Humanoid: A deep learning-based approach to automated black-box android app testing

Y Li, Z Yang, Y Guo, X Chen - 2019 34th IEEE/ACM …, 2019 - ieeexplore.ieee.org
Automated input generators must constantly choose which UI element to interact with and
how to interact with it, in order to achieve high coverage with a limited time budget …

Empowering llm to use smartphone for intelligent task automation

H Wen, Y Li, G Liu, S Zhao, T Yu, TJJ Li, S Jiang… - arXiv preprint arXiv …, 2023 - arxiv.org
Mobile task automation is an attractive technique that aims to enable voice-based hands-
free user interaction with smartphones. However, existing approaches suffer from poor …

Understanding the evolution of mobile app ecosystems: A longitudinal measurement study of google play

H Wang, H Li, Y Guo - The World Wide Web Conference, 2019 - dl.acm.org
The continuing expansion of mobile app ecosystems has attracted lots of efforts from the
research community. However, although a large number of research studies have focused …

Does this app really need my location? Context-aware privacy management for smartphones

S Chitkara, N Gothoskar, S Harish, JI Hong… - Proceedings of the …, 2017 - dl.acm.org
The enormous popularity of smartphones, their rich sensing capabilities, and the data they
have about their users have lead to millions of apps being developed and used. However …

Deepintent: Deep icon-behavior learning for detecting intention-behavior discrepancy in mobile apps

S Xi, S Yang, X Xiao, Y Yao, Y Xiong, F Xu… - Proceedings of the …, 2019 - dl.acm.org
Mobile apps have been an indispensable part in our daily life. However, there exist many
potentially harmful apps that may exploit users' privacy data, eg, collecting the user's …

Iconintent: automatic identification of sensitive ui widgets based on icon classification for android apps

X Xiao, X Wang, Z Cao, H Wang… - 2019 IEEE/ACM 41st …, 2019 - ieeexplore.ieee.org
Many mobile applications (ie, apps) include UI widgets to use or collect users' sensitive data.
Thus, to identify suspicious sensitive data usage such as UI-permission mismatch, it is …

An explorative study of the mobile app ecosystem from app developers' perspective

H Wang, Z Liu, Y Guo, X Chen, M Zhang, G Xu… - Proceedings of the 26th …, 2017 - dl.acm.org
With the prevalence of smartphones, app markets such as Apple App Store and Google Play
has become the center stage in the mobile app ecosystem, with millions of apps developed …

Privacystreams: Enabling transparency in personal data processing for mobile apps

Y Li, F Chen, TJJ Li, Y Guo, G Huang… - Proceedings of the …, 2017 - dl.acm.org
Smartphone app developers often access and use privacy-sensitive data to create apps with
rich and meaningful interactions. However, it can be challenging for auditors and end-users …

Deuedroid: Detecting underground economy apps based on utg similarity

Z Chen, J Liu, Y Hu, L Wu, Y Zhou, Y He… - Proceedings of the …, 2023 - dl.acm.org
In recent years, the underground economy is proliferating in the mobile system. These
underground economy apps (UEware for short) make profits from providing non-compliant …

A large-scale empirical study on android runtime-permission rationale messages

X Liu, Y Leng, W Yang, W Wang… - 2018 IEEE Symposium …, 2018 - ieeexplore.ieee.org
After Android 6.0 introduces the runtime-permission system, many apps provide runtime-
permission-group rationales for the users to better understand the permissions requested by …