1

Data Augmentation for Dementia Detection in Spoken Language

Characterizing Improper Input Validation Vulnerabilities of Mobile Crowdsourcing Services

Shadow-catcher: Looking into shadows to detect ghost objects in autonomous vehicle 3d sensing

Darknetz: towards model privacy at the edge using trusted execution environments

Codrive: Improving automobile positioning via collaborative driving

Resolving the predicament of android custom permissions

CamForensics: Understanding visual privacy leaks in the wild

Ghost installer in the shadow: Security analysis of app installation on android

HanGuard: SDN-driven protection of smart home WiFi devices from malicious mobile apps

Draco: A system for uniform and fine-grained access control for web code on android