共 48 条
[1]
Aafer Y, 2013, L N INST COMP SCI SO, V127, P86
[2]
Aggarwal CC, DATABASE THEORY ICDT
[3]
Allix K, 2016, 13TH WORKING CONFERENCE ON MINING SOFTWARE REPOSITORIES (MSR 2016), P468, DOI [10.1109/MSR.2016.056, 10.1145/2901739.2903508]
[4]
[Anonymous], 2006, ACM SIGOPS OPER SYST, DOI DOI 10.1145/1218063.1217938
[5]
[Anonymous], 2012, P 27 ANN ACM S APPL, DOI DOI 10.1145/2245276.2232070
[6]
[Anonymous], 2012, P 5 ACM C SEC PRIV W
[7]
[Anonymous], 2019, 16 INT C MIN SOFTW R
[8]
[Anonymous], 2014, DREBIN EFFECTIVE EXP
[9]
Privacy Threats through Ultrasonic Side Channels on Mobile Devices
[J].
2017 IEEE EUROPEAN SYMPOSIUM ON SECURITY AND PRIVACY (EUROS&P),
2017,
:35-47
[10]
Bishop C.M., 1995, Neural networks for pattern recognition

