{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,8]],"date-time":"2024-09-08T10:39:19Z","timestamp":1725791959700},"publisher-location":"Cham","reference-count":25,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319058122"},{"type":"electronic","value":"9783319058139"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014]]},"DOI":"10.1007\/978-3-319-05813-9_18","type":"book-chapter","created":{"date-parts":[[2014,4,16]],"date-time":"2014-04-16T11:57:50Z","timestamp":1397649470000},"page":"266-280","source":"Crossref","is-referenced-by-count":1,"title":["ADI: Towards a Framework of App Developer Inspection"],"prefix":"10.1007","author":[{"given":"Kai","family":"Xing","sequence":"first","affiliation":[]},{"given":"Di","family":"Jiang","sequence":"additional","affiliation":[]},{"given":"Wilfred","family":"Ng","sequence":"additional","affiliation":[]},{"given":"Xiaotian","family":"Hao","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"18_CR1","doi-asserted-by":"crossref","unstructured":"Alazab, M., Monsamy, V., Batten, L., Lantz, P., Tian, R.: Analysis of malicious and benign android applications. In: ICDCSW (2012)","DOI":"10.1109\/ICDCSW.2012.13"},{"key":"18_CR2","doi-asserted-by":"crossref","unstructured":"Balog, K., Azzopardi, L., De Rijke, M.: Formal models for expert finding in enterprise corpora. In: SIGIR (2006)","DOI":"10.1145\/1148170.1148181"},{"key":"18_CR3","unstructured":"Barbosa, L., Feng, J.: Robust sentiment detection on twitter from biased and noisy data. In: ACL (2010)"},{"key":"18_CR4","doi-asserted-by":"crossref","unstructured":"Blei, D.M., Ng, A.Y., Jordan, M.I.: Latent dirichlet allocation. The Journal of Machine Learning Research (2003)","DOI":"10.7551\/mitpress\/1120.003.0082"},{"key":"18_CR5","doi-asserted-by":"crossref","unstructured":"Chia, P., Yamamoto, Y., Asokan, N.: Is this app safe?: A large scale study on application permissions and risk signals. In: WWW, pp. 311\u2013320 (2012)","DOI":"10.1145\/2187836.2187879"},{"key":"18_CR6","doi-asserted-by":"crossref","unstructured":"Griffiths, T.L., Steyvers, M.: Finding scientific topics. Proc. of the National Academy of Sciences of the United States of America (2004)","DOI":"10.1073\/pnas.0307752101"},{"key":"18_CR7","doi-asserted-by":"crossref","unstructured":"Ha-Thuc, V., Mejova, Y., Harris, C., Srinivasan, P.: A relevance-based topic model for news event tracking. In: SIGIR (2009)","DOI":"10.1145\/1571941.1572117"},{"key":"18_CR8","doi-asserted-by":"crossref","unstructured":"Jiang, D., Leung, K., Ng, W.: Context-aware search personalization with concept preference. In: CIKM (2011)","DOI":"10.1145\/2063576.2063661"},{"key":"18_CR9","doi-asserted-by":"crossref","unstructured":"Jiang, D., Ng, W.: Mining web search topics with diverse spatiotemporal patterns. In: SIGIR (2013)","DOI":"10.1145\/2484028.2484124"},{"key":"18_CR10","doi-asserted-by":"crossref","unstructured":"Jiang, D., Vosecky, J., Leung, K.W.-T., Ng, W.: G-wstd: A framework for geographic web search topic discovery. In: CIKM (2012)","DOI":"10.1145\/2396761.2398414"},{"key":"18_CR11","doi-asserted-by":"crossref","unstructured":"Jiang, D., Vosecky, J., Leung, K.W.-T., Ng, W.: Panorama: A semantic-aware application search framework. In: EDBT (2013)","DOI":"10.1145\/2452376.2452420"},{"key":"18_CR12","doi-asserted-by":"crossref","unstructured":"Joachims, T.: Optimizing search engines using clickthrough data. In: SIGKDD (2002)","DOI":"10.1145\/775066.775067"},{"key":"18_CR13","doi-asserted-by":"crossref","unstructured":"Kang, D., Jiang, D., Pei, J., Liao, Z., Sun, X., Choi, H.J.: Multidimensional mining of large-scale search logs: A topic-concept cube approach. In: WSDM (2011)","DOI":"10.1145\/1935826.1935888"},{"key":"18_CR14","doi-asserted-by":"publisher","DOI":"10.1017\/CBO9780511809071","volume-title":"Introduction to information retrieval","author":"C.D. Manning","year":"2008","unstructured":"Manning, C.D., Raghavan, P., Schutze, H.: Introduction to information retrieval. Cambridge University Press, Cambridge (2008)"},{"key":"18_CR15","doi-asserted-by":"publisher","DOI":"10.1017\/CBO9780511809071","volume-title":"Introduction to information retrieval","author":"C.D. Manning","year":"2008","unstructured":"Manning, C.D., Raghavan, P., Sch\u00fctze, H.: Introduction to information retrieval, vol.\u00a01. Cambridge University Press, Cambridge (2008)"},{"key":"18_CR16","unstructured":"Mazurek, J.: Evaluation of ranking similarity in ordinal ranking problems. Acta academica karviniensia"},{"key":"18_CR17","doi-asserted-by":"crossref","unstructured":"Mei, Q., Liu, C., Su, H., Zhai, C.X.: A probabilistic approach to spatiotemporal theme pattern mining on weblogs. In: WWW (2006)","DOI":"10.1145\/1135777.1135857"},{"key":"18_CR18","first-page":"1801","volume":"10","author":"D. Newman","year":"2009","unstructured":"Newman, D., Asuncion, A., Smyth, P., Welling, M.: Distributed algorithms for topic models. The Journal of Machine Learning Research\u00a010, 1801\u20131828 (2009)","journal-title":"The Journal of Machine Learning Research"},{"key":"18_CR19","doi-asserted-by":"crossref","unstructured":"Renda, M., Straccia, U.: Web metasearch: Rank vs. score based rank aggregation methods. In: Proceedings of the 2003 ACM symposium on Applied Computing (2003)","DOI":"10.1145\/952686.952698"},{"key":"18_CR20","unstructured":"Rosen-Zvi, M., Griffiths, T., Steyvers, M., Smyth, P.: The author-topic model for authors and documents. In: Proceedings of the UAI Conference (2004)"},{"issue":"11","key":"18_CR21","doi-asserted-by":"publisher","first-page":"613","DOI":"10.1145\/361219.361220","volume":"18","author":"G. Salton","year":"1975","unstructured":"Salton, G., Wong, A., Yang, C.: A vector space model for automatic indexing. Communications of the ACM\u00a018(11), 613\u2013620 (1975)","journal-title":"Communications of the ACM"},{"key":"18_CR22","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"397","DOI":"10.1007\/978-3-642-29038-1_29","volume-title":"Database Systems for Advanced Applications","author":"J. Vosecky","year":"2012","unstructured":"Vosecky, J., Leung, K.W.-T., Ng, W.: Searching for quality microblog posts: Filtering and ranking based on content analysis and implicit links. In: Lee, S.-G., Peng, Z., Zhou, X., Moon, Y.-S., Unland, R., Yoo, J. (eds.) DASFAA 2012, Part I. LNCS, vol.\u00a07238, pp. 397\u2013413. Springer, Heidelberg (2012)"},{"key":"18_CR23","unstructured":"Wallach, H.M.: Structured topic models for language. Unpublished doctoral dissertation. Univ.of Cambridge (2008)"},{"key":"18_CR24","doi-asserted-by":"crossref","unstructured":"Wei, X., Gomez, L., Neamtiu, I., Faloutsos, M.: Malicious android applications in the enterprise: What do they do and how do we fix it? In: ICDEW, pp. 251\u2013254. IEEE (2012)","DOI":"10.1109\/ICDEW.2012.81"},{"key":"18_CR25","unstructured":"Zhou, Y., Wang, Z., Zhou, W., Jiang, X.: Hey, you, get off of my market: Detecting malicious apps in official and alternative android markets. In: NDSS (2012)"}],"container-title":["Lecture Notes in Computer Science","Database Systems for Advanced Applications"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-05813-9_18","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,5,25]],"date-time":"2024-05-25T23:13:40Z","timestamp":1716678820000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-05813-9_18"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014]]},"ISBN":["9783319058122","9783319058139"],"references-count":25,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-05813-9_18","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2014]]}}}