{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,4]],"date-time":"2026-02-04T16:36:42Z","timestamp":1770223002104,"version":"3.49.0"},"reference-count":41,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans. Big Data"],"published-print":{"date-parts":[[2021]]},"DOI":"10.1109\/tbdata.2021.3093244","type":"journal-article","created":{"date-parts":[[2021,6,29]],"date-time":"2021-06-29T19:47:53Z","timestamp":1624996073000},"page":"1-1","source":"Crossref","is-referenced-by-count":4,"title":["Understanding and Conquering the Difficulties in Identifying Third-party Librariesfrom Millions of Android Apps"],"prefix":"10.1109","author":[{"given":"Yanghua","family":"Zhang","sequence":"first","affiliation":[]},{"given":"Jice","family":"Wang","sequence":"additional","affiliation":[]},{"given":"Hexiang","family":"Huang","sequence":"additional","affiliation":[]},{"given":"Yuqing","family":"Zhang","sequence":"additional","affiliation":[]},{"given":"Peng","family":"Liu","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref39","first-page":"468","article-title":"AndroZoo: Collecting Millions of Android Apps for the Research Community","author":"allix","year":"2016","journal-title":"2016 IEEE\/ACM 13th Conference on Mining Software Repositories (MSR)"},{"key":"ref38","article-title":"Redis","year":"2018"},{"key":"ref33","article-title":"Mikepenz","author":"penz","year":"2020"},{"key":"ref32","article-title":"Baidu wormhole","year":"2015"},{"key":"ref31","article-title":"Connectivity (graph theory)","year":"2020"},{"key":"ref30","article-title":"Umeng","year":"2020"},{"key":"ref37","author":"robert","year":"2011","journal-title":"Algorithms"},{"key":"ref36","article-title":"Apktool","author":"tumbleson","year":"2016"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1145\/2627393.2627395"},{"key":"ref34","article-title":"Wala","year":"2015"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1145\/2976749.2978333"},{"key":"ref40","article-title":"Codematch artifacts","author":"glanz","year":"2017"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/Trustcom\/BigDataSE\/ICESS.2017.292"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1145\/3106237.3106305"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/SANER.2018.8330204"},{"key":"ref14","first-page":"653","article-title":"LibRadar: Fast and Accurate Detection of Third-Party Libraries in Android Apps","author":"ma","year":"2016","journal-title":"2016 IEEE\/ACM 38th International Conference on Software Engineering Companion (ICSE-C) ICSE-C"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.2017.38"},{"key":"ref16","article-title":"Google play","year":"2012"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE-C.2017.161"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/ISSNIP.2014.6827639"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1145\/2435349.2435377"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1145\/2666356.2594299"},{"key":"ref4","first-page":"1","article-title":"Investigating user privacy in android ad libraries","author":"stevens","year":"2012","journal-title":"Proc Workshop Mobile Secur Technol (MoST)"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/ICC.2013.6654845"},{"key":"ref3","article-title":"Longitudinal analysis of android ad library permissions","author":"book","year":"2013"},{"key":"ref6","article-title":"Badkernel","year":"2016"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1109\/MSR.2017.23"},{"key":"ref5","article-title":"Setting the record straight on moplus SDK and the wormhole vulnerability","author":"shen","year":"2015"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2016.29"},{"key":"ref7","article-title":"Ad vulna: A vulnaggressive (vulnerable & aggressive) adware threatening millions","author":"yulong","year":"2013"},{"key":"ref2","first-page":"21","article-title":"A study of android application security","author":"enck","year":"2011","journal-title":"Proc 20th USENIX Conf Secur"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/SANER.2016.52"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1145\/2185448.2185464"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2016.23485"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2018.2872958"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1145\/2771783.2771795"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-45744-4_23"},{"key":"ref41","article-title":"Appbrain","year":"2020"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1145\/2714576.2714598"},{"key":"ref26","first-page":"553","article-title":"Adsplit: Separating smartphone advertising from applications","author":"shekhar","year":"2012","journal-title":"Proc 21th USENIX Secur Symp"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1145\/2627393.2627396"}],"container-title":["IEEE Transactions on Big Data"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6687317\/7153538\/09468421.pdf?arnumber=9468421","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,11,11]],"date-time":"2022-11-11T17:16:06Z","timestamp":1668186966000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9468421\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021]]},"references-count":41,"URL":"https:\/\/doi.org\/10.1109\/tbdata.2021.3093244","relation":{},"ISSN":["2332-7790","2372-2096"],"issn-type":[{"value":"2332-7790","type":"electronic"},{"value":"2372-2096","type":"electronic"}],"subject":[],"published":{"date-parts":[[2021]]}}}