Abstract
Malicious activities in mobile applications may affect the mobile usages and even leave security concerns in the mobile applications. For example, the......
小提示:本篇文献需要登录阅读全文,点击跳转登录