{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,5,13]],"date-time":"2026-05-13T17:44:21Z","timestamp":1778694261132,"version":"3.51.4"},"publisher-location":"New York, NY, USA","reference-count":14,"publisher":"ACM","license":[{"start":{"date-parts":[[2016,8,25]],"date-time":"2016-08-25T00:00:00Z","timestamp":1472083200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["91418206"],"award-info":[{"award-number":["91418206"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100002855","name":"Ministry of Science and Technology of the People's Republic of China","doi-asserted-by":"publisher","award":["2014CB340701"],"award-info":[{"award-number":["2014CB340701"]}],"id":[{"id":"10.13039\/501100002855","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2016,8,25]]},"DOI":"10.1145\/2970276.2970278","type":"proceedings-article","created":{"date-parts":[[2016,8,26]],"date-time":"2016-08-26T12:40:09Z","timestamp":1472215209000},"page":"762-767","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":18,"title":["Relda2: an effective static analysis tool for resource leak detection in Android apps"],"prefix":"10.1145","author":[{"given":"Tianyong","family":"Wu","sequence":"first","affiliation":[{"name":"Institute of Software at Chinese Academy of Sciences, China \/ University at Chinese Academy of Sciences, China"}]},{"given":"Jierui","family":"Liu","sequence":"additional","affiliation":[{"name":"Institute of Software at Chinese Academy of Sciences, China \/ University at Chinese Academy of Sciences, China"}]},{"given":"Xi","family":"Deng","sequence":"additional","affiliation":[{"name":"Institute of Software at Chinese Academy of Sciences, China \/ University at Chinese Academy of Sciences, China"}]},{"given":"Jun","family":"Yan","sequence":"additional","affiliation":[{"name":"Institute of Software at Chinese Academy of Sciences, China"}]},{"given":"Jian","family":"Zhang","sequence":"additional","affiliation":[{"name":"Institute of Software at Chinese Academy of Sciences, China \/ University at Chinese Academy of Sciences, China"}]}],"member":"320","published-online":{"date-parts":[[2016,8,25]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"Androguard. http:\/\/code.google.com\/p\/androguard\/.  Androguard. http:\/\/code.google.com\/p\/androguard\/."},{"key":"e_1_3_2_1_2_1","volume-title":"http:\/\/ibotpeaches.github.io\/Apktool\/","year":"2016","unstructured":"Apktool - a tool for reverse engineering android apk files. http:\/\/ibotpeaches.github.io\/Apktool\/ , 2016 . Apktool - a tool for reverse engineering android apk files. http:\/\/ibotpeaches.github.io\/Apktool\/, 2016."},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1145\/2594291.2594299"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1145\/2259051.2259056"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2015.23140"},{"key":"e_1_3_2_1_6_1","first-page":"364","volume-title":"CAV","author":"Cimatti A.","year":"2002","unstructured":"A. Cimatti , E. M. Clarke , E. Giunchiglia , F. Giunchiglia , M. Pistore , M. Roveri , R. Sebastiani , and A. Tacchella . NuSMV 2: An opensource tool for symbolic model checking . In CAV , pages 359\u2013 364 , 2002 . A. Cimatti, E. M. Clarke, E. Giunchiglia, F. Giunchiglia, M. Pistore, M. Roveri, R. Sebastiani, and A. Tacchella. NuSMV 2: An opensource tool for symbolic model checking. In CAV, pages 359\u2013364, 2002."},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1109\/ASE.2013.6693097"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1145\/2771783.2771803"},{"key":"e_1_3_2_1_9_1","first-page":"1","volume":"27","author":"Kim K.","year":"2013","unstructured":"K. Kim and H. Cha . Wakescope: Runtime wakelock anomaly management scheme for Android platform. In EMSOFT, pages 27 : 1 \u2013 27 :10, 2013 . K. Kim and H. Cha. Wakescope: Runtime wakelock anomaly management scheme for Android platform. In EMSOFT, pages 27:1\u201327:10, 2013.","journal-title":"In EMSOFT, pages"},{"key":"e_1_3_2_1_10_1","first-page":"10","volume-title":"PERCOM","author":"Liu Y.","year":"2013","unstructured":"Y. Liu , C. Xu , and S. C. Cheung . Where has my battery gone? finding sensor related energy black holes in smartphone applications . In PERCOM , pages 2\u2013 10 , 2013 . Y. Liu, C. Xu, and S. C. Cheung. Where has my battery gone? finding sensor related energy black holes in smartphone applications. In PERCOM, pages 2\u201310, 2013."},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1145\/2491411.2491450"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2016.2547385"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1109\/ISSRE.2013.6698894"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.5555\/2818754.2818768"}],"event":{"name":"ASE'16: ACM\/IEEE International Conference on Automated Software Engineering","location":"Singapore Singapore","acronym":"ASE'16","sponsor":["SIGAI ACM Special Interest Group on Artificial Intelligence","SIGSOFT ACM Special Interest Group on Software Engineering","IEEE-CS Computer Society"]},"container-title":["Proceedings of the 31st IEEE\/ACM International Conference on Automated Software Engineering"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2970276.2970278","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2970276.2970278","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T03:50:00Z","timestamp":1750218600000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2970276.2970278"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,8,25]]},"references-count":14,"alternative-id":["10.1145\/2970276.2970278","10.1145\/2970276"],"URL":"https:\/\/doi.org\/10.1145\/2970276.2970278","relation":{},"subject":[],"published":{"date-parts":[[2016,8,25]]},"assertion":[{"value":"2016-08-25","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}