Zobrazeno 1 - 10
of 27
pro vyhledávání: '"Nengqiang HE"'
Publikováno v:
Tongxin xuebao, Vol 42, Pp 13-27 (2021)
The vulnerability detection model of Android application based on learning lacks semantic features.The extracted features contain noise data unrelated to vulnerabilities, which leads to the false positive of vulnerability detection model.A feature ex
Externí odkaz:
https://doaj.org/article/3aad0eac10a84eb783a2a4de5e9ab6b4
Publikováno v:
IEEE Access, Vol 6, Pp 61267-61276 (2018)
In recent years, many packing services emerge and have been used to protect Android applications by concealing the executable files. However, it also brings some severe problems. For example, Android malwares use packers to escape detection from the
Externí odkaz:
https://doaj.org/article/fdcdd92c48604c8ea2d30da4ac33ff81
Publikováno v:
Symmetry, Vol 13, Iss 5, p 861 (2021)
Ransomwares on Android have become a challenging threat, performing tasks such as hijacking screen resources, locking devices, and encrypting files. Even worse, with the evolution of ransomwares, many ransomwares can disable USB interfaces of mobile
Externí odkaz:
https://doaj.org/article/cbf6a8f90c564cee826dc133387309b5
Publikováno v:
IEEE Transactions on Information Forensics and Security. 14:48-60
Online social networks have now become the most popular platforms for people to share information with others. Along with this, there is a serious threat to individuals’ privacy. One privacy risk comes from the sharing of co-owned data, i.e., when
Check in or Not? A Stochastic Game for Privacy Preserving in Point-of-Interest Recommendation System
Publikováno v:
IEEE Internet of Things Journal. 5:4178-4190
With the growing popularity of mobile social networks, point-of-interest (POI) recommendation, which utilizes users’ check-in data to suggest interesting places for users, has attracted much attention in recent years. The check-in data, containing
Publikováno v:
IEEE Access, Vol 6, Pp 61267-61276 (2018)
In recent years, many packing services emerge and have been used to protect Android applications by concealing the executable files. However, it also brings some severe problems. For example, Android malwares use packers to escape detection from the
Publikováno v:
ICNCC
It has been discovered that quite a few organizations have become the victims of APT, which is a deliberate and malicious espionage threat to military, political, infrastructure targets for the purpose of stealing the core data or thwarting the norma
Publikováno v:
Science China Information Sciences. 56:1-15
Advances in wireless access technologies such as WiMax and LTE have accelerated the development of wireless video applications. Though existing erasure codes are designed for wireless data broadcasting, their potential can only be realized for wirele
Publikováno v:
IEEE Transactions on Consumer Electronics. 56:1450-1456
This paper presents an SD-based universal sensor data entry card, named uSD. The prefix "u" of uSD illustrates its most significant characteristic: universality, which means uSD is platform independent and compatible with heterogeneous platforms, tru
Publikováno v:
2013 International Conference on Information and Network Security (ICINS 2013).
In this paper, we propose the CNCERT1 cloud based mobile sinkhole system (CCMSS) to monitor mobile (or smartphone) victims infected by mobile malwares. Different from sinkholes for computer malwares, CCMSS is designed to redirect victim's flow at mal