{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,4,3]],"date-time":"2024-04-03T06:30:26Z","timestamp":1712125826860},"reference-count":25,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"4","license":[{"start":{"date-parts":[[2016,12,1]],"date-time":"2016-12-01T00:00:00Z","timestamp":1480550400000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["J. Commun. Inf. Netw."],"published-print":{"date-parts":[[2016,12]]},"DOI":"10.1007\/bf03391577","type":"journal-article","created":{"date-parts":[[2017,4,28]],"date-time":"2017-04-28T08:21:51Z","timestamp":1493367711000},"page":"22-32","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":4,"title":["Towards privacy-preserving user targeting"],"prefix":"10.23919","volume":"1","author":[{"given":"Jinghua","family":"Jiang","sequence":"first","affiliation":[]},{"given":"Yifeng","family":"Zheng","sequence":"additional","affiliation":[]},{"given":"Zhenkui","family":"Shi","sequence":"additional","affiliation":[]},{"given":"Jing","family":"Yao","sequence":"additional","affiliation":[]},{"given":"Cong","family":"Wang","sequence":"additional","affiliation":[]},{"given":"Xiaolin","family":"Gui","sequence":"additional","affiliation":[]}],"member":"263","published-online":{"date-parts":[[2017,4,27]]},"reference":[{"key":"BF03391577_CR1","unstructured":"BEALES H. The value of behavioral targeting[EB\/OL]. \n                    http:\/\/www.networkadvertising.org\n                    \n                  \/pdfs\/Beales_NAI_Study.pdf"},{"key":"BF03391577_CR2","first-page":"94","volume-title":"PiCoDa: privacy-preserving smart coupon delivery architecture[C]","author":"K Partridge","year":"2012","unstructured":"PARTRIDGE K, PATHAK M A, UZUN E, et al. PiCoDa: privacy-preserving smart coupon delivery architecture[C]\/\/The 5th Workshop on Hot Topics in Privacy Enhancing Technologies, Vigo, Spain, 2012: 94\u2013108."},{"key":"BF03391577_CR3","first-page":"31","volume-title":"A fuzzy commitment approach to privacy preserving behavioral targeting[C]","author":"S Rane","year":"2014","unstructured":"RANE S, UZUN E. A fuzzy commitment approach to privacy preserving behavioral targeting[C]\/\/The ACM MobiCom Workshop on Security and Privacy in Mobile Environments, Maui, USA, 2014: 31\u201335."},{"key":"BF03391577_CR4","first-page":"257","volume-title":"ObliviAd: provably secure and practical online behavioral advertising[C]","author":"M Backes","year":"2012","unstructured":"BACKES M, KATE A, MAFFEI M, et al. ObliviAd: provably secure and practical online behavioral advertising[C]\/\/IEEE Symposium on Security and Privacy, San Francisco, USA, 2012: 257\u2013271."},{"key":"BF03391577_CR5","first-page":"169","volume-title":"Privad: practical privacy in online advertising[C]","author":"S Guha","year":"2011","unstructured":"GUHA S, CHENG B, FRANCIS P. Privad: practical privacy in online advertising[C]\/\/The 8th USENIX conference on Networked systems design and implementation, Boston, USA, 2011: 169\u2013182."},{"key":"BF03391577_CR6","first-page":"59","volume-title":"MAdScope: characterizing mobile In-App targeted Ads[C]","author":"S Nath","year":"2015","unstructured":"NATH S. MAdScope: characterizing mobile In-App targeted Ads[C]\/\/The 13th Annual International Conference on Mobile Systems, Applications, and Services, Florence, Italy, 2015: 59\u201373."},{"key":"BF03391577_CR7","first-page":"408","volume-title":"Targeted advertising and privacy Too[C]","author":"A Juels","year":"2001","unstructured":"JUELS A. Targeted advertising and privacy Too[C]\/\/Cryptographer\u2019s Track the RSA Conference, San Francisco, USA, 2001: 408\u2013424."},{"key":"BF03391577_CR8","volume-title":"Adnostic: privacy preserving targeted advertising[C]","author":"V Toubiana","year":"2010","unstructured":"TOUBIANA V, NARAYANAN A, BONEH D, et al. Adnostic: privacy preserving targeted advertising[C]\/\/The Network and Distributed System Security Symposium, San Diego, USA, 2010."},{"key":"BF03391577_CR9","first-page":"662","volume-title":"Privacy-aware personalization for mobile advertising[C]","author":"M Hardt","year":"2012","unstructured":"HARDT M, NATH S. Privacy-aware personalization for mobile advertising[C]\/\/The 19th ACM Conference on Computer and Communications Security, Raleigh, USA, 2012: 662\u2013673."},{"key":"BF03391577_CR10","first-page":"79","volume-title":"Towards secure and practical targeted mobile advertising[C]","author":"J Jiang","year":"2015","unstructured":"JIANG J, GUI X, SHI Z, et al. Towards secure and practical targeted mobile advertising[C]\/\/The 11th International Conference on Mobile Ad-hoc and Sensor Networks, Shenzhen, 2015: 79\u201388."},{"key":"BF03391577_CR11","first-page":"125","volume-title":"CAMEO: a middleware for mobile advertisement delivery[C]","author":"A J Khan","year":"2013","unstructured":"KHAN A J, JAYARAJAH K, HAN D, et al. CAMEO: a middleware for mobile advertisement delivery[C]\/\/The 11th Annual International Conference on Mobile Systems, Applications, and Services, Taipei, China, 2013: 125\u2013138."},{"key":"BF03391577_CR12","first-page":"2237","volume-title":"Effective ad targeting with concealed profiles[C]","author":"M S Kodialam","year":"2012","unstructured":"KODIALAM M S, LAKSHMAN T V, MUKHERJEE S. Effective ad targeting with concealed profiles[C]\/\/The 31st Annual IEEE International Conference on Computer Communications, Orlando, USA, 2012: 2237\u20132245."},{"key":"BF03391577_CR13","first-page":"298","volume-title":"Advertiser and publisher-centric privacy aware online behavioral advertising[C]","author":"J Hua","year":"2015","unstructured":"HUA J, TANG A, ZHONG S. Advertiser and publisher-centric privacy aware online behavioral advertising[C]\/\/The 35th IEEE International Conference on Distributed Computing Systems, Columbus, USA, 2015: 298\u2013307."},{"key":"BF03391577_CR14","first-page":"169","volume-title":"Towards statistical queries over distributed private user data[C]","author":"R Chen","year":"2012","unstructured":"CHEN R, REZNICHENKO A, FRANCIS P, et al. Towards statistical queries over distributed private user data[C]\/\/The 9th USENIX Symposium on Networked Systems Design and Implementation, San Jose, USA, 2012: 169\u2013182."},{"key":"BF03391577_CR15","first-page":"687","volume-title":"Non-tracking web analytics[C]","author":"I E Akkus","year":"2012","unstructured":"AKKUS I E, CHEN R, HARDT M, et al. Non-tracking web analytics[C]\/\/The ACM Conference on Computer and Communications Security, Raleigh, USA, 2012: 687\u2013698."},{"key":"BF03391577_CR16","first-page":"1","volume-title":"Differential privacy[C]","author":"C Dwork","year":"2006","unstructured":"DWORK C. Differential privacy[C]\/\/Proc. of the 33rd International Colloquium, Automata, Languages and Programming, Venice, Italy, 2006: 1\u201312."},{"key":"BF03391577_CR17","first-page":"486","volume-title":"Our data, ourselves: privacy via distributed noise generation[C]","author":"C Dwork","year":"2006","unstructured":"DWORK C, KENTHAPADI K, MCSHERRY F, et al. Our data, ourselves: privacy via distributed noise generation[C]\/\/Proc. of the 25th Annual International Conference on the Theory and Applications of Cryptographic Techniques, St. Petersburg, Russia, 2006: 486\u2013503."},{"key":"BF03391577_CR18","first-page":"735","volume-title":"Differentially private aggregation of distributed time-series with transformation and encryption[C]","author":"V Rastogi","year":"2010","unstructured":"RASTOGI V, NATH S. Differentially private aggregation of distributed time-series with transformation and encryption[C]\/\/Proc. of the ACM International Conference on Management of Data, Indianapolis, USA, 2010: 735\u2013746."},{"key":"BF03391577_CR19","volume-title":"Privacy-preserving aggregation of time-series data[C]","author":"E Shi","year":"2011","unstructured":"SHI E, CHAN T H, RIEFFEL E G, et al. Privacy-preserving aggregation of time-series data[C]\/\/The Network and Distributed System Security Symposium, USA, 2011."},{"key":"BF03391577_CR20","first-page":"315","volume-title":"SplitX: high-performance private analytics[C]","author":"R Chen","year":"2013","unstructured":"CHEN R, AKKUS I E, FRANCIS P. SplitX: high-performance private analytics[C]\/\/The ACM Special Interest Group on Data Communication, Hong Kong, China, 2013: 315\u2013326."},{"key":"BF03391577_CR21","first-page":"111","volume-title":"SmartAds: bringing contextual ads to mobile apps[C]","author":"S Nath","year":"2013","unstructured":"NATH S, LIN F X, RAVINDRANATH L, et al. SmartAds: bringing contextual ads to mobile apps[C]\/\/The 11th Annual International Conference on Mobile Systems, Applications, and Services, Taipei, China, 2013: 111\u2013124."},{"key":"BF03391577_CR22","first-page":"345","volume-title":"Analyzing android browser apps for file:\/\/vulnerabilities[C]","author":"D Wu","year":"2014","unstructured":"WU D, CHANG R K C. Analyzing android browser apps for file:\/\/vulnerabilities[C]\/\/The 17th International Conference Information Security, Hong Kong, China, 2014: 345\u2013363."},{"key":"BF03391577_CR23","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2016.23407","volume-title":"What mobile Ads know about mobile users[C]","author":"S Son","year":"2016","unstructured":"SON S, KIM D, SHMATIKOV V. What mobile Ads know about mobile users[C]\/\/The 23rd Annual Network and Distributed System Security Symposium, San Diego, USA, 2016."},{"key":"BF03391577_CR24","first-page":"57","volume-title":"DECAF: detecting and characterizing Ad fraud in mobile Apps[C]","author":"B Liu","year":"2014","unstructured":"LIU B, NATH S, GOVINDAN R, et al. DECAF: detecting and characterizing Ad fraud in mobile Apps[C]\/\/The 11th USENIX Symposium on Networked Systems Design and Implementation, USA, 2014: 57\u201370."},{"key":"BF03391577_CR25","first-page":"123","volume-title":"MAdFraud: investigating ad fraud in android applications[C]","author":"J Crussell","year":"2014","unstructured":"CRUSSELL J, STEVENS R, CHEN H. MAdFraud: investigating ad fraud in android applications[C]\/\/The 12th Annual International Conference on Mobile Systems, Applications, and Services, Bretton Woods, USA, 2014: 123\u2013134."}],"container-title":["Journal of Communications and Information Networks"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/article\/10.1007\/BF03391577\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/BF03391577.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/BF03391577.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,6,24]],"date-time":"2022-06-24T12:12:21Z","timestamp":1656072741000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/BF03391577"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,12]]},"references-count":25,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2016,12]]}},"alternative-id":["BF03391577"],"URL":"https:\/\/doi.org\/10.1007\/bf03391577","relation":{},"ISSN":["2096-1081","2509-3312"],"issn-type":[{"value":"2096-1081","type":"print"},{"value":"2509-3312","type":"electronic"}],"subject":[],"published":{"date-parts":[[2016,12]]}}}