{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,11]],"date-time":"2025-09-11T18:21:35Z","timestamp":1757614895891,"version":"3.44.0"},"reference-count":77,"publisher":"Springer Science and Business Media LLC","issue":"4","license":[{"start":{"date-parts":[[2025,7,15]],"date-time":"2025-07-15T00:00:00Z","timestamp":1752537600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2025,7,15]],"date-time":"2025-07-15T00:00:00Z","timestamp":1752537600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"funder":[{"name":"Vingroup Innovation Foundation","award":["VINIF.2024.TS.067"],"award-info":[{"award-number":["VINIF.2024.TS.067"]}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Int. J. Inf. Secur."],"published-print":{"date-parts":[[2025,8]]},"DOI":"10.1007\/s10207-025-01098-w","type":"journal-article","created":{"date-parts":[[2025,7,15]],"date-time":"2025-07-15T12:18:04Z","timestamp":1752581884000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["CI2P-MedHFDroid: a context-aware individual privacy preferences model for medical, health &amp; fitness android apps"],"prefix":"10.1007","volume":"24","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-9152-6208","authenticated-orcid":false,"given":"Nguyen Ngoc","family":"Phien","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-3199-6333","authenticated-orcid":false,"given":"Phat T.","family":"Tran-Truong","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-5336-0566","authenticated-orcid":false,"given":"Ha Xuan","family":"Son","sequence":"additional","affiliation":[]},{"given":"Vo H.","family":"Khanh","sequence":"additional","affiliation":[]},{"given":"Triet M.","family":"Nguyen","sequence":"additional","affiliation":[]},{"given":"Luong H.","family":"Huong","sequence":"additional","affiliation":[]},{"given":"Bang K.","family":"Le","sequence":"additional","affiliation":[]},{"given":"Ngan Nguyen T.","family":"K.","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,7,15]]},"reference":[{"key":"1098_CR1","doi-asserted-by":"crossref","unstructured":"Abinaya, S., Devi, M.K.: Enhancing crop productivity through autoencoder-based disease detection and context-aware remedy recommendation system. In: Application of Machine Learning in Agriculture, pp. 239\u2013262. Elsevier (2022)","DOI":"10.1016\/B978-0-323-90550-3.00014-X"},{"key":"1098_CR2","doi-asserted-by":"publisher","DOI":"10.1016\/j.entcom.2023.100567","volume":"46","author":"H Aloulou","year":"2023","unstructured":"Aloulou, H., Aloulou, H., Abdulrazak, B., Kacem, A.H.: Personalized, context-aware, and adaptable persuasive approach for encouraging physical activity among older adults. Entertainment Computing 46, 100567 (2023)","journal-title":"Entertainment Computing"},{"key":"1098_CR3","doi-asserted-by":"crossref","unstructured":"Alsoubai, A., Ghaiumy\u00a0Anaraky, R., Li, Y., Page, X., Knijnenburg, B., Wisniewski, P.J.: Permission vs. app limiters: Profiling smartphone users to understand differing strategies for mobile privacy management. In: Proceedings of the 2022 CHI Conference on Human Factors in Computing Systems, pp. 1\u201318 (2022)","DOI":"10.1145\/3491102.3517652"},{"key":"1098_CR4","doi-asserted-by":"crossref","unstructured":"Brand\u00e3o, A., Mendes, R., Vilela, J.P.: Prediction of mobile app privacy preferences with user profiles via federated learning. In: Proceedings of the Twelfth ACM Conference on Data and Application Security and Privacy, pp. 89\u2013100 (2022)","DOI":"10.1145\/3508398.3511526"},{"key":"1098_CR5","doi-asserted-by":"crossref","unstructured":"Chakraborty, S., Raghavan, K.R., Johnson, M.P., Srivastava, M.B.: A framework for context-aware privacy of sensor data on mobile systems. In: Proceedings of the 14th Workshop on Mobile Computing Systems and Applications, pp. 1\u20136 (2013)","DOI":"10.1145\/2444776.2444791"},{"key":"1098_CR6","unstructured":"Chakraborty, S., Shen, C., Raghavan, K.R., Shoukry, Y., Millar, M., Srivastava, M.: ipshield: A framework for enforcing context-aware privacy. In: 11th $$\\{$$USENIX$$\\}$$ Symposium on Networked Systems Design and Implementation ($$\\{$$NSDI$$\\}$$ 14), pp. 143\u2013156 (2014)"},{"key":"1098_CR7","doi-asserted-by":"crossref","unstructured":"Chapelle, O., Zien, A.: Semi-supervised classification by low density separation. In: AISTATS, vol. 2005, pp. 57\u201364. Citeseer (2005)","DOI":"10.7551\/mitpress\/9780262033589.001.0001"},{"issue":"3","key":"1098_CR8","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/3132029","volume":"1","author":"S Chitkara","year":"2017","unstructured":"Chitkara, S., Gothoskar, N., Harish, S., Hong, J.I., Agarwal, Y.: Does this app really need my location? context-aware privacy management for smartphones. Proceedings of the ACM on Interactive, Mobile, Wearable and Ubiquitous Technologies 1(3), 1\u201322 (2017)","journal-title":"Proceedings of the ACM on Interactive, Mobile, Wearable and Ubiquitous Technologies"},{"key":"1098_CR9","doi-asserted-by":"crossref","unstructured":"Das, P.K., Ghosh, D., Jagtap, P., Joshi, A., Finin, T.: Preserving user privacy and security in context-aware mobile platforms. In: Censorship, Surveillance, and Privacy: Concepts, Methodologies, Tools, and Applications, pp. 1203\u20131230. IGI global (2019)","DOI":"10.4018\/978-1-5225-7113-1.ch058"},{"issue":"7","key":"1098_CR10","doi-asserted-by":"publisher","first-page":"4032","DOI":"10.1109\/TGRS.2012.2228275","volume":"51","author":"I D\u00f3pido","year":"2013","unstructured":"D\u00f3pido, I., Li, J., Marpu, P.R., Plaza, A., Dias, J., Benediktsson, J.A.: Semisupervised self-learning for hyperspectral image classification. IEEE Trans. Geosci. Remote Sens. 51(7), 4032\u20134044 (2013)","journal-title":"IEEE Trans. Geosci. Remote Sens."},{"key":"1098_CR11","doi-asserted-by":"crossref","unstructured":"Du, X., Pan, X., Cao, Y., He, B., Fang, G., Chen, Y., Xu, D.: Flowcog: Context-aware semantic extraction and analysis of information flow leaks in android apps. IEEE Transactions on Mobile Computing (2022)","DOI":"10.1109\/TMC.2022.3197638"},{"issue":"5","key":"1098_CR12","doi-asserted-by":"publisher","first-page":"469","DOI":"10.25046\/aj050558","volume":"5","author":"N Duong-Trung","year":"2020","unstructured":"Duong-Trung, N., Quynh, N., Tang, T., Ha, X.: Interpretation of machine learning models for medical diagnosis. Advances in Science, Technology and Engineering Systems Journal 5(5), 469\u2013477 (2020)","journal-title":"Advances in Science, Technology and Engineering Systems Journal"},{"key":"1098_CR13","doi-asserted-by":"crossref","unstructured":"Duong-Trung, N., Son, H.X., Le, H.T., Phan, T.T.: On components of a patient-centered healthcare system using smart contract. In: Proceedings of the 4th International Conference on Cryptography, Security and Privacy, p. 31\u201335 (2020)","DOI":"10.1145\/3377644.3377668"},{"key":"1098_CR14","doi-asserted-by":"crossref","unstructured":"Duong-Trung, N., Son, H.X., Le, H.T., Phan, T.T.: Smart care: Integrating blockchain technology into the design of patient-centered healthcare systems. In: Proceedings of the 4th International Conference on Cryptography, Security and Privacy, ICCSP 2020, p. 105\u2013109 (2020)","DOI":"10.1145\/3377644.3377667"},{"key":"1098_CR15","doi-asserted-by":"crossref","unstructured":"Egele, M., Kruegel, C., Kirda, E., Vigna, G.: An empirical study of cryptographic misuse in android applications. In: Proceedings of the 2011 ACM SIGSAC Conference on Computer and Communications Security, pp. 73\u201384. ACM (2011)","DOI":"10.1145\/2508859.2516693"},{"key":"1098_CR16","doi-asserted-by":"crossref","unstructured":"Gadiyar, H.M.T., Thyagaraju, G., Goudar, R.: An adaptive approach for preserving privacy in context aware applications for smartphones in cloud computing platform (2023)","DOI":"10.21203\/rs.3.rs-1600119\/v1"},{"key":"1098_CR17","doi-asserted-by":"crossref","unstructured":"Gonz\u00e1lez-P\u00e9rez, A., Matey-Sanz, M., Granell, C., Diaz-Sanahuja, L., Bret\u00f3n-L\u00f3pez, J., Casteleyn, S.: Awarns: A framework for developing context-aware reactive mobile applications for health and mental health. Journal of Biomedical Informatics p. 104359 (2023)","DOI":"10.1016\/j.jbi.2023.104359"},{"key":"1098_CR18","doi-asserted-by":"crossref","unstructured":"Gorla, A., Tavecchia, I., Gross, F., Zeller, A.: Checking app behavior against app descriptions. In: Proceedings of the 36th International Conference on Software Engineering, pp. 1025\u20131035. ACM (2014)","DOI":"10.1145\/2568225.2568276"},{"key":"1098_CR19","doi-asserted-by":"crossref","unstructured":"Grundy, Q., Chiu, K., Held, F., Continella, A., Bero, L., Holz, R.: Data sharing practices of medicines related apps and the mobile ecosystem: traffic, content, and network analysis. bmj 364 (2019)","DOI":"10.1136\/bmj.l920"},{"issue":"6","key":"1098_CR20","doi-asserted-by":"publisher","first-page":"7491","DOI":"10.1007\/s10639-022-10942-8","volume":"27","author":"CP Gumbheer","year":"2022","unstructured":"Gumbheer, C.P., Khedo, K.K., Bungaleea, A.: Personalized and adaptive context-aware mobile learning: review, challenges and future directions. Educ. Inf. Technol. 27(6), 7491\u20137517 (2022)","journal-title":"Educ. Inf. Technol."},{"key":"1098_CR21","doi-asserted-by":"crossref","unstructured":"He, Q., Agu, E.O.: Context-aware probabilistic models for predicting future sedentary behaviors of smartphone users. Journal of Healthcare Informatics Research pp. 1\u201341 (2022)","DOI":"10.1007\/s41666-021-00107-6"},{"key":"1098_CR22","doi-asserted-by":"crossref","unstructured":"Heid, K., Tefke, T., Heider, J., Staudemeyer, R.C.: Android data storage locations and what app developers do with it from a security and privacy perspective. In: ICISSP, pp. 378\u2013387 (2022)","DOI":"10.5220\/0010838200003120"},{"key":"1098_CR23","doi-asserted-by":"publisher","DOI":"10.1016\/j.pmcj.2022.101725","volume":"87","author":"JL Herrera","year":"2022","unstructured":"Herrera, J.L., Chen, H.Y., Berrocal, J., Murillo, J.M., Julien, C.: Context-aware privacy-preserving access control for mobile computing. Pervasive Mob. Comput. 87, 101725 (2022)","journal-title":"Pervasive Mob. Comput."},{"key":"1098_CR24","doi-asserted-by":"crossref","unstructured":"Hoang, N.M., Son, H.X.: A dynamic solution for fine-grained policy conflict resolution. In: Proceedings of the 3rd International Conference on Cryptography, Security and Privacy, pp. 116\u2013120 (2019)","DOI":"10.1145\/3309074.3309097"},{"key":"1098_CR25","doi-asserted-by":"crossref","unstructured":"Huang, H., Li, R., Liu, J., Zhou, S., Lin, K., Zheng, Z.: Contextfl: Context-aware federated learning by estimating the training and reporting phases of mobile clients. In: 2022 IEEE 42nd International Conference on Distributed Computing Systems (ICDCS), pp. 570\u2013580. IEEE (2022)","DOI":"10.1109\/ICDCS54860.2022.00061"},{"issue":"9","key":"1098_CR26","doi-asserted-by":"publisher","first-page":"4302","DOI":"10.3390\/s23094302","volume":"23","author":"X Jiang","year":"2023","unstructured":"Jiang, X., Zhao, Z., Li, Z., Hong, F.: Echo-id: Smartphone placement region identification for context-aware computing. Sensors 23(9), 4302 (2023)","journal-title":"Sensors"},{"key":"1098_CR27","doi-asserted-by":"publisher","first-page":"61656","DOI":"10.1109\/ACCESS.2019.2916503","volume":"7","author":"H Jin","year":"2019","unstructured":"Jin, H., Luo, Y., Li, P., Mathew, J.: A review of secure and privacy-preserving medical data sharing. IEEE Access 7, 61656\u201361669 (2019)","journal-title":"IEEE Access"},{"issue":"2","key":"1098_CR28","first-page":"4469","volume":"11","author":"Y Khasawneh","year":"2023","unstructured":"Khasawneh, Y., Khasawneh, M.: Achieving assessment equity and fairness: Identifying and eliminating bias in assessment tools and practices. Kurdish Studies 11(2), 4469\u20134478 (2023)","journal-title":"Kurdish Studies"},{"issue":"1","key":"1098_CR29","first-page":"35","volume":"3","author":"A Kiourtis","year":"2023","unstructured":"Kiourtis, A., Mavrogiorgos, K., Nifakos, S., Kyriazis, D.: Identity management standards: A literature review. Computers and Informatics 3(1), 35\u201346 (2023)","journal-title":"Computers and Informatics"},{"key":"1098_CR30","doi-asserted-by":"crossref","unstructured":"Kitsiou, A., Pantelelis, M., Mavroeidi, A.G., Sideri, M., Simou, S., Vgena, A., Tzortzaki, E., Kalloniatis, C.: Self-adaptive privacy in cloud computing: An overview under an interdisciplinary spectrum. In: Proceedings of the 26th Pan-Hellenic Conference on Informatics, pp. 64\u201369 (2022)","DOI":"10.1145\/3575879.3575968"},{"issue":"2","key":"1098_CR31","doi-asserted-by":"publisher","first-page":"6","DOI":"10.2478\/popets-2022-0033","volume":"2022","author":"K Kollnig","year":"2022","unstructured":"Kollnig, K., Shuba, A., Binns, R., Van Kleek, M., Shadbolt, N.: Are iphones really better for privacy? a comparative study of ios and android apps. Proceedings on Privacy Enhancing Technologies 2022(2), 6\u201324 (2022)","journal-title":"Proceedings on Privacy Enhancing Technologies"},{"issue":"4","key":"1098_CR32","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/3524020","volume":"25","author":"SM Lehman","year":"2022","unstructured":"Lehman, S.M., Alrumayh, A.S., Kolhe, K., Ling, H., Tan, C.C.: Hidden in plain sight: Exploring privacy risks of mobile augmented reality applications. ACM Transactions on Privacy and Security 25(4), 1\u201335 (2022)","journal-title":"ACM Transactions on Privacy and Security"},{"key":"1098_CR33","doi-asserted-by":"crossref","unstructured":"Li, T., Xia, T., Wang, H., Tu, Z., Tarkoma, S., Han, Z., Hui, P.: Smartphone app usage analysis: datasets, methods, and applications. IEEE Communications Surveys & Tutorials (2022)","DOI":"10.1109\/COMST.2022.3163176"},{"issue":"3","key":"1098_CR34","doi-asserted-by":"publisher","first-page":"246","DOI":"10.1088\/1741-2560\/4\/3\/010","volume":"4","author":"X Liao","year":"2007","unstructured":"Liao, X., Yao, D., Li, C.: Transductive svm for reducing the training effort in bci. J. Neural Eng. 4(3), 246 (2007)","journal-title":"J. Neural Eng."},{"key":"1098_CR35","doi-asserted-by":"crossref","unstructured":"Liu, S., Li, F., Li, F., Cheng, X., Shen, H.: Adaptive co-training svm for sentiment classification on tweets. In: Proceedings of the 22nd ACM international conference on Information & Knowledge Management, pp. 2079\u20132088 (2013)","DOI":"10.1145\/2505515.2505569"},{"key":"1098_CR36","doi-asserted-by":"crossref","unstructured":"Liu, Z., Shan, J., Bonazzi, R., Pigneur, Y.: Privacy as a tradeoff: Introducing the notion of privacy calculus for context-aware mobile applications. In: 2014 47th Hawaii International Conference on System Sciences, pp. 1063\u20131072. IEEE (2014)","DOI":"10.1109\/HICSS.2014.138"},{"key":"1098_CR37","doi-asserted-by":"crossref","unstructured":"Luo, J., Xu, H., Su, Z.: Fault diagnosis method based semi-supervised manifold learning and transductive svm. In: 2017 International Conference on Sensing, Diagnostics, Prognostics, and Control (SDPC), pp. 710\u2013717. IEEE (2017)","DOI":"10.1109\/SDPC.2017.140"},{"key":"1098_CR38","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2022.102729","volume":"118","author":"S Manimaran","year":"2022","unstructured":"Manimaran, S., Sastry, V., Gopalan, N.: Sbtddl: A novel framework for sensor-based threats detection on android smartphones using deep learning. Computers & Security 118, 102729 (2022)","journal-title":"Computers & Security"},{"key":"1098_CR39","doi-asserted-by":"crossref","unstructured":"Mavrogiorgos, K., Kiourtis, A., Kyriazis, D.: A multi-layer approach for data cleaning in the healthcare domain. In: Proceedings of the 2022 8th International Conference on Computing and Data Engineering, pp. 1\u20136. ACM (2022)","DOI":"10.1145\/3512850.3512856"},{"key":"1098_CR40","doi-asserted-by":"crossref","unstructured":"Mendes, R., Brand\u00e3o, A., Vilela, J.P., Beresford, A.R.: Effect of user expectation on mobile app privacy: a field study. In: 2022 IEEE international conference on pervasive computing and communications (PerCom), pp. 207\u2013214. IEEE (2022)","DOI":"10.1109\/PerCom53586.2022.9762379"},{"key":"1098_CR41","doi-asserted-by":"crossref","unstructured":"Mendes, R., Cunha, M., Vilela, J.P., Beresford, A.R.: Enhancing user privacy in mobile devices through prediction of privacy preferences. In: Computer Security\u2013ESORICS 2022: 27th European Symposium on Research in Computer Security, Copenhagen, Denmark, September 26\u201330, 2022, Proceedings, Part I, pp. 153\u2013172. Springer (2022)","DOI":"10.1007\/978-3-031-17140-6_8"},{"key":"1098_CR42","unstructured":"Mendes, R.d.S.C.: Automated privacy protection for mobile devices. Ph.D. thesis, 00500:: Universidade de Coimbra (2023)"},{"key":"1098_CR43","doi-asserted-by":"crossref","unstructured":"Miettinen, M., Heuser, S., Kronz, W., Sadeghi, A.R., Asokan, N.: Conxsense: automated context classification for context-aware access control. In: Proceedings of the 9th ACM symposium on Information, computer and communications security, pp. 293\u2013304 (2014)","DOI":"10.1145\/2590296.2590337"},{"key":"1098_CR44","doi-asserted-by":"crossref","unstructured":"Motti, V.G., Berkovsky, S.: Healthcare privacy. In: Modern socio-technical perspectives on privacy, pp. 203\u2013231. Springer International Publishing (2022)","DOI":"10.1007\/978-3-030-82786-1_10"},{"key":"1098_CR45","doi-asserted-by":"crossref","unstructured":"Mubeen, M., Al-Ghuribi, S., Al-Harrasi, A., Al-Saidi, R.: Usability evaluation of pandemic health care mobile applications. In: IOP Conference Series: Earth and Environmental Science, vol. 704, p. 012013. IOP Publishing (2021)","DOI":"10.1088\/1755-1315\/704\/1\/012041"},{"key":"1098_CR46","doi-asserted-by":"crossref","unstructured":"Olejnik, K., Dacosta, I., Machado, J.S., Huguenin, K., Khan, M.E., Hubaux, J.P.: Smarper: Context-aware and automatic runtime-permissions for mobile devices. In: 2017 IEEE Symposium on Security and Privacy (SP), pp. 1058\u20131076. IEEE (2017)","DOI":"10.1109\/SP.2017.25"},{"issue":"1","key":"1098_CR47","doi-asserted-by":"publisher","first-page":"479","DOI":"10.3390\/app12010479","volume":"12","author":"V Ponce","year":"2022","unstructured":"Ponce, V., Abdulrazak, B.: Context-aware end-user development review. Appl. Sci. 12(1), 479 (2022)","journal-title":"Appl. Sci."},{"key":"1098_CR48","unstructured":"Re\u0161\u010di\u010d, N., Piltaver, R., Slapni\u010dar, G., Mar\u010deti\u010d, M., Lu\u0161trek, M.: Smartchange: Ai-based long-term health risk evaluation for driving behaviour change strategies in children and youth. In: 2023 International Conference on Applied Mathematics & Computer Science (ICAMCS). IEEE (2023)"},{"key":"1098_CR49","doi-asserted-by":"crossref","unstructured":"Rosenberg, C., Hebert, M., Schneiderman, H.: Semi-supervised self-training of object detection models (2005)","DOI":"10.1109\/ACVMOT.2005.107"},{"issue":"4","key":"1098_CR50","volume":"8","author":"O Sagi","year":"2018","unstructured":"Sagi, O., Rokach, L.: Ensemble learning: A survey. Wiley Interdisciplinary Reviews: Data Mining and Knowledge Discovery 8(4), e1249 (2018)","journal-title":"Wiley Interdisciplinary Reviews: Data Mining and Knowledge Discovery"},{"key":"1098_CR51","doi-asserted-by":"crossref","unstructured":"Shu, J., Zheng, R., Hui, P.: Cardea: Context-aware visual privacy protection for photo taking and sharing. In: Proceedings of the 9th ACM Multimedia Systems Conference, pp. 304\u2013315 (2018)","DOI":"10.1145\/3204949.3204973"},{"key":"1098_CR52","doi-asserted-by":"crossref","unstructured":"Sindhwani, V., Keerthi, S.S.: Large scale semi-supervised linear svms. In: Proceedings of the 29th annual international ACM SIGIR conference on Research and development in information retrieval, pp. 477\u2013484 (2006)","DOI":"10.1145\/1148170.1148253"},{"key":"1098_CR53","doi-asserted-by":"crossref","unstructured":"Singh, B.C., Carminati, B., Ferrari, E.: Learning privacy habits of pds owners. In: 2017 IEEE 37th International Conference on Distributed Computing Systems (ICDCS), pp. 151\u2013161. IEEE (2017)","DOI":"10.1109\/ICDCS.2017.65"},{"key":"1098_CR54","unstructured":"Singh, B.C., Carminati, B., Ferrari, E.: Privacy-aware personal data storage (p-pds): Learning how to protect user privacy from external applications. IEEE Transactions on Dependable and Secure Computing (2019)"},{"key":"1098_CR55","doi-asserted-by":"crossref","unstructured":"Son, H.X., Carminati, B., Ferrari, E.: A risk assessment mechanism for android apps. In: 2021 IEEE International Conference on Smart Internet of Things (SmartIoT), pp. 237\u2013244. IEEE (2021)","DOI":"10.1109\/SmartIoT52359.2021.00044"},{"key":"1098_CR56","doi-asserted-by":"crossref","unstructured":"Son, H.X., Carminati, B., Ferrari, E.: Priapp-install: Learning user privacy preferences on mobile apps\u2019 installation. In: Information Security Practice and Experience: 17th International Conference, ISPEC 2022, Taipei, Taiwan, November 23\u201325, 2022, Proceedings, pp. 306\u2013323. Springer (2022)","DOI":"10.1007\/978-3-031-21280-2_17"},{"issue":"3","key":"1098_CR57","doi-asserted-by":"publisher","first-page":"242","DOI":"10.1007\/s41019-022-00189-1","volume":"7","author":"HX Son","year":"2022","unstructured":"Son, H.X., Carminati, B., Ferrari, E.: A risk estimation mechanism for android apps based on hybrid analysis. Data Science and Engineering 7(3), 242\u2013252 (2022)","journal-title":"Data Science and Engineering"},{"key":"1098_CR58","doi-asserted-by":"crossref","unstructured":"Son, H.X., Dang, T.K., Massacci, F.: Rew-smt: a new approach for rewriting xacml request with dynamic big data security policies. In: International Conference on Security, Privacy and Anonymity in Computation, Communication and Storage, pp. 501\u2013515. Springer (2017)","DOI":"10.1007\/978-3-319-72389-1_40"},{"key":"1098_CR59","doi-asserted-by":"crossref","unstructured":"Son, H.X., Hoang, N.M.: A novel attribute-based access control system for fine-grained privacy protection. In: Proceedings of the 3rd International Conference on Cryptography, Security and Privacy, pp. 76\u201380 (2019)","DOI":"10.1145\/3309074.3309091"},{"key":"1098_CR60","doi-asserted-by":"crossref","unstructured":"Son, H.X., Le, T.H., Quynh, N.T.T., Huy, H.N.D., Duong-Trung, N., Luong, H.H.: Toward a blockchain-based technology in dealing with emergencies in patient-centered healthcare systems. In: International Conference on Mobile, Secure, and Programmable Networking, pp. 44\u201356. Springer (2021)","DOI":"10.1007\/978-3-030-67550-9_4"},{"key":"1098_CR61","doi-asserted-by":"crossref","unstructured":"Son, H.X., Nguyen, M.H., Vo, H.K., et\u00a0al.: Toward an privacy protection based on access control model in hybrid cloud for healthcare systems. In: International Joint Conference: 12th International Conference on Computational Intelligence in Security for Information Systems (CISIS 2019) and 10th International Conference on EUropean Transnational Education (ICEUTE 2019), pp. 77\u201386. Springer (2019)","DOI":"10.1007\/978-3-030-20005-3_8"},{"key":"1098_CR62","doi-asserted-by":"crossref","unstructured":"Son, H.X., et\u00a0al.: In2p-med: Toward the individual privacy preferences identity in the medical web apps. In: Web Engineering: 23rd International Conference, ICWE 2023, Alicante, Spain, June 6\u20139, 2023, Proceedings. Springer (2023)","DOI":"10.1007\/978-3-031-34444-2_10"},{"key":"1098_CR63","unstructured":"Su, H.: Comprehensive analysis for intelligent recommendation on mobile applications"},{"key":"1098_CR64","doi-asserted-by":"crossref","unstructured":"Symvoulidis, C., Kiourtis, A., Votis, K., Tzovaras, D.: Healthcare provision in the cloud: An ehr object store-based cloud used for emergency. In: Healthinf, vol.\u00a01, pp. 435\u2013442 (2021)","DOI":"10.5220\/0010247004350442"},{"key":"1098_CR65","doi-asserted-by":"crossref","unstructured":"Thanh, L.N.T., Phien, N.N., Vo, H.K., Luong, H.H., Anh, T.D., Tuan, K.N.H., Son, H.X., et\u00a0al.: Ioht-mba: an internet of healthcare things (ioht) platform based on microservice and brokerless architecture. International Journal of Advanced Computer Science and Applications 12(7) (2021)","DOI":"10.14569\/IJACSA.2021.0120768"},{"key":"1098_CR66","doi-asserted-by":"crossref","unstructured":"Theis, S., Stellmacher, C., P\u00fctz, S., Arend, M.G., Nitsch, V.: Understanding fitness tracker users\u2019 and non-users\u2019 requirements for interactive and transparent privacy information. In: Extended Abstracts of the 2023 CHI Conference on Human Factors in Computing Systems, pp. 1\u20137 (2023)","DOI":"10.1145\/3544549.3585698"},{"key":"1098_CR67","doi-asserted-by":"publisher","first-page":"129","DOI":"10.1007\/s00779-012-0632-0","volume":"18","author":"E Toch","year":"2014","unstructured":"Toch, E.: Crowdsourcing privacy preferences in context-aware applications. Pers. Ubiquit. Comput. 18, 129\u2013141 (2014)","journal-title":"Pers. Ubiquit. Comput."},{"key":"1098_CR68","doi-asserted-by":"crossref","unstructured":"Tomaras, D., Tsenos, M., Kalogeraki, V.: Practical privacy preservation in a mobile cloud environment. In: 2022 23rd IEEE International Conference on Mobile Data Management (MDM), pp. 188\u2013197. IEEE (2022)","DOI":"10.1109\/MDM55031.2022.00047"},{"issue":"2","key":"1098_CR69","doi-asserted-by":"publisher","first-page":"245","DOI":"10.1007\/s10115-013-0706-y","volume":"42","author":"I Triguero","year":"2015","unstructured":"Triguero, I., Garc\u00eda, S., Herrera, F.: Self-labeled techniques for semi-supervised learning: taxonomy, software and empirical study. Knowl. Inf. Syst. 42(2), 245\u2013284 (2015)","journal-title":"Knowl. Inf. Syst."},{"key":"1098_CR70","unstructured":"Vapnik, V.: Statistical learning theory wiley-interscience. New York (1998)"},{"key":"1098_CR71","unstructured":"Vilela, J.P., Beresford, A.R.: Enhancing user privacy in mobile devices through prediction of privacy preferences"},{"key":"1098_CR72","doi-asserted-by":"crossref","unstructured":"Wilson, S., et\u00a0al.: The creation and analysis of a website privacy policy corpus. In: Proceedings of the 54th Annual Meeting of the Association for Computational Linguistics, pp. 1330\u20131340 (2016)","DOI":"10.18653\/v1\/P16-1126"},{"key":"1098_CR73","doi-asserted-by":"crossref","unstructured":"Xuan, S.H., Tran, L.K., Dang, T.K., Pham, Y.N.: Rew-xac: an approach to rewriting request for elastic abac enforcement with dynamic policies. In: 2016 International Conference on Advanced Computing and Applications (ACOMP), pp. 25\u201331. IEEE (2016)","DOI":"10.1109\/ACOMP.2016.014"},{"key":"1098_CR74","doi-asserted-by":"crossref","unstructured":"Yang, S., Wang, Y., Yao, Y., Wang, H., Ye, Y., Xiao, X.: Describectx: context-aware description synthesis for sensitive behaviors in mobile apps. In: Proceedings of the 44th International Conference on Software Engineering, pp. 685\u2013697 (2022)","DOI":"10.1145\/3510003.3510058"},{"key":"1098_CR75","doi-asserted-by":"crossref","unstructured":"Yu, L., Luo, X., Liu, X., Zhang, T.: Can we trust the privacy policies of android apps? In: 2016 46th Annual IEEE\/IFIP International Conference on Dependable Systems and Networks (DSN), pp. 538\u2013549. IEEE (2016)","DOI":"10.1109\/DSN.2016.55"},{"key":"1098_CR76","doi-asserted-by":"crossref","unstructured":"Zhang, M., Yin, H.: Efficient, context-aware privacy leakage confinement for android applications without firmware modding. In: Proceedings of the 9th ACM symposium on Information, computer and communications security, pp. 259\u2013270 (2014)","DOI":"10.1145\/2590296.2590312"},{"key":"1098_CR77","doi-asserted-by":"crossref","unstructured":"Zhao, Y., Li, L., Wang, H., He, Q., Grundy, J.: Apimatchmaker: Matching the right apis for supporting the development of android apps. IEEE Transactions on Software Engineering (2022)","DOI":"10.1109\/TSE.2022.3146831"}],"container-title":["International Journal of Information Security"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10207-025-01098-w.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s10207-025-01098-w\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10207-025-01098-w.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,9,5]],"date-time":"2025-09-05T11:33:19Z","timestamp":1757071999000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s10207-025-01098-w"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,7,15]]},"references-count":77,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2025,8]]}},"alternative-id":["1098"],"URL":"https:\/\/doi.org\/10.1007\/s10207-025-01098-w","relation":{},"ISSN":["1615-5262","1615-5270"],"issn-type":[{"type":"print","value":"1615-5262"},{"type":"electronic","value":"1615-5270"}],"subject":[],"published":{"date-parts":[[2025,7,15]]},"assertion":[{"value":"15 July 2025","order":1,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare that they have no known competing financial interests or personal relationships that could have appeared to influence the work reported in this paper.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflicts of Interest"}},{"value":"The authors declare no competing interests.","order":3,"name":"Ethics","group":{"name":"EthicsHeading","label":"Competing interests"}}],"article-number":"176"}}