共 50 条
- [41] Exchanging Third-Party Information with Minimum Transmission Cost 2012 IEEE GLOBAL COMMUNICATIONS CONFERENCE (GLOBECOM), 2012,
- [42] Leakage of Sensitive Information to Third-Party Voice Applications PROCEEDINGS OF THE 4TH INTERNATIONAL CONFERENCE ON CONVERSATIONAL USER INTERFACES, CUI 2022, 2022,
- [45] Stay in your Cage! a sound sandbox for third-party libraries on android Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 2016, 9878 LNCS : 458 - 476
- [46] Stay in Your Cage! A Sound Sandbox for Third-Party Libraries on Android COMPUTER SECURITY - ESORICS 2016, PT I, 2016, 9878 : 458 - 476
- [47] AppMonitor: restricting information leakage to third-party applications Social Network Analysis and Mining, 2020, 10
- [50] SurgeScan: Enforcing Security Policies on Untrusted Third-Party Android Libraries 2017 IEEE SMARTWORLD, UBIQUITOUS INTELLIGENCE & COMPUTING, ADVANCED & TRUSTED COMPUTED, SCALABLE COMPUTING & COMMUNICATIONS, CLOUD & BIG DATA COMPUTING, INTERNET OF PEOPLE AND SMART CITY INNOVATION (SMARTWORLD/SCALCOM/UIC/ATC/CBDCOM/IOP/SCI), 2017,