A survey of app store analysis for software engineering

W Martin, F Sarro, Y Jia, Y Zhang… - IEEE transactions on …, 2016 - ieeexplore.ieee.org
App Store Analysis studies information about applications obtained from app stores. App
stores provide a wealth of information derived from users that would not exist had the …

From personalized medicine to population health: a survey of mHealth sensing techniques

Z Wang, H Xiong, J Zhang, S Yang… - IEEE Internet of …, 2022 - ieeexplore.ieee.org
Mobile sensing systems have been widely used as a practical approach to collect
behavioral and health-related information from individuals and to provide timely intervention …

PermPair: Android Malware Detection Using Permission Pairs

A Arora, SK Peddoju, M Conti - IEEE Transactions on …, 2019 - ieeexplore.ieee.org
The Android smartphones are highly prone to spreading the malware due to intrinsic
feebleness that permits an application to access the internal resources when the user grants …

Combating against potentially harmful mobile apps

M Suleman, TR Soomro, TM Ghazal… - … Conference on Artificial …, 2021 - Springer
Mobile apps make our life much easier and simple in other aspects number of potentially
harmful applications are making Smartphone users un-secure. Smartphone apps are often …

Marvin: Efficient and comprehensive mobile app classification through static and dynamic analysis

M Lindorfer, M Neugschwandtner… - 2015 IEEE 39th annual …, 2015 - ieeexplore.ieee.org
Android dominates the smartphone operating system market and consequently has attracted
the attention of malware authors and researchers alike. Despite the considerable number of …

The feasibility of dynamically granted permissions: Aligning mobile privacy with user preferences

P Wijesekera, A Baokar, L Tsai… - … IEEE Symposium on …, 2017 - ieeexplore.ieee.org
Current smartphone operating systems regulate application permissions by prompting users
on an ask-on-first-use basis. Prior research has shown that this method is ineffective …

Query expansion based on crowd knowledge for code search

L Nie, H Jiang, Z Ren, Z Sun, X Li - IEEE Transactions on …, 2016 - ieeexplore.ieee.org
As code search is a frequent developer activity in software development practices, improving
the performance of code search is a critical task. In the text retrieval based search …

A taxonomy and qualitative comparison of program analysis techniques for security assessment of android software

A Sadeghi, H Bagheri, J Garcia… - IEEE Transactions on …, 2016 - ieeexplore.ieee.org
In parallel with the meteoric rise of mobile software, we are witnessing an alarming
escalation in the number and sophistication of the security threats targeted at mobile …

Android permissions remystified: A field study on contextual integrity

P Wijesekera, A Baokar, A Hosseini… - 24th USENIX Security …, 2015 - usenix.org
We instrumented the Android platform to collect data regarding how often and under what
circumstances smartphone applications access protected resources regulated by …

Contrastive curriculum learning for sequential user behavior modeling via data augmentation

S Bian, WX Zhao, K Zhou, J Cai, Y He, C Yin… - Proceedings of the 30th …, 2021 - dl.acm.org
Within online platforms, it is critical to capture the semantics of sequential user behaviors for
accurately modeling user interests. However, dynamic characteristics and sparse behaviors …