Cited By
View all- Fan MShi JWang YYu LZhang XWang HJin WLiu TFilkov VRay BZhou M(2024)Giving without Notifying: Assessing Compliance of Data Transmission in Android AppsProceedings of the 39th IEEE/ACM International Conference on Automated Software Engineering10.1145/3691620.3695528(1595-1606)Online publication date: 27-Oct-2024
- Wang CKo RZhang YYang YLin ZGrundy JPollock LPenta M(2023)TaintMini: Detecting Flow of Sensitive Data in Mini-Programs with Static Taint AnalysisProceedings of the 45th International Conference on Software Engineering10.1109/ICSE48619.2023.00086(932-944)Online publication date: 14-May-2023
- Moussaileb RCuppens NLanet JBouder H(2021)A Survey on Windows-based Ransomware Taxonomy and Detection MechanismsACM Computing Surveys10.1145/345315354:6(1-36)Online publication date: 13-Jul-2021
- Show More Cited By