iHunter: Hunting Privacy Violations at Scale in the Software Supply Chain on iOS.
Dexin LiuYue XiaoChaoqi ZhangKaitao XieXiaolong BaiShikun ZhangLuyi XingPublished in: USENIX Security Symposium (2024)
Keyphrases
- service level
- supply chain
- privacy violations
- lead time
- supply chain management
- inventory management
- bullwhip effect
- operating costs
- decision making
- quantity discount
- distribution centers
- supplier selection
- economic order quantity
- inventory control
- cost savings
- radio frequency identification rfid
- trading partners
- stackelberg game
- customer demand
- uncertain demand
- private information
- third party
- reinforcement learning