On Recommending Hashtags in Twitter Networks SM Kywe, TA Hoang, EP Lim, F Zhu The 4th International Conference on Social Informatics (SocInfo 2012), 2012 | 204 | 2012 |
Biometric Authentication on iPhone and Android: Usability, Perceptions, and Influences on Adoption C Bhagavatula, B Ur, K Iacovino, SM Kywe, LF Cranor, M Savvides | 168 | 2015 |
A Survey of Recommender Systems in Twitter SM Kywe, EP Lim, F Zhu The 4th International Conference on Social Informatics (SocInfo 2012), 2012 | 124 | 2012 |
Launching generic attacks on ios with approved third-party applications J Han, SM Kywe, Q Yan, F Bao, R Deng, D Gao, Y Li, J Zhou International Conference on Applied Cryptography and Network Security, 272-289, 2013 | 35 | 2013 |
Detecting camouflaged applications on mobile application markets SM Kywe, Y Li, RH Deng, J Hong International Conference on Information Security and Cryptology, 241-254, 2014 | 20 | 2014 |
Batch Clone Detection in RFID-enabled supply chain J Shi, SM Kywe, Y Li 2014 IEEE International Conference on RFID (IEEE RFID), 118-125, 2014 | 18 | 2014 |
Attacking android smartphone systems without permissions SM Kywe, Y Li, K Petal, M Grace Privacy, Security and Trust (PST), 2016 14th Annual Conference on, 147-156, 2016 | 16 | 2016 |
Security Issues of In-Store Mobile Payment X Yu, SM Kywe, Y Li Handbook of Blockchain, Digital Finance, and Inclusion, Volume 2, 115-144, 2017 | 15 | 2017 |
Evaluation of Different Electronic Product Code Discovery Service Models SM Kywe, J Shi, Y Li, R Kailash Advances in Internet of Things 2 (2), 37-46, 2012 | 15 | 2012 |
Privatedroid: Private browsing mode for android SM Kywe, C Landis, Y Pei, J Satterfield, Y Tian, P Tague 2014 IEEE 13th International Conference on Trust, Security and Privacy in …, 2014 | 9 | 2014 |
Poster: Usability Analysis of Biometric Authentication Systems on Mobile Phones K Iacovino, SM Kywe, LF Cranor, B Ur | 9* | |
Dissecting developer policy violating apps: characterization and detection SM Kywe, Y Li, J Hong, C Yao Malicious and Unwanted Software (MALWARE), 2016 11th International …, 2016 | 7 | 2016 |
Attack and defense mechanisms of malicious EPC event injection in EPC discovery service SM Kywe, Y Li, J Shi RFID-Technologies and Applications (RFID-TA), 2013 IEEE International …, 2013 | 5 | 2013 |
Techniques for identifying mobile platform vulnerabilities and detecting policy-violating applications MK SU Singapore Management University, 2016 | | 2016 |
ENVIRONMENTAL MANAGEMENT STUDY IN CENTRAL MYANMAR S Wynn, SM Kywe, W Maung Selected Student Research Projects of the 5th Search for SEAMEO Young …, 0 | | |