Zheran Fang
Cited by
Cited by
Permission based Android security: Issues and countermeasures
Z Fang, W Han, Y Li
computers & security 43, 205-218, 2014
revdroid: Code analysis of the side effects after dynamic permission revocation of android apps
Z Fang, W Han, D Li, Z Guo, D Guo, XS Wang, Z Qian, H Chen
Proceedings of the 11th ACM on Asia Conference on Computer and …, 2016
Collaborative policy administration
W Han, Z Fang, LT Yang, G Pan, Z Wu
IEEE Transactions on Parallel and Distributed Systems 25 (2), 498-507, 2013
Role mining algorithm evaluation and improvement in large volume android applications
X Zhang, W Han, Z Fang, Y Yin, H Mustafa
Proceedings of the first international workshop on Security in embedded …, 2013
Poster: collaborative policy administration
W Han, Z Fang, W Chen, W Xu, C Lei
Proceedings of the 18th ACM conference on Computer and communications …, 2011
senDroid: Auditing Sensor Access in Android System-wide
W Han, C Cao, H Chen, D Li, Z Fang, W Xu, XS Wang
IEEE Transactions on Dependable and Secure Computing, 2017
APP Vetting Based on the Consistency of Description and APK
W Han, W Wang, X Zhang, W Peng, Z Fang
International Conference on Trusted Systems, 259-277, 2014
Role Mining in Large Volume Android Applications
X Zhang, W Han, Z Fang, Y Yin, HA Mustafa
The system can't perform the operation now. Try again later.
Articles 1–8