Follow
Su Mon Kywe
Su Mon Kywe
Security Architect
Verified email at sc.com
Title
Cited by
Cited by
Year
On Recommending Hashtags in Twitter Networks
SM Kywe, TA Hoang, EP Lim, F Zhu
The 4th International Conference on Social Informatics (SocInfo 2012), 2012
2072012
Biometric Authentication on iPhone and Android: Usability, Perceptions, and Influences on Adoption
C Bhagavatula, B Ur, K Iacovino, SM Kywe, LF Cranor, M Savvides
1702015
A Survey of Recommender Systems in Twitter
SM Kywe, EP Lim, F Zhu
The 4th International Conference on Social Informatics (SocInfo 2012), 2012
1262012
Launching generic attacks on ios with approved third-party applications
J Han, SM Kywe, Q Yan, F Bao, R Deng, D Gao, Y Li, J Zhou
International Conference on Applied Cryptography and Network Security, 272-289, 2013
352013
Detecting camouflaged applications on mobile application markets
SM Kywe, Y Li, RH Deng, J Hong
International Conference on Information Security and Cryptology, 241-254, 2014
202014
Batch Clone Detection in RFID-enabled supply chain
J Shi, SM Kywe, Y Li
2014 IEEE International Conference on RFID (IEEE RFID), 118-125, 2014
182014
Attacking android smartphone systems without permissions
SM Kywe, Y Li, K Petal, M Grace
Privacy, Security and Trust (PST), 2016 14th Annual Conference on, 147-156, 2016
172016
Security Issues of In-Store Mobile Payment
X Yu, SM Kywe, Y Li
Handbook of Blockchain, Digital Finance, and Inclusion, Volume 2, 115-144, 2017
162017
Evaluation of Different Electronic Product Code Discovery Service Models
SM Kywe, J Shi, Y Li, R Kailash
Advances in Internet of Things 2 (2), 37-46, 2012
152012
Privatedroid: Private browsing mode for android
SM Kywe, C Landis, Y Pei, J Satterfield, Y Tian, P Tague
2014 IEEE 13th International Conference on Trust, Security and Privacy in …, 2014
92014
Poster: Usability Analysis of Biometric Authentication Systems on Mobile Phones
K Iacovino, SM Kywe, LF Cranor, B Ur
9*
Dissecting developer policy violating apps: characterization and detection
SM Kywe, Y Li, J Hong, C Yao
Malicious and Unwanted Software (MALWARE), 2016 11th International …, 2016
72016
Attack and defense mechanisms of malicious EPC event injection in EPC discovery service
SM Kywe, Y Li, J Shi
RFID-Technologies and Applications (RFID-TA), 2013 IEEE International …, 2013
52013
Techniques for identifying mobile platform vulnerabilities and detecting policy-violating applications
MK SU
Singapore Management University, 2016
2016
ENVIRONMENTAL MANAGEMENT STUDY IN CENTRAL MYANMAR
S Wynn, SM Kywe, W Maung
Selected Student Research Projects of the 5th Search for SEAMEO Young …, 0
The system can't perform the operation now. Try again later.
Articles 1–15