共 32 条
- [11] Mining Apps for Abnormal Usage of Sensitive Data [J]. 2015 IEEE/ACM 37TH IEEE INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING, VOL 1, 2015, : 426 - 436
- [12] Checking App Behavior Against App Descriptions [J]. 36TH INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING (ICSE 2014), 2014, : 1025 - 1035
- [13] Grace M. C., 2012, 5 ACM C SEC PRIV WIR, P101
- [14] Mining Android Apps to Recommend Permissions [J]. 2016 IEEE 23RD INTERNATIONAL CONFERENCE ON SOFTWARE ANALYSIS, EVOLUTION, AND REENGINEERING (SANER), VOL 1, 2016, : 427 - 437
- [15] Li L, 2016, 31 IEEE ACM INT C AU
- [16] Li L., 2014, P 13 INT C TRUST SEC
- [17] Li L., 2014, ARXIV14047431
- [18] Li L, 2016, THESIS
- [19] Li Li, 2016, 20 INT SYST SOFTW PR
- [20] Li Li, 2016, DOCT S 38 INT C SOFT