{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,9]],"date-time":"2026-01-09T21:12:58Z","timestamp":1767993178246,"version":"3.49.0"},"reference-count":56,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","license":[{"start":{"date-parts":[[2019,1,1]],"date-time":"2019-01-01T00:00:00Z","timestamp":1546300800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/OAPA.html"}],"funder":[{"DOI":"10.13039\/501100002467","name":"Dankook University","doi-asserted-by":"publisher","id":[{"id":"10.13039\/501100002467","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Access"],"published-print":{"date-parts":[[2019]]},"DOI":"10.1109\/access.2019.2920314","type":"journal-article","created":{"date-parts":[[2019,5,31]],"date-time":"2019-05-31T20:00:07Z","timestamp":1559332807000},"page":"72182-72196","source":"Crossref","is-referenced-by-count":12,"title":["RomaDroid: A Robust and Efficient Technique for Detecting Android App Clones Using a Tree Structure and Components of Each App\u2019s Manifest File"],"prefix":"10.1109","volume":"7","author":[{"given":"Byoungchul","family":"Kim","sequence":"first","affiliation":[]},{"given":"Kyeonghwan","family":"Lim","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-9917-0429","authenticated-orcid":false,"given":"Seong-Je","family":"Cho","sequence":"additional","affiliation":[]},{"given":"Minkyu","family":"Park","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1145\/2382196.2382222"},{"key":"ref38","year":"2019","journal-title":"App Manifest File of Android Developers"},{"key":"ref33","article-title":"Code protection in Android","author":"schulz","year":"2012"},{"key":"ref32","year":"2019","journal-title":"DashO (Java Obfuscator & Android Obfuscator)"},{"key":"ref31","year":"2019","journal-title":"ProGuard&#x2014;Mobile App Protection"},{"key":"ref30","year":"2019","journal-title":"ProGuard&#x2014;Mobile App Protection"},{"key":"ref37","first-page":"86","article-title":"Effects of code obfuscation on Android app similarity analysis","volume":"6","author":"park","year":"2015","journal-title":"Proc JoWUA"},{"key":"ref36","doi-asserted-by":"crossref","first-page":"172","DOI":"10.1007\/978-3-030-01701-9_10","article-title":"Understanding Android obfuscation techniques: A large-scale investigation in the wild","author":"dong","year":"2018","journal-title":"Security and Privacy in Communication Networks"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1145\/2843859.2843866"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1145\/3274694.3274726"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/MOBILESoft.2017.18"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1145\/2597073.2597109"},{"key":"ref29","first-page":"638","article-title":"CodeMatch: Obfuscation won&#x2019;t conceal your repackaged app","author":"glanz","year":"2017","journal-title":"Proceedings of the Joint Meeting on Foundations of Software Engineering"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/TMC.2014.2381212"},{"key":"ref1","first-page":"182","article-title":"AnDarwin: Scalable detection of semantically similar Android applications","author":"crussell","year":"2013","journal-title":"Proc ESORICS"},{"key":"ref20","first-page":"142","article-title":"Detecting repackaged Android applications based on code clone detection technique","volume":"44","author":"wang","year":"2014","journal-title":"Sci China Inf Sci"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/Trustcom\/BigDataSE\/ICESS.2017.230"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1145\/1985793.1985835"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1145\/1985441.1985468"},{"key":"ref23","doi-asserted-by":"crossref","first-page":"169","DOI":"10.1007\/978-3-642-38908-5_13","article-title":"A framework for evaluating mobile app repackaging detection algorithms","author":"huang","year":"2013","journal-title":"Trust and Trustworthy Computing"},{"key":"ref26","article-title":"A taxonomy of obfuscating transformations","author":"collberg","year":"1997"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1007\/s10664-012-9199-7"},{"key":"ref50","doi-asserted-by":"publisher","DOI":"10.1109\/CISTI.2014.6877073"},{"key":"ref51","article-title":"Attacks on fitness trackers revisited: A case-study of unfit firmware security","author":"rieck","year":"2016","journal-title":"arXiv 1604 03313"},{"key":"ref56","article-title":"Rebooting research on detecting repackaged Android apps: Literature review and benchmark","author":"li","year":"0","journal-title":"IEEE Trans Softw Eng"},{"key":"ref55","doi-asserted-by":"publisher","DOI":"10.1109\/WMNC.2015.10"},{"key":"ref54","doi-asserted-by":"publisher","DOI":"10.1145\/2967360.2967369"},{"key":"ref53","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2017.2787737"},{"key":"ref52","doi-asserted-by":"publisher","DOI":"10.1145\/2873587.2873594"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/WCRE.1995.514697"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2002.1019480"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1080\/01969722.2013.803889"},{"key":"ref12","first-page":"20","article-title":"CP-miner: A tool for finding copy-paste and related bugs in operating system code","volume":"6","author":"li","year":"2004","journal-title":"Proc OSDI"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/ICSM.1998.738528"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/SCAM.2004.6"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.2007.30"},{"key":"ref16","first-page":"62","article-title":"Juxtapp: A scalable system for detecting code reuse among Android applications","author":"hanna","year":"2012","journal-title":"Proceedings of the 4th International Conference on Detection of Intrusions and Malware and Vulnerability Assessment"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1145\/2133601.2133640"},{"key":"ref18","first-page":"37","article-title":"Attack of the clones: Detecting cloned applications on Android markets","author":"crussell","year":"2012","journal-title":"Proc 17th Eur Symp Res Comput Secur"},{"key":"ref19","first-page":"182","article-title":"Scalable semantics-based detection of similar Android applications","volume":"13","author":"crussell","year":"2013","journal-title":"Proc ESORICS"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/MS.2010.159"},{"key":"ref3","doi-asserted-by":"crossref","first-page":"71","DOI":"10.1145\/2771783.2771795","article-title":"WuKong: A scalable and accurate two-phase approach to Android app clone detection","author":"wang","year":"2015","journal-title":"Proc ISSTA"},{"key":"ref6","first-page":"459","article-title":"Adrob: Examining the landscape and impact of android application plagiarism","author":"gibler","year":"2013","journal-title":"Proc 11th Annu Int Conf Mobile Syst Appl Serv"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/IWSC.2013.6613045"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2012.16"},{"key":"ref7","first-page":"175","article-title":"Achieving accuracy and scalability simultaneously in detecting application clones on Android markets","author":"chen","year":"2014","journal-title":"Proc ICSE"},{"key":"ref49","article-title":"Security analysis of wearable fitness devices (Fitbit)","author":"cyr","year":"2014"},{"key":"ref9","doi-asserted-by":"crossref","first-page":"221","DOI":"10.1145\/2637364.2592003","article-title":"A measurement study of Google play","volume":"42","author":"viennot","year":"2014","journal-title":"ACM SIGMETRICS Perform Eval Rev"},{"key":"ref46","year":"2019","journal-title":"F-Droid&#x2014;Android Market"},{"key":"ref45","first-page":"1","article-title":"An LCS-based string metric","author":"bakkelund","year":"2009","journal-title":"Proc OLS"},{"key":"ref48","doi-asserted-by":"publisher","DOI":"10.1002\/spe.2414"},{"key":"ref47","doi-asserted-by":"crossref","first-page":"13","DOI":"10.1145\/3197231.3197248","article-title":"Orlis: Obfuscation-resilient library detection for Android","author":"wang","year":"2018","journal-title":"Proc Int'l Conf on Mobile Software Engineering and Systems (MOBILESoft)"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1109\/AsiaJCIS.2012.18"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1145\/1866307.1866317"},{"key":"ref44","first-page":"61","article-title":"Evaluating structural similarity in XML documents","volume":"2","author":"nierman","year":"2002","journal-title":"Proc WebDB"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.28945\/1638"}],"container-title":["IEEE Access"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6287639\/8600701\/08727540.pdf?arnumber=8727540","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,1,27]],"date-time":"2022-01-27T09:23:34Z","timestamp":1643275414000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/8727540\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019]]},"references-count":56,"URL":"https:\/\/doi.org\/10.1109\/access.2019.2920314","relation":{},"ISSN":["2169-3536"],"issn-type":[{"value":"2169-3536","type":"electronic"}],"subject":[],"published":{"date-parts":[[2019]]}}}