{"id":"https://openalex.org/W3039179582","doi":"https://doi.org/10.1587/transfun.2019eap1128","title":"Contextual Integrity Based Android Privacy Data Protection System","display_name":"Contextual Integrity Based Android Privacy Data Protection System","publication_year":2020,"publication_date":"2020-06-30","ids":{"openalex":"https://openalex.org/W3039179582","doi":"https://doi.org/10.1587/transfun.2019eap1128","mag":"3039179582"},"language":"en","primary_location":{"id":"doi:10.1587/transfun.2019eap1128","is_oa":false,"landing_page_url":"https://doi.org/10.1587/transfun.2019eap1128","pdf_url":null,"source":{"id":"https://openalex.org/S166990724","display_name":"IEICE Transactions on Fundamentals of Electronics Communications and Computer Sciences","issn_l":"0916-8508","issn":["0916-8508","1745-1337"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4320800604","host_organization_name":"Institute of Electronics, Information and Communication Engineers","host_organization_lineage":["https://openalex.org/P4320800604"],"host_organization_lineage_names":["Institute of Electronics, Information and Communication Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5100676495","display_name":"Fan Wu","orcid":"https://orcid.org/0000-0002-1286-7141"},"institutions":[{"id":"https://openalex.org/I139759216","display_name":"Beijing University of Posts and Telecommunications","ror":"https://ror.org/04w9fbh59","country_code":"CN","type":"education","lineage":["https://openalex.org/I139759216"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Fan WU","raw_affiliation_strings":["Beijing University of Posts and Telecommunications"],"affiliations":[{"raw_affiliation_string":"Beijing University of Posts and Telecommunications","institution_ids":["https://openalex.org/I139759216"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5073058503","display_name":"Li He","orcid":"https://orcid.org/0000-0002-6681-0933"},"institutions":[{"id":"https://openalex.org/I139759216","display_name":"Beijing University of Posts and Telecommunications","ror":"https://ror.org/04w9fbh59","country_code":"CN","type":"education","lineage":["https://openalex.org/I139759216"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"He LI","raw_affiliation_strings":["Beijing University of Posts and Telecommunications"],"affiliations":[{"raw_affiliation_string":"Beijing University of Posts and Telecommunications","institution_ids":["https://openalex.org/I139759216"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5065601551","display_name":"Wenhao Fan","orcid":"https://orcid.org/0000-0001-5288-8708"},"institutions":[{"id":"https://openalex.org/I139759216","display_name":"Beijing University of Posts and Telecommunications","ror":"https://ror.org/04w9fbh59","country_code":"CN","type":"education","lineage":["https://openalex.org/I139759216"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Wenhao FAN","raw_affiliation_strings":["Beijing University of Posts and Telecommunications"],"affiliations":[{"raw_affiliation_string":"Beijing University of Posts and Telecommunications","institution_ids":["https://openalex.org/I139759216"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5102968225","display_name":"Bihua Tang","orcid":"https://orcid.org/0009-0005-3588-0671"},"institutions":[{"id":"https://openalex.org/I139759216","display_name":"Beijing University of Posts and Telecommunications","ror":"https://ror.org/04w9fbh59","country_code":"CN","type":"education","lineage":["https://openalex.org/I139759216"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Bihua TANG","raw_affiliation_strings":["Beijing University of Posts and Telecommunications"],"affiliations":[{"raw_affiliation_string":"Beijing University of Posts and Telecommunications","institution_ids":["https://openalex.org/I139759216"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5020422392","display_name":"Yuanan Liu","orcid":"https://orcid.org/0000-0002-8076-1904"},"institutions":[{"id":"https://openalex.org/I139759216","display_name":"Beijing University of Posts and Telecommunications","ror":"https://ror.org/04w9fbh59","country_code":"CN","type":"education","lineage":["https://openalex.org/I139759216"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Yuanan LIU","raw_affiliation_strings":["Beijing University of Posts and Telecommunications"],"affiliations":[{"raw_affiliation_string":"Beijing University of Posts and Telecommunications","institution_ids":["https://openalex.org/I139759216"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":5,"corresponding_author_ids":["https://openalex.org/A5100676495"],"corresponding_institution_ids":["https://openalex.org/I139759216"],"apc_list":null,"apc_paid":null,"fwci":0.1515,"has_fulltext":false,"cited_by_count":1,"citation_normalized_percentile":{"value":0.41909151,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":94},"biblio":{"volume":"E103.A","issue":"7","first_page":"906","last_page":"916"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12034","display_name":"Digital and Cyber Forensics","score":0.9976999759674072,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9921000003814697,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/android","display_name":"Android (operating system)","score":0.8564561605453491},{"id":"https://openalex.org/keywords/permission","display_name":"Permission","score":0.7725172638893127},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7179368734359741},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.5213916897773743},{"id":"https://openalex.org/keywords/porting","display_name":"Porting","score":0.44489002227783203},{"id":"https://openalex.org/keywords/information-privacy","display_name":"Information privacy","score":0.44234901666641235},{"id":"https://openalex.org/keywords/privacy-protection","display_name":"Privacy protection","score":0.43156522512435913},{"id":"https://openalex.org/keywords/information-sensitivity","display_name":"Information sensitivity","score":0.4276975989341736},{"id":"https://openalex.org/keywords/cloud-computing","display_name":"Cloud computing","score":0.41188016533851624},{"id":"https://openalex.org/keywords/internet-privacy","display_name":"Internet privacy","score":0.3402314782142639},{"id":"https://openalex.org/keywords/software","display_name":"Software","score":0.09906253218650818},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.09142273664474487}],"concepts":[{"id":"https://openalex.org/C557433098","wikidata":"https://www.wikidata.org/wiki/Q94","display_name":"Android (operating system)","level":2,"score":0.8564561605453491},{"id":"https://openalex.org/C2779089604","wikidata":"https://www.wikidata.org/wiki/Q7169333","display_name":"Permission","level":2,"score":0.7725172638893127},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7179368734359741},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.5213916897773743},{"id":"https://openalex.org/C106251023","wikidata":"https://www.wikidata.org/wiki/Q851989","display_name":"Porting","level":3,"score":0.44489002227783203},{"id":"https://openalex.org/C123201435","wikidata":"https://www.wikidata.org/wiki/Q456632","display_name":"Information privacy","level":2,"score":0.44234901666641235},{"id":"https://openalex.org/C3017597292","wikidata":"https://www.wikidata.org/wiki/Q25052250","display_name":"Privacy protection","level":2,"score":0.43156522512435913},{"id":"https://openalex.org/C137822555","wikidata":"https://www.wikidata.org/wiki/Q2587068","display_name":"Information sensitivity","level":2,"score":0.4276975989341736},{"id":"https://openalex.org/C79974875","wikidata":"https://www.wikidata.org/wiki/Q483639","display_name":"Cloud computing","level":2,"score":0.41188016533851624},{"id":"https://openalex.org/C108827166","wikidata":"https://www.wikidata.org/wiki/Q175975","display_name":"Internet privacy","level":1,"score":0.3402314782142639},{"id":"https://openalex.org/C2777904410","wikidata":"https://www.wikidata.org/wiki/Q7397","display_name":"Software","level":2,"score":0.09906253218650818},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.09142273664474487},{"id":"https://openalex.org/C199539241","wikidata":"https://www.wikidata.org/wiki/Q7748","display_name":"Law","level":1,"score":0.0},{"id":"https://openalex.org/C17744445","wikidata":"https://www.wikidata.org/wiki/Q36442","display_name":"Political science","level":0,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1587/transfun.2019eap1128","is_oa":false,"landing_page_url":"https://doi.org/10.1587/transfun.2019eap1128","pdf_url":null,"source":{"id":"https://openalex.org/S166990724","display_name":"IEICE Transactions on Fundamentals of Electronics Communications and Computer Sciences","issn_l":"0916-8508","issn":["0916-8508","1745-1337"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4320800604","host_organization_name":"Institute of Electronics, Information and Communication Engineers","host_organization_lineage":["https://openalex.org/P4320800604"],"host_organization_lineage_names":["Institute of Electronics, Information and Communication Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":19,"referenced_works":["https://openalex.org/W794140516","https://openalex.org/W1438616768","https://openalex.org/W1614685846","https://openalex.org/W1978762841","https://openalex.org/W2066266646","https://openalex.org/W2104359975","https://openalex.org/W2105412867","https://openalex.org/W2122672392","https://openalex.org/W2171389360","https://openalex.org/W2185590857","https://openalex.org/W2487124337","https://openalex.org/W2604458809","https://openalex.org/W2604764484","https://openalex.org/W2766670511","https://openalex.org/W2792310543","https://openalex.org/W2805971087","https://openalex.org/W2888971993","https://openalex.org/W3125057561","https://openalex.org/W3126144215"],"related_works":["https://openalex.org/W3022534164","https://openalex.org/W2928666135","https://openalex.org/W3134446890","https://openalex.org/W3046095319","https://openalex.org/W3197497514","https://openalex.org/W1591172238","https://openalex.org/W2111194702","https://openalex.org/W2972172135","https://openalex.org/W1787552957","https://openalex.org/W315296216"],"abstract_inverted_index":{"Android":[0,30,62,94],"occupies":[1],"a":[2,55,86,98,144],"very":[3],"large":[4],"market":[5],"share":[6],"in":[7,34],"the":[8,65,73,79,104,116,125,135,150,153,158,177,186,198,218],"field":[9],"of":[10,15,67,75,81,89,109,119,127,138,152,188,197],"mobile":[11],"devices,":[12],"and":[13,39,96,113,130,179,212],"quantities":[14],"applications":[16],"are":[17],"created":[18],"everyday":[19],"allowing":[20],"users":[21],"to":[22,37,57,78,123,142,193],"easily":[23],"use":[24],"them.":[25],"However,":[26],"privacy":[27,47,59,68,82,99,132],"leaks":[28],"on":[29,61,103,157],"terminals":[31,63],"may":[32],"result":[33],"serious":[35],"losses":[36],"businesses":[38],"individuals.":[40],"Current":[41],"permission":[42,161],"model":[43,88,146],"cannot":[44],"effectively":[45],"prevent":[46],"data":[48,60,206,210],"leakage.":[49],"In":[50],"this":[51],"paper,":[52],"we":[53,175],"find":[54],"way":[56],"protect":[58],"from":[64],"perspective":[66],"information":[69],"propagation":[70],"by":[71,172],"porting":[72],"concept":[74],"contextual":[76,90,169,219],"integrity":[77,91],"realm":[80],"protection.":[83],"We":[84],"propose":[85],"computational":[87],"suiting":[92],"for":[93],"platform":[95],"design":[97],"protection":[100],"system":[101,107,178,200],"based":[102],"model.":[105],"The":[106,195],"consists":[108],"an":[110],"online":[111,120],"phase":[112,121,140],"offline":[114,139,189],"phase;":[115],"main":[117,136],"function":[118,137],"is":[122,141],"computing":[124],"value":[126,151],"distribution":[128],"norm":[129],"making":[131],"decisions,":[133],"while":[134],"create":[143],"classification":[145],"that":[147,185,203],"can":[148],"calculate":[149],"appropriateness":[154],"norm.":[155],"Based":[156],"6":[159],"million":[160,167],"requests":[162,211,215],"records":[163,170],"along":[164],"with":[165],"2.3":[166],"runtime":[168],"collected":[171],"dynamic":[173],"analysis,":[174],"build":[176],"verify":[180],"its":[181],"feasibility.":[182],"Experiment":[183],"shows":[184],"accuracy":[187],"classifier":[190],"reaches":[191],"up":[192],"0.94.":[194],"experiment":[196],"overall":[199],"feasibility":[201],"illustrates":[202],"70%":[204],"location":[205],"requests,":[207],"84%":[208],"phone":[209],"46%":[213],"storage":[214],"etc.,":[216],"violate":[217],"integrity.":[220]},"counts_by_year":[{"year":2023,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
