Login / Signup

Combination attack of android applications analysis scheme based on privacy leak.

Jieming GuChengze LiDian LeiQi Li
Published in: CCIS (2016)
Keyphrases
  • private information
  • privacy preserving
  • data sets
  • detection mechanism