{"id":"https://openalex.org/W2884516187","doi":"https://doi.org/10.1145/3196398.3196412","title":"Why are Android apps removed from Google Play?","display_name":"Why are Android apps removed from Google Play?","publication_year":2018,"publication_date":"2018-05-28","ids":{"openalex":"https://openalex.org/W2884516187","doi":"https://doi.org/10.1145/3196398.3196412","mag":"2884516187"},"language":"en","primary_location":{"id":"doi:10.1145/3196398.3196412","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3196398.3196412","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 15th International Conference on Mining Software Repositories","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5100719795","display_name":"Haoyu Wang","orcid":"https://orcid.org/0000-0002-4871-5334"},"institutions":[{"id":"https://openalex.org/I139759216","display_name":"Beijing University of Posts and Telecommunications","ror":"https://ror.org/04w9fbh59","country_code":"CN","type":"education","lineage":["https://openalex.org/I139759216"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Haoyu Wang","raw_affiliation_strings":["Beijing University of Posts and Telecommunications, China and Beijing Key Laboratory of Intelligent Telecommunication Software and Multimedia, China"],"affiliations":[{"raw_affiliation_string":"Beijing University of Posts and Telecommunications, China and Beijing Key Laboratory of Intelligent Telecommunication Software and Multimedia, China","institution_ids":["https://openalex.org/I139759216"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5028635734","display_name":"Hao Li","orcid":"https://orcid.org/0000-0001-8776-6911"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Hao Li","raw_affiliation_strings":["OrangeApk, China"],"affiliations":[{"raw_affiliation_string":"OrangeApk, China","institution_ids":[]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5106407830","display_name":"Li Li","orcid":"https://orcid.org/0000-0003-2990-1614"},"institutions":[{"id":"https://openalex.org/I56590836","display_name":"Monash University","ror":"https://ror.org/02bfwt286","country_code":"AU","type":"education","lineage":["https://openalex.org/I56590836"]}],"countries":["AU"],"is_corresponding":false,"raw_author_name":"Li Li","raw_affiliation_strings":["Monash University, Australia"],"affiliations":[{"raw_affiliation_string":"Monash University, Australia","institution_ids":["https://openalex.org/I56590836"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5021450973","display_name":"Yao Guo","orcid":"https://orcid.org/0000-0001-5064-5286"},"institutions":[{"id":"https://openalex.org/I20231570","display_name":"Peking University","ror":"https://ror.org/02v51f717","country_code":"CN","type":"education","lineage":["https://openalex.org/I20231570"]},{"id":"https://openalex.org/I4210128818","display_name":"Institute of Software","ror":"https://ror.org/033dfsn42","country_code":"CN","type":"facility","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210128818"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Yao Guo","raw_affiliation_strings":["Peking University, China and Key Laboratory of High-Confidence Software Technologies (Ministry of Education), China"],"affiliations":[{"raw_affiliation_string":"Peking University, China and Key Laboratory of High-Confidence Software Technologies (Ministry of Education), China","institution_ids":["https://openalex.org/I4210128818","https://openalex.org/I20231570"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5102002679","display_name":"Guoai Xu","orcid":"https://orcid.org/0000-0002-9582-0698"},"institutions":[{"id":"https://openalex.org/I139759216","display_name":"Beijing University of Posts and Telecommunications","ror":"https://ror.org/04w9fbh59","country_code":"CN","type":"education","lineage":["https://openalex.org/I139759216"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Guoai Xu","raw_affiliation_strings":["Beijing University of Posts and Telecommunications, China"],"affiliations":[{"raw_affiliation_string":"Beijing University of Posts and Telecommunications, China","institution_ids":["https://openalex.org/I139759216"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":5,"corresponding_author_ids":["https://openalex.org/A5100719795"],"corresponding_institution_ids":["https://openalex.org/I139759216"],"apc_list":null,"apc_paid":null,"fwci":8.5874,"has_fulltext":false,"cited_by_count":63,"citation_normalized_percentile":{"value":0.98461844,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":89,"max":100},"biblio":{"volume":null,"issue":null,"first_page":"231","last_page":"242"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9872000217437744,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11644","display_name":"Spam and Phishing Detection","score":0.9868999719619751,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/android","display_name":"Android (operating system)","score":0.7752543687820435},{"id":"https://openalex.org/keywords/app-store","display_name":"App store","score":0.7460417747497559},{"id":"https://openalex.org/keywords/malware","display_name":"Malware","score":0.6671349406242371},{"id":"https://openalex.org/keywords/world-wide-web","display_name":"World Wide Web","score":0.6408421993255615},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.6360089778900146},{"id":"https://openalex.org/keywords/trustworthiness","display_name":"Trustworthiness","score":0.5965931415557861},{"id":"https://openalex.org/keywords/mobile-apps","display_name":"Mobile apps","score":0.5789910554885864},{"id":"https://openalex.org/keywords/internet-privacy","display_name":"Internet privacy","score":0.5372037887573242},{"id":"https://openalex.org/keywords/smartphone-app","display_name":"Smartphone app","score":0.5121057033538818},{"id":"https://openalex.org/keywords/android-app","display_name":"Android app","score":0.47761934995651245},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.25054335594177246},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.0719984769821167}],"concepts":[{"id":"https://openalex.org/C557433098","wikidata":"https://www.wikidata.org/wiki/Q94","display_name":"Android (operating system)","level":2,"score":0.7752543687820435},{"id":"https://openalex.org/C2779794324","wikidata":"https://www.wikidata.org/wiki/Q3814081","display_name":"App store","level":2,"score":0.7460417747497559},{"id":"https://openalex.org/C541664917","wikidata":"https://www.wikidata.org/wiki/Q14001","display_name":"Malware","level":2,"score":0.6671349406242371},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.6408421993255615},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6360089778900146},{"id":"https://openalex.org/C153701036","wikidata":"https://www.wikidata.org/wiki/Q659974","display_name":"Trustworthiness","level":2,"score":0.5965931415557861},{"id":"https://openalex.org/C2988145974","wikidata":"https://www.wikidata.org/wiki/Q620615","display_name":"Mobile apps","level":2,"score":0.5789910554885864},{"id":"https://openalex.org/C108827166","wikidata":"https://www.wikidata.org/wiki/Q175975","display_name":"Internet privacy","level":1,"score":0.5372037887573242},{"id":"https://openalex.org/C3017619522","wikidata":"https://www.wikidata.org/wiki/Q620615","display_name":"Smartphone app","level":2,"score":0.5121057033538818},{"id":"https://openalex.org/C2988045736","wikidata":"https://www.wikidata.org/wiki/Q94","display_name":"Android app","level":3,"score":0.47761934995651245},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.25054335594177246},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.0719984769821167}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1145/3196398.3196412","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3196398.3196412","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 15th International Conference on Mining Software Repositories","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":40,"referenced_works":["https://openalex.org/W79696261","https://openalex.org/W799327109","https://openalex.org/W1449208847","https://openalex.org/W1535984709","https://openalex.org/W1976596267","https://openalex.org/W1998862130","https://openalex.org/W2019798206","https://openalex.org/W2077202047","https://openalex.org/W2088479623","https://openalex.org/W2122672392","https://openalex.org/W2125011234","https://openalex.org/W2136649349","https://openalex.org/W2140095007","https://openalex.org/W2141554582","https://openalex.org/W2166743230","https://openalex.org/W2254062603","https://openalex.org/W2286924183","https://openalex.org/W2292487094","https://openalex.org/W2304458857","https://openalex.org/W2343325785","https://openalex.org/W2399891510","https://openalex.org/W2400269587","https://openalex.org/W2514488523","https://openalex.org/W2572070369","https://openalex.org/W2593054802","https://openalex.org/W2593474785","https://openalex.org/W2597857713","https://openalex.org/W2605037362","https://openalex.org/W2605225222","https://openalex.org/W2620844046","https://openalex.org/W2621207633","https://openalex.org/W2725004715","https://openalex.org/W2734721836","https://openalex.org/W2740060156","https://openalex.org/W2775172862","https://openalex.org/W2785871300","https://openalex.org/W2809601656","https://openalex.org/W2999585024","https://openalex.org/W4244726870","https://openalex.org/W4299301436"],"related_works":["https://openalex.org/W3142571737","https://openalex.org/W2890710341","https://openalex.org/W785354139","https://openalex.org/W2605037362","https://openalex.org/W2938393566","https://openalex.org/W3173766926","https://openalex.org/W3044207086","https://openalex.org/W2493732476","https://openalex.org/W4396661046","https://openalex.org/W3035615288"],"abstract_inverted_index":{"To":[0,108],"ensure":[1],"the":[2,7,50,69,90,102,114],"quality":[3],"and":[4,136,159],"trustworthiness":[5],"of":[6,21,52,67,93,104,169],"apps":[8,31,54,70,121],"within":[9],"its":[10],"app":[11,25,137,143,148],"market":[12,134],"(i.e.,":[13],"Google":[14,16,41,77,125,152],"Play),":[15],"has":[17],"released":[18],"a":[19,28,80,141,167],"series":[20],"policies":[22],"to":[23,86,117],"regulate":[24],"developers.":[26],"As":[27],"result,":[29],"policy-violating":[30],"(e.g.,":[32],"malware,":[33],"low-quality":[34],"apps,":[35,95,173],"etc.)":[36],"have":[37,47,62,71,165,185],"been":[38,72],"removed":[39,53,73,94,106,123,172],"by":[40],"Play":[42,78,153],"periodically.":[43],"In":[44],"reality,":[45],"we":[46,61,164],"found":[48],"that":[49],"number":[51,92],"are":[55,97,122,175],"actually":[56],"much":[57],"more":[58],"than":[59],"what":[60],"expected,":[63],"as":[64,190,192],"almost":[65,98],"half":[66],"all":[68],"or":[74],"replaced":[75],"from":[76,84,124,151],"during":[79],"two":[81,147],"year":[82],"period":[83],"2015":[85,155],"2017.":[87],"However,":[88],"despite":[89],"significant":[91],"there":[96],"no":[99],"study":[100],"on":[101],"characterization":[103],"these":[105],"apps.":[107],"this":[109,111],"end,":[110],"paper":[112],"takes":[113],"first":[115],"step":[116],"understand":[118],"why":[119],"Android":[120],"Play,":[126],"aiming":[127],"at":[128],"observing":[129],"promising":[130],"insights":[131,193],"for":[132,194],"both":[133],"maintainers":[135],"developers":[138],"towards":[139],"building":[140],"better":[142],"ecosystem.":[144],"By":[145],"leveraging":[146],"sets":[149],"crawled":[150],"in":[154,179],"(over":[156,161],"1.5":[157],"million)":[158],"2017":[160],"2.1":[162],"million),":[163],"identified":[166],"set":[168],"over":[170],"790K":[171],"which":[174],"then":[176],"thoroughly":[177],"investigated":[178],"various":[180,187],"aspects.":[181],"The":[182],"experimental":[183],"results":[184],"revealed":[186],"interesting":[188],"findings,":[189],"well":[191],"future":[195],"research":[196],"directions.":[197]},"counts_by_year":[{"year":2025,"cited_by_count":1},{"year":2024,"cited_by_count":3},{"year":2023,"cited_by_count":1},{"year":2022,"cited_by_count":6},{"year":2021,"cited_by_count":15},{"year":2020,"cited_by_count":14},{"year":2019,"cited_by_count":14},{"year":2018,"cited_by_count":9}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
