A survey of app store analysis for software engineering
App Store Analysis studies information about applications obtained from app stores. App
stores provide a wealth of information derived from users that would not exist had the …
stores provide a wealth of information derived from users that would not exist had the …
From personalized medicine to population health: a survey of mHealth sensing techniques
Mobile sensing systems have been widely used as a practical approach to collect
behavioral and health-related information from individuals and to provide timely intervention …
behavioral and health-related information from individuals and to provide timely intervention …
PermPair: Android Malware Detection Using Permission Pairs
The Android smartphones are highly prone to spreading the malware due to intrinsic
feebleness that permits an application to access the internal resources when the user grants …
feebleness that permits an application to access the internal resources when the user grants …
Combating against potentially harmful mobile apps
Mobile apps make our life much easier and simple in other aspects number of potentially
harmful applications are making Smartphone users un-secure. Smartphone apps are often …
harmful applications are making Smartphone users un-secure. Smartphone apps are often …
Marvin: Efficient and comprehensive mobile app classification through static and dynamic analysis
M Lindorfer, M Neugschwandtner… - 2015 IEEE 39th annual …, 2015 - ieeexplore.ieee.org
Android dominates the smartphone operating system market and consequently has attracted
the attention of malware authors and researchers alike. Despite the considerable number of …
the attention of malware authors and researchers alike. Despite the considerable number of …
The feasibility of dynamically granted permissions: Aligning mobile privacy with user preferences
P Wijesekera, A Baokar, L Tsai… - … IEEE Symposium on …, 2017 - ieeexplore.ieee.org
Current smartphone operating systems regulate application permissions by prompting users
on an ask-on-first-use basis. Prior research has shown that this method is ineffective …
on an ask-on-first-use basis. Prior research has shown that this method is ineffective …
Query expansion based on crowd knowledge for code search
As code search is a frequent developer activity in software development practices, improving
the performance of code search is a critical task. In the text retrieval based search …
the performance of code search is a critical task. In the text retrieval based search …
A taxonomy and qualitative comparison of program analysis techniques for security assessment of android software
In parallel with the meteoric rise of mobile software, we are witnessing an alarming
escalation in the number and sophistication of the security threats targeted at mobile …
escalation in the number and sophistication of the security threats targeted at mobile …
Android permissions remystified: A field study on contextual integrity
P Wijesekera, A Baokar, A Hosseini… - 24th USENIX Security …, 2015 - usenix.org
We instrumented the Android platform to collect data regarding how often and under what
circumstances smartphone applications access protected resources regulated by …
circumstances smartphone applications access protected resources regulated by …
Contrastive curriculum learning for sequential user behavior modeling via data augmentation
Within online platforms, it is critical to capture the semantics of sequential user behaviors for
accurately modeling user interests. However, dynamic characteristics and sparse behaviors …
accurately modeling user interests. However, dynamic characteristics and sparse behaviors …