Cited By
View all- Wang ZGuan JWang XWang WXing LAlharbi FMeng WJensen CCremers CKirda E(2023)The Danger of Minimum Exposures: Understanding Cross-App Information Leaks on iOS through Multi-Side-Channel LearningProceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security10.1145/3576915.3616655(281-295)Online publication date: 15-Nov-2023
- Xie FZhang YYan CLi SBu LChen KHuang ZBai G(2022)Scrutinizing Privacy Policy Compliance of Virtual Personal Assistant AppsProceedings of the 37th IEEE/ACM International Conference on Automated Software Engineering10.1145/3551349.3560416(1-13)Online publication date: 10-Oct-2022
- Miao YChen CPan LHan QZhang JXiang Y(2021)Machine Learning–based Cyber Attacks Targeting on Controlled InformationACM Computing Surveys10.1145/346517154:7(1-36)Online publication date: 18-Jul-2021
- Show More Cited By