Follow
Zheran Fang
Title
Cited by
Cited by
Year
Permission based Android security: Issues and countermeasures
Z Fang, W Han, Y Li
computers & security 43, 205-218, 2014
1912014
revdroid: Code analysis of the side effects after dynamic permission revocation of android apps
Z Fang, W Han, D Li, Z Guo, D Guo, XS Wang, Z Qian, H Chen
Proceedings of the 11th ACM on Asia Conference on Computer and …, 2016
332016
Collaborative policy administration
W Han, Z Fang, LT Yang, G Pan, Z Wu
IEEE Transactions on Parallel and Distributed Systems 25 (2), 498-507, 2013
202013
sendroid: Auditing sensor access in android system-wide
W Han, C Cao, H Chen, D Li, Z Fang, W Xu, XS Wang
IEEE Transactions on Dependable and Secure Computing 17 (2), 407-421, 2017
112017
Role mining algorithm evaluation and improvement in large volume android applications
X Zhang, W Han, Z Fang, Y Yin, H Mustafa
Proceedings of the first international workshop on Security in embedded …, 2013
62013
APP Vetting Based on the Consistency of Description and APK
W Han, W Wang, X Zhang, W Peng, Z Fang
Trusted Systems: 6th International Conference, INTRUST 2014, Beijing, China …, 2015
42015
Poster: collaborative policy administration
W Han, Z Fang, W Chen, W Xu, C Lei
Proceedings of the 18th ACM conference on Computer and communications …, 2011
32011
Role Mining in Large Volume Android Applications
X Zhang, W Han, Z Fang, Y Yin, HA Mustafa
2013
The system can't perform the operation now. Try again later.
Articles 1–8