{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,6]],"date-time":"2026-01-06T13:26:10Z","timestamp":1767705970126},"reference-count":20,"publisher":"Springer Science and Business Media LLC","issue":"2","license":[{"start":{"date-parts":[[2024,1,12]],"date-time":"2024-01-12T00:00:00Z","timestamp":1705017600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2024,1,12]],"date-time":"2024-01-12T00:00:00Z","timestamp":1705017600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["J Comput Virol Hack Tech"],"DOI":"10.1007\/s11416-023-00510-0","type":"journal-article","created":{"date-parts":[[2024,1,12]],"date-time":"2024-01-12T18:02:28Z","timestamp":1705082548000},"page":"331-346","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":4,"title":["Picker Blinder: a framework for automatic injection of malicious inter-app communication"],"prefix":"10.1007","volume":"20","author":[{"given":"Rosangela","family":"Casolare","sequence":"first","affiliation":[]},{"given":"Stefano","family":"Fagnano","sequence":"additional","affiliation":[]},{"given":"Giacomo","family":"Iadarola","sequence":"additional","affiliation":[]},{"given":"Fabio","family":"Martinelli","sequence":"additional","affiliation":[]},{"given":"Francesco","family":"Mercaldo","sequence":"additional","affiliation":[]},{"given":"Antonella","family":"Santone","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2024,1,12]]},"reference":[{"key":"510_CR1","doi-asserted-by":"crossref","unstructured":"Abro, F.I., Rajarajan, M., Chen, T.M., Rahulamathavan, Y.: Android application collusion demystified. In: International Conference on Future Network Systems and Security, pp. 176\u2013187. Springer (2017)","DOI":"10.1007\/978-3-319-65548-2_14"},{"key":"510_CR2","doi-asserted-by":"crossref","unstructured":"Bacci, A., Bartoli, A., Martinelli, F., Medvet, E., Mercaldo, F., Visaggio, C.A.: Impact of code obfuscation on android malware detection based on static and dynamic analysis. In: ICISSP, pp. 379\u2013385 (2018)","DOI":"10.5220\/0006642503790385"},{"key":"510_CR3","first-page":"300","volume":"149","author":"M Bada","year":"2021","unstructured":"Bada, M., Boubiche, D.E., Lagraa, N., Kerrache, C.A., Imran, M., Shoaib, M.: A policy-based solution for the detection of colluding gps-spoofing attacks in Fanets. Transp. Res. Part A: Policy Pract. 149, 300\u2013318 (2021)","journal-title":"Transp. Res. Part A: Policy Pract."},{"key":"510_CR4","doi-asserted-by":"crossref","unstructured":"Bao, F.: Colluding attacks to a payment protocol and two signature exchange schemes. In: International Conference on the Theory and Application of Cryptology and Information Security, pp. 417\u2013429. Springer (2004)","DOI":"10.1007\/978-3-540-30539-2_29"},{"issue":"2","key":"510_CR5","doi-asserted-by":"publisher","first-page":"127","DOI":"10.1007\/s11416-017-0296-4","volume":"14","author":"J Blasco","year":"2018","unstructured":"Blasco, J., Chen, T.M.: Automated generation of colluding apps for experimental research. J. Comput. Virol. Hacking Tech. 14(2), 127\u2013138 (2018)","journal-title":"J. Comput. Virol. Hacking Tech."},{"key":"510_CR6","doi-asserted-by":"crossref","unstructured":"Canfora, G., Mercaldo, F., Moriano, G., Visaggio, C.A.: Composition-malware: building android malware at run time. In: 2015 10th International Conference on Availability, Reliability and Security, pp. 318\u2013326. IEEE (2015)","DOI":"10.1109\/ARES.2015.64"},{"key":"510_CR7","doi-asserted-by":"crossref","unstructured":"Canfora, G., Mercaldo, F., Visaggio, C.A., D\u2019Angelo, M., Furno, A., Manganelli, C.: A case study of automating user experience-oriented performance testing on smartphones. In: 2013 IEEE Sixth International Conference on Software Testing, Verification and Validation, pp. 66\u201369. IEEE (2013)","DOI":"10.1109\/ICST.2013.16"},{"key":"510_CR8","doi-asserted-by":"crossref","unstructured":"Casolare, R., Ciaramella, G., Martinelli, F., Mercaldo, F., Santone, A.: Ste\u00e6lergon: A framework for injecting colluding malicious payload in android applications. In: The 16th International Conference on Availability, Reliability and Security, pp. 1\u20137 (2021)","DOI":"10.1145\/3465481.3470077"},{"key":"510_CR9","doi-asserted-by":"crossref","unstructured":"Casolare, R., Lacava, G., Martinelli, F., Mercaldo, F., Russodivito, M., Santone, A.: 2faces: A new model of malware based on dynamic compiling and reflection. Computer Virology and Hacking Techniques (2021) (to appear)","DOI":"10.1007\/s11416-021-00409-8"},{"key":"510_CR10","doi-asserted-by":"crossref","unstructured":"Casolare, R., Martinelli, F., Mercaldo, F., Santone, A.: A model checking based proposal for mobile colluding attack detection. In: 2019 IEEE International Conference on Big Data (Big Data), pp. 5998\u20136000. IEEE (2019)","DOI":"10.1109\/BigData47090.2019.9006094"},{"key":"510_CR11","doi-asserted-by":"crossref","unstructured":"Casolare, R., Martinelli, F., Mercaldo, F., Santone, A.: Malicious collusion detection in mobile environment by means of model checking. In: 2020 International Joint Conference on Neural Networks (IJCNN), pp. 1\u20136. IEEE (2020)","DOI":"10.1109\/IJCNN48605.2020.9207638"},{"key":"510_CR12","doi-asserted-by":"crossref","unstructured":"Cimitile, A., Martinelli, F., Mercaldo, F.: Machine learning meets ios malware: Identifying malicious applications on apple environment. In: ICISSP, pp. 487\u2013492 (2017)","DOI":"10.5220\/0006217304870492"},{"key":"510_CR13","doi-asserted-by":"crossref","unstructured":"Ferrante, A., Medvet, E., Mercaldo, F., Milosevic, J., Visaggio, C.A.: Spotting the malicious moment: Characterizing malware behavior using dynamic features. In: 2016 11th International Conference on Availability, Reliability and Security (ARES), pp. 372\u2013381. IEEE (2016)","DOI":"10.1109\/ARES.2016.70"},{"issue":"1","key":"510_CR14","doi-asserted-by":"publisher","first-page":"15","DOI":"10.1109\/TMI.2022.3202248","volume":"42","author":"P Huang","year":"2022","unstructured":"Huang, P., He, P., Tian, S., Ma, M., Feng, P., Xiao, H., Mercaldo, F., Santone, A., Qin, J.: A vit-amc network with adaptive model fusion and multiobjective optimization for interpretable laryngeal tumor grading from histopathological images. IEEE Trans. Med. Imag. 42(1), 15\u201328 (2022)","journal-title":"IEEE Trans. Med. Imag."},{"issue":"4","key":"510_CR15","doi-asserted-by":"publisher","first-page":"1696","DOI":"10.1109\/JBHI.2021.3108999","volume":"26","author":"P Huang","year":"2021","unstructured":"Huang, P., Tan, X., Zhou, X., Liu, S., Mercaldo, F., Santone, A.: Fabnet: fusion attention block and transfer learning for laryngeal cancer tumor grading in p63 ihc histopathology images. IEEE J. Biomed. Health Inform. 26(4), 1696\u20131707 (2021)","journal-title":"IEEE J. Biomed. Health Inform."},{"key":"510_CR16","doi-asserted-by":"crossref","unstructured":"Huang, P., Zhou, X., He, P., Feng, P., Tian, S., Sun, Y., Mercaldo, F., Santone, A., Qin, J., Xiao, H.: Interpretable laryngeal tumor grading of histopathological images via depth domain adaptive network with integration gradient cam and priori experience-guided attention. Comput. Biol. Med. 154, 106447 (2023)","DOI":"10.1016\/j.compbiomed.2022.106447"},{"key":"510_CR17","doi-asserted-by":"crossref","unstructured":"Kamhoua, G.A., Pissinou, N., Iyengar, S., Beltran, J., Kamhoua, C., Hernandez, B.L., Njilla, L., Makki, A.P.: Preventing colluding identity clone attacks in online social networks. In: 2017 IEEE 37th International Conference on Distributed Computing Systems Workshops (ICDCSW), pp. 187\u2013192. IEEE (2017)","DOI":"10.1109\/ICDCSW.2017.64"},{"key":"510_CR18","doi-asserted-by":"crossref","unstructured":"Khalil, I.: Mcc: mitigating colluding collision attacks in wireless sensor networks. In: 2010 IEEE Global Telecommunications Conference GLOBECOM 2010, pp. 1\u20135. IEEE (2010)","DOI":"10.1109\/GLOCOM.2010.5683731"},{"key":"510_CR19","doi-asserted-by":"crossref","unstructured":"Li, L., Bartel, A., Bissyand\u00e9, T.F., Klein, J., Le\u00a0Traon, Y.: Apkcombiner: combining multiple android apps to support inter-app analysis. In: IFIP International Information Security and Privacy Conference, pp. 513\u2013527. Springer (2015)","DOI":"10.1007\/978-3-319-18467-8_34"},{"issue":"3","key":"510_CR20","first-page":"228","volume":"2","author":"WZ Zarni Aung","year":"2013","unstructured":"Zarni Aung, W.Z.: Permission-based android malware detection. Int. J. Sci. Technol. Res. 2(3), 228\u2013234 (2013)","journal-title":"Int. J. Sci. Technol. Res."}],"container-title":["Journal of Computer Virology and Hacking Techniques"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11416-023-00510-0.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11416-023-00510-0\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11416-023-00510-0.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,4,18]],"date-time":"2024-04-18T18:12:46Z","timestamp":1713463966000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11416-023-00510-0"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,1,12]]},"references-count":20,"journal-issue":{"issue":"2","published-online":{"date-parts":[[2024,6]]}},"alternative-id":["510"],"URL":"https:\/\/doi.org\/10.1007\/s11416-023-00510-0","relation":{},"ISSN":["2263-8733"],"issn-type":[{"value":"2263-8733","type":"electronic"}],"subject":[],"published":{"date-parts":[[2024,1,12]]},"assertion":[{"value":"10 November 2021","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"20 September 2023","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"12 January 2024","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}