1. 1. A Probabilistic Discriminative Model for Android Malware Detection with Decompiled
Source Code:
http://ieeexplore.ieee.org/xpl/articleDetails.jsp?arnumber=6894210&queryText=android
&refinements%5B%5D=&ranges%5B%5D=2015_2015_Year&rowsPerPage=100&searc
hField=Search_All
2. The Impact of API Change- and Fault-Proneness on the User Ratings of Android Apps
http://ieeexplore.ieee.org/xpl/articleDetails.jsp?arnumber=6945855&queryText=android
&refinements%5B%5D=&ranges%5B%5D=2015_2015_Year&searchField=Search_All
3. COVERT: Compositional Analysis of Android Inter-App Permission Leakage
http://ieeexplore.ieee.org/xpl/articleDetails.jsp?arnumber=7079508&queryText=android
&refinements%5B%5D=&ranges%5B%5D=2015_2015_Year&pageNumber=2&searchF
ield=Search_All
4. SmartPhoto: A Resource-Aware Crowdsourcing Approach for Image Sensing with
Smartphones
http://ieeexplore.ieee.org/xpl/articleDetails.jsp?arnumber=7126979&queryText=android
&refinements%5B%5D=&ranges%5B%5D=2015_2015_Year&pageNumber=12&search
Field=Search_All
5. SBVLC: Secure Barcode-based Visible Light Communication for Smartphones
http://ieeexplore.ieee.org/xpl/articleDetails.jsp?arnumber=7061506&queryText=android+
Computing&refinements%5B%5D=&ranges%5B%5D=2015_2015_Year&pageNumber
=2&searchField=Search_All
6. Friendbook: A Semantic-Based Friend Recommendation System for Social Networks
http://ieeexplore.ieee.org/xpl/articleDetails.jsp?arnumber=6811189&queryText=android+
Computing&refinements%5B%5D=&ranges%5B%5D=2015_2015_Year&pageNumber
=2&searchField=Search_All
7. Alterdroid: Differential Fault Analysis of Obfuscated Smartphone Malware
http://ieeexplore.ieee.org/xpl/articleDetails.jsp?arnumber=7127000&queryText=android+
Computing&refinements%5B%5D=&ranges%5B%5D=2015_2015_Year&pageNumber
=3&searchField=Search_All
2. 8. My Privacy My Decision: Control of Photo Sharing on Online Social Networks
http://ieeexplore.ieee.org/xpl/articleDetails.jsp?arnumber=7120947&queryText=android+
Computing&refinements%5B%5D=&ranges%5B%5D=2015_2015_Year&pageNumber
=5&searchField=Search_All
9. Continuous and Transparent User Identity Verification for Secure Internet
Services
http://ieeexplore.ieee.org/xpl/articleDetails.jsp?arnumber=6702439&queryText=a
ndroid+Computing&refinements%5B%5D=&ranges%5B%5D=2015_2015_Year&
pageNumber=7&searchField=Search_All