The case for mobile forensics of private data leaks: Towards large-scale user-oriented privacy protection JCJ Keng, TK Wee, L Jiang, RK Balan Proceedings of the 4th Asia-Pacific Workshop on Systems, 1-7, 2013 | 28 | 2013 |
Graph-aided directed testing of android applications for checking runtime privacy behaviours JCJ Keng, L Jiang, TK Wee, RK Balan Proceedings of the 11th International Workshop on Automation of Software …, 2016 | 20 | 2016 |
Automated testing and notification of mobile app privacy leak-cause behaviours JCJ Keng Proceedings of the 31st IEEE/ACM International Conference on Automated …, 2016 | 8 | 2016 |
An empirical study on bug reports of Android 3rd party libraries J Kochhar, J Keng, T Biying Singapore Management University, 2013 | 2 | 2013 |
Privacy protection in outsourced association rule mining using distributed servers and its privacy notions JCJ Keng | 2 | 2013 |
Uncovering user-triggered privacy leaks in mobile applications and their utility in privacy protection JKJ CHAN Singapore Management University, 2017 | 1 | 2017 |
DEMO of Mobile Forensics: Identification of Leak Causes in Mobile Applications JCJ Keng, TK Wee, L Jiang, RK Balan 4th ACM SIGOPS Asia-Pacific Workshop on Systems (APSys 2013), 2013 | 1 | 2013 |
Profiling power utilization behaviours of smartwatch applications JCJ Keng, L Jiang, RK Balan, Y Lee, A Misra Proceedings of the 14th Annual International Conference on Mobile Systems …, 2016 | | 2016 |
Graph-aided directed testing of Android applications for checking runtime privacy behaviours.(2016) JJK CHAN, L JIANG, KW TAN, RK BALAN AST 2016: Proceedings of the 11th International Workshop on Automation of …, 2016 | | 2016 |
Leveraging automated privacy checking for design of mobile privacy protection mechanisms JCJ Keng, L Jiang, KW Tan, RK BALAN | | 2016 |
Demo of MAMBA: A Graph-Aided Directed Tester for Android Applications JCJ Keng, L Jiang, TK Wee, RK Balan 17th International Conference on Distributed Computing and Networking (ICDCN …, 2016 | | 2016 |
Mobile platform and application research at SMU LiveLabs S Gottipati, J Sebastian, LT Tuan, TK Wee, JCJ Keng, K Muralidharan, ... Communication Systems and Networks (COMSNETS), 2014 Sixth International …, 2014 | | 2014 |
The Case for Mobile Forensics of Private Data Leaks: Towards Large-Scale User-Oriented Privacy Protection.(2013) JJK CHAN, KW TAN, L JIANG, RK BALAN APSys' 13: Proceedings of the 4th Asia-Pacific Workshop on Systems …, 2013 | | 2013 |
Redundant Link Improvement on Radio Access Network (RAN) and a Class-Threshold Metric Bandwidth Reservation Scheme with Borrowing (CTMRS-B) for Survivability JK Chan 3rd International Conference on Advanced Infocomm Technology (ICAIT 2010), 2010 | | 2010 |
Demo: Profiling power utilization behaviours of smartwatch applications.(2016) JJK CHAN, L JIANG, RK BALAN, Y LEE, A MISRA MobiSys' 16 Companion: Proceedings of the 14th Annual International …, 0 | | |
Leveraging automated privacy checking for design of mobile privacy protection mechanisms.(2016) JJK CHAN, L JIANG, KW TAN, R BALAN CHI 2016: The 34th Annual CHI Conference on Human Factors in Computing …, 0 | | |
When NEO meets the ORACLE: Predicting Collaboration and Movie Performance in IMDb S Sen, J Chan | | |