Works (4)

Updated: July 5th, 2023 15:45

2016 conference paper

AppShell: Making data protection practical for lost or stolen Android devices

Noms 2016 - 2016 ieee/ifip network operations and management symposium, 502–508.

By: Y. Zhou n, K. Singh & X. Jiang n

topics (OpenAlex): Advanced Malware Detection Techniques; User Authentication and Security Systems; Digital and Cyber Forensics
TL;DR: The proposed solution enables adaptive protection by pro-actively stepping up or stepping down data security based on perceived contextual risk of the device by transparently encrypting the data, and discarding the encryption key, when required, for enhanced protection. (via Semantic Scholar)
UN Sustainable Development Goals Color Wheel
UN Sustainable Development Goal Categories
16. Peace, Justice and Strong Institutions (OpenAlex)
Source: NC State University Libraries
Added: August 6, 2018

2013 book

Android malware

By: X. Jiang n & Y. Zhou n

topics (OpenAlex): Advanced Malware Detection Techniques
TL;DR: Android Malware presents a systematic view on state-of-the-art mobile malware that targets the popular Android mobile platform, covering key topics like the Android malware history, malware behavior and classification, as well as, possible defense techniques. (via Semantic Scholar)
Source: NC State University Libraries
Added: August 6, 2018

2013 conference paper

Fast, scalable detection of "piggybacked" mobile applications

ACM Conference on Data and Application Security and Privacy, 185–195.

By: W. Zhou n, Y. Zhou n, M. Grace n, X. Jiang n & S. Zou*

topics (OpenAlex): Advanced Malware Detection Techniques; Software Testing and Debugging Techniques; Network Security and Intrusion Detection
TL;DR: This paper proposes a module decoupling technique to partition an app's code into primary and non-primary modules, and develops a feature fingerprint technique to extract various semantic features from primary modules and convert them into feature vectors. (via Semantic Scholar)
Source: NC State University Libraries
Added: August 6, 2018

2012 article

Dissecting Android Malware: Characterization and Evolution

2012 IEEE SYMPOSIUM ON SECURITY AND PRIVACY (SP), pp. 95–109.

By: Y. Zhou n & X. Jiang n

author keywords: Android malware; smartphone security
topics (OpenAlex): Advanced Malware Detection Techniques; Network Security and Intrusion Detection; Software Testing and Debugging Techniques
TL;DR: Systematize or characterize existing Android malware from various aspects, including their installation methods, activation mechanisms as well as the nature of carried malicious payloads reveal that they are evolving rapidly to circumvent the detection from existing mobile anti-virus software. (via Semantic Scholar)
Source: Web Of Science
Added: August 6, 2018

Citation Index includes data from a number of different sources. If you have questions about the sources of data in the Citation Index or need a set of data which is free to re-distribute, please contact us.

Certain data included herein are derived from the Web of Science© and InCites© (2025) of Clarivate Analytics. All rights reserved. You may not copy or re-distribute this material in whole or in part without the prior written consent of Clarivate Analytics.