咨询与建议

限定检索结果

文献类型

  • 5 篇 期刊文献

馆藏范围

  • 5 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 4 篇 工学
    • 3 篇 计算机科学与技术...
    • 1 篇 电子科学与技术(可...
    • 1 篇 网络空间安全
  • 1 篇 理学
    • 1 篇 数学

主题

  • 5 篇 privacy leakage
  • 2 篇 dynamic analysis
  • 1 篇 federated graph ...
  • 1 篇 privacy protecti...
  • 1 篇 http
  • 1 篇 property inferen...
  • 1 篇 network traffic ...
  • 1 篇 mobile applicati...
  • 1 篇 static analysis
  • 1 篇 semantic attack ...
  • 1 篇 gnns
  • 1 篇 embeddings
  • 1 篇 binary analysis
  • 1 篇 cloud platform
  • 1 篇 mobile security
  • 1 篇 personally ident...
  • 1 篇 regression model
  • 1 篇 android malware ...
  • 1 篇 inter-component ...

机构

  • 2 篇 college of compu...
  • 1 篇 network informat...
  • 1 篇 department of el...
  • 1 篇 school of comput...
  • 1 篇 fudan university
  • 1 篇 institute of inf...
  • 1 篇 nanyang technolo...
  • 1 篇 school of comput...
  • 1 篇 sklois institute...
  • 1 篇 school of cyber ...
  • 1 篇 collaborative in...
  • 1 篇 singapore instit...

作者

  • 1 篇 zhang lei
  • 1 篇 xinwen hu
  • 1 篇 wenbing zhao
  • 1 篇 bing chen
  • 1 篇 jiewen liu
  • 1 篇 ruitao feng
  • 1 篇 lejian liao
  • 1 篇 zhu donglai
  • 1 篇 baolu xue
  • 1 篇 sun limin
  • 1 篇 guozhu meng
  • 1 篇 kai chen
  • 1 篇 mengya guo
  • 1 篇 jiaye pan
  • 1 篇 yang zhemin
  • 1 篇 yuntao xu
  • 1 篇 yi liu
  • 1 篇 yang liu
  • 1 篇 guangdong bai
  • 1 篇 yi zhuang

语言

  • 5 篇 英文
检索条件"主题词=Privacy leakage"
5 条 记 录,以下是1-10 订阅
排序:
Fine-Grained Binary Analysis Method for privacy leakage Detection on the Cloud Platform
收藏 引用
Computers, Materials & Continua 2020年 第7期64卷 607-622页
作者: Jiaye Pan Yi Zhuang Xinwen Hu Wenbing Zhao College of Computer Science and Technology Nanjing University of Aeronautics and AstronauticsNanjing200016China School of Computer Science and Engineering Nanyang Technological University639798Singapore Department of Electrical Engineering and Computer Science Cleveland State UniversityCleveland44115-2214USA
Nowadays cloud architecture is widely applied on the *** malware aiming at the privacy data stealing or crypto currency mining is threatening the security of cloud *** view of the problems with existing application be... 详细信息
来源: 维普期刊数据库 维普期刊数据库 评论
PIAFGNN:Property Inference Attacks against Federated Graph Neural Networks
收藏 引用
Computers, Materials & Continua 2025年 第2期82卷 1857-1877页
作者: Jiewen Liu Bing Chen Baolu Xue Mengya Guo Yuntao Xu College of Computer Science and Technology Nanjing University of Aeronautics and AstronauticsNanjing321002China Collaborative Innovation Center of Novel Software Technology and Industrialization Nanjing210023China
Federated Graph Neural Networks (FedGNNs) have achieved significant success in representation learning for graph data, enabling collaborative training among multiple parties without sharing their raw graph data and so... 详细信息
来源: 维普期刊数据库 维普期刊数据库 评论
TPII:tracking personally identifiable information via user behaviors in HTTP traffic
收藏 引用
Frontiers of Computer Science 2020年 第3期14卷 175-187页
作者: Yi LIU Tian SONG Lejian LIAO School of Computer Science Beijing Institute of TechnologyBeijing 100081China Network Information Center Yan'an UniversityYan'an 716000China School of Computer ScienceBeijing Institute of TechnologyBeijing 100081China
It is widely common that mobile applications collect non-critical personally identifiable information(PII)from users'devices to the cloud by application service providers(ASPs)in a positive manner to provide precise a... 详细信息
来源: 维普期刊数据库 维普期刊数据库 评论
DroidEcho:an in-depth dissection of malicious behaviors in Android applications
收藏 引用
Cybersecurity 2018年 第1期1卷 126-142页
作者: Guozhu Meng Ruitao Feng Guangdong Bai Kai Chen Yang Liu SKLOIS Institute of Information EngineeringChinese Academy of SciencesBeijingChina Nanyang Technological University SingaporeSingapore Singapore Institute of Technology SingaporeSingapore School of Cyber Security University of Chinese Academy of SciencesBeijingChina
A precise representation for attacks can benefit the detection of malware in both accuracy and ***,it is still far from expectation to describe attacks precisely on the Android *** addition,new features on Android,suc... 详细信息
来源: 维普期刊数据库 维普期刊数据库 评论
A survey of privacy protection techniques for mobile devices
收藏 引用
Journal of Communications and Information Networks 2016年 第4期1卷 86-92页
作者: ZHANG Lei ZHU Donglai YANG Zhemin SUN Limin YANG Min Fudan University ShangHai 200433China Institute of Information Engineering China Academy of ScienceBeijing 100093China
Modern mobile devices provide a wide variety of *** are able to access these services for many sensitive tasks relating to their everyday lives(e.g.,finance,home,or contacts).However,these services also provide new at... 详细信息
来源: 维普期刊数据库 维普期刊数据库 评论