[HTML][HTML] A survey on semantic communications: technologies, solutions, applications and challenges

Y Liu, X Wang, Z Ning, MC Zhou, L Guo… - Digital Communications …, 2023 - Elsevier
Semantic Communication (SC) has emerged as a novel communication paradigm that
provides a receiver with meaningful information extracted from the source to maximize …

The development of privacy protection standards for smart home

D Liu, C Wu, L Yang, X Zhao… - … and Mobile Computing, 2022 - Wiley Online Library
With the rapid development of network technology, society has entered the Internet of Things
(IoT) era. Enriching IoT devices enable smart home privacy information to be easily obtained …

MiniTracker: Large-Scale Sensitive Information Tracking in Mini Apps

W Li, B Yang, H Ye, L Xiang, Q Tao… - … on Dependable and …, 2023 - ieeexplore.ieee.org
Running on host mobile applications, mini apps have gained increasing popularity these
days for its convenience in installation and usage. However, being easy to use allows mini …

CaIAuth: Context-aware implicit authentication when the screen is awake

C Wu, K He, J Chen, R Du… - IEEE Internet of Things …, 2020 - ieeexplore.ieee.org
Relieving users from the burden of remembering and inputting authentication information
explicitly, such as passwords/PINs and lock patterns, implicit authentication mechanisms …

[PDF][PDF] An investigation study for risk calculation of security vulnerabilities on android applications (in

RM Abdullah, AZ Abualkishik, NM Isaacc… - Indonesian Journal of …, 2022 - academia.edu
Applications within mobile devices, although useful and entertaining, come with security
risks to private information stored within the device such as name, address, and date of birth …

Social Privacy-Preserving Modeling Based on Graphical Evolutionary Game and Infectious Disease Dissemination Dynamics

K Gu, CQJ Li, Y Deng - IEEE Transactions on Computational …, 2023 - ieeexplore.ieee.org
Although social network provides more convenience for people's daily communication, it
also faces the risk of personal privacy leakage. How to effectively evaluate and protect …

Powerprint: Identifying smartphones through power consumption of the battery

J Chen, K He, J Chen, Y Fang… - Security and …, 2020 - Wiley Online Library
Device fingerprinting technologies are widely employed in smartphones. However, the
features used in existing schemes may bring the privacy disclosure problems because of …

A Decision Probability Transformation Method Based on the Neural Network

J Li, A Zhao, H Liu - Entropy, 2022 - mdpi.com
When the Dempster–Shafer evidence theory is applied to the field of information fusion, how
to reasonably transform the basic probability assignment (BPA) into probability to improve …

Personalized Privacy Risk Assessment Based on Deep Neural Network for Image Sharing on Social Networks

H Cai, A Zhao, S Wang, M Zhang, Y Zhang - International Conference on …, 2023 - Springer
With the extensive usage of social networks, many users get used to share images with their
friends frequently without thinking carefully about the private information in the images …

RoD2M: Robust Deep Multi-modal Multi-label Model for Mobile App Security Rating

P Xie, Y Wu, H Chen, L Wu… - 2024 IEEE 7th International …, 2024 - ieeexplore.ieee.org
As the number of mobile internet users continues to expand, the number of apps is
increasing, which involves various app security issues. It is crucial to generate a …