ResearchTrend.AI
  • Papers
  • Communities
  • Events
  • Blog
  • Pricing
Papers
Communities
Social Events
Terms and Conditions
Pricing
Parameter LabParameter LabTwitterGitHubLinkedInBlueskyYoutube

© 2025 ResearchTrend.AI, All rights reserved.

  1. Home
  2. Papers
  3. 2106.04951
  4. Cited By
Information flow based defensive chain for data leakage detection and
  prevention: a survey

Information flow based defensive chain for data leakage detection and prevention: a survey

9 June 2021
Ning Xi
Chao Chen
Jun Zhang
Cong Sun
Shigang Liu
Pengbin Feng
Jianfeng Ma
ArXivPDFHTML

Papers citing "Information flow based defensive chain for data leakage detection and prevention: a survey"

10 / 10 papers shown
Title
Machine Learning Based Cyber Attacks Targeting on Controlled
  Information: A Survey
Machine Learning Based Cyber Attacks Targeting on Controlled Information: A Survey
Yuantian Miao
Chao Chen
Lei Pan
Qing-Long Han
Jun Zhang
Yang Xiang
AAML
77
68
0
16 Feb 2021
Program Analysis of Commodity IoT Applications for Security and Privacy:
  Challenges and Opportunities
Program Analysis of Commodity IoT Applications for Security and Privacy: Challenges and Opportunities
Z. Berkay Celik
Earlence Fernandes
Eric Pauley
Gang Tan
Patrick McDaniel
37
123
0
18 Sep 2018
Android HIV: A Study of Repackaging Malware for Evading Machine-Learning
  Detection
Android HIV: A Study of Repackaging Malware for Evading Machine-Learning Detection
Xiao Chen
Chaoran Li
Derui Wang
S. Wen
Jun Zhang
Surya Nepal
Yang Xiang
K. Ren
AAML
57
245
0
10 Aug 2018
Sensitive Information Tracking in Commodity IoT
Sensitive Information Tracking in Commodity IoT
Berkay Çelik
Leonardo Babun
A. Sikder
Hidayet Aksu
Gang Tan
Patrick McDaniel
A. S. Uluagac
51
220
0
22 Feb 2018
A Permission-Dependent Type System for Secure Information Flow Analysis
A Permission-Dependent Type System for Secure Information Flow Analysis
Hongxu Chen
Alwen Tiu
Zhiwu Xu
Yang Liu
34
13
0
27 Sep 2017
Cryptographically Secure Information Flow Control on Key-Value Stores
Cryptographically Secure Information Flow Control on Key-Value Stores
Lucas Waye
Pablo Buiras
Owen Arden
Alejandro Russo
Stephen Chong
28
8
0
29 Aug 2017
HornDroid: Practical and Sound Static Analysis of Android Applications
  by SMT Solving
HornDroid: Practical and Sound Static Analysis of Android Applications by SMT Solving
Stefano Calzavara
Ilya Grishchenko
Matteo Maffei
33
69
0
25 Jul 2017
ReCon: Revealing and Controlling PII Leaks in Mobile Network Traffic
ReCon: Revealing and Controlling PII Leaks in Mobile Network Traffic
Jingjing Ren
Ashwin Rao
Martina Lindorfer
A. Legout
David Choffnes
55
240
0
01 Jul 2015
Android Permissions Remystified: A Field Study on Contextual Integrity
Android Permissions Remystified: A Field Study on Contextual Integrity
Primal Wijesekera
Arjun Baokar
Ashkan Hosseini
Serge Egelman
D. Wagner
K. Beznosov
41
200
0
15 Apr 2015
Semantic Similarity in a Taxonomy: An Information-Based Measure and its
  Application to Problems of Ambiguity in Natural Language
Semantic Similarity in a Taxonomy: An Information-Based Measure and its Application to Problems of Ambiguity in Natural Language
Philip Resnik
77
2,361
0
27 May 2011
1