The following publications are possibly variants of this publication:
- Automatically Locating Malicious Packages in Piggybacked Android AppsLi Li 0029, Daoyuan Li, Tegawendé F. Bissyandé, Jacques Klein, Haipeng Cai, David Lo, Yves Le Traon. ICSE 2017: 170-174 [doi]
- Understanding Android App Piggybacking: A Systematic Study of Malicious Code GraftingLi Li 0029, Daoyuan Li, Tegawendé F. Bissyandé, Jacques Klein, Yves Le Traon, David Lo, Lorenzo Cavallaro. tifs, 12(6):1269-1284, 2017. [doi]
- Understanding Android app piggybackingLi Li 0029, Daoyuan Li, Tegawendé F. Bissyandé, Jacques Klein, Yves Le Traon, David Lo, Lorenzo Cavallaro. ICSE 2017: 359-361 [doi]
- DAPASA: Detecting Android Piggybacked Apps Through Sensitive Subgraph AnalysisMing Fan, Jun Liu, Wei Wang, Haifei Li, Zhenzhou Tian, Ting Liu. tifs, 12(8):1772-1785, 2017. [doi]
- Checking App Behavior Against App Descriptions: What If There are No App Descriptions?Md. Shamsujjoha, John Grundy, Li Li, Hourieh Khalajzadeh, and Qinghua Lu. In 29th IEEE/ACM International Conference on Program Comprehension (ICPC 2021). 2021:
- Detecting Android malicious apps and categorizing benign apps with ensemble of classifiersWei Wang, Yuanyuan Li, Xing Wang, Jiqiang Liu, Xiangliang Zhang. fgcs, 78:987-994, 2018. [doi]