{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,10]],"date-time":"2024-09-10T21:32:35Z","timestamp":1726003955644},"publisher-location":"Cham","reference-count":37,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030017002"},{"type":"electronic","value":"9783030017019"}],"license":[{"start":{"date-parts":[[2018,1,1]],"date-time":"2018-01-01T00:00:00Z","timestamp":1514764800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018]]},"DOI":"10.1007\/978-3-030-01701-9_9","type":"book-chapter","created":{"date-parts":[[2018,12,28]],"date-time":"2018-12-28T12:03:08Z","timestamp":1545998588000},"page":"151-171","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["Automated Identification of Sensitive Data via Flexible User Requirements"],"prefix":"10.1007","author":[{"given":"Ziqi","family":"Yang","sequence":"first","affiliation":[]},{"given":"Zhenkai","family":"Liang","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2018,12,29]]},"reference":[{"key":"9_CR1","doi-asserted-by":"crossref","unstructured":"Avdiienko, V., Kuznetsov, K., Rommelfanger, I., Rau, A., Gorla, A., Zeller, A.: Detecting behavior anomalies in graphical user interfaces. In: Proceedings of the 39th International Conference on Software Engineering Companion (ICSE-C). IEEE (2017)","DOI":"10.1109\/ICSE-C.2017.130"},{"key":"9_CR2","unstructured":"Baccianella, S., Esuli, A., Sebastiani, F.: SentiWordNet 3.0: an enhanced lexical resource for sentiment analysis and opinion mining. In: Proceedings of the 7th International Conference on Language Resources and Evaluation. European Language Resources Association (2010)"},{"key":"9_CR3","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"150","DOI":"10.1007\/978-3-319-11379-1_8","volume-title":"Research in Attacks, Intrusions and Defenses","author":"E Budianto","year":"2014","unstructured":"Budianto, E., Jia, Y., Dong, X., Saxena, P., Liang, Z.: You can\u2019t be me: enabling trusted paths and user sub-origins in web browsers. In: Stavrou, A., Bos, H., Portokalidis, G. (eds.) RAID 2014. LNCS, vol. 8688, pp. 150\u2013171. Springer, Cham (2014). \nhttps:\/\/doi.org\/10.1007\/978-3-319-11379-1_8"},{"key":"9_CR4","doi-asserted-by":"crossref","unstructured":"Bursztein, E., Soman, C., Boneh, D., Mitchell, J.C.: SessionJuggler: secure web login from an untrusted terminal using session hijacking. In: Proceedings of the 21st International Conference on World Wide Web (WWW). ACM (2012)","DOI":"10.1145\/2187836.2187880"},{"key":"9_CR5","unstructured":"CNBC: Driver\u2019s license, credit card numbers: The equifax hack is way worse than consumers knew. \nhttps:\/\/www.cnbc.com\/2018\/02\/12\/the-equifax-hack-is-way-worse-than-consumers-knew.html"},{"key":"9_CR6","first-page":"1","volume":"34","author":"P Cunningham","year":"2007","unstructured":"Cunningham, P., Delany, S.J.: K-nearest neighbour classifiers. Multiple Classif. Syst. 34, 1\u201317 (2007)","journal-title":"Multiple Classif. Syst."},{"key":"9_CR7","unstructured":"Enck, W., et al.: TaintDroid: an information-flow tracking system for realtime privacy monitoring on smartphones. In: Proceedings of the 9th USENIX Conference on Operating Systems Design and Implementation (USENIX OSDI). USENIX Association (2010)"},{"key":"9_CR8","doi-asserted-by":"crossref","unstructured":"Finkel, J.R., Grenager, T., Manning, C.: Incorporating non-local information into information extraction systems by gibbs sampling. In: Proceedings of the 43rd Annual Meeting of the Association for Computational Linguistics (ACL). Association for Computational Linguistics (2005)","DOI":"10.3115\/1219840.1219885"},{"key":"9_CR9","unstructured":"Gabrilovich, E., Markovitch, S.: Computing semantic relatedness using Wikipedia-based explicit semantic analysis. In: Proceedings of the 20th International Joint Conference on Artifical Intelligence (IJCAI). Morgan Kaufmann Publishers Inc. (2007)"},{"key":"9_CR10","unstructured":"Huang, J., et al.: SUPOR: precise and scalable sensitive user input detection for android apps. In: 24th USENIX Security Symposium (USENIX Security). USENIX Association (2015)"},{"key":"9_CR11","volume-title":"Speech and Language Processing","author":"D Jurafsky","year":"2014","unstructured":"Jurafsky, D., Martin, J.H.: Speech and Language Processing, vol. 3. Pearson, London (2014)"},{"key":"9_CR12","unstructured":"Klein, D., Manning, C.D.: Fast exact inference with a factored model for natural language parsing. In: Proceedings of the 15th International Conference on Neural Information Processing Systems (NIPS). MIT Press (2002)"},{"key":"9_CR13","doi-asserted-by":"crossref","unstructured":"Kong, D., Cen, L., Jin, H.: AUTOREB: automatically understanding the review-to-behavior fidelity in android applications. In: Proceedings of the 22nd Conference on Computer and Communications Security (CCS). ACM (2015)","DOI":"10.1145\/2810103.2813689"},{"key":"9_CR14","unstructured":"LDC: English gigaword fifth edition. \nhttps:\/\/catalog.ldc.upenn.edu\/LDC2011T07"},{"key":"9_CR15","doi-asserted-by":"crossref","unstructured":"Li, X., Hu, H., Bai, G., Jia, Y., Liang, Z., Saxena, P.: DroidVault: a trusted data vault for android devices. In: Proceedings of the 19th International Conference on Engineering of Complex Computer Systems (ICECCS). IEEE (2014)","DOI":"10.1109\/ICECCS.2014.13"},{"key":"9_CR16","doi-asserted-by":"crossref","unstructured":"Liao, X., Yuan, K., Wang, X., Li, Z., Xing, L., Beyah, R.: Acing the IOC game: toward automatic discovery and analysis of open-source cyber threat intelligence. In: Proceedings of Conference on Computer and Communications Security (CCS). ACM (2016)","DOI":"10.1145\/2976749.2978315"},{"key":"9_CR17","doi-asserted-by":"crossref","unstructured":"Lu, K., et al.: Checking more and alerting less: detecting privacy leakages via enhanced data-flow analysis and peer voting. In: Proceedings of the Network and Distributed System Security Symposium (NDSS) (2015)","DOI":"10.14722\/ndss.2015.23287"},{"key":"9_CR18","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"88","DOI":"10.1007\/978-3-540-77366-5_11","volume-title":"Financial Cryptography and Data Security","author":"M Mannan","year":"2007","unstructured":"Mannan, M., van Oorschot, P.C.: Using a personal device to strengthen password authentication from an untrusted computer. In: Dietrich, S., Dhamija, R. (eds.) FC 2007. LNCS, vol. 4886, pp. 88\u2013103. Springer, Heidelberg (2007). \nhttps:\/\/doi.org\/10.1007\/978-3-540-77366-5_11"},{"key":"9_CR19","unstructured":"Manning, C.D., Surdeanu, M., Bauer, J., Finkel, J., Bethard, S.J., McClosky, D.: The Stanford CoreNLP natural language processing toolkit. In: Association for Computational Linguistics (ACL) System Demonstrations, pp. 55\u201360 (2014). \nhttp:\/\/www.aclweb.org\/anthology\/P\/P14\/P14-5010"},{"key":"9_CR20","unstructured":"Mikolov, T., Sutskever, I., Chen, K., Corrado, G., Dean, J.: Distributed representations of words and phrases and their compositionality. In: Proceedings of the 26th International Conference on Neural Information Processing Systems (NIPS). Curran Associates Inc. (2013)"},{"key":"9_CR21","unstructured":"Nan, Y., Yang, M., Yang, Z., Zhou, S., Gu, G., Wang, X.: UIPicker: user-input privacy identification in mobile applications. In: Proceedings of the 24th USENIX Security Symposium (USENIX Security). USENIX Association (2015)"},{"key":"9_CR22","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-76917-0","volume-title":"Advanced Data Mining Techniques","author":"DL Olson","year":"2008","unstructured":"Olson, D.L., Delen, D.: Advanced Data Mining Techniques. Springer, Heidelberg (2008). \nhttps:\/\/doi.org\/10.1007\/978-3-540-76917-0"},{"key":"9_CR23","doi-asserted-by":"crossref","unstructured":"Oprea, A., Balfanz, D., Durfee, G., Smetters, D.K.: Securing a remote terminal application with a mobile trusted device. In: Proceedings of the 20th Annual Computer Security Applications Conference (ACSAC). IEEE (2004)","DOI":"10.1109\/CSAC.2004.33"},{"key":"9_CR24","unstructured":"Pandita, R., Xiao, X., Yang, W., Enck, W., Xie, T.: WHYPER: towards automating risk assessment of mobile applications. In: Proceedings of the 22nd USENIX Security Symposium (USENIX Security). USENIX Association (2013)"},{"key":"9_CR25","doi-asserted-by":"crossref","unstructured":"Pennington, J., Socher, R., Manning, C.D.: GloVe: global vectors for word representation. In: Empirical Methods in Natural Language Processing (EMNLP) (2014)","DOI":"10.3115\/v1\/D14-1162"},{"key":"9_CR26","doi-asserted-by":"crossref","unstructured":"Qu, Z., Rastogi, V., Zhang, X., Chen, Y., Zhu, T., Chen, Z.: AutoCog: measuring the description-to-permission fidelity in android applications. In: Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security (CCS). ACM (2014)","DOI":"10.1145\/2660267.2660287"},{"key":"9_CR27","doi-asserted-by":"crossref","unstructured":"Rastogi, V., Chen, Y., Enck, W.: AppsPlayground: automatic security analysis of smartphone applications. In: Proceedings of the 3rd ACM Conference on Data and Application Security and Privacy. ACM (2013)","DOI":"10.1145\/2435349.2435379"},{"key":"9_CR28","unstructured":"Roalter, L., Kranz, M., Diewald, S., M\u00f6ller, A., Synnes, K.: The smartphone as mobile authorization proxy. In: Proceedings of the 14th International Conference on Computer Aided Systems Theory (EUROCAST), pp. 306\u2013307 (2013)"},{"key":"9_CR29","doi-asserted-by":"crossref","unstructured":"Sharp, R., Madhavapeddy, A., Want, R., Pering, T.: Enhancing web browsing security on public terminals using mobile composition. In: Proceedings of the 6th International Conference on Mobile Systems, Applications, and Services (MobiSys). ACM (2008)","DOI":"10.1145\/1378600.1378612"},{"key":"9_CR30","unstructured":"Socher, R., et al.: Recursive deep models for semantic compositionality over a sentiment treebank. In: Proceedings of the Conference on Empirical Methods in Natural Language Processing (EMNLP) (2013)"},{"key":"9_CR31","unstructured":"Steinbach, M., Karypis, G., Kumar, V., et al.: A comparison of document clustering techniques. In: KDD Workshop on Text Mining, Boston, vol. 400, pp. 525\u2013526 (2000)"},{"key":"9_CR32","doi-asserted-by":"crossref","unstructured":"Toutanova, K., Klein, D., Manning, C.D., Singer, Y.: Feature-rich part-of-speech tagging with a cyclic dependency network. In: Proceedings of the 2003 Conference of the North American Chapter of the Association for Computational Linguistics on Human Language Technology (NAACL). Association for Computational Linguistics (2003)","DOI":"10.3115\/1073445.1073478"},{"key":"9_CR33","unstructured":"Wikipedia: Yahoo! data breaches. \nhttps:\/\/en.wikipedia.org\/wiki\/Yahoo!_data_breaches"},{"key":"9_CR34","doi-asserted-by":"crossref","unstructured":"Xu, J., Croft, W.B.: Query expansion using local and global document analysis. In: Proceedings of the 19th Annual International ACM SIGIR Conference on Research and Development in Information Retrieval (SIGIR). ACM (1996)","DOI":"10.1145\/243199.243202"},{"key":"9_CR35","doi-asserted-by":"crossref","unstructured":"Yu, L., Luo, X., Qian, C., Wang, S.: Revisiting the description-to-behavior fidelity in android applications. In: Proceedings of the 23rd International Conference on Software Analysis, Evolution, and Reengineering (SANER). IEEE (2016)","DOI":"10.1109\/SANER.2016.67"},{"key":"9_CR36","unstructured":"Zhou, Y., Jiang, X.: Detecting passive content leaks and pollution in android applications. In: Proceedings of the 20th Network and Distributed System Security Symposium (NDSS) (2013)"},{"key":"9_CR37","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"60","DOI":"10.1007\/978-3-642-23822-2_4","volume-title":"Computer Security \u2013 ESORICS 2011","author":"Y Zhou","year":"2011","unstructured":"Zhou, Y., Evans, D.: Protecting private web content from embedded scripts. In: Atluri, V., Diaz, C. (eds.) ESORICS 2011. LNCS, vol. 6879, pp. 60\u201379. Springer, Heidelberg (2011). \nhttps:\/\/doi.org\/10.1007\/978-3-642-23822-2_4"}],"container-title":["Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering","Security and Privacy in Communication Networks"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-01701-9_9","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2018,12,28]],"date-time":"2018-12-28T12:07:51Z","timestamp":1545998871000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-030-01701-9_9"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018]]},"ISBN":["9783030017002","9783030017019"],"references-count":37,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-01701-9_9","relation":{},"ISSN":["1867-8211","1867-822X"],"issn-type":[{"type":"print","value":"1867-8211"},{"type":"electronic","value":"1867-822X"}],"subject":[],"published":{"date-parts":[[2018]]},"assertion":[{"value":"SecureComm","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Security and Privacy in Communication Systems","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Singapore","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Singapore","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2018","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"8 August 2018","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"10 August 2018","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"securecomm2018","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/securecomm.org\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}