{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,30]],"date-time":"2026-01-30T09:55:40Z","timestamp":1769766940173,"version":"3.49.0"},"reference-count":132,"publisher":"Association for Computing Machinery (ACM)","issue":"2","funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"crossref","award":["62141209, 61932007"],"award-info":[{"award-number":["62141209, 61932007"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"crossref"}]},{"name":"Luxembourg National Research Fund","award":["16344458 (REPROCESS) and 18154263 (UNLOCK)"],"award-info":[{"award-number":["16344458 (REPROCESS) and 18154263 (UNLOCK)"]}]},{"name":"ARC Laureate Fellowship","award":["FL190100035"],"award-info":[{"award-number":["FL190100035"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":["ACM Comput. Surv."],"published-print":{"date-parts":[[2026,1,31]]},"abstract":"<jats:p>Mobile software engineering has been a hot research topic for decades. Our fellow researchers have proposed various approaches (with over 7,000 publications for Android alone) in this field that essentially contributed to the great success of the current mobile ecosystem. Existing research efforts mainly focus on popular mobile platforms, namely Android and iOS. OpenHarmony, a newly open sourced mobile platform, has rarely been considered, although it is the one requiring the most attention as OpenHarmony is expected to occupy one-third of the market in China (if not in the world). To fill the gap, we present to the mobile software engineering community a research roadmap for encouraging our fellow researchers to contribute promising approaches to OpenHarmony. Specifically, we start by presenting a tertiary study of mobile software engineering, attempting to understand what problems have been targeted by the mobile community and how they have been resolved. We then summarize the existing (limited) achievements of OpenHarmony and subsequently highlight the research gap between Android\/iOS and OpenHarmony. This research gap eventually helps in forming the roadmap for conducting software engineering research for OpenHarmony.<\/jats:p>","DOI":"10.1145\/3720538","type":"journal-article","created":{"date-parts":[[2025,2,26]],"date-time":"2025-02-26T06:21:27Z","timestamp":1740550887000},"page":"1-36","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":6,"title":["Software Engineering for OpenHarmony: A Research Roadmap"],"prefix":"10.1145","volume":"58","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-2990-1614","authenticated-orcid":false,"given":"Li","family":"Li","sequence":"first","affiliation":[{"name":"Beihang University","place":["Beijing, China"]}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-9895-4600","authenticated-orcid":false,"given":"Xiang","family":"Gao","sequence":"additional","affiliation":[{"name":"School of Software, Beihang University","place":["Beijing, China"]}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-7654-5574","authenticated-orcid":false,"given":"Hailong","family":"Sun","sequence":"additional","affiliation":[{"name":"Beihang University","place":["Beijing, China"]}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-3473-9703","authenticated-orcid":false,"given":"Chunming","family":"Hu","sequence":"additional","affiliation":[{"name":"Beihang University","place":["Beijing, China"]}]},{"ORCID":"https:\/\/orcid.org\/0009-0003-4994-9006","authenticated-orcid":false,"given":"Carolyn","family":"Sun","sequence":"additional","affiliation":[{"name":"Australian National University","place":["Canberra, Australia"]}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-1100-8633","authenticated-orcid":false,"given":"Haoyu","family":"Wang","sequence":"additional","affiliation":[{"name":"Huazhong University of Science and Technology","place":["Wuhan, China"]}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-5224-9970","authenticated-orcid":false,"given":"Haipeng","family":"Cai","sequence":"additional","affiliation":[{"name":"Washington State University","place":["Pullman, United States"]}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-1628-9796","authenticated-orcid":false,"given":"Ting","family":"Su","sequence":"additional","affiliation":[{"name":"Software Institute, Shanghai Key Laboratory of Trustworthy Computing","place":["shanghai, China"]}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-9082-3208","authenticated-orcid":false,"given":"Xiapu","family":"Luo","sequence":"additional","affiliation":[{"name":"Department of Computing, The Hong Kong Polytechnic University","place":["Hong Kong, Hong Kong"]}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-7270-9869","authenticated-orcid":false,"given":"Tegawend\u00e9","family":"Bissyande","sequence":"additional","affiliation":[{"name":"SnT, University of Luxembourg","place":["Luxembourg, Luxembourg"]}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-4052-475X","authenticated-orcid":false,"given":"Jacques","family":"Klein","sequence":"additional","affiliation":[{"name":"SnT, University of Luxembourg","place":["Luxembourg, Luxembourg"]}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-4928-7076","authenticated-orcid":false,"given":"John","family":"Grundy","sequence":"additional","affiliation":[{"name":"Faculty of Information Technology, Monash University","place":["Clayton, Australia"]}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-6731-216X","authenticated-orcid":false,"given":"Tao","family":"Xie","sequence":"additional","affiliation":[{"name":"Computer Science, Peking University","place":["Beijing, China"]}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-9720-0361","authenticated-orcid":false,"given":"Haibo","family":"Chen","sequence":"additional","affiliation":[{"name":"Shanghai Jiao Tong University","place":["Shanghai, China"]}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-3245-1901","authenticated-orcid":false,"given":"Huaimin","family":"Wang","sequence":"additional","affiliation":[{"name":"Natl Univ Def Technol","place":["Changsa, China"]}]}],"member":"320","published-online":{"date-parts":[[2025,9,8]]},"reference":[{"key":"e_1_3_3_2_2","doi-asserted-by":"crossref","unstructured":"Naveed Ahmad Aimal Rextin and Um E. Kulsoom. 2018. Perspectives on usability guidelines for smartphone applications: An empirical investigation and systematic literature review. IST 94 C (2018) 130\u2013149.","DOI":"10.1016\/j.infsof.2017.10.005"},{"key":"e_1_3_3_3_2","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2019.2891715"},{"key":"e_1_3_3_4_2","doi-asserted-by":"publisher","DOI":"10.4236\/jcc.2017.55007"},{"key":"e_1_3_3_5_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.datak.2021.101929"},{"key":"e_1_3_3_6_2","doi-asserted-by":"publisher","DOI":"10.17706\/jsw.13.4.242-259"},{"key":"e_1_3_3_7_2","doi-asserted-by":"publisher","DOI":"10.1145\/2351676.2351717"},{"key":"e_1_3_3_8_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.softx.2020.100403"},{"key":"e_1_3_3_9_2","doi-asserted-by":"publisher","DOI":"10.1145\/2666356.2594299"},{"key":"e_1_3_3_10_2","doi-asserted-by":"publisher","DOI":"10.1145\/2382196.2382222"},{"key":"e_1_3_3_11_2","first-page":"1","article-title":"Software engineering techniques for statically analyzing mobile apps: Research trends, characteristics, and potential for industrial adoption","volume":"12","year":"2021","unstructured":"Autili and others.2021. Software engineering techniques for statically analyzing mobile apps: Research trends, characteristics, and potential for industrial adoption. J. Internet Serv. Appl. 12 (2021), 1\u201360.","journal-title":"J. Internet Serv. Appl."},{"key":"e_1_3_3_12_2","doi-asserted-by":"publisher","DOI":"10.1109\/EmpiRE.2014.6890110"},{"key":"e_1_3_3_13_2","doi-asserted-by":"publisher","DOI":"10.1145\/3177847"},{"key":"e_1_3_3_14_2","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2014.2322867"},{"key":"e_1_3_3_15_2","doi-asserted-by":"publisher","DOI":"10.1145\/2259051.2259056"},{"key":"e_1_3_3_16_2","doi-asserted-by":"publisher","DOI":"10.1145\/2184489.2184500"},{"key":"e_1_3_3_17_2","doi-asserted-by":"publisher","DOI":"10.1145\/3241739"},{"key":"e_1_3_3_18_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.jss.2006.07.009"},{"key":"e_1_3_3_19_2","doi-asserted-by":"publisher","DOI":"10.1145\/3411764.3445762"},{"issue":"6","key":"e_1_3_3_20_2","first-page":"117","article-title":"Energy diagnosis of Android applications: A thematic taxonomy and survey","volume":"53","author":"C. Marimuthu","year":"2020","unstructured":"Marimuthu C., K. Chandrasekaran, and Sridhar Chimalakonda. 2020. Energy diagnosis of Android applications: A thematic taxonomy and survey. ACM Comput. Surv. 53, 6, Article 117 (Dec.2020), 36 pages.","journal-title":"ACM Comput. Surv."},{"key":"e_1_3_3_21_2","doi-asserted-by":"publisher","DOI":"10.3389\/fpsyg.2022.875310"},{"key":"e_1_3_3_22_2","first-page":"20","volume-title":"Proceedings of the Workshop on Innovations in Mobile Privacy and Security at the International Symposium Engineering Secure Software and Systems (IMPS@ ESSoS\u201916)","author":"Costamagna Valerio","year":"2016","unstructured":"Valerio Costamagna and Cong Zheng. 2016. Artdroid: A virtual-method hooking framework on android art runtime. In Proceedings of the Workshop on Innovations in Mobile Privacy and Security at the International Symposium Engineering Secure Software and Systems (IMPS@ ESSoS\u201916). 20\u201328."},{"key":"e_1_3_3_23_2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-40203-6_11"},{"key":"e_1_3_3_24_2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-35813-5_1"},{"key":"e_1_3_3_25_2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-35813-5_1"},{"key":"e_1_3_3_26_2","doi-asserted-by":"publisher","DOI":"10.1145\/3463274.3463318"},{"key":"e_1_3_3_27_2","doi-asserted-by":"publisher","DOI":"10.1145\/3510579"},{"key":"e_1_3_3_28_2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-01701-9_10"},{"key":"e_1_3_3_29_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.infsof.2020.106466"},{"key":"e_1_3_3_30_2","doi-asserted-by":"publisher","DOI":"10.1145\/2619091"},{"key":"e_1_3_3_31_2","doi-asserted-by":"publisher","DOI":"10.1109\/ISSRE5003.2020.00032"},{"key":"e_1_3_3_32_2","doi-asserted-by":"publisher","DOI":"10.1109\/FOSE.2007.14"},{"key":"e_1_3_3_33_2","doi-asserted-by":"publisher","DOI":"10.1109\/MOBILESoft.2017.33"},{"key":"e_1_3_3_34_2","doi-asserted-by":"publisher","DOI":"10.1109\/ICECCS.2019.00029"},{"key":"e_1_3_3_35_2","article-title":"Understanding the evolution of android app vulnerabilities","author":"Gao Jun","year":"2019","unstructured":"Jun Gao et\u00a0al. 2019. Understanding the evolution of android app vulnerabilities. Trans. Reliabil. (2019).","journal-title":"Trans. Reliabil."},{"key":"e_1_3_3_36_2","doi-asserted-by":"publisher","DOI":"10.1145\/3442381.3449932"},{"key":"e_1_3_3_37_2","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2022.3216879"},{"key":"e_1_3_3_38_2","doi-asserted-by":"publisher","DOI":"10.5555\/3063155.3063211"},{"key":"e_1_3_3_39_2","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.2013.6606553"},{"key":"e_1_3_3_40_2","doi-asserted-by":"crossref","unstructured":"Alessandra Gorla et\u00a0al. 2014. Checking app behavior against app descriptions. InProceedings of the IEEE\/ACM International Conference on Software Engineering (ICSE\u201914). 1025\u20131035.","DOI":"10.1145\/2568225.2568276"},{"key":"e_1_3_3_41_2","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2021.3071193"},{"key":"e_1_3_3_42_2","doi-asserted-by":"publisher","DOI":"10.1145\/2480741.2480744"},{"key":"e_1_3_3_43_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.jss.2018.08.028"},{"key":"e_1_3_3_44_2","doi-asserted-by":"publisher","DOI":"10.1109\/ESEM.2013.9"},{"key":"e_1_3_3_45_2","doi-asserted-by":"publisher","DOI":"10.1145\/3507903"},{"key":"e_1_3_3_46_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.infsof.2019.02.003"},{"key":"e_1_3_3_47_2","article-title":"Guidelines for Performing Systematic Literature Reviews in Software Engineering","author":"Keele Staffs","year":"2007","unstructured":"Staffs Keele et\u00a0al. 2007. Guidelines for Performing Systematic Literature Reviews in Software Engineering. Technical Report.","journal-title":"Technical Report"},{"key":"e_1_3_3_48_2","unstructured":"Seoyeon Kim Jisu Park Jinman Jung Seongbae Eun Young-Sun Yun Sunsup So et\u00a0al. 2018. Identifying UI widgets of mobile applications from sketch images. Journal of Engineering and Applied Sciences 13 6 (2018) 1561\u20131566."},{"key":"e_1_3_3_49_2","doi-asserted-by":"publisher","DOI":"10.1109\/TPDS.2018.2822683"},{"key":"e_1_3_3_50_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.infsof.2010.03.006"},{"key":"e_1_3_3_51_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.infsof.2013.07.010"},{"key":"e_1_3_3_52_2","article-title":"Automated testing of android apps: A systematic literature review","author":"Kong Pingfan","year":"2018","unstructured":"Pingfan Kong et\u00a0al. 2018. Automated testing of android apps: A systematic literature review. IEEE Trans. Reliabil. (2018).","journal-title":"IEEE Trans. Reliabil."},{"key":"e_1_3_3_53_2","doi-asserted-by":"publisher","DOI":"10.1109\/TR.2018.2865733"},{"key":"e_1_3_3_54_2","doi-asserted-by":"publisher","DOI":"10.1145\/3572905"},{"key":"e_1_3_3_55_2","volume-title":"CETUS","author":"Lam Patrick","year":"2011","unstructured":"Patrick Lam et\u00a0al. 2011. The Soot framework for Java program analysis: A retrospective. In CETUS, Vol. 15."},{"issue":"5","key":"e_1_3_3_56_2","first-page":"104","article-title":"A systematic survey on android API usage for data-driven analytics with smartphones","volume":"55","author":"Lee Hansoo","year":"2022","unstructured":"Hansoo Lee, Joonyoung Park, and Uichin Lee. 2022. A systematic survey on android API usage for data-driven analytics with smartphones. ACM Comput. Surv. 55, 5, Article 104 (Dec.2022), 38 pages.","journal-title":"ACM Comput. Surv."},{"key":"e_1_3_3_57_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.infsof.2017.04.001"},{"key":"e_1_3_3_58_2","doi-asserted-by":"publisher","DOI":"10.1007\/s10664-019-09764-z"},{"key":"e_1_3_3_59_2","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2019.2901679"},{"key":"e_1_3_3_60_2","doi-asserted-by":"publisher","DOI":"10.1109\/ICSME.2016.35"},{"key":"e_1_3_3_61_2","doi-asserted-by":"crossref","unstructured":"Li Li Jun Gao M\u00e9d\u00e9ric Hurier Pingfan Kong Tegawend\u00e9 F. Bissyand\u00e9 Alexandre Bartel Jacques Klein and Yves Le Traon. 2017. AndroZoo++: Collecting millions of android apps and their metadata for the research community. arXiv (2017) 468\u2013471.","DOI":"10.1145\/2901739.2903508"},{"key":"e_1_3_3_62_2","doi-asserted-by":"publisher","DOI":"10.1145\/3064857.3079179"},{"key":"e_1_3_3_63_2","doi-asserted-by":"publisher","DOI":"10.1145\/3524842.3527963"},{"key":"e_1_3_3_64_2","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE-SEIP52600.2021.00040"},{"key":"e_1_3_3_65_2","doi-asserted-by":"publisher","DOI":"10.1145\/3379597.3387503"},{"key":"e_1_3_3_66_2","article-title":"Automatically detecting incompatible android APIs","author":"Liu Pei","year":"2023","unstructured":"Pei Liu, Yanjie Zhao, Mattia Fazzini, Haipeng Cai, John Grundy, and Li Li. 2023. Automatically detecting incompatible android APIs. Trans. Softw. Eng. (2023).","journal-title":"Trans. Softw. Eng."},{"key":"e_1_3_3_67_2","article-title":"Deep learning for android malware defenses: A systematic literature review","author":"Liu Yue","year":"2022","unstructured":"Yue Liu et\u00a0al. 2022. Deep learning for android malware defenses: A systematic literature review. ACM Comput. Surv. (2022).","journal-title":"ACM Comput. Surv."},{"issue":"8","key":"e_1_3_3_68_2","first-page":"153","article-title":"Deep learning for android malware defenses: A systematic literature review","volume":"55","author":"Liu Yue","year":"2022","unstructured":"Yue Liu, Chakkrit Tantithamthavorn, Li Li, and Yepang Liu. 2022. Deep learning for android malware defenses: A systematic literature review. ACM Comput. Surv. 55, 8, Article 153 (Dec.2022), 36 pages.","journal-title":"ACM Comput. Surv."},{"key":"e_1_3_3_69_2","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE48619.2023.00168"},{"issue":"1","key":"e_1_3_3_70_2","first-page":"21","article-title":"A survey of context simulation for testing mobile context-aware applications","volume":"53","author":"Luo Chu","year":"2020","unstructured":"Chu Luo, Jorge Goncalves, Eduardo Velloso, and Vassilis Kostakos. 2020. A survey of context simulation for testing mobile context-aware applications. ACM Comput. Surv. 53, 1, Article 21 (Feb.2020), 39 pages.","journal-title":"ACM Comput. Surv."},{"key":"e_1_3_3_71_2","doi-asserted-by":"publisher","DOI":"10.1109\/TMC.2019.2936561"},{"key":"e_1_3_3_72_2","doi-asserted-by":"publisher","DOI":"10.1145\/3638240"},{"key":"e_1_3_3_73_2","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE-SEIP.2019.00039"},{"key":"e_1_3_3_74_2","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2016.2630689"},{"key":"e_1_3_3_75_2","doi-asserted-by":"publisher","DOI":"10.1002\/inst.12278"},{"key":"e_1_3_3_76_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.jss.2022.111462"},{"key":"e_1_3_3_77_2","doi-asserted-by":"publisher","DOI":"10.1049\/sfw2.12123"},{"key":"e_1_3_3_78_2","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE-SEIS52602.2021.00012"},{"key":"e_1_3_3_79_2","doi-asserted-by":"publisher","DOI":"10.1145\/3524842.3527937"},{"key":"e_1_3_3_80_2","article-title":"47 New Products Qualified for OpenHarmony Compatibility Test","year":"2024","unstructured":"openharmony. 2024. 47 New Products Qualified for OpenHarmony Compatibility Test. Retrieved from https:\/\/www.huaweicentral.com\/47-new-products-qualified-for-openharmony-compatibility-test-in-june-2024\/","journal-title":"https:\/\/www.huaweicentral.com\/47-new-products-qualified-for-openharmony-compatibility-test-in-june-2024\/"},{"key":"e_1_3_3_81_2","article-title":"ArkAnalyzer: The Static Analysis Framework for OpenHarmony","year":"2024","unstructured":"OpenHarmony. 2024. ArkAnalyzer: The Static Analysis Framework for OpenHarmony. Retrieved from https:\/\/gitee.com\/openharmony-sig\/arkanalyzer","journal-title":"https:\/\/gitee.com\/openharmony-sig\/arkanalyzer"},{"key":"e_1_3_3_82_2","article-title":"OpenHarmony\/ostest_wukong","year":"2024","unstructured":"OpenHarmony. 2024. OpenHarmony\/ostest_wukong. Retrieved Octover 22, 2024 from https:\/\/gitee.com\/openharmony\/ostest_wukong","journal-title":"https:\/\/gitee.com\/openharmony\/ostest_wukong"},{"key":"e_1_3_3_83_2","article-title":"Security Issue Response Team Work Charter","year":"2024","unstructured":"openharmony. 2024. Security Issue Response Team Work Charter. Retrieved from https:\/\/gitee.com\/openharmony\/security\/blob\/master\/README_en.md","journal-title":"https:\/\/gitee.com\/openharmony\/security\/blob\/master\/README_en.md"},{"key":"e_1_3_3_84_2","article-title":"UiTest Features","year":"2024","unstructured":"OpenHarmony. 2024. UiTest Features. Retrieved from https:\/\/gitee.com\/openharmony\/testfwk_arkxtest","journal-title":"https:\/\/gitee.com\/openharmony\/testfwk_arkxtest"},{"key":"e_1_3_3_85_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.jss.2017.11.043"},{"key":"e_1_3_3_86_2","doi-asserted-by":"publisher","DOI":"10.1145\/2543581.2543594"},{"key":"e_1_3_3_87_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.jss.2020.110657"},{"key":"e_1_3_3_88_2","doi-asserted-by":"publisher","DOI":"10.1109\/CyberC55534.2022.00023"},{"key":"e_1_3_3_89_2","doi-asserted-by":"publisher","DOI":"10.1145\/3617589"},{"issue":"6","key":"e_1_3_3_90_2","first-page":"126","article-title":"A survey of android malware detection with deep neural models","volume":"53","author":"Qiu Junyang","year":"2020","unstructured":"Junyang Qiu, Jun Zhang, Wei Luo, Lei Pan, Surya Nepal, and Yang Xiang. 2020. A survey of android malware detection with deep neural models. ACM Comput. Surv. 53, 6, Article 126 (Dec.2020), 36 pages.","journal-title":"ACM Comput. Surv."},{"key":"e_1_3_3_91_2","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2014.23039"},{"key":"e_1_3_3_92_2","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.2017.35"},{"key":"e_1_3_3_93_2","doi-asserted-by":"publisher","DOI":"10.1145\/2523649.2523678"},{"key":"e_1_3_3_94_2","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2016.2615307"},{"key":"e_1_3_3_95_2","doi-asserted-by":"publisher","DOI":"10.1145\/3510003.3512766"},{"key":"e_1_3_3_96_2","volume-title":"Proceedings of the ACM International Conference on the Foundations of Software Engineering (FSE\u201922)","author":"Santos Joanna Cecilia Da Silva","year":"2022","unstructured":"Joanna Cecilia Da Silva Santos and Julian Dolby. 2022. Program analysis using WALA. In Proceedings of the ACM International Conference on the Foundations of Software Engineering (FSE\u201922)."},{"key":"e_1_3_3_97_2","doi-asserted-by":"publisher","DOI":"10.1145\/3556974"},{"issue":"3","key":"e_1_3_3_98_2","first-page":"704","article-title":"Socio-technical challenges and mitigation guidelines in developing mobile healthcare applications","volume":"7","author":"Shahzad Basit","year":"2017","unstructured":"Basit Shahzad, Abdullatif M. Abdullatif, Kashif Saleem, and Wasif Jameel. 2017. Socio-technical challenges and mitigation guidelines in developing mobile healthcare applications. J. Med. Imag. Health Inf. 7, 3 (2017), 704\u2013712.","journal-title":"J. Med. Imag. Health Inf."},{"key":"e_1_3_3_99_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.infsof.2021.106693"},{"key":"e_1_3_3_100_2","doi-asserted-by":"publisher","DOI":"10.1145\/3218585.3218673"},{"key":"e_1_3_3_101_2","doi-asserted-by":"publisher","DOI":"10.1002\/stvr.1801"},{"key":"e_1_3_3_102_2","doi-asserted-by":"publisher","DOI":"10.1145\/2480362.2480701"},{"key":"e_1_3_3_103_2","doi-asserted-by":"publisher","DOI":"10.1145\/3106237.3106298"},{"key":"e_1_3_3_104_2","doi-asserted-by":"publisher","DOI":"10.1145\/2733306"},{"key":"e_1_3_3_105_2","unstructured":"Xiaoyu Sun Xiao Chen Yonghui Liu John Grundy and Li Li. 2023. Taming android fragmentation through lightweight crowdsourced testing. IEEE Transactions on Software Engineering 49 6 (2023) 3599\u20133615."},{"key":"e_1_3_3_106_2","doi-asserted-by":"publisher","DOI":"10.1007\/s11219-018-9418-6"},{"key":"e_1_3_3_107_2","doi-asserted-by":"publisher","DOI":"10.1371\/journal.pone.0195955"},{"key":"e_1_3_3_108_2","doi-asserted-by":"publisher","DOI":"10.1109\/TMC.2018.2886881"},{"key":"e_1_3_3_109_2","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2023.3294971"},{"key":"e_1_3_3_110_2","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2022.3148258"},{"key":"e_1_3_3_111_2","doi-asserted-by":"publisher","DOI":"10.1145\/3243734.3243835"},{"key":"e_1_3_3_112_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.jss.2021.111166"},{"key":"e_1_3_3_113_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.jss.2023.111677"},{"key":"e_1_3_3_114_2","doi-asserted-by":"publisher","DOI":"10.1145\/2963145"},{"key":"e_1_3_3_115_2","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2018.2866347"},{"key":"e_1_3_3_116_2","doi-asserted-by":"publisher","DOI":"10.1109\/SP40001.2021.00105"},{"key":"e_1_3_3_117_2","doi-asserted-by":"publisher","DOI":"10.1145\/3460319.3464839"},{"key":"e_1_3_3_118_2","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2020.2996433"},{"key":"e_1_3_3_119_2","doi-asserted-by":"publisher","DOI":"10.1007\/s11219-017-9368-4"},{"issue":"1","key":"e_1_3_3_120_2","first-page":"13","article-title":"Autonomous visual navigation for mobile robots: A systematic literature review","volume":"53","author":"Yasuda Yuri D. V.","year":"2020","unstructured":"Yuri D. V. Yasuda, Luiz Eduardo G. Martins, and Fabio A. M. Cappabianco. 2020. Autonomous visual navigation for mobile robots: A systematic literature review. ACM Comput. Surv. 53, 1, Article 13 (Feb.2020), 34 pages.","journal-title":"ACM Comput. Surv."},{"key":"e_1_3_3_121_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.jss.2016.03.065"},{"key":"e_1_3_3_122_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.jss.2016.03.065"},{"key":"e_1_3_3_123_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.infsof.2023.107323"},{"key":"e_1_3_3_124_2","article-title":"Research on third-party libraries in android apps: A taxonomy and systematic literature review","author":"Zhan Xian","year":"2021","unstructured":"Xian Zhan, Tianming Liu, Lingling Fan, Li Li, Sen Chen, Xiapu Luo, and Yang Liu. 2021. Research on third-party libraries in android apps: A taxonomy and systematic literature review. Trans. Softw. Eng. (2021).","journal-title":"Trans. Softw. Eng."},{"key":"e_1_3_3_125_2","doi-asserted-by":"publisher","DOI":"10.1109\/SANER.2019.8667975"},{"key":"e_1_3_3_126_2","doi-asserted-by":"crossref","unstructured":"Xiangyu Zhang Lingling Fan Sen Chen Yucheng Su and Boyuan Li. 2023. Scene-driven exploration and GUI modeling for android apps. In The 38th IEEE\/ACM International Conference on Automated Software Engineering (ASE) IEEE 1251\u20131262.","DOI":"10.1109\/ASE56229.2023.00179"},{"key":"e_1_3_3_127_2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-24177-7_15"},{"key":"e_1_3_3_128_2","doi-asserted-by":"publisher","DOI":"10.1145\/3510003.3510128"},{"key":"e_1_3_3_129_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.infsof.2021.106619"},{"key":"e_1_3_3_130_2","article-title":"APIMatchmaker: Matching the right APIs for supporting the development of android apps","author":"Zhao Yanjie","year":"2022","unstructured":"Yanjie Zhao, Li Li, Haoyu Wang, Qiang He, and John Grundy. 2022. APIMatchmaker: Matching the right APIs for supporting the development of android apps. Trans. Softw. Eng. (2022).","journal-title":"Trans. Softw. Eng."},{"key":"e_1_3_3_131_2","doi-asserted-by":"publisher","DOI":"10.1109\/ASE51524.2021.9678843"},{"key":"e_1_3_3_132_2","doi-asserted-by":"publisher","DOI":"10.1145\/3533767.3534410"},{"key":"e_1_3_3_133_2","doi-asserted-by":"publisher","DOI":"10.1145\/3548606.3560601"}],"container-title":["ACM Computing Surveys"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3720538","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,9,10]],"date-time":"2025-09-10T03:30:53Z","timestamp":1757475053000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3720538"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,9,8]]},"references-count":132,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2026,1,31]]}},"alternative-id":["10.1145\/3720538"],"URL":"https:\/\/doi.org\/10.1145\/3720538","relation":{},"ISSN":["0360-0300","1557-7341"],"issn-type":[{"value":"0360-0300","type":"print"},{"value":"1557-7341","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025,9,8]]},"assertion":[{"value":"2024-01-24","order":0,"name":"received","label":"Received","group":{"name":"publication_history","label":"Publication History"}},{"value":"2025-02-03","order":2,"name":"accepted","label":"Accepted","group":{"name":"publication_history","label":"Publication History"}},{"value":"2025-09-08","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}