Cited By
View all- Faruki PBhan RJain VBhatia SEl Madhoun NPamula R(2023)A Survey and Evaluation of Android-Based Malware Evasion Techniques and Detection FrameworksInformation10.3390/info1407037414:7(374)Online publication date: 30-Jun-2023
- Chen ZLiu JHu YWu LZhou YHe YLiao XWang KLi JQin ZJust RFraser G(2023)DeUEDroid: Detecting Underground Economy Apps Based on UTG SimilarityProceedings of the 32nd ACM SIGSOFT International Symposium on Software Testing and Analysis10.1145/3597926.3598051(223-235)Online publication date: 12-Jul-2023
- Hageman KFeal ÁGamba JGirish ABleier JLindorfer MTapiador JVallina-Rodriguez N(2023)Mixed Signals: Analyzing Software Attribution Challenges in the Android EcosystemIEEE Transactions on Software Engineering10.1109/TSE.2023.323658249:4(2964-2979)Online publication date: 1-Apr-2023
- Show More Cited By