Zheran Fang
Zheran Fang
Geverifieerd e-mailadres voor fudan.edu.cn
Geciteerd door
Geciteerd door
Permission based Android security: Issues and countermeasures
Z Fang, W Han, Y Li
computers & security 43, 205-218, 2014
revdroid: Code analysis of the side effects after dynamic permission revocation of android apps
Z Fang, W Han, D Li, Z Guo, D Guo, XS Wang, Z Qian, H Chen
Proceedings of the 11th ACM on Asia Conference on Computer and …, 2016
Collaborative policy administration
W Han, Z Fang, LT Yang, G Pan, Z Wu
IEEE Transactions on Parallel and Distributed Systems 25 (2), 498-507, 2013
sendroid: Auditing sensor access in android system-wide
W Han, C Cao, H Chen, D Li, Z Fang, W Xu, XS Wang
IEEE Transactions on Dependable and Secure Computing 17 (2), 407-421, 2017
Role mining algorithm evaluation and improvement in large volume android applications
X Zhang, W Han, Z Fang, Y Yin, H Mustafa
Proceedings of the first international workshop on Security in embedded …, 2013
APP Vetting Based on the Consistency of Description and APK
W Han, W Wang, X Zhang, W Peng, Z Fang
Trusted Systems: 6th International Conference, INTRUST 2014, Beijing, China …, 2015
Poster: collaborative policy administration
W Han, Z Fang, W Chen, W Xu, C Lei
Proceedings of the 18th ACM conference on Computer and communications …, 2011
Role Mining in Large Volume Android Applications
X Zhang, W Han, Z Fang, Y Yin, HA Mustafa
Het systeem kan de bewerking nu niet uitvoeren. Probeer het later opnieuw.
Artikelen 1–8