{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,23]],"date-time":"2024-10-23T06:33:49Z","timestamp":1729665229863,"version":"3.28.0"},"reference-count":20,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2016,12]]},"DOI":"10.1109\/glocom.2016.7842384","type":"proceedings-article","created":{"date-parts":[[2017,2,7]],"date-time":"2017-02-07T15:56:26Z","timestamp":1486482986000},"page":"1-6","source":"Crossref","is-referenced-by-count":5,"title":["Who Moved My Cheese: Towards Automatic and Fine-Grained Classification and Modeling Ad Network"],"prefix":"10.1109","author":[{"given":"Jiafa","family":"Liu","sequence":"first","affiliation":[]},{"given":"Junyi","family":"Liu","sequence":"additional","affiliation":[]},{"given":"Huaxin","family":"Li","sequence":"additional","affiliation":[]},{"given":"Haojin","family":"Zhu","sequence":"additional","affiliation":[]},{"given":"Na","family":"Ruan","sequence":"additional","affiliation":[]},{"given":"Di","family":"Ma","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"year":"0","key":"ref10"},{"year":"0","key":"ref11"},{"year":"0","key":"ref12"},{"key":"ref13","first-page":"26","article-title":"Mobile data offloading: how much can WiFi deliver?","author":"kyunghan","year":"2010","journal-title":"Proceedings of the 6th International COnference"},{"key":"ref14","first-page":"391","article-title":"Behavioral Clustering of HTTP-Based Malware and Signature Generation Using Malicious Network Traces","author":"roberto","year":"2010","journal-title":"NSDI"},{"key":"ref15","doi-asserted-by":"crossref","first-page":"931","DOI":"10.1109\/TNET.2013.2264634","article-title":"Behavior analysis of internet traffic via bipartite graphs and one-mode projections","volume":"22","author":"kuai","year":"2014","journal-title":"IEEE\/ACM Transactions on Networking"},{"key":"ref16","first-page":"42","article-title":"How to reduce smartphone traffic volume by 30%?","author":"feng","year":"2013","journal-title":"Proceedings of International Conference on Passive and Active Network Measurement"},{"key":"ref17","doi-asserted-by":"crossref","first-page":"21","DOI":"10.1145\/2412096.2412100","article-title":"How expensive are free smartphone apps?","volume":"16","author":"li","year":"2012","journal-title":"ACM SIGMOBILE Mobile Computing and Communications Review"},{"key":"ref18","first-page":"1","article-title":"Demographics inference through Wi-Fi network traffic analysis","author":"huaxin","year":"2016","journal-title":"IEEE INFOCOM 2016-The 35th Annual IEEE International Conference on Computer Communications"},{"key":"ref19","first-page":"43","article-title":"All your location are belong to us: Breaking mobile social networks for automated user location tracking","author":"muyuan","year":"2014","journal-title":"Proceedings of the 5th ACM International Symposium on Mobile Ad-hoc Networking and Computing"},{"key":"ref4","article-title":"Longitudinal analysis of android ad library permissions","author":"theodore","year":"2013","journal-title":"arXiv preprintarXiv 1303 0857"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1145\/2185448.2185464"},{"key":"ref6","first-page":"281","article-title":"A first look at traffic on smartphones","author":"hossein","year":"2010","journal-title":"Proceedings of the 10th ACM SIGCOMM Conference on Internet Measurement"},{"year":"0","key":"ref5"},{"key":"ref8","first-page":"63","article-title":"Understanding mobile app usage patterns using in-app advertisements","author":"alok","year":"2013","journal-title":"Proceedings of International Conference on Passive and Active Network Measurement"},{"key":"ref7","first-page":"553","article-title":"Adsplit: Separating smartphone advertising from applications","author":"shashi","year":"2012","journal-title":"Presented as part of the 21st USENIX Security Symposium (USENIX Security 12)"},{"key":"ref2","first-page":"169","article-title":"Privad: practical privacy in online advertising","author":"saikat","year":"2011","journal-title":"USENIX Conference on Networked Systems Design and Implementation"},{"year":"0","key":"ref1"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.2013.6566868"},{"key":"ref20","doi-asserted-by":"crossref","first-page":"22","DOI":"10.1109\/TPDS.2013.36","article-title":"A probabilistic misbehavior detection scheme toward efficient trust establishment in delay-tolerant networks","volume":"25","author":"haojin","year":"2014","journal-title":"IEEE Transactions on Parallel and Distributed Systems"}],"event":{"name":"GLOBECOM 2016 - 2016 IEEE Global Communications Conference","start":{"date-parts":[[2016,12,4]]},"location":"Washington, DC, USA","end":{"date-parts":[[2016,12,8]]}},"container-title":["2016 IEEE Global Communications Conference (GLOBECOM)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/7840067\/7841475\/07842384.pdf?arnumber=7842384","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,25]],"date-time":"2017-06-25T06:00:56Z","timestamp":1498370456000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/7842384\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,12]]},"references-count":20,"URL":"https:\/\/doi.org\/10.1109\/glocom.2016.7842384","relation":{},"subject":[],"published":{"date-parts":[[2016,12]]}}}