{"id":"https://openalex.org/W4403391441","doi":"https://doi.org/10.1109/tse.2024.3479288","title":"Do as You Say: Consistency Detection of Data Practice in Program Code and Privacy Policy in Mini-App","display_name":"Do as You Say: Consistency Detection of Data Practice in Program Code and Privacy Policy in Mini-App","publication_year":2024,"publication_date":"2024-10-14","ids":{"openalex":"https://openalex.org/W4403391441","doi":"https://doi.org/10.1109/tse.2024.3479288"},"language":"en","primary_location":{"id":"doi:10.1109/tse.2024.3479288","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tse.2024.3479288","pdf_url":null,"source":{"id":"https://openalex.org/S8351582","display_name":"IEEE Transactions on Software Engineering","issn_l":"0098-5589","issn":["0098-5589","1939-3520","2326-3881"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310320439","host_organization_name":"IEEE Computer Society","host_organization_lineage":["https://openalex.org/P4310320439","https://openalex.org/P4310319808"],"host_organization_lineage_names":["IEEE Computer Society","Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Software Engineering","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":null,"display_name":"Yin Wang","orcid":"https://orcid.org/0000-0002-2597-208X"},"institutions":[{"id":"https://openalex.org/I87445476","display_name":"Xi'an Jiaotong University","ror":"https://ror.org/017zhmm22","country_code":"CN","type":"education","lineage":["https://openalex.org/I87445476"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Yin Wang","raw_affiliation_strings":["Ministry of Education Key Laboratory of Intelligent Networks and Network Security, Xi&#x2019;an Jiaotong University, Xi&#x2019;an, Shaanxi, China","Xi&#x2019;an Jiaotong University"],"affiliations":[{"raw_affiliation_string":"Ministry of Education Key Laboratory of Intelligent Networks and Network Security, Xi&#x2019;an Jiaotong University, Xi&#x2019;an, Shaanxi, China","institution_ids":["https://openalex.org/I87445476"]},{"raw_affiliation_string":"Xi&#x2019;an Jiaotong University","institution_ids":["https://openalex.org/I87445476"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100692958","display_name":"Ming Fan","orcid":"https://orcid.org/0000-0002-9327-0987"},"institutions":[{"id":"https://openalex.org/I87445476","display_name":"Xi'an Jiaotong University","ror":"https://ror.org/017zhmm22","country_code":"CN","type":"education","lineage":["https://openalex.org/I87445476"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Ming Fan","raw_affiliation_strings":["Ministry of Education Key Laboratory of Intelligent Networks and Network Security, Xi&#x2019;an Jiaotong University, Xi&#x2019;an, Shaanxi, China","Xi&#x2019;an Jiaotong University"],"affiliations":[{"raw_affiliation_string":"Ministry of Education Key Laboratory of Intelligent Networks and Network Security, Xi&#x2019;an Jiaotong University, Xi&#x2019;an, Shaanxi, China","institution_ids":["https://openalex.org/I87445476"]},{"raw_affiliation_string":"Xi&#x2019;an Jiaotong University","institution_ids":["https://openalex.org/I87445476"]}]},{"author_position":"middle","author":{"id":null,"display_name":"Junfeng Liu","orcid":"https://orcid.org/0009-0005-7534-5550"},"institutions":[{"id":"https://openalex.org/I87445476","display_name":"Xi'an Jiaotong University","ror":"https://ror.org/017zhmm22","country_code":"CN","type":"education","lineage":["https://openalex.org/I87445476"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Junfeng Liu","raw_affiliation_strings":["Ministry of Education Key Laboratory of Intelligent Networks and Network Security, Xi&#x2019;an Jiaotong University, Xi&#x2019;an, Shaanxi, China","Xi&#x2019;an Jiaotong University"],"affiliations":[{"raw_affiliation_string":"Ministry of Education Key Laboratory of Intelligent Networks and Network Security, Xi&#x2019;an Jiaotong University, Xi&#x2019;an, Shaanxi, China","institution_ids":["https://openalex.org/I87445476"]},{"raw_affiliation_string":"Xi&#x2019;an Jiaotong University","institution_ids":["https://openalex.org/I87445476"]}]},{"author_position":"middle","author":{"id":null,"display_name":"Junjie Tao","orcid":"https://orcid.org/0000-0002-4512-3085"},"institutions":[{"id":"https://openalex.org/I87445476","display_name":"Xi'an Jiaotong University","ror":"https://ror.org/017zhmm22","country_code":"CN","type":"education","lineage":["https://openalex.org/I87445476"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Junjie Tao","raw_affiliation_strings":["Ministry of Education Key Laboratory of Intelligent Networks and Network Security, Xi&#x2019;an Jiaotong University, Xi&#x2019;an, Shaanxi, China","Xi&#x2019;an Jiaotong University"],"affiliations":[{"raw_affiliation_string":"Ministry of Education Key Laboratory of Intelligent Networks and Network Security, Xi&#x2019;an Jiaotong University, Xi&#x2019;an, Shaanxi, China","institution_ids":["https://openalex.org/I87445476"]},{"raw_affiliation_string":"Xi&#x2019;an Jiaotong University","institution_ids":["https://openalex.org/I87445476"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5041389585","display_name":"Wuxia Jin","orcid":"https://orcid.org/0000-0002-9137-4635"},"institutions":[{"id":"https://openalex.org/I87445476","display_name":"Xi'an Jiaotong University","ror":"https://ror.org/017zhmm22","country_code":"CN","type":"education","lineage":["https://openalex.org/I87445476"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Wuxia Jin","raw_affiliation_strings":["Ministry of Education Key Laboratory of Intelligent Networks and Network Security, Xi&#x2019;an Jiaotong University, Xi&#x2019;an, Shaanxi, China","Xi&#x2019;an Jiaotong University"],"affiliations":[{"raw_affiliation_string":"Ministry of Education Key Laboratory of Intelligent Networks and Network Security, Xi&#x2019;an Jiaotong University, Xi&#x2019;an, Shaanxi, China","institution_ids":["https://openalex.org/I87445476"]},{"raw_affiliation_string":"Xi&#x2019;an Jiaotong University","institution_ids":["https://openalex.org/I87445476"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100419375","display_name":"Haijun Wang","orcid":"https://orcid.org/0009-0001-3509-3919"},"institutions":[{"id":"https://openalex.org/I87445476","display_name":"Xi'an Jiaotong University","ror":"https://ror.org/017zhmm22","country_code":"CN","type":"education","lineage":["https://openalex.org/I87445476"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Haijun Wang","raw_affiliation_strings":["Ministry of Education Key Laboratory of Intelligent Networks and Network Security, Xi&#x2019;an Jiaotong University, Xi&#x2019;an, Shaanxi, China","Xi&#x2019;an Jiaotong University"],"affiliations":[{"raw_affiliation_string":"Ministry of Education Key Laboratory of Intelligent Networks and Network Security, Xi&#x2019;an Jiaotong University, Xi&#x2019;an, Shaanxi, China","institution_ids":["https://openalex.org/I87445476"]},{"raw_affiliation_string":"Xi&#x2019;an Jiaotong University","institution_ids":["https://openalex.org/I87445476"]}]},{"author_position":"middle","author":{"id":null,"display_name":"Qi Xiong","orcid":"https://orcid.org/0009-0008-3460-0043"},"institutions":[{"id":"https://openalex.org/I2250653659","display_name":"Tencent (China)","ror":"https://ror.org/00hhjss72","country_code":"CN","type":"company","lineage":["https://openalex.org/I2250653659"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Qi Xiong","raw_affiliation_strings":["Tencent Big Data Security Lab, Shenzhen, Guangdong, China","Tencent Big Data Security Lab"],"affiliations":[{"raw_affiliation_string":"Tencent Big Data Security Lab, Shenzhen, Guangdong, China","institution_ids":["https://openalex.org/I2250653659"]},{"raw_affiliation_string":"Tencent Big Data Security Lab","institution_ids":["https://openalex.org/I2250653659"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5101554099","display_name":"Ting Liu","orcid":"https://orcid.org/0000-0002-7600-0934"},"institutions":[{"id":"https://openalex.org/I87445476","display_name":"Xi'an Jiaotong University","ror":"https://ror.org/017zhmm22","country_code":"CN","type":"education","lineage":["https://openalex.org/I87445476"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Ting Liu","raw_affiliation_strings":["Ministry of Education Key Laboratory of Intelligent Networks and Network Security, Xi&#x2019;an Jiaotong University, Xi&#x2019;an, Shaanxi, China","Xi&#x2019;an Jiaotong University"],"affiliations":[{"raw_affiliation_string":"Ministry of Education Key Laboratory of Intelligent Networks and Network Security, Xi&#x2019;an Jiaotong University, Xi&#x2019;an, Shaanxi, China","institution_ids":["https://openalex.org/I87445476"]},{"raw_affiliation_string":"Xi&#x2019;an Jiaotong University","institution_ids":["https://openalex.org/I87445476"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":8,"corresponding_author_ids":[],"corresponding_institution_ids":["https://openalex.org/I87445476"],"apc_list":null,"apc_paid":null,"fwci":6.1234,"has_fulltext":false,"cited_by_count":9,"citation_normalized_percentile":{"value":0.96498247,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":90,"max":99},"biblio":{"volume":"50","issue":"12","first_page":"3225","last_page":"3248"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T12034","display_name":"Digital and Cyber Forensics","score":0.8101999759674072,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T12034","display_name":"Digital and Cyber Forensics","score":0.8101999759674072,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T14484","display_name":"Technology and Data Analysis","score":0.7684999704360962,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10764","display_name":"Privacy-Preserving Technologies in Data","score":0.7595999836921692,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8485603928565979},{"id":"https://openalex.org/keywords/consistency","display_name":"Consistency (knowledge bases)","score":0.6056505441665649},{"id":"https://openalex.org/keywords/code","display_name":"Code (set theory)","score":0.5728294253349304},{"id":"https://openalex.org/keywords/data-consistency","display_name":"Data consistency","score":0.44868409633636475},{"id":"https://openalex.org/keywords/information-privacy","display_name":"Information privacy","score":0.42616742849349976},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.3825277090072632},{"id":"https://openalex.org/keywords/programming-language","display_name":"Programming language","score":0.3709447979927063},{"id":"https://openalex.org/keywords/database","display_name":"Database","score":0.25312936305999756},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.1168111264705658}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8485603928565979},{"id":"https://openalex.org/C2776436953","wikidata":"https://www.wikidata.org/wiki/Q5163215","display_name":"Consistency (knowledge bases)","level":2,"score":0.6056505441665649},{"id":"https://openalex.org/C2776760102","wikidata":"https://www.wikidata.org/wiki/Q5139990","display_name":"Code (set theory)","level":3,"score":0.5728294253349304},{"id":"https://openalex.org/C93361087","wikidata":"https://www.wikidata.org/wiki/Q4426698","display_name":"Data consistency","level":2,"score":0.44868409633636475},{"id":"https://openalex.org/C123201435","wikidata":"https://www.wikidata.org/wiki/Q456632","display_name":"Information privacy","level":2,"score":0.42616742849349976},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.3825277090072632},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.3709447979927063},{"id":"https://openalex.org/C77088390","wikidata":"https://www.wikidata.org/wiki/Q8513","display_name":"Database","level":1,"score":0.25312936305999756},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.1168111264705658},{"id":"https://openalex.org/C177264268","wikidata":"https://www.wikidata.org/wiki/Q1514741","display_name":"Set (abstract data type)","level":2,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/tse.2024.3479288","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tse.2024.3479288","pdf_url":null,"source":{"id":"https://openalex.org/S8351582","display_name":"IEEE Transactions on Software Engineering","issn_l":"0098-5589","issn":["0098-5589","1939-3520","2326-3881"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310320439","host_organization_name":"IEEE Computer Society","host_organization_lineage":["https://openalex.org/P4310320439","https://openalex.org/P4310319808"],"host_organization_lineage_names":["IEEE Computer Society","Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Software Engineering","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[{"score":0.6000000238418579,"display_name":"Peace, Justice and strong institutions","id":"https://metadata.un.org/sdg/16"}],"awards":[{"id":"https://openalex.org/G1259930355","display_name":null,"funder_award_id":"62272377","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G1828253250","display_name":null,"funder_award_id":"62232014","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G4893786199","display_name":null,"funder_award_id":"62372368","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G7749996985","display_name":null,"funder_award_id":"62372367","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"}],"funders":[{"id":"https://openalex.org/F4320321001","display_name":"National Natural Science Foundation of China","ror":"https://ror.org/01h0zpd94"}],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":59,"referenced_works":["https://openalex.org/W1481354592","https://openalex.org/W1965995882","https://openalex.org/W1966862293","https://openalex.org/W2019798206","https://openalex.org/W2032724464","https://openalex.org/W2060692877","https://openalex.org/W2085939020","https://openalex.org/W2113115074","https://openalex.org/W2146717998","https://openalex.org/W2155735696","https://openalex.org/W2159660385","https://openalex.org/W2165304392","https://openalex.org/W2168649891","https://openalex.org/W2376050373","https://openalex.org/W2517394750","https://openalex.org/W2528826491","https://openalex.org/W2547900581","https://openalex.org/W2621177934","https://openalex.org/W2735107741","https://openalex.org/W2791737564","https://openalex.org/W2792746558","https://openalex.org/W2794864670","https://openalex.org/W2795807997","https://openalex.org/W2803054784","https://openalex.org/W2890664869","https://openalex.org/W2904429768","https://openalex.org/W2908464012","https://openalex.org/W2953461273","https://openalex.org/W2963070937","https://openalex.org/W3015693366","https://openalex.org/W3091051094","https://openalex.org/W3097802856","https://openalex.org/W3103666600","https://openalex.org/W3214522776","https://openalex.org/W4237358558","https://openalex.org/W4244726870","https://openalex.org/W4244916588","https://openalex.org/W4245027182","https://openalex.org/W4254194321","https://openalex.org/W4284690649","https://openalex.org/W4292387188","https://openalex.org/W4384302769","https://openalex.org/W4385413429","https://openalex.org/W4385574024","https://openalex.org/W4388483160","https://openalex.org/W6628346335","https://openalex.org/W6628353899","https://openalex.org/W6654557578","https://openalex.org/W6704346317","https://openalex.org/W6738114657","https://openalex.org/W6747772679","https://openalex.org/W6754545200","https://openalex.org/W6766222326","https://openalex.org/W6781783938","https://openalex.org/W6788222877","https://openalex.org/W6795374924","https://openalex.org/W6999986095","https://openalex.org/W7002349083","https://openalex.org/W7062415643"],"related_works":["https://openalex.org/W2386805970","https://openalex.org/W2308026613","https://openalex.org/W2379416403","https://openalex.org/W2901600492","https://openalex.org/W2165253724","https://openalex.org/W1985571776","https://openalex.org/W2769374332","https://openalex.org/W2971748376","https://openalex.org/W2167069786","https://openalex.org/W2749515417"],"abstract_inverted_index":{"Mini-app":[0],"is":[1,64],"an":[2,232],"emerging":[3],"form":[4],"of":[5,75,106,202,220,236],"mobile":[6],"application":[7,94],"that":[8,33],"combines":[9],"web":[10],"technology":[11],"with":[12,214],"native":[13],"capabilities.":[14],"Its":[15],"features,":[16],"e.g.,":[17],"no":[18,23,67],"need":[19],"to":[20,125,149,164,179],"download":[21],"and":[22,60,96,128,157],"installation,":[24],"have":[25,120],"made":[26],"it":[27],"popular":[28],"rapidly.":[29],"However,":[30],"privacy":[31,61,73,169,215],"issues":[32,123,141],"violate":[34],"the":[35,42,50,72,76,89,112,154,206,210,223],"laws":[36],"or":[37],"regulations":[38],"are":[39,84,176],"breeding":[40],"in":[41,55,100,142,209,231],"swiftly":[43],"expanding":[44],"mini-app":[45,77,90],"ecosystem.":[46],"Ensuring":[47],"consistency":[48,119,129,140,182,224],"between":[49],"mini-app's":[51],"data":[52,109,126,146,151,166],"practices":[53,110,152,167],"embedded":[54],"its":[56],"program":[57,155],"code":[58,102,156],"behavior":[59],"policy":[62],"description":[63],"crucial.":[65],"But":[66],"work":[68],"has":[69],"systematically":[70],"investigated":[71],"problem":[74],"before.":[78],"To":[79],"achieve":[80],"this":[81],"purpose,":[82],"there":[83],"two":[85],"main":[86],"challenges.":[87],"Firstly,":[88],"represents":[91],"a":[92,97,135,159,181,191,199],"novel":[93,136],"form,":[95],"deficiency":[98],"exists":[99],"information-sensitive":[101],"analysis":[103,148,201],"tools":[104],"capable":[105],"accurately":[107],"discerning":[108],"from":[111,168,173],"code.":[113],"Secondly,":[114],"previous":[115],"studies":[116],"focusing":[117],"on":[118,190,205],"exhibited":[121],"granularity":[122],"related":[124],"types":[127],"patterns.":[130],"This":[131],"paper":[132],"introduces":[133],"MiniDetector,":[134],"approach":[137],"for":[138],"identifying":[139],"mini-apps.":[143,195],"MiniDetector":[144],"employs":[145],"flow":[147],"pinpoint":[150],"within":[153],"utilizes":[158],"two-stage":[160],"prompt":[161],"engineering":[162],"process":[163],"extract":[165],"policies.":[170,216],"The":[171,184],"results":[172],"both":[174],"analyses":[175],"then":[177],"compared":[178],"establish":[180],"match.":[183],"proposed":[185],"method":[186],"undergoes":[187],"sufficiency":[188],"evaluations":[189],"dataset":[192],"comprising":[193],"70":[194],"Additionally,":[196],"we":[197],"conduct":[198],"comprehensive":[200],"100,000":[203],"mini-apps":[204],"WeChat":[207],"client":[208],"wild,":[211],"extracting":[212],"3,369":[213],"Astonishingly,":[217],"only":[218],"11":[219],"these":[221],"meet":[222],"requirements,":[225],"while":[226],"3,358":[227],"exhibit":[228],"inconsistencies,":[229],"resulting":[230],"alarming":[233],"inconsistency":[234],"rate":[235],"99.7%.":[237]},"counts_by_year":[{"year":2026,"cited_by_count":2},{"year":2025,"cited_by_count":4},{"year":2024,"cited_by_count":2},{"year":2023,"cited_by_count":1}],"updated_date":"2026-04-09T08:11:56.329763","created_date":"2025-10-10T00:00:00"}
