{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,29]],"date-time":"2025-12-29T04:41:21Z","timestamp":1766983281844,"version":"3.37.3"},"reference-count":96,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"11","license":[{"start":{"date-parts":[[2022,11,1]],"date-time":"2022-11-01T00:00:00Z","timestamp":1667260800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2022,11,1]],"date-time":"2022-11-01T00:00:00Z","timestamp":1667260800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2022,11,1]],"date-time":"2022-11-01T00:00:00Z","timestamp":1667260800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/501100001321","name":"National Research Foundation","doi-asserted-by":"publisher","award":["AISG2-RP-2020-019","NRF2018NCR-NCR005-0001"],"award-info":[{"award-number":["AISG2-RP-2020-019","NRF2018NCR-NCR005-0001"]}],"id":[{"id":"10.13039\/501100001321","id-type":"DOI","asserted-by":"publisher"}]},{"name":"NRF Investigatorship","award":["NRFI06-2020-0022-0001","NRF2018NCR-NSOE003-0001","NRF2018NCRNSOE004-0001"],"award-info":[{"award-number":["NRFI06-2020-0022-0001","NRF2018NCR-NSOE003-0001","NRF2018NCRNSOE004-0001"]}]},{"DOI":"10.13039\/501100000923","name":"Australian Research Council","doi-asserted-by":"publisher","award":["DE200100016"],"award-info":[{"award-number":["DE200100016"]}],"id":[{"id":"10.13039\/501100000923","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Discovery Project","award":["DP200100020"],"award-info":[{"award-number":["DP200100020"]}]},{"name":"Hong Kong RGC Projects","award":["PolyU15222317","PolyU15223918"],"award-info":[{"award-number":["PolyU15222317","PolyU15223918"]}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61802164"],"award-info":[{"award-number":["61802164"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Guandong Basic and Applied Basic Research Fundation","award":["2021A1515011562"],"award-info":[{"award-number":["2021A1515011562"]}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["62072046"],"award-info":[{"award-number":["62072046"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IIEEE Trans. Software Eng."],"published-print":{"date-parts":[[2022,11,1]]},"DOI":"10.1109\/tse.2021.3115506","type":"journal-article","created":{"date-parts":[[2021,9,28]],"date-time":"2021-09-28T21:43:13Z","timestamp":1632865393000},"page":"4249-4273","source":"Crossref","is-referenced-by-count":13,"title":["A Systematic Assessment on Android Third-Party Library Detection Tools"],"prefix":"10.1109","volume":"48","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-9814-5977","authenticated-orcid":false,"given":"Xian","family":"Zhan","sequence":"first","affiliation":[{"name":"Department of Computing, The Hong Kong Polytechnic University, Hong Kong, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-5216-933X","authenticated-orcid":false,"given":"Tianming","family":"Liu","sequence":"additional","affiliation":[{"name":"Monash University, Clayton, VIC, Australia"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-8147-8126","authenticated-orcid":false,"given":"Yepang","family":"Liu","sequence":"additional","affiliation":[{"name":"Department of Computer Science and Engineering, Southern University of Science and Technology, Shenzhen, Guangdong Province, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-7300-9215","authenticated-orcid":false,"given":"Yang","family":"Liu","sequence":"additional","affiliation":[{"name":"School of Computer Science and Engineering, Nanyang Technological University, Singapore, Singapore"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-2990-1614","authenticated-orcid":false,"given":"Li","family":"Li","sequence":"additional","affiliation":[{"name":"Monash University, Clayton, VIC, Australia"}]},{"given":"Haoyu","family":"Wang","sequence":"additional","affiliation":[{"name":"School of Computer Science, Beijing University of Posts and Telecommunications, Beijing, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-9082-3208","authenticated-orcid":false,"given":"Xiapu","family":"Luo","sequence":"additional","affiliation":[{"name":"Department of Computing, The Hong Kong Polytechnic University, Hong Kong, China"}]}],"member":"263","reference":[{"year":"2020","key":"ref73"},{"year":"2017","key":"ref72"},{"year":"2020","key":"ref71"},{"year":"2013","key":"ref70"},{"year":"0","key":"ref76"},{"year":"0","key":"ref77"},{"year":"2017","key":"ref74"},{"year":"2020","key":"ref39"},{"year":"0","key":"ref75"},{"year":"0","key":"ref38"},{"year":"2019","key":"ref78"},{"year":"2019","key":"ref79"},{"year":"0","key":"ref33"},{"year":"0","key":"ref32"},{"year":"0","key":"ref31"},{"year":"2019","key":"ref30"},{"year":"0","key":"ref37"},{"year":"0","key":"ref36"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-01701-9_10"},{"year":"0","key":"ref34"},{"year":"0","key":"ref60"},{"key":"ref62","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE-C.2017.79"},{"year":"0","key":"ref61"},{"year":"2019","key":"ref28"},{"key":"ref63","doi-asserted-by":"publisher","DOI":"10.1109\/SANER48275.2020.9054845"},{"key":"ref64","doi-asserted-by":"publisher","DOI":"10.1145\/1985441.1985453"},{"year":"0","key":"ref27"},{"year":"0","key":"ref65"},{"year":"0","key":"ref66"},{"year":"2019","key":"ref29"},{"year":"0","key":"ref67"},{"year":"2016","key":"ref68"},{"year":"2019","key":"ref2"},{"year":"0","key":"ref69"},{"year":"2019","key":"ref1"},{"key":"ref20","first-page":"919","article-title":"Automated third-party library detection for android applications: Are we there yet?","author":"xian","year":"2020","journal-title":"Proc 35th IEEE\/ACM Int Conf Automated Softw Eng"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/TMC.2020.3003336"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1145\/3395351.3399346"},{"year":"2019","key":"ref24"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1145\/3133956.3134048"},{"year":"2019","key":"ref26"},{"year":"2019","key":"ref25"},{"key":"ref50","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2020.3013438"},{"key":"ref51","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2019.2901679"},{"year":"2020","key":"ref95"},{"year":"2013","key":"ref94"},{"year":"2020","key":"ref93"},{"year":"2020","key":"ref92"},{"year":"2020","key":"ref91"},{"year":"2020","key":"ref90"},{"year":"2020","key":"ref96"},{"year":"2007","key":"ref59","article-title":"Guidelines for performing systematic literature reviews in software engineering"},{"key":"ref58","doi-asserted-by":"publisher","DOI":"10.1145\/2601248.2601268"},{"key":"ref57","doi-asserted-by":"publisher","DOI":"10.1145\/2568225.2568286"},{"key":"ref56","doi-asserted-by":"publisher","DOI":"10.1109\/TPAMI.2004.75"},{"key":"ref55","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-55415-5_12"},{"key":"ref54","doi-asserted-by":"publisher","DOI":"10.1007\/s11277-018-5456-4"},{"key":"ref53","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2018.2872958"},{"key":"ref52","doi-asserted-by":"publisher","DOI":"10.1109\/ISDFS.2018.8355388"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1145\/2664243.2664275"},{"key":"ref11","first-page":"659","article-title":"Finding unknown malice in 10 seconds: Mass vetting for new threats at the Google-play scale","author":"kai","year":"2015","journal-title":"Proc Usenix Secur Symp"},{"year":"2017","key":"ref40"},{"key":"ref12","first-page":"199","article-title":"Modeling users mobile app privacy preferences: Restoring usability in a sea of permission settings","author":"lin","year":"2014","journal-title":"Proceedings of the 10th Symposium on Usable Privacy and Security"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/ISSNIP.2014.6827639"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1145\/2435349.2435377"},{"key":"ref15","first-page":"653","article-title":"LibRadar: Fast and Accurate Detection of Third-Party Libraries in Android Apps","author":"ma","year":"2016","journal-title":"2016 IEEE\/ACM 38th International Conference on Software Engineering Companion (ICSE-C) ICSE-C"},{"year":"2019","key":"ref82"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.2017.38"},{"year":"2019","key":"ref81"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1145\/2976749.2978333"},{"year":"2019","key":"ref84"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/APSEC.2016.017"},{"year":"0","key":"ref83"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1145\/3197231.3197248"},{"year":"2019","key":"ref80"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE-C.2017.161"},{"year":"2007","key":"ref89"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1145\/2742647.2742668"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/SANER.2016.52"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/SANER.2019.8667975"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1145\/2133601.2133640"},{"year":"2020","key":"ref85"},{"key":"ref7","first-page":"62","article-title":"Juxtapp: A scalable system for detecting code reuse among android applications","author":"hanna","year":"2012","journal-title":"Detection of Intrusions and Malware and Vulnerability Assessment"},{"key":"ref86","doi-asserted-by":"publisher","DOI":"10.1145\/2771783.2771795"},{"key":"ref49","doi-asserted-by":"publisher","DOI":"10.1145\/3238147.3238170"},{"year":"2016","key":"ref87"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1145\/2627393.2627395"},{"year":"2007","key":"ref88"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.1145\/2950290.2983958"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1109\/ASE.2015.89"},{"key":"ref48","doi-asserted-by":"publisher","DOI":"10.1145\/3180155.3180222"},{"key":"ref47","doi-asserted-by":"publisher","DOI":"10.1109\/TR.2018.2865733"},{"year":"0","key":"ref42"},{"year":"0","key":"ref41"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1145\/2568225.2568286"},{"year":"0","key":"ref43"}],"container-title":["IEEE Transactions on Software Engineering"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/32\/9946941\/09551847.pdf?arnumber=9551847","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,12,12]],"date-time":"2022-12-12T19:36:44Z","timestamp":1670873804000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9551847\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,11,1]]},"references-count":96,"journal-issue":{"issue":"11"},"URL":"https:\/\/doi.org\/10.1109\/tse.2021.3115506","relation":{},"ISSN":["0098-5589","1939-3520","2326-3881"],"issn-type":[{"type":"print","value":"0098-5589"},{"type":"electronic","value":"1939-3520"},{"type":"electronic","value":"2326-3881"}],"subject":[],"published":{"date-parts":[[2022,11,1]]}}}