Cited By
View all- Nguyen TPham NDoan HTran KTran BHuynh KTran NVo K(2024)Dissecting Data Practices in Android Apps: A Comparative Study of Data Collection and Sharing BehaviorsIntelligent Data Engineering and Automated Learning – IDEAL 202410.1007/978-3-031-77731-8_2(15-26)Online publication date: 19-Nov-2024
- Phan TPham NHieu DTran KTran BLe BNgan NPhu T(2024)Evaluating Third-Party Involvement in Android Apps: Norms and Anomalies in Usage PatternsMobile Web and Intelligent Information Systems10.1007/978-3-031-68005-2_9(114-127)Online publication date: 18-Aug-2024
- Senanayake JKalutarage HPetrovski AAl-Kadri MPiras L(2023)FedREVAN: Real-time DEtection of Vulnerable Android Source Code Through Federated Neural Network with XAIComputer Security. ESORICS 2023 International Workshops10.1007/978-3-031-54129-2_25(426-441)Online publication date: 25-Sep-2023
- Show More Cited By