{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,9]],"date-time":"2026-01-09T18:54:13Z","timestamp":1767984853820,"version":"3.49.0"},"publisher-location":"New York, NY, USA","reference-count":49,"publisher":"ACM","license":[{"start":{"date-parts":[[2015,10,12]],"date-time":"2015-10-12T00:00:00Z","timestamp":1444608000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2015,10,12]]},"DOI":"10.1145\/2810103.2813689","type":"proceedings-article","created":{"date-parts":[[2015,10,6]],"date-time":"2015-10-06T15:22:12Z","timestamp":1444144932000},"page":"530-541","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":49,"title":["AUTOREB"],"prefix":"10.1145","author":[{"given":"Deguang","family":"Kong","sequence":"first","affiliation":[{"name":"Samsung Research America, Mountain View, CA, USA"}]},{"given":"Lei","family":"Cen","sequence":"additional","affiliation":[{"name":"Purdue University, West Lafayette, IN, USA"}]},{"given":"Hongxia","family":"Jin","sequence":"additional","affiliation":[{"name":"Samsung Research America, Mountain View, CA, USA"}]}],"member":"320","published-online":{"date-parts":[[2015,10,12]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.5555\/993483"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1145\/2462096.2462100"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1145\/2676726.2676973"},{"key":"e_1_3_2_1_4_1","first-page":"266","volume-title":"ICML","volume":"28","author":"Cotter A.","year":"2013","unstructured":"A. Cotter , S. Shalev-shwartz, and N. Srebro . Learning optimally sparse support vector machines . In ICML , volume 28 , pages 266 -- 274 , 2013 . A. Cotter, S. Shalev-shwartz, and N. Srebro. Learning optimally sparse support vector machines. In ICML, volume 28, pages 266--274, 2013."},{"issue":"1","key":"e_1_3_2_1_5_1","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1111\/j.2517-6161.1977.tb01600.x","article-title":"Maximum likelihood from incomplete data via the em algorithm","volume":"39","author":"Dempster A. P.","year":"1977","unstructured":"A. P. Dempster , N. M. Laird , and D. B. Rubin . Maximum likelihood from incomplete data via the em algorithm . Journal of the Royal Statistical Society, Series B , 39 ( 1 ): 1 -- 38 , 1977 . A. P. Dempster, N. M. Laird, and D. B. Rubin. Maximum likelihood from incomplete data via the em algorithm. Journal of the Royal Statistical Society, Series B, 39(1):1--38, 1977.","journal-title":"Journal of the Royal Statistical Society, Series B"},{"key":"e_1_3_2_1_6_1","volume-title":"John Willey & Sons","author":"Duda R. O.","year":"1973","unstructured":"R. O. Duda and P. E. Hart . Pattern Classification and Scene Analysis . John Willey & Sons , New Yotk , 1973 . R. O. Duda and P. E. Hart. Pattern Classification and Scene Analysis. John Willey & Sons, New Yotk, 1973."},{"key":"e_1_3_2_1_7_1","volume-title":"OSDI","author":"Enck W.","year":"2010","unstructured":"W. Enck , P. Gilbert , B. Chun , L. P. Cox , J. Jung , P. McDaniel , and A. N. Sheth . Taintdroid: An information-flow tracking system for realtime privacy monitoring on smartphones . In OSDI , 2010 . W. Enck, P. Gilbert, B. Chun, L. P. Cox, J. Jung, P. McDaniel, and A. N. Sheth. Taintdroid: An information-flow tracking system for realtime privacy monitoring on smartphones. In OSDI, 2010."},{"key":"e_1_3_2_1_8_1","volume-title":"USENIX Security Symposium","author":"Enck W.","year":"2011","unstructured":"W. Enck , D. Octeau , P. Mcdaniel , and S. Chaudhuri . A study of android application security . In USENIX Security Symposium , 2011 . W. Enck, D. Octeau, P. Mcdaniel, and S. Chaudhuri. A study of android application security. In USENIX Security Symposium, 2011."},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1145\/2046707.2046779"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/2381934.2381943"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1145\/2335356.2335360"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/2487575.2488202"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1109\/MSR.2010.5463340"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-30921-2_17"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1145\/2307636.2307663"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1145\/2185448.2185464"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1145\/2046707.2046780"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1145\/2714576.2714589"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1137\/1.9781611974010.68"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1145\/2487575.2488219"},{"key":"e_1_3_2_1_21_1","first-page":"79","volume-title":"USENIX Security Symposium","author":"Lee W.","year":"1998","unstructured":"W. Lee and S. J. Stolfo . Data mining approaches for intrusion detection . In USENIX Security Symposium , pages 79 -- 94 , 1998 . W. Lee and S. J. Stolfo. Data mining approaches for intrusion detection. In USENIX Security Symposium, pages 79--94, 1998."},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1145\/2370216.2370290"},{"key":"e_1_3_2_1_23_1","volume-title":"Handbook of Natural Language Processing","author":"Liu B.","year":"2010","unstructured":"B. Liu . Sentiment analysis and subjectivity . In Handbook of Natural Language Processing , Second Edition. Taylor and Francis Group , Boca , 2010 . B. Liu. Sentiment analysis and subjectivity. In Handbook of Natural Language Processing, Second Edition. Taylor and Francis Group, Boca, 2010."},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1145\/1150402.1150522"},{"key":"e_1_3_2_1_25_1","first-page":"113","volume-title":"USENIX Security","author":"Livshits B.","year":"2013","unstructured":"B. Livshits and J. Jung . Automatic mediation of privacy-sensitive resource access in smartphone applications . In USENIX Security , pages 113 -- 130 . USENIX, 2013 . B. Livshits and J. Jung. Automatic mediation of privacy-sensitive resource access in smartphone applications. In USENIX Security, pages 113--130. USENIX, 2013."},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1145\/1081706.1081754"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1145\/1557019.1557153"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1145\/2207676.2208554"},{"key":"e_1_3_2_1_29_1","first-page":"993","volume-title":"USENIX Security","author":"Nan Y.","year":"2015","unstructured":"Y. Nan , M. Yang , Z. Yang , S. Zhou , G. Gu , and X. Wang . Uipicker: User-input privacy identification in mobile applications . In USENIX Security , pages 993 -- 1008 , 2015 . Y. Nan, M. Yang, Z. Yang, S. Zhou, G. Gu, and X. Wang. Uipicker: User-input privacy identification in mobile applications. In USENIX Security, pages 993--1008, 2015."},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1145\/1518701.1518977"},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1145\/2076732.2076735"},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2005.15"},{"key":"e_1_3_2_1_33_1","first-page":"527","volume-title":"USENIX Security","author":"Pandita R.","year":"2013","unstructured":"R. Pandita , X. Xiao , W. Yang , W. Enck , and T. Xie . Whyper: Towards automating risk assessment of mobile applications . In USENIX Security , pages 527 -- 542 , 2013 . R. Pandita, X. Xiao, W. Yang, W. Enck, and T. Xie. Whyper: Towards automating risk assessment of mobile applications. In USENIX Security, pages 527--542, 2013."},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.5555\/2337223.2337319"},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1145\/2771783.2771791"},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1145\/2660267.2660287"},{"key":"e_1_3_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.5555\/1756006.1859894"},{"key":"e_1_3_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.1145\/1920261.1920267"},{"key":"e_1_3_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.1145\/2664243.2664280"},{"key":"e_1_3_2_1_40_1","doi-asserted-by":"publisher","DOI":"10.1145\/1294261.1294276"},{"key":"e_1_3_2_1_41_1","doi-asserted-by":"crossref","first-page":"267","DOI":"10.1111\/j.2517-6161.1996.tb02080.x","article-title":"Regression shrinkage and selection via the lasso","volume":"58","author":"Tibshirani R.","year":"1994","unstructured":"R. Tibshirani . Regression shrinkage and selection via the lasso . Journal of the Royal Statistical Society, Series B , 58 : 267 -- 288 , 1994 . R. Tibshirani. Regression shrinkage and selection via the lasso. Journal of the Royal Statistical Society, Series B, 58:267--288, 1994.","journal-title":"Journal of the Royal Statistical Society, Series B"},{"key":"e_1_3_2_1_42_1","doi-asserted-by":"publisher","DOI":"10.1145\/2785830.2785845"},{"key":"e_1_3_2_1_43_1","volume-title":"USENIX Security","author":"Wang R.","year":"2015","unstructured":"R. Wang , W. Enck , D. Reeves , X. Zhang , P. Ning , D. Xu , W. Zhou , and A. M. Azab . Easeandroid: Automatic policy analysis and refinement for security enhanced android via large-scale semi-supervised learning . In USENIX Security , Washington, D.C. , 2015 . USENIX Association . R. Wang, W. Enck, D. Reeves, X. Zhang, P. Ning, D. Xu, W. Zhou, and A. M. Azab. Easeandroid: Automatic policy analysis and refinement for security enhanced android via large-scale semi-supervised learning. In USENIX Security, Washington, D.C., 2015. USENIX Association."},{"key":"e_1_3_2_1_44_1","doi-asserted-by":"publisher","DOI":"10.1145\/243199.243202"},{"key":"e_1_3_2_1_45_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-39235-1_3"},{"key":"e_1_3_2_1_46_1","volume-title":"USENIX Security Symposium","author":"Yan L. K.","year":"2012","unstructured":"L. K. Yan and H. Yin . Droidscope: Seamlessly reconstructing the os and dalvik semantic views for dynamic android malware analysis . In USENIX Security Symposium , 2012 . L. K. Yan and H. Yin. Droidscope: Seamlessly reconstructing the os and dalvik semantic views for dynamic android malware analysis. In USENIX Security Symposium, 2012."},{"key":"e_1_3_2_1_47_1","doi-asserted-by":"publisher","DOI":"10.1145\/2627393.2627395"},{"key":"e_1_3_2_1_48_1","doi-asserted-by":"publisher","DOI":"10.1145\/2660267.2660359"},{"key":"e_1_3_2_1_49_1","volume-title":"NDSS","author":"Zhou Y.","year":"2012","unstructured":"Y. Zhou , Z. Wang , W. Zhou , and X. Jiang . Hey, you, get off of my market: Detecting malicious apps in official and alternative android markets . In NDSS , 2012 . Y. Zhou, Z. Wang, W. Zhou, and X. Jiang. Hey, you, get off of my market: Detecting malicious apps in official and alternative android markets. In NDSS, 2012."}],"event":{"name":"CCS'15: The 22nd ACM Conference on Computer and Communications Security","location":"Denver Colorado USA","acronym":"CCS'15","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"]},"container-title":["Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2810103.2813689","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2810103.2813689","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T05:48:24Z","timestamp":1750225704000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2810103.2813689"}},"subtitle":["Automatically Understanding the Review-to-Behavior Fidelity in Android Applications"],"short-title":[],"issued":{"date-parts":[[2015,10,12]]},"references-count":49,"alternative-id":["10.1145\/2810103.2813689","10.1145\/2810103"],"URL":"https:\/\/doi.org\/10.1145\/2810103.2813689","relation":{},"subject":[],"published":{"date-parts":[[2015,10,12]]},"assertion":[{"value":"2015-10-12","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}