Open Access. Powered by Scholars. Published by Universities.®
Physical Sciences and Mathematics Commons™
Open Access. Powered by Scholars. Published by Universities.®
- Institution
-
- Singapore Management University (340)
- Edith Cowan University (67)
- Missouri University of Science and Technology (42)
- Wright State University (40)
- Marquette University (34)
-
- University of Texas at El Paso (33)
- University of Nebraska - Lincoln (25)
- Old Dominion University (21)
- City University of New York (CUNY) (19)
- Dartmouth College (17)
- Technological University Dublin (15)
- University of Nebraska at Omaha (15)
- The University of San Francisco (12)
- California Polytechnic State University, San Luis Obispo (11)
- Kennesaw State University (11)
- Florida International University (10)
- University of New Haven (10)
- Washington University in St. Louis (10)
- Western University (10)
- Air Force Institute of Technology (9)
- Smith College (9)
- Pace University (8)
- University of Dayton (7)
- University of Texas Rio Grande Valley (7)
- Boise State University (6)
- Bryn Mawr College (6)
- Cleveland State University (6)
- College of Saint Benedict and Saint John's University (6)
- Zayed University (6)
- Georgia State University (5)
- Keyword
-
- Security (20)
- Data mining (14)
- Big data (12)
- Online learning (12)
- Digital forensics (11)
-
- Social media (11)
- Twitter (11)
- Privacy (9)
- Visualization (9)
- [RSTDPub] (9)
- AHRC New York City (8)
- Algorithms (8)
- Community Engagement (8)
- EPortfolio (8)
- Optimization (8)
- Service Learning (8)
- Crowdsourcing (7)
- Design (7)
- Machine learning (7)
- Android (6)
- Healthcare (6)
- Information security (6)
- Localization (6)
- Smartphone (6)
- Analytics (5)
- Classification (5)
- Clustering (5)
- Computer science (5)
- Computer security (5)
- Content-based image retrieval (5)
- Publication
-
- Research Collection School Of Computing and Information Systems (335)
- Computer Science Faculty Publications (35)
- Departmental Technical Reports (CS) (33)
- Mathematics, Statistics and Computer Science Faculty Research and Publications (33)
- Research outputs 2014 to 2021 (25)
-
- Kno.e.sis Publications (24)
- Computer Science Technical Reports (22)
- Physics Faculty Research & Creative Works (20)
- Computer Science and Engineering Faculty Publications (16)
- Australian Digital Forensics Conference (14)
- Computer Science Faculty Publications and Presentations (14)
- Australian Information Security Management Conference (13)
- Faculty Publications (13)
- Faculty and Research Publications (11)
- All Computer Science and Engineering Research (10)
- CSE Conference and Workshop Papers (10)
- Electrical & Computer Engineering and Computer Science Faculty Publications (10)
- Electrical and Computer Engineering Publications (10)
- FIU Electronic Theses and Dissertations (9)
- Media Studies (9)
- Australian eHealth Informatics and Security Conference (8)
- Community Action Forum: Seidenberg School (8)
- Conference papers (8)
- Publications and Research (8)
- Articles (7)
- Computer Science and Software Engineering (7)
- Computer Science: Faculty Publications (7)
- Geosciences and Geological and Petroleum Engineering Faculty Research & Creative Works (7)
- All Works (6)
- Computer Science Faculty Research and Scholarship (6)
Articles 1 - 30 of 960
Full-Text Articles in Physical Sciences and Mathematics
Drip - Data Rich, Information Poor: A Concise Synopsis Of Data Mining, Muhammad Obeidat, Max North, Lloyd Burgess, Sarah North
Drip - Data Rich, Information Poor: A Concise Synopsis Of Data Mining, Muhammad Obeidat, Max North, Lloyd Burgess, Sarah North
Faculty and Research Publications
As production of data is exponentially growing with a drastically lower cost, the importance of data mining required to extract and discover valuable information is becoming more paramount. To be functional in any business or industry, data must be capable of supporting sound decision-making and plausible prediction. The purpose of this paper is concisely but broadly to provide a synopsis of the technology and theory of data mining, providing an enhanced comprehension of the methods by which massive data can be transferred into meaningful information.
Dynamics Of Propagation Of Premature Impulses In Structurally Remodeled Infarcted Myocardium: A Computational Analysis, Candido Cabo
Dynamics Of Propagation Of Premature Impulses In Structurally Remodeled Infarcted Myocardium: A Computational Analysis, Candido Cabo
Publications and Research
Initiation of cardiac arrhythmias typically follows one or more premature impulses either occurring spontaneously or applied externally. In this study, we characterize the dynamics of propagation of single (S2) and double premature impulses (S3), and the mechanisms of block of premature impulses at structural heterogeneities caused by remodeling of gap junctional conductance (Gj) in infarcted myocardium. Using a sub-cellular computer model of infarcted tissue, we found that |INa,max|, prematurity (coupling interval with the previous impulse), and conduction velocity (CV) of premature impulses change dynamically as they propagate away from the site of initiation. There are fundamental differences between the dynamics …
Kaczmarz Iterative Projection And Nonuniform Sampling With Complexity Estimates, Tim Wallace, Ali Safak Sekmen
Kaczmarz Iterative Projection And Nonuniform Sampling With Complexity Estimates, Tim Wallace, Ali Safak Sekmen
Computer Science Faculty Research
Kaczmarz’s alternating projection method has been widely used for solving mostly over-determined linear system of equations Ax = b in various fields of engineering, medical imaging, and computational science. Because of its simple iterative nature with light computation, this method was successfully applied in computerized tomography. Since tomography generates a matrix A with highly coherent rows, randomized Kaczmarz algorithm is expected to provide faster convergence as it picks a row for each iteration at random, based on a certain probability distribution. Since Kaczmarz’s method is a subspace projection method, the convergence rate for simple Kaczmarz algorithm was developed in …
Online Learning On Incremental Distance Metric For Person Re-Identification, Yuke Sun, Hong Liu, Qianru Sun
Online Learning On Incremental Distance Metric For Person Re-Identification, Yuke Sun, Hong Liu, Qianru Sun
Research Collection School Of Computing and Information Systems
Person re-identification is to match persons appearing across non-overlapping cameras. The matching is challenging due to visual ambiguities and disparities of human bodies. Most previous distance metrics are learned by off-line and supervised approaches. However, they are not practical in real-world applications in which online data comes in without any label. In this paper, a novel online learning approach on incremental distance metric, OL-IDM, is proposed. The approach firstly modifies Self-Organizing Incremental Neural Network (SOINN) using Mahalanobis distance metric to cluster incoming data into neural nodes. Such metric maximizes the likelihood of a true image pair matches with a smaller …
Human Action Classification Based On Sequential Bag-Of-Words Model, Hong Liu, Qiaoduo Zhang, Qianru Sun
Human Action Classification Based On Sequential Bag-Of-Words Model, Hong Liu, Qiaoduo Zhang, Qianru Sun
Research Collection School Of Computing and Information Systems
Recently, approaches utilizing spatial-temporal features have achieved great success in human action classification. However, they typically rely on bag-of-words (BoWs) model, and ignore the spatial and temporal structure information of visual words, bringing ambiguities among similar actions. In this paper, we present a novel approach called sequential BoWs for efficient human action classification. It captures temporal sequential structure by segmenting the entire action into sub-actions. Each sub-action has a tiny movement within a narrow range of action. Then the sequential BoWs are created, in which each sub-action is assigned with a certain weight and salience to highlight the distinguishing sections. …
Data Visualization For Network Simulations, Luiz Felipe Perrone, Greg L. Shrock, Christopher S. Main
Data Visualization For Network Simulations, Luiz Felipe Perrone, Greg L. Shrock, Christopher S. Main
Faculty Journal Articles
As many other kinds of simulation experiments, simulations of computer networks tend to generate high volumes of output data. While the collection and the statistical processing of these data are challenges in and of themselves, creating meaningful visualizations from them is as much an art as it is a science. A sophisticated body of knowledge in information design and data visualization has been developed and continues to evolve. However, many of the visualizations created by the network simulation community tend to be less than optimal at creating compelling, informative narratives from experimental output data. The primary contribution of this paper …
Perspectives On Languages For Specifying Simulation Experiments, Luiz Felipe Perrone, Johannes Schützel, Danhua Peng, Adelinde Urhmacher
Perspectives On Languages For Specifying Simulation Experiments, Luiz Felipe Perrone, Johannes Schützel, Danhua Peng, Adelinde Urhmacher
Faculty Journal Articles
While domain specific languages are well established for describing the system of interest in modeling and simulation, the last years have seen increasingly domain specific languages also exploited for specifying experiments. This development, whose application areas range from computational biology to network simulation, is motivated by the desire to facilitate the reproducibility of simulation results. Thereby, the experimentation process is treated as a first class object of simulation studies. As the experimentation process contains different tasks such as configuration, observation, analysis, and evaluation, domain-specific languages can be exploited to specify experiments as well as individual sub-tasks or even the goal …
College Of Engineering Senior Design Competition Fall 2014, University Of Nevada, Las Vegas
College Of Engineering Senior Design Competition Fall 2014, University Of Nevada, Las Vegas
Fred and Harriet Cox Senior Design Competition Projects
Part of every UNLV engineering student’s academic experience, the senior design project stimulates engineering innovation and entrepreneurship. Each student in their senior year chooses, plans, designs, and prototypes a product in this required element of the curriculum. A capstone to the student’s educational career, the senior design project encourages the student to use everything learned in the engineering program to create a practical, real world solution to an engineering challenge. The senior design competition helps focus the senior students in increasing the quality and potential for commercial application for their design projects. Judges from local industry evaluate the projects on …
The Potentials And Challenges Of Big Data In Public Health, Rena N. Vithiatharan
The Potentials And Challenges Of Big Data In Public Health, Rena N. Vithiatharan
Australian eHealth Informatics and Security Conference
The potential to use big data sources for public health increases with the broadening availability of data and improved methods of analysis. Whilst there are some well-known examples of the opportunistic use of big data, such as GoogleFlu, public health has not yet realised the full potential of such data sources. A literature review was undertaken to identify the potential of such data collections to impact public health, and to identify what challenges are currently limiting this potential. The potential include improved real-time analysis, research and development and genome studies. However, challenges listed are poor universal standardisation and classification, privacy …
Byod In Ehealth: Herding Cats And Stable Doors, Or A Catastrophe Waiting To Happen?, Krishnun Sansurooh, Patricia A H Williams
Byod In Ehealth: Herding Cats And Stable Doors, Or A Catastrophe Waiting To Happen?, Krishnun Sansurooh, Patricia A H Williams
Australian eHealth Informatics and Security Conference
The use of personal devices in the work environment has crossed the boundaries of work and socially related tasks. With cyber criminals seriously targeting healthcare for medical identity theft, the lack of control of new technologies within healthcare networks becomes an increasing vulnerability. The prolific adoption of personal mobile devices in the healthcare environment requires a proactive approach to the management of Bring Your Own Device (BYOD). This paper analysed the current state of the problem and the challenges that this creates in an environment that has stringent privacy and security requirements. The discourse demonstrates that the issue is not …
3rd Australian Ehealth Informatics And Security Conference, 2014, Edith Cowan University: Conference Details, Security Research Institute, Edith Cowan University
3rd Australian Ehealth Informatics And Security Conference, 2014, Edith Cowan University: Conference Details, Security Research Institute, Edith Cowan University
Australian eHealth Informatics and Security Conference
No abstract provided.
Customising Doctor-Nurse Communications, Brian Cusack, Dave Parry
Customising Doctor-Nurse Communications, Brian Cusack, Dave Parry
Australian eHealth Informatics and Security Conference
Doctor-Nurse communications are critical for patient safety and workflow effectiveness. Our research question was: What further improvements can be made to current communication systems? A variety of mobile and land based communication systems have been used and experimented with. In the study, the pager was found to be most common and more recent attempts to provide broadband capability with systems such as the iBeep. We built an alternative information system using Android phones and a software application that was customised by feedback from the medical professionals. The trial in five wards with 22 doctors and 170 nurses over one month …
Managing Wireless Security Risks In Medical Services, Brian Cusack, Akar Kyaw
Managing Wireless Security Risks In Medical Services, Brian Cusack, Akar Kyaw
Australian eHealth Informatics and Security Conference
Medical systems are designed for a range of end users from different professional skill groups and people who carry the devices in and on their bodies. Open, accurate, and efficient communication is the priority for medical systems and consequently strong protection costs are traded against the utility benefits for open systems. In this paper we assess the vulnerabilities created by the professional and end user expectations, and theorise ways to mitigate wireless security vulnerabilities. The benefits of wireless medical services are great in terms of efficiencies, mobility, and information management. These benefits may be realised by treating the vulnerabilities and …
Security Of Electronic Health Records In A Resource Limited Setting: The Case Of Smart-Care Electronic Health Record In Zambia, Keith Mweebo
Security Of Electronic Health Records In A Resource Limited Setting: The Case Of Smart-Care Electronic Health Record In Zambia, Keith Mweebo
Australian eHealth Informatics and Security Conference
This paper presents a case study of security issues related to the operationalization of smart-care, an electronic medical record (EMR) used to manage Human Immunodeficiency Virus (HIV) health information in Zambia. The aim of the smart-care program is to link up services and improve access to health information, by providing a reliable way to collect, store, retrieve and analyse health data in a secure way. As health professionals gain improved access to patient health information electronically, there is need to ensure this information is secured, and that patient privacy and confidentiality is maintained. During the initial stages of the program …
Avoiding Epic Fails: Software And Standards Directions To Increase Clinical Safety, Patricia A H Williams, Vincent B. Mccauley
Avoiding Epic Fails: Software And Standards Directions To Increase Clinical Safety, Patricia A H Williams, Vincent B. Mccauley
Australian eHealth Informatics and Security Conference
No abstract provided.
Big Data In Healthcare: What Is It Used For?, Rebecca Hermon, Patricia A H Williams
Big Data In Healthcare: What Is It Used For?, Rebecca Hermon, Patricia A H Williams
Australian eHealth Informatics and Security Conference
Big data analytics is a growth area with the potential to provide useful insight in healthcare. Whilst many dimensions of big data still present issues in its use and adoption, such as managing the volume, variety, velocity, veracity, and value, the accuracy, integrity, and semantic interpretation are of greater concern in clinical application. However, such challenges have not deterred the use and exploration of big data as an evidence source in healthcare. This drives the need to investigate healthcare information to control and reduce the burgeoning cost of healthcare, as well as to seek evidence to improve patient outcomes. Whilst …
Fresh: Fair And Efficient Slot Configuration And Scheduling For Hadoop Clusters, Jiayin Wang, Yi Yao, Ying Mao, Bo Sheng, Ningfang Mi
Fresh: Fair And Efficient Slot Configuration And Scheduling For Hadoop Clusters, Jiayin Wang, Yi Yao, Ying Mao, Bo Sheng, Ningfang Mi
Department of Computer Science Faculty Scholarship and Creative Works
Hadoop is an emerging framework for parallel big data processing. While becoming popular, Hadoop is too complex for regular users to fully understand all the system parameters and tune them appropriately. Especially when processing a batch of jobs, default Hadoop setting may cause inefficient resource utilization and unnecessarily prolong the execution time. This paper considers an extremely important setting of slot configuration which by default is fixed and static. We proposed an enhanced Hadoop system called FRESH which can derive the best slot setting, dynamically configure slots, and appropriately assign tasks to the available slots. The experimental results show that …
A Partner-Matching Framework For Social Activity Communities, Chunyu Ai, Wei Zhong, Mingyuan Yan, Feng Gu
A Partner-Matching Framework For Social Activity Communities, Chunyu Ai, Wei Zhong, Mingyuan Yan, Feng Gu
Publications and Research
A lot of daily activities require more than one person to participate and collaborate with each other; however, for many people, it is not easy to find good partners to engage in activities with one another. With the rapid growth of social network applications, more and more people get used to creating connections with people on the social network. Therefore, designing social network framework for partner-matching is significant in helping people to easily find good partners. In this paper, we proposed a framework which can match partners for an active community. In order to improve the matching performance, all users …
Vehicle Base Station, Emad William Saad, John L. Vian, Matthew A. Vavrina, Jared A. Nisbett, Donald C. Wunsch
Vehicle Base Station, Emad William Saad, John L. Vian, Matthew A. Vavrina, Jared A. Nisbett, Donald C. Wunsch
Electrical and Computer Engineering Faculty Research & Creative Works
A system to load and unload material from a vehicle comprises a vehicle base station and an assembly to autonomously load and unload material from the vehicle.
Facilitating Natural Conversational Agent Interactions: Lessons From A Deception Experiment, Ryan M. Schuetzler, Mark Grimes, Justin Scott Giboney, Joesph Buckman
Facilitating Natural Conversational Agent Interactions: Lessons From A Deception Experiment, Ryan M. Schuetzler, Mark Grimes, Justin Scott Giboney, Joesph Buckman
Information Systems and Quantitative Analysis Faculty Proceedings & Presentations
This study reports the results of a laboratory experiment exploring interactions between humans and a conversational agent. Using the ChatScript language, we created a chat bot that asked participants to describe a series of images. The two objectives of this study were (1) to analyze the impact of dynamic responses on participants’ perceptions of the conversational agent, and (2) to explore behavioral changes in interactions with the chat bot (i.e. response latency and pauses) when participants engaged in deception. We discovered that a chat bot that provides adaptive responses based on the participant’s input dramatically increases the perceived humanness and …
Security Issues In Data Warehouse, Saiqa Aleem, Luiz Fernando Capretz, Faheem Ahmed Dr.
Security Issues In Data Warehouse, Saiqa Aleem, Luiz Fernando Capretz, Faheem Ahmed Dr.
Electrical and Computer Engineering Publications
Data Warehouse (DWH) provides storage for huge amounts of historical data from heterogeneous operational sources in the form of multidimensional views, thus supplying sensitive and useful information which help decision-makers to improve the organization’s business processes. A data warehouse environment must ensure that data collected and stored in one big repository are not vulnerable. A review of security approaches specifically for data warehouse environment and issues concerning each type of security approach have been provided in this paper.
Promoting Functions To Type Families In Haskell, Richard A. Eisenberg, Jan Stolarek
Promoting Functions To Type Families In Haskell, Richard A. Eisenberg, Jan Stolarek
Computer Science Faculty Research and Scholarship
Haskell, as implemented in the Glasgow Haskell Compiler (GHC), is enriched with many extensions that support type-level programming, such as promoted datatypes, kind polymorphism, and type families. Yet, the expressiveness of the type-level language remains limited. It is missing many features present at the term level, including case expressions, anonymous functions, partially-applied functions, and letexpressions. In this paper, we present an algorithm - with a proof of correctness - to encode these term-level constructs at the type level. Our approach is automated and capable of promoting a wide array of functions to type families. We also highlight and discuss …
Information-Theoretic Limits For Density Estimation, James Brofos
Information-Theoretic Limits For Density Estimation, James Brofos
Computer Science Technical Reports
This paper is concerned with the information-theoretical limits of density estimation for Gaussian random variables with data drawn independently and with identical distributions. We apply Fano's inequality to the space of densities and an arbitrary estimator. We derive necessary conditions on the sample size for reliable density recovery and for reliable density estimation. These conditions are true simultaneously for both finitely and infinitely dimensional density spaces.
Flow Dynamics Of Byrd Glacier, East Antarctica, C. J. Van Der Veen, L. A. Stearns, Jesse Johnson, B. Csatho
Flow Dynamics Of Byrd Glacier, East Antarctica, C. J. Van Der Veen, L. A. Stearns, Jesse Johnson, B. Csatho
Computer Science Faculty Publications
Force-balance calculations on Byrd Glacier, East Antarctica, reveal large spatial variations in the along-flow component of driving stress with corresponding sticky spots that are stationary over time. On the large scale, flow resistance is partitioned between basal (�80%) and lateral (�20%) drag. Ice flow is due mostly to basal sliding and concentrated vertical shear in the basal ice layers, indicating the bed is at or close to the pressure-melting temperature. There is a significant component of driving stress in the across-flow direction resulting in nonzero basal drag in that direction. This is an unrealistic result and we propose that there …
A Function-To-Task Process Model For Adaptive Automation System Design, Jason M. Bindewald, Michael E. Miller, Gilbert L. Peterson
A Function-To-Task Process Model For Adaptive Automation System Design, Jason M. Bindewald, Michael E. Miller, Gilbert L. Peterson
Faculty Publications
Adaptive automation systems allow the user to complete a task seamlessly with a computer performing tasks at which the human operator struggles. Unlike traditional systems that allocate functions to either the human or the machine, adaptive automation varies the allocation of functions during system operation. Creating these systems requires designers to consider issues not present during static system development. To assist in adaptive automation system design, this paper presents the concept of inherent tasks and takes advantage of this concept to create the function-to-task design process model. This process model helps the designer determine how to allocate functions to the …
Modeling The Evolution Of Generativity And The Emergence Of Digital Ecosystems, C. Jason Woodard, Eric K. Clemons
Modeling The Evolution Of Generativity And The Emergence Of Digital Ecosystems, C. Jason Woodard, Eric K. Clemons
Research Collection School Of Computing and Information Systems
Recent literature on sociotechnical systems has employed the concept of generativity to explain the remarkable capacity for digital artifacts to support decentralized innovation and the emergence of rich business ecosystems. In this paper, we propose agent-based computational modeling as a tool for studying the evolution of generativity, and offer a set of building blocks for constructing agent-based models in which generativity evolves. We describe a series of models that we have created using these building blocks, and summarize the results of our computational experiments to date. We find in several different settings that key features of generative systems can themselves …
Cardioguard: A Brassiere-Based Reliable Ecg Monitoring Sensor System For Supporting Daily Smartphone Healthcare Applications, Sungjun Kwon, Jeehoon Kim, Seungwoo Kang, Youngki Lee, Hyunjae Baek, Kwangsuk Park
Cardioguard: A Brassiere-Based Reliable Ecg Monitoring Sensor System For Supporting Daily Smartphone Healthcare Applications, Sungjun Kwon, Jeehoon Kim, Seungwoo Kang, Youngki Lee, Hyunjae Baek, Kwangsuk Park
Research Collection School Of Computing and Information Systems
We propose CardioGuard, a brassiere-based reliable electrocardiogram (ECG) monitoring sensor system, for supporting daily smartphone healthcare applications. It is designed to satisfy two key requirements for user-unobtrusive daily ECG monitoring: reliability of ECG sensing and usability of the sensor. The system is validated through extensive evaluations. The evaluation results showed that the CardioGuard sensor reliably measure the ECG during 12 representative daily activities including diverse movement levels; 89.53% of QRS peaks were detected on average. The questionnaire-based user study with 15 participants showed that the CardioGuard sensor was comfortable and unobtrusive. Additionally, the signal-to-noise ratio test and the washing durability …
A Metrics Suite Of Cloud Computing Adoption Readiness, Robert J. Kauffman, Dan Ma, Martin Yu
A Metrics Suite Of Cloud Computing Adoption Readiness, Robert J. Kauffman, Dan Ma, Martin Yu
Research Collection School Of Computing and Information Systems
Recent research on cloud computing adoption indicates that there has been a lack of deep understanding of its benefits by managers and organizations. This has been an obstacle for adoption. We report on an initial design for a firm-level cloud computing readiness metrics suite. We propose categories and measures to form a set of metrics to measure adoption readiness and assess the required adjustments in strategy and management, technology and operations, and business policies. We reviewed the relevant interdisciplinary literature and interviewed industry professionals to ground our metrics based on theory and practice knowledge. We identified four relevant categories for …
Mydeal: A Mobile Shopping Assistant Matching User Preferences To Promotions, Kartik Muralidharan, Swapna Gottipati, Jing Jiang, Narayan Ramasubbu, Rajesh Krishna Balan
Mydeal: A Mobile Shopping Assistant Matching User Preferences To Promotions, Kartik Muralidharan, Swapna Gottipati, Jing Jiang, Narayan Ramasubbu, Rajesh Krishna Balan
Research Collection School Of Computing and Information Systems
A common problem in large urban cities is the huge number of retail options available. In response, a number of shopping assistance applications have been created for mobile phones. However, these applications mostly allow users to know where stores are or find promotions on specific items. What is missing is a system that factors in a user's shopping preferences and automatically tells them which stores are of their interest. The key challenge in this system is twofold; 1) building a matching algorithm that can combine user preferences with fairly unstructured deals and store information to generate a final rank ordered …
Android Or Ios For Better Privacy Protection?, Jin Han, Qiang Yan, Debin Gao, Jianying Zhou, Huijie Robert Deng
Android Or Ios For Better Privacy Protection?, Jin Han, Qiang Yan, Debin Gao, Jianying Zhou, Huijie Robert Deng
Research Collection School Of Computing and Information Systems
With the rapid growth of the mobile market, security of mobile platforms is receiving increasing attention from both research community as well as the public. In this paper, we make the first attempt to establish a baseline for security comparison between the two most popular mobile platforms. We investigate applications that run on both Android and iOS and examine the difference in the usage of their security sensitive APIs (SS-APIs). Our analysis over 2,600 applications shows that iOS applications consistently access more SS-APIs than their counterparts on Android. The additional privileges gained on iOS are often associated with accessing private …