Zheran Fang
Cited by
Cited by
Permission based Android security: Issues and countermeasures
Z Fang, W Han, Y Li
computers & security 43, 205-218, 2014
revdroid: Code analysis of the side effects after dynamic permission revocation of android apps
Z Fang, W Han, D Li, Z Guo, D Guo, XS Wang, Z Qian, H Chen
Proceedings of the 11th ACM on Asia Conference on Computer and …, 2016
Collaborative policy administration
W Han, Z Fang, LT Yang, G Pan, Z Wu
IEEE Transactions on Parallel and Distributed Systems 25 (2), 498-507, 2013
Role mining algorithm evaluation and improvement in large volume android applications
X Zhang, W Han, Z Fang, Y Yin, H Mustafa
Proceedings of the first international workshop on Security in embedded …, 2013
sendroid: Auditing sensor access in android system-wide
W Han, C Cao, H Chen, D Li, Z Fang, W Xu, XS Wang
IEEE Transactions on Dependable and Secure Computing 17 (2), 407-421, 2017
Poster: collaborative policy administration
W Han, Z Fang, W Chen, W Xu, C Lei
Proceedings of the 18th ACM conference on Computer and communications …, 2011
APP Vetting Based on the Consistency of Description and APK
W Han, W Wang, X Zhang, W Peng, Z Fang
International Conference on Trusted Systems, 259-277, 2014
Automatically detecting and fixing concurrency bugs in go software systems
Z Liu, S Zhu, B Qin, H Chen, L Song
Proceedings of the 26th ACM International Conference on Architectural …, 2021
Role Mining in Large Volume Android Applications
X Zhang, W Han, Z Fang, Y Yin, HA Mustafa
The system can't perform the operation now. Try again later.
Articles 1–9