The following publications are possibly variants of this publication:
- TraceDroid: Detecting Android Malware by Trace of Privacy LeakageYueqing Wu, Hao Fu, Guoming Zhang, Bin Zhao, Minghui Xu 0001, Yifei Zou, Xiaotao Feng, Pengfei Hu. wasa 2022: 466-478 [doi]
- Network traffic monitoring, analysis and anomaly detection [Guest Editorial]Wei Wang 0012, Xiangliang Zhang, Wenchang Shi, Shiguo Lian, Dengguo Feng. network, 25(3):6-7, 2011. [doi]
- Checking App Behavior Against App Descriptions: What If There are No App Descriptions?Md. Shamsujjoha, John Grundy, Li Li, Hourieh Khalajzadeh, and Qinghua Lu. In 29th IEEE/ACM International Conference on Program Comprehension (ICPC 2021). 2021:
- Security Analysis of Cryptocurrency Wallets in Android-Based ApplicationsDaojing He, Shihao Li, Cong Li, Sencun Zhu, Sammy Chan, Weidong Min, Nadra Guizani. network, 34(6):114-119, 2020. [doi]
- On Safeguarding Privacy and Security in the Framework of Federated LearningChuan Ma, Jun Li 0004, Ming Ding 0001, Howard H. Yang, Feng Shu 0002, Tony Q. S. Quek, H. Vincent Poor. network, 34(4):242-248, 2020. [doi]