-
1
-
-
85180797563
-
-
Fda.gov. Accessed: 2015-01-05
-
Fda.gov. http://goo.gl/guSsMM. Accessed: 2015-01-05.
-
-
-
-
3
-
-
0001882616
-
Fast algorithms for mining association rules
-
R. Agrawal, R. Srikant, et al. Fast algorithms for mining association rules. In VLDB, 1994.
-
(1994)
VLDB
-
-
Agrawal, R.1
Srikant, R.2
-
4
-
-
85076931460
-
Using gui ripping for automated testing of android applications
-
D. Amalfitano, A. R. Fasolino, P. Tramontana, S. De Carmine, and A. M. Memon. Using gui ripping for automated testing of android applications. In ACM ASE, 2012.
-
(2012)
ACM ASE
-
-
Amalfitano, D.1
Fasolino, A. R.2
Tramontana, P.3
De Carmine, S.4
Memon, A. M.5
-
5
-
-
84901614388
-
Flowdroid: Precise context, flow, field, object-sensitive and lifecycle-aware taint analysis for android apps
-
S. Arzt, S. Rasthofer, C. Fritz, E. Bodden, A. Bartel, J. Klein, Y. Le Traon, D. Octeau, and P. McDaniel. Flowdroid: Precise context, flow, field, object-sensitive and lifecycle-aware taint analysis for android apps. In PLDI, 2014.
-
(2014)
PLDI
-
-
Arzt, S.1
Rasthofer, S.2
Fritz, C.3
Bodden, E.4
Bartel, A.5
Klein, J.6
Le Traon, Y.7
Octeau, D.8
McDaniel, P.9
-
6
-
-
22944478098
-
An adapted lesk algorithm for word sense disambiguation using wordnet
-
S. Banerjee and T. Pedersen. An adapted lesk algorithm for word sense disambiguation using wordnet. In CICLing. 2002.
-
(2002)
CICLing
-
-
Banerjee, S.1
Pedersen, T.2
-
7
-
-
84908107170
-
Adscape: Harvesting and analyzing online display ads
-
P. Barford, I. Canadi, D. Krushevskaja, Q. Ma, and S. Muthukrishnan. Adscape: Harvesting and analyzing online display ads. In WWW, 2014.
-
(2014)
WWW
-
-
Barford, P.1
Canadi, I.2
Krushevskaja, D.3
Ma, Q.4
Muthukrishnan, S.5
-
8
-
-
85048552153
-
Brahmastra: driving apps to test the security of third-party components
-
R. Bhoraskar, S. Han, J. Jeon, T. Azim, S. Chen, J. Jung, S. Nath, R. Wang, and D. Wetherall. Brahmastra: driving apps to test the security of third-party components. In USENIX Security, 2014.
-
(2014)
USENIX Security
-
-
Bhoraskar, R.1
Han, S.2
Jeon, J.3
Azim, T.4
Chen, S.5
Jung, J.6
Nath, S.7
Wang, R.8
Wetherall, D.9
-
10
-
-
11144329997
-
High precision extraction of grammatical relations
-
J. Carroll and T. Briscoe. High precision extraction of grammatical relations. In COLING, 2002.
-
(2002)
COLING
-
-
Carroll, J.1
Briscoe, T.2
-
11
-
-
84870819587
-
-
developer.android.com. Observed in May 2015
-
developer.android.com. Ui/application exerciser monkey. http://goo.gl/ cH9wPR, Observed in May 2015.
-
Ui/application exerciser monkey
-
-
-
12
-
-
85127865258
-
Twitter scanning users’ other apps to help deliver ‘tailored content
-
November
-
S. Dredge. Twitter scanning users’ other apps to help deliver ‘tailored content’. The Guardian, November.
-
The Guardian
-
-
Dredge, S.1
-
13
-
-
84875632094
-
How companies learn your secrets
-
C. Duhigg. How companies learn your secrets. The New York Times, 16, 2012.
-
(2012)
The New York Times
, vol.16
-
-
Duhigg, C.1
-
14
-
-
79955570859
-
Taintdroid: An information-flow tracking system for realtime privacy monitoring on smartphones
-
W. Enck, P. Gilbert, B.-G. Chun, L. P. Cox, J. Jung, P. McDaniel, and A. N. Sheth. Taintdroid: An information-flow tracking system for realtime privacy monitoring on smartphones. In OSDI, 2010.
-
(2010)
OSDI
-
-
Enck, W.1
Gilbert, P.2
Chun, B.-G.3
Cox, L. P.4
Jung, J.5
McDaniel, P.6
Sheth, A. N.7
-
16
-
-
84904607664
-
Java libraries for accessing the princeton wordnet: Comparison and evaluation
-
M. A. Finlayson. Java libraries for accessing the princeton wordnet: Comparison and evaluation. In GWC, 2014.
-
(2014)
GWC
-
-
Finlayson, M. A.1
-
17
-
-
84877950290
-
Androidleaks: Automatically detecting potential privacy leaks in Android applications on a large scale
-
C. Gibler, J. Crussell, J. Erickson, and H. Chen. Androidleaks: Automatically detecting potential privacy leaks in Android applications on a large scale. In TRUST, 2012.
-
(2012)
TRUST
-
-
Gibler, C.1
Crussell, J.2
Erickson, J.3
Chen, H.4
-
19
-
-
84943340689
-
Mobiad: private and scalable mobile advertising
-
H. Haddadi, P. Hui, and I. Brown. Mobiad: private and scalable mobile advertising. In MobiArch, 2010.
-
(2010)
MobiArch
-
-
Haddadi, H.1
Hui, P.2
Brown, I.3
-
20
-
-
0039253846
-
Mining frequent patterns without candidate generation
-
J. Han, J. Pei, and Y. Yin. Mining frequent patterns without candidate generation. In SIGMOD, 2000.
-
(2000)
SIGMOD
-
-
Han, J.1
Pei, J.2
Yin, Y.3
-
21
-
-
84903214230
-
Puma: programmable ui-automation for large-scale dynamic analysis of mobile apps
-
S. Hao, B. Liu, S. Nath, W. G. Halfond, and R. Govindan. Puma: programmable ui-automation for large-scale dynamic analysis of mobile apps. In Mobisys, 2014.
-
(2014)
Mobisys
-
-
Hao, S.1
Liu, B.2
Nath, S.3
Halfond, W. G.4
Govindan, R.5
-
22
-
-
0012992939
-
Lexical chains as representations of context for the detection and correction of malapropisms
-
G. Hirst and D. St-Onge. Lexical chains as representations of context for the detection and correction of malapropisms. WordNet: An electronic lexical database, 1998.
-
(1998)
WordNet: An electronic lexical database
-
-
Hirst, G.1
St-Onge, D.2
-
23
-
-
84979682861
-
Supor: Precise and scalable sensitive user input detection for android apps
-
J. Huang, Z. Li, X. Xiao, Z. Wu, K. Lu, X. Zhang, and G. Jiang. Supor: Precise and scalable sensitive user input detection for android apps. In USENIX Security, 2015.
-
(2015)
USENIX Security
-
-
Huang, J.1
Li, Z.2
Xiao, X.3
Wu, Z.4
Lu, K.5
Zhang, X.6
Jiang, G.7
-
25
-
-
85180802767
-
Towards automated risk assessment and mitigation of mobile application
-
Y. Jing, G. Ahn, Z. Zhao, and H. Hu. Towards automated risk assessment and mitigation of mobile application. Dependable and Secure Computing, IEEE Transactions on, 2014.
-
(2014)
Dependable and Secure Computing, IEEE Transactions on
-
-
Jing, Y.1
Ahn, G.2
Zhao, Z.3
Hu, H.4
-
26
-
-
84898941163
-
Riskmon: Continuous and automated risk assessment of mobile applications
-
Y. Jing, G.-J. Ahn, Z. Zhao, and H. Hu. Riskmon: Continuous and automated risk assessment of mobile applications. In CODASPY, 2014.
-
(2014)
CODASPY
-
-
Jing, Y.1
Ahn, G.-J.2
Zhao, Z.3
Hu, H.4
-
29
-
-
84860289389
-
Don’t kill my ads!: balancing privacy in an ad-supported mobile application market
-
I. Leontiadis, C. Efstratiou, M. Picone, and C. Mascolo. Don’t kill my ads!: balancing privacy in an ad-supported mobile application market. In HotMobile, 2012.
-
(2012)
HotMobile
-
-
Leontiadis, I.1
Efstratiou, C.2
Picone, M.3
Mascolo, C.4
-
30
-
-
0005180705
-
An information-theoretic definition of similarity
-
D. Lin. An information-theoretic definition of similarity. In ICML, 1998.
-
(1998)
ICML
-
-
Lin, D.1
-
31
-
-
84863587187
-
A framework for static detection of privacy leaks in Android applications
-
C. Mann and A. Starostin. A framework for static detection of privacy leaks in Android applications. In SAC, 2012.
-
(2012)
SAC
-
-
Mann, C.1
Starostin, A.2
-
32
-
-
84976702763
-
Wordnet: a lexical database for english
-
G. A. Miller. Wordnet: a lexical database for english. CACM, 38(11), 1995.
-
(1995)
CACM
, vol.38
, Issue.11
-
-
Miller, G. A.1
-
33
-
-
84875648983
-
Towards an understanding of the impact of advertising on data leaks
-
V. Moonsamy, M. Alazab, and L. Batten. Towards an understanding of the impact of advertising on data leaks. IJSN, 7(3), 2012.
-
(2012)
IJSN
, vol.7
, Issue.3
-
-
Moonsamy, V.1
Alazab, M.2
Batten, L.3
-
34
-
-
85058993358
-
Uipicker: User-input privacy identification in mobile applications
-
Y. Nan, M. Yang, Z. Yang, S. Zhou, G. Gu, and X. Wang. Uipicker: User-input privacy identification in mobile applications. In USENIX Security, 2015.
-
(2015)
USENIX Security
-
-
Nan, Y.1
Yang, M.2
Yang, Z.3
Zhou, S.4
Gu, G.5
Wang, X.6
-
35
-
-
84958524970
-
MAdScope: Characterizing mobile in-app targeted ads
-
S. Nath. MAdScope: Characterizing mobile in-app targeted ads. In Mobisys, 2015.
-
(2015)
Mobisys
-
-
Nath, S.1
-
36
-
-
84871959049
-
Addroid: Privilege separation for applications and advertisers in Android
-
P. Pearce, A. P. Felt, G. Nunez, and D. Wagner. Addroid: Privilege separation for applications and advertisers in Android. In ASIACCS, 2012.
-
(2012)
ASIACCS
-
-
Pearce, P.1
Felt, A. P.2
Nunez, G.3
Wagner, D.4
-
40
-
-
84954474056
-
AdSplit: Separating smartphone advertising from applications
-
S. Shekhar, M. Dietz, and D. S. Wallach. AdSplit: Separating smartphone advertising from applications. In USENIX Security, 2012.
-
(2012)
USENIX Security
-
-
Shekhar, S.1
Dietz, M.2
Wallach, D. S.3
-
43
-
-
84903733085
-
Investigating user privacy in Android ad libraries
-
R. Stevens, C. Gibler, J. Crussell, J. Erickson, and H. Chen. Investigating user privacy in Android ad libraries. In MoST, 2012.
-
(2012)
MoST
-
-
Stevens, R.1
Gibler, C.2
Crussell, J.3
Erickson, J.4
Chen, H.5
-
46
-
-
85180735932
-
-
Observed in May 2015
-
Twitter. What is app graph in Twitter? https://goo.gl/scmc69, Observed in May 2015.
-
What is app graph in Twitter?
-
-
-
50
-
-
84883287080
-
Understanding what they do with what they know
-
C. E. Wills and C. Tatar. Understanding what they do with what they know. In WPES, 2012.
-
(2012)
WPES
-
-
Wills, C. E.1
Tatar, C.2
-
51
-
-
85146676791
-
Verbs semantics and lexical selection
-
Z. Wu and M. Palmer. Verbs semantics and lexical selection. In ACL, 1994.
-
(1994)
ACL
-
-
Wu, Z.1
Palmer, M.2
-
52
-
-
84889041424
-
AppIntent: Analyzing sensitive data transmission in android for privacy leakage detection
-
Z. Yang, M. Yang, Y. Zhang, G. Gu, P. Ning, and X. S. Wang. AppIntent: Analyzing sensitive data transmission in android for privacy leakage detection. In CCS, 2013.
-
(2013)
CCS
-
-
Yang, Z.1
Yang, M.2
Zhang, Y.3
Gu, G.4
Ning, P.5
Wang, X. S.6
-
53
-
-
84872325256
-
Taming informationstealing smartphone applications (on android)
-
Y. Zhou, X. Zhang, X. Jiang, and V. W. Freeh. Taming informationstealing smartphone applications (on android). In TRUST, 2011.
-
(2011)
TRUST
-
-
Zhou, Y.1
Zhang, X.2
Jiang, X.3
Freeh, V. W.4
|