Cited By
View all- Zhang ZLuo SLu YPan L(2025)Obfuscation-resilient detection of Android third-party libraries using multi-scale code dependency fusionInformation Fusion10.1016/j.inffus.2024.102908117:COnline publication date: 1-May-2025
- Xie ZWen MLi TZhu YHou QJin HFilkov VRay BZhou M(2024)How Does Code Optimization Impact Third-party Library Detection for Android Applications?Proceedings of the 39th IEEE/ACM International Conference on Automated Software Engineering10.1145/3691620.3695554(1919-1931)Online publication date: 27-Oct-2024
- Xiao YNadkarni ALiao XTorres-Arias SDe Carli LZhang Y(2024)Enhancing Transparency and Accountability of TPLs with PBOM: A Privacy Bill of MaterialsProceedings of the 2024 Workshop on Software Supply Chain Offensive Research and Ecosystem Defenses10.1145/3689944.3696159(1-11)Online publication date: 19-Nov-2024
- Show More Cited By