Follow
Joseph Chan Joo Keng
Joseph Chan Joo Keng
Institute of High Performance Computing (IHPC), A*STAR
Verified email at msis.smu.edu.sg
Title
Cited by
Cited by
Year
The case for mobile forensics of private data leaks: Towards large-scale user-oriented privacy protection
JCJ Keng, TK Wee, L Jiang, RK Balan
Proceedings of the 4th Asia-Pacific Workshop on Systems, 1-7, 2013
282013
Graph-aided directed testing of android applications for checking runtime privacy behaviours
JCJ Keng, L Jiang, TK Wee, RK Balan
Proceedings of the 11th International Workshop on Automation of Software …, 2016
202016
Automated testing and notification of mobile app privacy leak-cause behaviours
JCJ Keng
Proceedings of the 31st IEEE/ACM International Conference on Automated …, 2016
82016
An empirical study on bug reports of Android 3rd party libraries
J Kochhar, J Keng, T Biying
Singapore Management University, 2013
22013
Privacy protection in outsourced association rule mining using distributed servers and its privacy notions
JCJ Keng
22013
Uncovering user-triggered privacy leaks in mobile applications and their utility in privacy protection
JKJ CHAN
Singapore Management University, 2017
12017
DEMO of Mobile Forensics: Identification of Leak Causes in Mobile Applications
JCJ Keng, TK Wee, L Jiang, RK Balan
4th ACM SIGOPS Asia-Pacific Workshop on Systems (APSys 2013), 2013
12013
Profiling power utilization behaviours of smartwatch applications
JCJ Keng, L Jiang, RK Balan, Y Lee, A Misra
Proceedings of the 14th Annual International Conference on Mobile Systems …, 2016
2016
Graph-aided directed testing of Android applications for checking runtime privacy behaviours.(2016)
JJK CHAN, L JIANG, KW TAN, RK BALAN
AST 2016: Proceedings of the 11th International Workshop on Automation of …, 2016
2016
Leveraging automated privacy checking for design of mobile privacy protection mechanisms
JCJ Keng, L Jiang, KW Tan, RK BALAN
2016
Demo of MAMBA: A Graph-Aided Directed Tester for Android Applications
JCJ Keng, L Jiang, TK Wee, RK Balan
17th International Conference on Distributed Computing and Networking (ICDCN …, 2016
2016
Mobile platform and application research at SMU LiveLabs
S Gottipati, J Sebastian, LT Tuan, TK Wee, JCJ Keng, K Muralidharan, ...
Communication Systems and Networks (COMSNETS), 2014 Sixth International …, 2014
2014
The Case for Mobile Forensics of Private Data Leaks: Towards Large-Scale User-Oriented Privacy Protection.(2013)
JJK CHAN, KW TAN, L JIANG, RK BALAN
APSys' 13: Proceedings of the 4th Asia-Pacific Workshop on Systems …, 2013
2013
Redundant Link Improvement on Radio Access Network (RAN) and a Class-Threshold Metric Bandwidth Reservation Scheme with Borrowing (CTMRS-B) for Survivability
JK Chan
3rd International Conference on Advanced Infocomm Technology (ICAIT 2010), 2010
2010
Demo: Profiling power utilization behaviours of smartwatch applications.(2016)
JJK CHAN, L JIANG, RK BALAN, Y LEE, A MISRA
MobiSys' 16 Companion: Proceedings of the 14th Annual International …, 0
Leveraging automated privacy checking for design of mobile privacy protection mechanisms.(2016)
JJK CHAN, L JIANG, KW TAN, R BALAN
CHI 2016: The 34th Annual CHI Conference on Human Factors in Computing …, 0
When NEO meets the ORACLE: Predicting Collaboration and Movie Performance in IMDb
S Sen, J Chan
The system can't perform the operation now. Try again later.
Articles 1–17