Chen, G.2
-
18
-
-
84861439818
-
Towards personalized context-aware recommendation by mining context logs through topic models
-
Berlin, Heidelberg, Springer-Verlag
-
K. Yu, B. Zhang, H. Zhu, H. Cao, and J. Tian. Towards personalized context-aware recommendation by mining context logs through topic models. In Proceedings of the 16th Pacific-Asia conference on Advances in Knowledge Discovery and Data Mining - Volume Part I, PAKDD'12, pages 431-443, Berlin, Heidelberg, 2012. Springer-Verlag.
-
(2012)
Proceedings of the 16th Pacific-Asia Conference on Advances in Knowledge Discovery and Data Mining - Volume Part I, PAKDD'12
, pp. 431-443
-
-
Yu, K.1
Zhang, B.2
Zhu, H.3
Cao, H.4
Tian, J.5
-
19
-
-
84887576455
-
To personalize or not: A risk management perspective
-
New York, NY, USA, ACM
-
W. Zhang, J. Wang, B. Chen, and X. Zhao. To personalize or not: A risk management perspective. In Proceedings of the 7th ACM Conference on Recommender Systems, RecSys '13, pages 229-236, New York, NY, USA, 2013. ACM.
-
(2013)
Proceedings of the 7th ACM Conference on Recommender Systems, RecSys '13
, pp. 229-236
-
-
Zhang, W.1
Wang, J.2
Chen, B.3
Zhao, X.4
-
20
-
-
85037359376
-
Taming information-stealing smartphone applications (on android)
-
Berlin, Heidelberg, Springer-Verlag
-
Y. Zhou, X. Zhang, X. Jiang, and V. W. Freeh. Taming information-stealing smartphone applications (on android). In Proceedings of the 4th international conference on Trust and trustworthy computing, TRUST'11, pages 93-107, Berlin, Heidelberg, 2011. Springer-Verlag.
-
(2011)
Proceedings of the 4th International Conference on Trust and Trustworthy Computing, TRUST'11
, pp. 93-107
-
-
Zhou, Y.1
Zhang, X.2
Jiang, X.3
Freeh, V.W.4
-
21
-
-
84874030599
-
Mining personal context-aware preferences for mobile users
-
H. Zhu, E. Chen, K. Yu, H. Cao, H. Xiong, and J. Tian. Mining personal context-aware preferences for mobile users. In Proceedings of the IEEE 12th International Conference on Data Mining, ICDM'12, pages 1212-1217, 2012.
-
(2012)
Proceedings of the IEEE 12th International Conference on Data Mining, ICDM'12
, pp. 1212-1217
-
-
Zhu, H.1
Chen, E.2
Yu, K.3
Cao, H.4
Xiong, H.5
Tian, J.6
-
22
-
-
84889587593
-
Ranking fraud detection for mobile apps: A holistic view
-
New York, NY, USA, ACM
-
H. Zhu, H. Xiong, Y. Ge, and E. Chen. Ranking fraud detection for mobile apps: A holistic view. In Proceedings of the 22Nd ACM International Conference on Conference on Information and Knowledge Management, CIKM '13, pages 619-628, New York, NY, USA, 2013. ACM.
-
(2013)
Proceedings of the 22Nd ACM International Conference on Conference on Information and Knowledge Management, CIKM '13
, pp. 619-628
-
-
Zhu, H.1
Xiong, H.2
Ge, Y.3
Chen, E.4
|