Signature generation for sensitive information leakage in android applications.
Hiroki KuzunoSatoshi TonamiPublished in: ICDE Workshops (2013)
Keyphrases
- sensitive information
- information leakage
- third party
- privacy preserving
- privacy preservation
- original data
- sensitive data
- private information
- confidential information
- data privacy
- privacy protection
- pattern recognition
- data protection
- personal information
- medical records
- image processing
- privacy issues
- protect sensitive
- data sets
- signature scheme
- machine learning