{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,9]],"date-time":"2024-09-09T02:16:17Z","timestamp":1725848177968},"publisher-location":"Cham","reference-count":17,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319279978"},{"type":"electronic","value":"9783319279985"}],"license":[{"start":{"date-parts":[[2015,1,1]],"date-time":"2015-01-01T00:00:00Z","timestamp":1420070400000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2015]]},"DOI":"10.1007\/978-3-319-27998-5_17","type":"book-chapter","created":{"date-parts":[[2016,1,29]],"date-time":"2016-01-29T11:08:51Z","timestamp":1454065731000},"page":"259-277","source":"Crossref","is-referenced-by-count":3,"title":["APP Vetting Based on the Consistency of Description and APK"],"prefix":"10.1007","author":[{"given":"Weili","family":"Han","sequence":"first","affiliation":[]},{"given":"Wei","family":"Wang","sequence":"additional","affiliation":[]},{"given":"Xinyi","family":"Zhang","sequence":"additional","affiliation":[]},{"given":"Weiwei","family":"Peng","sequence":"additional","affiliation":[]},{"given":"Zheran","family":"Fang","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2016,1,30]]},"reference":[{"key":"17_CR1","unstructured":"Number of android applications. Technical report, AppBrain (2014)"},{"key":"17_CR2","unstructured":"Research also shows steady and significant drop in number of malicious apps being removed in past three years. Technical report, RiskIQ (2014)"},{"key":"17_CR3","unstructured":"An open-source api for the android market. https:\/\/code.google.com\/p\/android-market-api . Accessed 2014"},{"key":"17_CR4","doi-asserted-by":"crossref","unstructured":"Au, K.W.Y., Zhou, Y.F., Huang, Z., Lie, D.: Pscout: Analyzing the android permission specification. In: Proceedings of the 2012 ACM Conference on Computer and Communications Security, CCS 2012, pp. 217\u2013228. ACM, New York (2012)","DOI":"10.1145\/2382196.2382222"},{"key":"17_CR5","unstructured":"Chau, M., Reith, R., Ubrani, J.: Worldwide quarterly mobile phone tracker. Technical report, International Data Corporation (2014)"},{"key":"17_CR6","doi-asserted-by":"crossref","unstructured":"Enck, W., Ongtang, M., Mcdaniel, P.D.: On lightweight mobile phone application certification. In: ACM Conference on Computer and Communications Security, pp. 235\u2013245 (2009)","DOI":"10.1145\/1653662.1653691"},{"key":"17_CR7","doi-asserted-by":"publisher","first-page":"205","DOI":"10.1016\/j.cose.2014.02.007","volume":"43","author":"Z Fang","year":"2014","unstructured":"Fang, Z., Han, W., Li, Y.: Permission based android security: issues and countermeasures. Comput. Secur. (COSE) 43, 205\u2013218 (2014)","journal-title":"Comput. Secur. (COSE)"},{"key":"17_CR8","doi-asserted-by":"crossref","unstructured":"Fellbaum, C.: WordNet An Electronic Lexical Database (1998)","DOI":"10.7551\/mitpress\/7287.001.0001"},{"key":"17_CR9","unstructured":"Gabrilovich, E., Markovitch, S.: Computing semantic relatedness using wikipedia-based explicit semantic analysis. In: International Joint Conference on Artificial Intelligence, pp. 1606\u20131611 (2007)"},{"key":"17_CR10","unstructured":"Google. android-apktool. https:\/\/code.google.com\/p\/android-apktool . Accessed 2014"},{"issue":"2","key":"17_CR11","doi-asserted-by":"publisher","first-page":"498","DOI":"10.1109\/TPDS.2013.147","volume":"25","author":"W Han","year":"2014","unstructured":"Han, W., Fang, Z., Yang, L.T., Pan, G., Wu, Z.: Collaborative policy administration. IEEE Trans. Parallel Distrib. Syst. (TPDS) 25(2), 498\u2013507 (2014)","journal-title":"IEEE Trans. Parallel Distrib. Syst. (TPDS)"},{"key":"17_CR12","doi-asserted-by":"crossref","unstructured":"Jordan, M.I., Jacobs, R.A.: Hierarchical mixtures of experts and the EM algorithm. In: International Symposium on Neural Networks (1993)","DOI":"10.1007\/978-1-4471-2097-1_113"},{"key":"17_CR13","unstructured":"Knoth, P., Zilka, L., Zdrahal, Z.: Cross-lingual link discovery in wikipedia using explicit semantic analysis. In: The 9th NTCIR Workshop Meeting, pp. 6\u20139, Tokyo, Japan, December 2011. Knowledge Media Institute"},{"key":"17_CR14","doi-asserted-by":"publisher","first-page":"130","DOI":"10.1108\/eb046814","volume":"14","author":"M Porter","year":"1980","unstructured":"Porter, M.: An algorithm for suffix stripping. Program-electron. Libr. Inf. Syst. 14, 130\u2013137 (1980)","journal-title":"Program-electron. Libr. Inf. Syst."},{"key":"17_CR15","doi-asserted-by":"publisher","first-page":"705","DOI":"10.1214\/aos\/1176345513","volume":"9","author":"D Pregibon","year":"1981","unstructured":"Pregibon, D.: Logistic regression diagnostics. Ann. Stat. 9, 705\u2013724 (1981)","journal-title":"Ann. Stat."},{"key":"17_CR16","doi-asserted-by":"crossref","unstructured":"Qu, Z., Rastogi, V., Zhang, X., Chen, Y., Zhu, T., Chen, Z.: AutoCog: measuring the description-to-permission fidelity in android applications. In: ACM Conference on Computer and Communications Security (2014)","DOI":"10.1145\/2660267.2660287"},{"key":"17_CR17","doi-asserted-by":"crossref","unstructured":"Zhang, X., Han, W., Fang, Z., Yin, Y., Mustafa, H.: Role mining algorithm evaluation and improvement in large volume android applications. In: Proceedings of the First International Workshop on Security in embedded systems and smartphones (SESP 2013), conjunction with ASIACCS 2013 (2013)","DOI":"10.1145\/2484417.2484423"}],"container-title":["Lecture Notes in Computer Science","Trusted Systems"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-27998-5_17","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,6,2]],"date-time":"2022-06-02T19:23:05Z","timestamp":1654197785000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-27998-5_17"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015]]},"ISBN":["9783319279978","9783319279985"],"references-count":17,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-27998-5_17","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2015]]}}}