Permission based Android security: Issues and countermeasures Z Fang, W Han, Y Li computers & security 43, 205-218, 2014 | 196 | 2014 |
revdroid: Code analysis of the side effects after dynamic permission revocation of android apps Z Fang, W Han, D Li, Z Guo, D Guo, XS Wang, Z Qian, H Chen Proceedings of the 11th ACM on Asia Conference on Computer and …, 2016 | 33 | 2016 |
Collaborative policy administration W Han, Z Fang, LT Yang, G Pan, Z Wu IEEE Transactions on Parallel and Distributed Systems 25 (2), 498-507, 2013 | 20 | 2013 |
sendroid: Auditing sensor access in android system-wide W Han, C Cao, H Chen, D Li, Z Fang, W Xu, XS Wang IEEE Transactions on Dependable and Secure Computing 17 (2), 407-421, 2017 | 11 | 2017 |
Role mining algorithm evaluation and improvement in large volume android applications X Zhang, W Han, Z Fang, Y Yin, H Mustafa Proceedings of the first international workshop on Security in embedded …, 2013 | 6 | 2013 |
APP Vetting Based on the Consistency of Description and APK W Han, W Wang, X Zhang, W Peng, Z Fang Trusted Systems: 6th International Conference, INTRUST 2014, Beijing, China …, 2015 | 4 | 2015 |
Poster: collaborative policy administration W Han, Z Fang, W Chen, W Xu, C Lei Proceedings of the 18th ACM conference on Computer and communications …, 2011 | 3 | 2011 |
Role Mining in Large Volume Android Applications X Zhang, W Han, Z Fang, Y Yin, HA Mustafa | | 2013 |