{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,9]],"date-time":"2026-01-09T19:09:25Z","timestamp":1767985765558,"version":"3.49.0"},"reference-count":49,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","license":[{"start":{"date-parts":[[2019,1,1]],"date-time":"2019-01-01T00:00:00Z","timestamp":1546300800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/legalcode"}],"funder":[{"DOI":"10.13039\/501100012166","name":"National Basic Research Program of China","doi-asserted-by":"publisher","award":["2017YFB0801901"],"award-info":[{"award-number":["2017YFB0801901"]}],"id":[{"id":"10.13039\/501100012166","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Foundation Strengthening Program for Key Basic Research of China","award":["2017-JCJQ-ZD-043"],"award-info":[{"award-number":["2017-JCJQ-ZD-043"]}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61897069"],"award-info":[{"award-number":["61897069"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Access"],"published-print":{"date-parts":[[2019]]},"DOI":"10.1109\/access.2019.2944684","type":"journal-article","created":{"date-parts":[[2019,10,1]],"date-time":"2019-10-01T02:18:26Z","timestamp":1569896306000},"page":"141850-141867","source":"Crossref","is-referenced-by-count":5,"title":["AppAuth: Authorship Attribution for Android App Clones"],"prefix":"10.1109","volume":"7","author":[{"given":"Guoai","family":"Xu","sequence":"first","affiliation":[{"name":"School of Cyberspace Security, Beijing University of Posts and Telecommunications, Beijing, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-9068-0828","authenticated-orcid":false,"given":"Chengpeng","family":"Zhang","sequence":"additional","affiliation":[{"name":"School of Cyberspace Security, Beijing University of Posts and Telecommunications, Beijing, China"}]},{"given":"Bowen","family":"Sun","sequence":"additional","affiliation":[{"name":"School of Cyberspace Security, Beijing University of Posts and Telecommunications, Beijing, China"}]},{"given":"Xinyu","family":"Yang","sequence":"additional","affiliation":[{"name":"School of Cyberspace Security, Beijing University of Posts and Telecommunications, Beijing, China"}]},{"given":"Yanhui","family":"Guo","sequence":"additional","affiliation":[{"name":"School of Cyberspace Security, Beijing University of Posts and Telecommunications, Beijing, China"}]},{"given":"Chengze","family":"Li","sequence":"additional","affiliation":[{"name":"National Computer Network Emergency Response Technical Team\/Coordination Center of China, Beijing, China"}]},{"given":"Haoyu","family":"Wang","sequence":"additional","affiliation":[{"name":"School of Computer Science, Beijing University of Posts and Telecommunications, Beijing, China"}]}],"member":"263","reference":[{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1109\/SSBSE.2009.18"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1145\/1276958.1277364"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1145\/2889160.2889178"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1145\/2901739.2903508"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1214\/aos\/1013203451"},{"key":"ref30","first-page":"897","article-title":"McRank: Learning to rank using multiple classification and gradient boosting","author":"li","year":"2008","journal-title":"Proc Adv Neural Inf Process Syst"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1016\/S0164-1212(03)00049-9"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1002\/spe.2146"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1016\/S0167-4048(97)00005-9"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE-C.2017.161"},{"key":"ref28","first-page":"1","article-title":"Clouds: A decision tree classifier for large datasets","volume":"2","author":"ranka","year":"1998","journal-title":"Proceedings of the Conference on Knowledge Discovery and Data Mining"},{"key":"ref27","first-page":"3146","article-title":"LightGBM: A highly efficient gradient boosting decision tree","author":"ke","year":"2017","journal-title":"Advances in neural information processing systems"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1137\/1.9781611972733.11"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1145\/3038912.3052712"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1145\/3278532.3278558"},{"key":"ref20","article-title":"When coding style survives compilation: De-anonymizing programmers from executable binaries","author":"islam","year":"2018","journal-title":"Proc Network and Distributed System Security Symp (NDSS)"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-23822-2_10"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1145\/3176258.3176322"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1145\/3196398.3196412"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1145\/3230833.3230849"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1016\/0167-4048(93)90055-A"},{"key":"ref25","first-page":"255","article-title":"De-anonymizing programmers via code stylometry","author":"caliskan-islam","year":"2015","journal-title":"Proc 24th USENIX Conf Security Symp"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-30806-7_6"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1145\/2771783.2771795"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1145\/1134285.1134445"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-43936-4_9"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-47560-8_9"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1145\/2637364.2592003"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1145\/2627393.2627395"},{"key":"ref16","doi-asserted-by":"crossref","first-page":"163","DOI":"10.1109\/ICPC.2015.25","article-title":"Detecting clones in Android applications through analyzing user interfaces","author":"soh","year":"2015","journal-title":"Proceedings of the 2015 IEEE 23rd International Conference on Program Comprehension ICPC '15"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1145\/2766498.2766508"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2019.2901679"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/Trustcom\/BigDataSE\/ICESS.2017.230"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-33167-1_3"},{"key":"ref3","first-page":"431","article-title":"AdRob: Examining the landscape and impact of Android application plagiarism","author":"gibler","year":"2013","journal-title":"Proc 11th Annu Int Conf Mobile Syst Appl Serv"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2012.16"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1007\/s11390-017-1786-z"},{"key":"ref8","first-page":"62","article-title":"Juxtapp: A scalable system for detecting code reuse among Android applications","author":"hanna","year":"2012","journal-title":"Detection of Intrusions and Malware and Vulnerability Assessment"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1145\/2133601.2133640"},{"key":"ref49","doi-asserted-by":"publisher","DOI":"10.1145\/3151137.3151138"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1145\/2435349.2435377"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.1145\/2568225.2568286"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1109\/TMC.2014.2381212"},{"key":"ref48","doi-asserted-by":"publisher","DOI":"10.1109\/DICTAP.2016.7544005"},{"key":"ref47","doi-asserted-by":"publisher","DOI":"10.1109\/ICPC.2016.7503721"},{"key":"ref42","doi-asserted-by":"crossref","first-page":"91","DOI":"10.1016\/j.diin.2006.06.015","article-title":"Identifying almost identical files using context triggered piecewise hashing","volume":"3","author":"kornblum","year":"2006","journal-title":"Journal of digital investigation"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.2012.6227178"},{"key":"ref44","first-page":"142","article-title":"Detecting repackaged Android applications based on code clone detection technique","volume":"44","author":"wang","year":"2014","journal-title":"Sci China Inf Sci"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1145\/1553374.1553516"}],"container-title":["IEEE Access"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6287639\/8600701\/08853275.pdf?arnumber=8853275","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,1,14]],"date-time":"2025-01-14T20:02:17Z","timestamp":1736884937000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/8853275\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019]]},"references-count":49,"URL":"https:\/\/doi.org\/10.1109\/access.2019.2944684","relation":{},"ISSN":["2169-3536"],"issn-type":[{"value":"2169-3536","type":"electronic"}],"subject":[],"published":{"date-parts":[[2019]]}}}