{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,25]],"date-time":"2026-02-25T18:00:30Z","timestamp":1772042430709,"version":"3.50.1"},"reference-count":39,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"8","license":[{"start":{"date-parts":[[2022,4,15]],"date-time":"2022-04-15T00:00:00Z","timestamp":1649980800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2022,4,15]],"date-time":"2022-04-15T00:00:00Z","timestamp":1649980800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2022,4,15]],"date-time":"2022-04-15T00:00:00Z","timestamp":1649980800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61771374"],"award-info":[{"award-number":["61771374"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61771373"],"award-info":[{"award-number":["61771373"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61801360"],"award-info":[{"award-number":["61801360"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["62001393"],"award-info":[{"award-number":["62001393"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100017596","name":"Natural Science Basic Research Program of Shaanxi","doi-asserted-by":"publisher","award":["2020JC-15"],"award-info":[{"award-number":["2020JC-15"]}],"id":[{"id":"10.13039\/501100017596","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100017596","name":"Natural Science Basic Research Program of Shaanxi","doi-asserted-by":"publisher","award":["2020JM-109"],"award-info":[{"award-number":["2020JM-109"]}],"id":[{"id":"10.13039\/501100017596","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100012226","name":"Fundamental Research Funds for the Central Universities","doi-asserted-by":"publisher","award":["31020200QD010"],"award-info":[{"award-number":["31020200QD010"]}],"id":[{"id":"10.13039\/501100012226","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Xi\u2019an Unmanned System Security and Intelligent Communications ISTC Center"},{"name":"Special Funds for Central Universities Construction of World-Class Universities (Disciplines) and Special Development Guidance","award":["0639021GH0201024"],"award-info":[{"award-number":["0639021GH0201024"]}]},{"name":"Basic Research Programs of Taicang","award":["TC2020JC03"],"award-info":[{"award-number":["TC2020JC03"]}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Internet Things J."],"published-print":{"date-parts":[[2022,4,15]]},"DOI":"10.1109\/jiot.2021.3109785","type":"journal-article","created":{"date-parts":[[2021,9,2]],"date-time":"2021-09-02T20:27:23Z","timestamp":1630614443000},"page":"6159-6172","source":"Crossref","is-referenced-by-count":8,"title":["Automatic Detection for Privacy Violations in Android Applications"],"prefix":"10.1109","volume":"9","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-4790-0877","authenticated-orcid":false,"given":"Qian","family":"Luo","sequence":"first","affiliation":[{"name":"State Key Laboratory of Integrated Services Networks, School of Cyber Engineering, Xidian University, Xi&#x2019;an, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-0257-5081","authenticated-orcid":false,"given":"Yinbo","family":"Yu","sequence":"additional","affiliation":[{"name":"National Engineering Laboratory for Integrated Aero-Space-Ground-Ocean Big Data Application Technology, the School of Cybersecurity, Northwestern Polytechnical University, Xi&#x2019;an, Shaanxi, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-4273-8866","authenticated-orcid":false,"given":"Jiajia","family":"Liu","sequence":"additional","affiliation":[{"name":"National Engineering Laboratory for Integrated Aero-Space-Ground-Ocean Big Data Application Technology, the School of Cybersecurity, Northwestern Polytechnical University, Xi&#x2019;an, Shaanxi, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-9307-6132","authenticated-orcid":false,"given":"Abderrahim","family":"Benslimane","sequence":"additional","affiliation":[{"name":"LIA\/CERI, University of Avignon, Avignon, France"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2019.2948888"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2019.2909745"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2020.3010023"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2018.2855650"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2020.102687"},{"key":"ref6","volume-title":"Global Market Share Smartphone Operating Systems of Unit Shipments 2014\u20132023","year":"2020"},{"key":"ref7","first-page":"603","article-title":"50 ways to leak your data: An exploration of apps\u2019 circumvention of the Android permissions system","volume-title":"Proc. USENIX Security Symp.","author":"Reardon"},{"key":"ref8","volume-title":"Guardian: App Annie: Android Users Will Download 170 Billion Apps in 2018 Thanks to Fortnite","author":"Minotti","year":"2020"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2018.2889924"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2019.2950134"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2018.2879302"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2018.2866347"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/JSYST.2019.2938611"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2014.02.007"},{"key":"ref15","volume-title":"Zoom Sued for Allegedly Illegally Disclosing Personal Data","author":"Rosenblatt","year":"2020"},{"key":"ref16","volume-title":"Guardian: Revealed: 50 Million Facebook Proles Harvested for Cambridge Analytica in Major Data Breach","author":"Graham-Harrison","year":"2020"},{"key":"ref17","volume-title":"FCC to Propose 200 Million Fines for U.S. Cellphone Carriers Over Consumer Data Disclosures","author":"Shepardson","year":"2020"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/BIGCOM.2018.00020"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/DSN.2016.55"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1145\/2884781.2884855"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2017.23034"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/IJCNN48605.2020.9206660"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1145\/3180155.3180196"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/ISSRE5003.2020.00032"},{"key":"ref25","first-page":"1","article-title":"Guess who\u2019s texting you? Evaluating the security of smartphone messaging applications","volume-title":"Proc. 19th Annu. Netw. Distrib. Syst. Security Symp. (NDSS)","author":"Schrittwieser"},{"key":"ref26","volume-title":"The Hacker News: Facebook SDK Vulnerability Puts Millions of Smartphone Users\u2019 Accounts at Risk","author":"Kumar","year":"2021"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1145\/2976749.2978333"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/TSUSC.2017.2783858"},{"key":"ref29","first-page":"977","article-title":"SUPOR: precise and scalable sensitive user input detection for Android apps","volume-title":"Proc. 24th USENIX Security Symp.","author":"Huang"},{"key":"ref30","first-page":"993","article-title":"UIPicker: User-input privacy identification in mobile applications","volume-title":"Proc. 24th USENIX Security Symp.","author":"Nan"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-34129-8_20"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1145\/2568225.2568276"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1145\/2660267.2660287"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2912210"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2014.2353996"},{"key":"ref36","first-page":"2379","article-title":"FIRMSCOPE: automatic uncovering of privilege-escalation vulnerabilities in pre-installed apps in Android firmware","volume-title":"Proc. USENIX Security Symp.","author":"Elsabagh"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1109\/ICC.2019.8761572"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1109\/ICICT.2017.8320163"},{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1109\/CCIS.2012.6664265"}],"container-title":["IEEE Internet of Things Journal"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6488907\/9750920\/09527317.pdf?arnumber=9527317","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,1,11]],"date-time":"2024-01-11T22:40:59Z","timestamp":1705012859000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9527317\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,4,15]]},"references-count":39,"journal-issue":{"issue":"8"},"URL":"https:\/\/doi.org\/10.1109\/jiot.2021.3109785","relation":{},"ISSN":["2327-4662","2372-2541"],"issn-type":[{"value":"2327-4662","type":"electronic"},{"value":"2372-2541","type":"electronic"}],"subject":[],"published":{"date-parts":[[2022,4,15]]}}}