{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,18]],"date-time":"2026-03-18T13:17:07Z","timestamp":1773839827861,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":56,"publisher":"ACM","license":[{"start":{"date-parts":[[2022,10,10]],"date-time":"2022-10-10T00:00:00Z","timestamp":1665360000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2022,10,10]]},"DOI":"10.1145\/3551349.3561151","type":"proceedings-article","created":{"date-parts":[[2023,1,5]],"date-time":"2023-01-05T20:43:54Z","timestamp":1672951434000},"page":"1-13","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":15,"title":["Mining Android API Usage to Generate Unit Test Cases for Pinpointing Compatibility Issues"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-7434-0452","authenticated-orcid":false,"given":"Xiaoyu","family":"Sun","sequence":"first","affiliation":[{"name":"Monash University, Australia"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-2990-1614","authenticated-orcid":false,"given":"Xiao","family":"Chen","sequence":"additional","affiliation":[{"name":"Monash University, Australia"}]},{"given":"Yanjie","family":"Zhao","sequence":"additional","affiliation":[{"name":"Monash University, Australia"}]},{"given":"Pei","family":"Liu","sequence":"additional","affiliation":[{"name":"Monash University, Australia"}]},{"given":"John","family":"Grundy","sequence":"additional","affiliation":[{"name":"Monash University, Australia"}]},{"given":"Li","family":"Li","sequence":"additional","affiliation":[{"name":"Monash University, Australia"}]}],"member":"320","published-online":{"date-parts":[[2023,1,5]]},"reference":[{"key":"e_1_3_2_1_1_1","volume-title":"https:\/\/github.com\/vorpal-research\/kex\/tree\/sbst-contest. Online","author":"Kex April","year":"2022","unstructured":"24 April 2022. Kex. https:\/\/github.com\/vorpal-research\/kex\/tree\/sbst-contest. Online; accessed 24 April 2022."},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2014.2367027"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1145\/2259051.2259052"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1145\/3293882.3330564"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICSM.2005.90"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1145\/3468264.3468584"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1109\/QSIC.2011.19"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1145\/2025113.2025179"},{"key":"e_1_3_2_1_9_1","volume-title":"https:\/\/developer.android.com\/reference\/android\/content\/pm\/LauncherApps#hasShortcutHostPermission(). Online","year":"2021","unstructured":"Google. 2021. LauncherApps. https:\/\/developer.android.com\/reference\/android\/content\/pm\/LauncherApps#hasShortcutHostPermission(). Online; accessed 27 January 2021."},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-27207-3_33"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1145\/3238147.3238181"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/1572272.1572283"},{"key":"e_1_3_2_1_13_1","first-page":"992","article-title":"Android fragmentation classification, causes, problems and solutions","volume":"14","author":"Kamran Muhammad","year":"2016","unstructured":"Muhammad Kamran, Junaid Rashid, and Muhammad\u00a0Wasif Nisar. 2016. Android fragmentation classification, causes, problems and solutions. International Journal of Computer Science and Information Security 14, 9(2016), 992.","journal-title":"International Journal of Computer Science and Information Security"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1145\/1869459.1869518"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1145\/3293882.3330552"},{"key":"e_1_3_2_1_16_1","volume-title":"A3: Assisting Android API migrations using code examples","author":"Lamothe Maxime","year":"2020","unstructured":"Maxime Lamothe, Weiyi Shang, and Tse-Hsun\u00a0Peter Chen. 2020. A3: Assisting Android API migrations using code examples. IEEE Transactions on Software Engineering(2020)."},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.5555\/1765931.1765948"},{"key":"e_1_3_2_1_18_1","volume-title":"MoonlightBox: Mining Android API Histories for Uncovering Release-time Inconsistencies. In The 29th IEEE International Symposium on Software Reliability Engineering (ISSRE","author":"Li Li","year":"2018","unstructured":"Li Li, Tegawend\u00e9\u00a0F Bissyand\u00e9, and Jacques Klein. 2018. MoonlightBox: Mining Android API Histories for Uncovering Release-time Inconsistencies. In The 29th IEEE International Symposium on Software Reliability Engineering (ISSRE 2018)."},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICSME.2016.35"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1145\/2931037.2931044"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.infsof.2017.04.001"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1145\/3213846.3213857"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1145\/3196398.3196419"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1145\/2491411.2491428"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1145\/2597008.2597155"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE-SEIP52600.2021.00040"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"crossref","unstructured":"Pei Liu Yanjie Zhao Haipeng Cai Mattia Fazzini John Grundy and Li Li. 2022. Automatically Detecting API-induced Compatibility Issues in Android Apps: A Comparative Analysis (Replicability Study). arXiv preprint arXiv:2205.15561(2022).","DOI":"10.1145\/3533767.3534407"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1145\/3544968"},{"key":"e_1_3_2_1_29_1","volume-title":"A survey of app store analysis for software engineering","author":"Martin William","year":"2016","unstructured":"William Martin, Federica Sarro, Yue Jia, Yuanyuan Zhang, and Mark Harman. 2016. A survey of app store analysis for software engineering. IEEE transactions on software engineering 43, 9 (2016), 817\u2013847."},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICSM.2013.18"},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1109\/SPW.2016.31"},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1109\/SANER.2016.88"},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1109\/CCECE.2012.6334930"},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jss.2017.10.032"},{"key":"e_1_3_2_1_35_1","volume-title":"Companion to the 22nd ACM SIGPLAN conference on Object-oriented programming systems and applications companion. 815\u2013816.","author":"Pacheco Carlos","unstructured":"Carlos Pacheco and Michael\u00a0D Ernst. 2007. Randoop: feedback-directed random testing for Java. In Companion to the 22nd ACM SIGPLAN conference on Object-oriented programming systems and applications companion. 815\u2013816."},{"key":"e_1_3_2_1_36_1","unstructured":"Jibesh Patra and Michael Pradel. 2016. Learning to fuzz: Application-independent fuzz testing with probabilistic generative models of input data. TU Darmstadt Department of Computer Science Tech. Rep. TUD-CS-2016-14664 (2016)."},{"key":"e_1_3_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.1145\/3324884.3416551"},{"key":"e_1_3_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.1145\/3510003.3512766"},{"key":"e_1_3_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.1109\/MSR.2019.00055"},{"key":"e_1_3_2_1_40_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10664-020-09877-w"},{"key":"e_1_3_2_1_41_1","volume-title":"Permissions needed for NotificationManager. https:\/\/stackoverflow.com\/questions\/41308512\/permissions-needed-for-notificationmanager. Online","author":"OverFlow Stack","year":"2021","unstructured":"Stack OverFlow. 2021. Permissions needed for NotificationManager. https:\/\/stackoverflow.com\/questions\/41308512\/permissions-needed-for-notificationmanager. Online; accessed 27 January 2021."},{"key":"e_1_3_2_1_42_1","volume-title":"2011 IEEE 13th International Conference on Communication Technology. IEEE, 728\u2013731","author":"Sui Ai-Fen","year":"2011","unstructured":"Ai-Fen Sui, Wen Tang, Jian\u00a0Jun Hu, and Ming\u00a0Zhu Li. 2011. An effective fuzz input generation method for protocol testing. In 2011 IEEE 13th International Conference on Communication Technology. IEEE, 728\u2013731."},{"key":"e_1_3_2_1_43_1","volume-title":"Characterizing Sensor Leaks in Android Apps. In 2021 IEEE 32nd International Symposium on Software Reliability Engineering (ISSRE). IEEE, 498\u2013509","author":"Sun Xiaoyu","year":"2021","unstructured":"Xiaoyu Sun, Xiao Chen, Kui Liu, Sheng Wen, Li Li, and John Grundy. 2021. Characterizing Sensor Leaks in Android Apps. In 2021 IEEE 32nd International Symposium on Software Reliability Engineering (ISSRE). IEEE, 498\u2013509."},{"key":"e_1_3_2_1_44_1","doi-asserted-by":"publisher","DOI":"10.1145\/3440033"},{"key":"e_1_3_2_1_45_1","doi-asserted-by":"publisher","DOI":"10.1145\/1925805.1925818"},{"key":"e_1_3_2_1_46_1","doi-asserted-by":"publisher","DOI":"10.1109\/SBST52555.2021.00012"},{"key":"e_1_3_2_1_47_1","doi-asserted-by":"publisher","DOI":"10.1145\/2970276.2970312"},{"key":"e_1_3_2_1_48_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.2019.00094"},{"key":"e_1_3_2_1_49_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2018.2876439"},{"key":"e_1_3_2_1_50_1","doi-asserted-by":"publisher","DOI":"10.1145\/3377811.3380357"},{"key":"e_1_3_2_1_51_1","doi-asserted-by":"publisher","DOI":"10.1145\/2660267.2660359"},{"key":"e_1_3_2_1_52_1","doi-asserted-by":"publisher","DOI":"10.1145\/3324884.3416641"},{"key":"e_1_3_2_1_53_1","doi-asserted-by":"publisher","DOI":"10.1109\/SOSE.2015.35"},{"key":"e_1_3_2_1_54_1","volume-title":"Towards Automatically Repairing Compatibility Issues in Published Android Apps. In The 44th International Conference on Software Engineering (ICSE","author":"Zhao Yanjie","year":"2022","unstructured":"Yanjie Zhao, Li Li, Kui Liu, and John Grundy. 2022. Towards Automatically Repairing Compatibility Issues in Published Android Apps. In The 44th International Conference on Software Engineering (ICSE 2022)."},{"key":"e_1_3_2_1_55_1","doi-asserted-by":"publisher","DOI":"10.1145\/2950290.2950298"},{"key":"e_1_3_2_1_56_1","doi-asserted-by":"publisher","DOI":"10.1002\/spe.2929"}],"event":{"name":"ASE '22: 37th IEEE\/ACM International Conference on Automated Software Engineering","location":"Rochester MI USA","acronym":"ASE '22"},"container-title":["Proceedings of the 37th IEEE\/ACM International Conference on Automated Software Engineering"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3551349.3561151","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3551349.3561151","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,8,22]],"date-time":"2025-08-22T08:26:09Z","timestamp":1755851169000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3551349.3561151"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,10,10]]},"references-count":56,"alternative-id":["10.1145\/3551349.3561151","10.1145\/3551349"],"URL":"https:\/\/doi.org\/10.1145\/3551349.3561151","relation":{},"subject":[],"published":{"date-parts":[[2022,10,10]]},"assertion":[{"value":"2023-01-05","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}