Author of the publication

Protecting Your Children from Inappropriate Content in Mobile Apps: An Automatic Maturity Rating Framework.

, , , , and . CIKM, page 1111-1120. ACM, (2015)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Predicting Links and Inferring Attributes using a Social-Attribute Network (SAN), , , , , , , and . CoRR, (2011)Mitigating Evasion Attacks to Deep Neural Networks via Region-based Classification., and . ACSAC, page 278-287. ACM, (2017)Robust and Verifiable Information Embedding Attacks to Deep Neural Networks via Error-Correcting Codes., , and . CoRR, (2020)Attacking Graph-based Classification via Manipulating the Graph Structure., and . ACM Conference on Computer and Communications Security, page 2023-2040. ACM, (2019)EviHunter: Identifying Digital Evidence in the Permanent Storage of Android Devices via Static Analysis., , , and . ACM Conference on Computer and Communications Security, page 1338-1350. ACM, (2018)IPGuard: Protecting the Intellectual Property of Deep Neural Networks via Fingerprinting the Classification Boundary., , and . CoRR, (2019)Prompt Injection Attacks and Defenses in LLM-Integrated Applications., , , , and . CoRR, (2023)Generation-based fuzzing? Don't build a new generator, reuse!, , , , , and . Comput. Secur., (June 2023)Semi-Supervised Node Classification on Graphs: Markov Random Fields vs. Graph Neural Networks., , and . CoRR, (2020)Forgery-Resistant Touch-based Authentication on Mobile Devices., , , and . AsiaCCS, page 499-510. ACM, (2016)