Previous work has investigated the particularities of security practices...
Modern defenses against cyberattacks increasingly rely on proactive
appr...
Graph is an important data representation ubiquitously existing in the r...
We study the temporal dynamics of potentially harmful apps (PHAs) on And...
The malware and botnet phenomenon is among the most significant threats ...
Android's security model severely limits the capabilities of anti-malwar...
Mobile phones enable the collection of a wealth of private information, ...
Many real-world data comes in the form of graphs, such as social network...
Ubiquitous intelligence has been widely recognized as a critical vision ...
The air-ground integrated network is a key component of future sixth
gen...
Credit scoring (Thomas et al., 2002) plays a vital role in the field of
...
Despite the fact that cyberattacks are constantly growing in complexity,...
With the increased complexity of modern computer attacks, there is a nee...
In this work, we define a collaborative and privacy-preserving machine
t...
We introduce a general framework for measuring risk in the context of Ma...