Android malware detection using complex-flows F Shen, J Del Vecchio, A Mohaisen, SY Ko, L Ziarek IEEE Transactions on Mobile Computing, 2018 | 103 | 2018 |
Android malware detection using complex-flows F Shen, J Del Vecchio, A Mohaisen, SY Ko, L Ziarek Distributed Computing Systems (ICDCS), 2017 IEEE 37th International …, 2017 | 103 | 2017 |
A secure and scalable storage system for aggregate data in IoT H Jiang, F Shen, S Chen, KC Li, YS Jeong Future Generation Computer Systems 49, 133-141, 2015 | 97 | 2015 |
Flow permissions for android S Holavanalli, D Manuel, V Nanjundaswamy, B Rosenberg, F Shen, ... 2013 28th IEEE/ACM International Conference on Automated Software …, 2013 | 81 | 2013 |
Information flows as a permission mechanism F Shen, N Vishnubhotla, C Todarka, M Arora, B Dhandapani, EJ Lehner, ... Proceedings of the 29th ACM/IEEE international conference on Automated …, 2014 | 70 | 2014 |
String analysis of Android applications (N) J Del Vecchio, F Shen, KM Yee, B Wang, SY Ko, L Ziarek 2015 30th IEEE/ACM International Conference on Automated Software …, 2015 | 13 | 2015 |
String analysis of Android applications (N) J Del Vecchio, F Shen, KM Yee, B Wang, SY Ko, L Ziarek 2015 30th IEEE/ACM International Conference on Automated Software …, 2015 | 13 | 2015 |
On post-generation data operations in secure distributed storage systems with internal padding F Shen, H Jiang, Z Xu 2010 10th IEEE International Conference on Computer and Information …, 2010 | 8 | 2010 |
Double Graph Attention Actor-Critic Framework for Urban Bus-Pooling System E Wang, B Liu, S Lin, F Shen, T Bao, J Zhang, J Wang, AW Sadek, C Qiao IEEE Transactions on Intelligent Transportation Systems, 2023 | 6 | 2023 |
Pigout: Making multiple hadoop clusters work together K Jeon, S Chandrashekhara, F Shen, S Mehra, O Kennedy, SY Ko 2014 IEEE International Conference on Big Data (Big Data), 100-109, 2014 | 6 | 2014 |
Towards secure and reliable data storage with multi-coefficient secret sharing F Shen, C Mei, H Jiang, Z Xu 2010 10th IEEE International Conference on Computer and Information …, 2010 | 5 | 2010 |
Android Security via Static Program Analysis F Shen Proceedings of the 2017 Workshop on MobiSys 2017 Ph. D. Forum, 19-20, 2017 | 3 | 2017 |
A secure play store for android F Shen Proceedings of the 2013 companion publication for conference on Systems …, 2013 | 3 | 2013 |
Poster: Android Malware Detection using Multi-Flows and API Patterns F Shen, J Del Vecchio, A Mohaisen, SY Ko, L Ziarek Proceedings of the 15th Annual International Conference on Mobile Systems …, 2017 | 2 | 2017 |
Secret sharing with extended coefficient use for improved data capacity F Shen, C Mei, H Jiang, Z Xu Proceedings of the IEEE SoutheastCon 2010 (SoutheastCon), 119-122, 2010 | 1 | 2010 |
Android Security via Static Analysis Techniques F Shen State University of New York at Buffalo, 2018 | | 2018 |
Flow Permissions for Android L Ziarek, S Ko, F Shen, B Rosenberg, V Nanjundaswamy, D Manuel | | 2013 |
Achieving High Throughput Sequencing with Graphics Processing Units S Chen, C Zhang, F Shen, L Bai, H Jiang, D Herman Proceedings of the International Conference on Parallel and Distributed …, 2011 | | 2011 |
A Trustworthy Storage System with Variable Data Partitioning F Shen, H Jiang Journal of Systemics and Informatics World Network 10, 101-108, 2010 | | 2010 |
A Reliable File Management System based on Scaled Secret Sharing F Shen, H Jiang, J Jenness Proceedings of the 2010 International Conference on Parallel and Distributed …, 2010 | | 2010 |