{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,4]],"date-time":"2026-02-04T17:04:13Z","timestamp":1770224653455,"version":"3.49.0"},"publisher-location":"New York, NY, USA","reference-count":51,"publisher":"ACM","license":[{"start":{"date-parts":[[2019,5,13]],"date-time":"2019-05-13T00:00:00Z","timestamp":1557705600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2019,5,13]]},"DOI":"10.1145\/3308558.3313427","type":"proceedings-article","created":{"date-parts":[[2019,5,13]],"date-time":"2019-05-13T12:17:59Z","timestamp":1557749879000},"page":"3165-3171","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":18,"title":["A Multi-modal Neural Embeddings Approach for Detecting Mobile Counterfeit Apps"],"prefix":"10.1145","author":[{"given":"Jathushan","family":"Rajasegaran","sequence":"first","affiliation":[{"name":"Data61, CSIRO Sydney, Australia"}]},{"given":"Naveen","family":"Karunanayake","sequence":"additional","affiliation":[{"name":"Data61, CSIRO Sydney, Australia"}]},{"given":"Ashanie","family":"Gunathillake","sequence":"additional","affiliation":[{"name":"The University of Sydney Sydney, Australia"}]},{"given":"Suranga","family":"Seneviratne","sequence":"additional","affiliation":[{"name":"The University of Sydney Sydney, Australia"}]},{"given":"Guillaume","family":"Jourjon","sequence":"additional","affiliation":[{"name":"Data61, CSIRO Sydney, Australia"}]}],"member":"320","published-online":{"date-parts":[[2019,5,13]]},"reference":[{"key":"e_1_3_2_1_1_1","volume-title":"On the surprising behavior of distance metrics in high dimensional spaces","author":"Aggarwal Charu C","unstructured":"Charu C Aggarwal , Alexander Hinneburg , and Daniel A Keim . 2001. On the surprising behavior of distance metrics in high dimensional spaces . In ICDT. Springer . Charu C Aggarwal, Alexander Hinneburg, and Daniel A Keim. 2001. On the surprising behavior of distance metrics in high dimensional spaces. In ICDT. Springer."},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-69429-8_6"},{"key":"e_1_3_2_1_3_1","first-page":"1","article-title":"Fast Explicit Diffusion for Accelerated Features in Nonlinear Scale Spaces","author":"Alcantarilla Pablo Fern\u00e1ndez","year":"2013","unstructured":"Pablo Fern\u00e1ndez Alcantarilla , Jes\u00fas Nuevo , and Adrien Bartoli . 2013 . Fast Explicit Diffusion for Accelerated Features in Nonlinear Scale Spaces . In BMVC. 1 - 9 . Pablo Fern\u00e1ndez Alcantarilla, Jes\u00fas Nuevo, and Adrien Bartoli. 2013. Fast Explicit Diffusion for Accelerated Features in Nonlinear Scale Spaces. In BMVC. 1-9.","journal-title":"BMVC."},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1109\/SPW.2016.40"},{"key":"e_1_3_2_1_5_1","unstructured":"Ionut Arghire. 2017. Fake Netflix App Takes Control of Android Devices. http:\/\/www.securityweek.com\/fake-netflix-app-takes-control-android-devices.  Ionut Arghire. 2017. Fake Netflix App Takes Control of Android Devices. http:\/\/www.securityweek.com\/fake-netflix-app-takes-control-android-devices."},{"key":"e_1_3_2_1_6_1","volume-title":"DREBIN: Effective and Explainable Detection of Android Malware in Your Pocket.. In NDSS.","author":"Arp Daniel","year":"2014","unstructured":"Daniel Arp , Michael Spreitzenbarth , Malte Hubner , Hugo Gascon , Konrad Rieck , and CERT Siemens . 2014 . DREBIN: Effective and Explainable Detection of Android Malware in Your Pocket.. In NDSS. Daniel Arp, Michael Spreitzenbarth, Malte Hubner, Hugo Gascon, Konrad Rieck, and CERT Siemens. 2014. DREBIN: Effective and Explainable Detection of Android Malware in Your Pocket.. In NDSS."},{"key":"e_1_3_2_1_7_1","volume-title":"Lempitsky","author":"Babenko Artem","year":"2014","unstructured":"Artem Babenko , Anton Slesarev , Alexander Chigorin , and Victor S . Lempitsky . 2014 . Neural Codes for Image Retrieval. CoRR abs\/1404.1777(2014). arxiv:1404.1777 Artem Babenko, Anton Slesarev, Alexander Chigorin, and Victor S. Lempitsky. 2014. Neural Codes for Image Retrieval. CoRR abs\/1404.1777(2014). arxiv:1404.1777"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1007\/11744023_32"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1145\/2766959"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/2766959"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1145\/2046614.2046619"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/2184305.2184317"},{"key":"e_1_3_2_1_13_1","unstructured":"Sam Costello. 2018. How Many Apps Are in the App Store?https:\/\/www.lifewire.com\/how-many-apps-in-app-store-2000252. Accessed: 2018-04-12.  Sam Costello. 2018. How Many Apps Are in the App Store?https:\/\/www.lifewire.com\/how-many-apps-in-app-store-2000252. Accessed: 2018-04-12."},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-40203-6_11"},{"key":"e_1_3_2_1_15_1","unstructured":"Leon A Gatys Alexander S Ecker and Matthias Bethge. 2015. A neural algorithm of artistic style. arXiv preprint arXiv:1508.06576(2015).  Leon A Gatys Alexander S Ecker and Matthias Bethge. 2015. A neural algorithm of artistic style. arXiv preprint arXiv:1508.06576(2015)."},{"key":"e_1_3_2_1_16_1","unstructured":"Leon A. Gatys Alexander S. Ecker and Matthias Bethge. 2015. Texture synthesis and the controlled generation of natural stimuli using convolutional neural networks. CoRR abs\/1505.07376(2015). arxiv:1505.07376   Leon A. Gatys Alexander S. Ecker and Matthias Bethge. 2015. Texture synthesis and the controlled generation of natural stimuli using convolutional neural networks. CoRR abs\/1505.07376(2015). arxiv:1505.07376"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2016.265"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1145\/2462456.2464461"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1145\/2307636.2307663"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1145\/2987443.2987471"},{"key":"e_1_3_2_1_21_1","volume-title":"Number of available applications in the Google Play Store from","author":"Statista Inc.","year":"2009","unstructured":"Statista Inc. 2018. Number of available applications in the Google Play Store from December 2009 to December 2017. https:\/\/www.statista.com\/statistics\/266210\/number-of-available-applications-in-the-google-play-store\/. Statista Inc.2018. Number of available applications in the Google Play Store from December 2009 to December 2017. https:\/\/www.statista.com\/statistics\/266210\/number-of-available-applications-in-the-google-play-store\/."},{"key":"e_1_3_2_1_22_1","unstructured":"Chris Jager. 2018. Scam Alert: Fake CBA And ANZ Bank Apps Discovered On Google Play Store. https:\/\/www.lifehacker.com.au\/2018\/09\/scam-alert-fake-cba-and-anz-banking-apps-found-on-google-play-store\/. Accessed: 2018-10-15.  Chris Jager. 2018. Scam Alert: Fake CBA And ANZ Bank Apps Discovered On Google Play Store. https:\/\/www.lifehacker.com.au\/2018\/09\/scam-alert-fake-cba-and-anz-banking-apps-found-on-google-play-store\/. Accessed: 2018-10-15."},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-88682-2_24"},{"key":"e_1_3_2_1_24_1","unstructured":"Yongcheng Jing Yezhou Yang Zunlei Feng Jingwen Ye and Mingli Song. 2017. Neural Style Transfer: A Review. arXiv preprint arXiv:1705.04058(2017).  Yongcheng Jing Yezhou Yang Zunlei Feng Jingwen Ye and Mingli Song. 2017. Neural Style Transfer: A Review. arXiv preprint arXiv:1705.04058(2017)."},{"key":"e_1_3_2_1_25_1","volume-title":"Perceptual losses for real-time style transfer and super-resolution","author":"Johnson Justin","unstructured":"Justin Johnson , Alexandre Alahi , and Li Fei-Fei . 2016. Perceptual losses for real-time style transfer and super-resolution . In ECCV. Springer , 694-711. Justin Johnson, Alexandre Alahi, and Li Fei-Fei. 2016. Perceptual losses for real-time style transfer and super-resolution. In ECCV. Springer, 694-711."},{"key":"e_1_3_2_1_26_1","volume-title":"Proc. of the 31st ICML. 1188-1196","author":"Le Quoc","year":"2014","unstructured":"Quoc Le and Tomas Mikolov . 2014 . Distributed representations of sentences and documents . In Proc. of the 31st ICML. 1188-1196 . Quoc Le and Tomas Mikolov. 2014. Distributed representations of sentences and documents. In Proc. of the 31st ICML. 1188-1196."},{"key":"e_1_3_2_1_27_1","volume-title":"IEEE Winter Conference on Applications of Computer Vision. 1-9.","author":"Levi G.","unstructured":"G. Levi and T. Hassner . 2016. LATCH: Learned arrangements of three patch codes . In IEEE Winter Conference on Applications of Computer Vision. 1-9. G. Levi and T. Hassner. 2016. LATCH: Learned arrangements of three patch codes. In IEEE Winter Conference on Applications of Computer Vision. 1-9."},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1145\/1150402.1150436"},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1023\/B:VISI.0000029664.99615.94"},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1145\/3029806.3029819"},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-45744-4_11"},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1145\/2911996.2912057"},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2006.264"},{"key":"e_1_3_2_1_34_1","unstructured":"Sarah Perez. 2013. Developer Spams Google Play With Ripoffs Of Well-Known Apps Again. http:\/\/techcrunch.com.  Sarah Perez. 2013. Developer Spams Google Play With Ripoffs Of Well-Known Apps Again. http:\/\/techcrunch.com."},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICDCSW.2011.20"},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1145\/2766498.2766523"},{"key":"e_1_3_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.1145\/2736277.2741084"},{"key":"e_1_3_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.1145\/3007901"},{"key":"e_1_3_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10844-010-0148-x"},{"key":"e_1_3_2_1_40_1","unstructured":"Karen Simonyan and Andrew Zisserman. 2014. Very Deep Convolutional Networks for Large-Scale Image Recognition. CoRR abs\/1409.1556(2014). arxiv:1409.1556  Karen Simonyan and Andrew Zisserman. 2014. Very Deep Convolutional Networks for Large-Scale Image Recognition. CoRR abs\/1409.1556(2014). arxiv:1409.1556"},{"key":"e_1_3_2_1_41_1","doi-asserted-by":"publisher","DOI":"10.1145\/2766498.2766508"},{"key":"e_1_3_2_1_42_1","volume-title":"App Miscategorization Detection: A Case Study on Google Play","author":"Surian Didi","year":"2017","unstructured":"Didi Surian , Suranga Seneviratne , Aruna Seneviratne , and Sanjay Chawla . 2017. App Miscategorization Detection: A Case Study on Google Play . IEEE TKDE 29, 8 ( 2017 ). Didi Surian, Suranga Seneviratne, Aruna Seneviratne, and Sanjay Chawla. 2017. App Miscategorization Detection: A Case Study on Google Play. IEEE TKDE 29, 8 (2017)."},{"key":"e_1_3_2_1_43_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICIP.2016.7533051"},{"key":"e_1_3_2_1_44_1","doi-asserted-by":"publisher","DOI":"10.1145\/2637364.2592003"},{"key":"e_1_3_2_1_45_1","unstructured":"Kyle Wagner. 2012. Fake Angry Birds Space Android App Is Full Of Malware. https:\/\/www.gizmodo.com.au\/2012\/04\/psa-fake-angry-birds-space-android-app-is-full-of-malware\/.  Kyle Wagner. 2012. Fake Angry Birds Space Android App Is Full Of Malware. https:\/\/www.gizmodo.com.au\/2012\/04\/psa-fake-angry-birds-space-android-app-is-full-of-malware\/."},{"key":"e_1_3_2_1_46_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIP.2003.819861"},{"key":"e_1_3_2_1_47_1","doi-asserted-by":"publisher","DOI":"10.1109\/AsiaJCIS.2012.18"},{"key":"e_1_3_2_1_48_1","doi-asserted-by":"publisher","DOI":"10.1145\/2766498.2766510"},{"key":"e_1_3_2_1_49_1","doi-asserted-by":"publisher","DOI":"10.1145\/2740070.2631434"},{"key":"e_1_3_2_1_50_1","volume-title":"The Design and Application of PHABS: A Novel Benchmark Platform for Perceptual Hashing Algorithms. In IEEE International Conference on Multimedia and Expo. 887-890","author":"Zhang H.","unstructured":"H. Zhang , M. Schmucker , and X. Niu . 2007 . The Design and Application of PHABS: A Novel Benchmark Platform for Perceptual Hashing Algorithms. In IEEE International Conference on Multimedia and Expo. 887-890 . H. Zhang, M. Schmucker, and X. Niu. 2007. The Design and Application of PHABS: A Novel Benchmark Platform for Perceptual Hashing Algorithms. In IEEE International Conference on Multimedia and Expo. 887-890."},{"key":"e_1_3_2_1_51_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2012.16"}],"event":{"name":"WWW '19: The Web Conference","location":"San Francisco CA USA","acronym":"WWW '19","sponsor":["IW3C2 International World Wide Web Conference Committee"]},"container-title":["The World Wide Web Conference"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3308558.3313427","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3308558.3313427","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T01:02:17Z","timestamp":1750208537000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3308558.3313427"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,5,13]]},"references-count":51,"alternative-id":["10.1145\/3308558.3313427","10.1145\/3308558"],"URL":"https:\/\/doi.org\/10.1145\/3308558.3313427","relation":{},"subject":[],"published":{"date-parts":[[2019,5,13]]},"assertion":[{"value":"2019-05-13","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}