Cited By
View all- Wang YFan MZhou HWang HJin WLi JChen WLi SZhang YHan DLiu TFilkov VRay BZhou M(2024)MiniChecker: Detecting Data Privacy Risk of Abusive Permission Request Behavior in Mini-ProgramsProceedings of the 39th IEEE/ACM International Conference on Automated Software Engineering10.1145/3691620.3695534(1667-1679)Online publication date: 27-Oct-2024
- Zhang YMukhopadhyay RChaintreau A(2024)Network Fairness Ambivalence: When does social network capital mitigate or amplify unfairness?Proceedings of the ACM on Measurement and Analysis of Computing Systems10.1145/36560178:2(1-28)Online publication date: 29-May-2024
- Wang YFan MLiu JTao JJin WWang HXiong QLiu T(2024)Do as You Say: Consistency Detection of Data Practice in Program Code and Privacy Policy in Mini-AppIEEE Transactions on Software Engineering10.1109/TSE.2024.347928850:12(3225-3248)Online publication date: 1-Dec-2024
- Show More Cited By