{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,30]],"date-time":"2025-10-30T07:09:05Z","timestamp":1761808145998,"version":"3.37.3"},"reference-count":33,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"3","license":[{"start":{"date-parts":[[2018,3,1]],"date-time":"2018-03-01T00:00:00Z","timestamp":1519862400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans.Inform.Forensic Secur."],"published-print":{"date-parts":[[2018,3]]},"DOI":"10.1109\/tifs.2017.2767019","type":"journal-article","created":{"date-parts":[[2017,10,26]],"date-time":"2017-10-26T19:47:14Z","timestamp":1509047234000},"page":"773-787","source":"Crossref","is-referenced-by-count":21,"title":["Android User Privacy Preserving Through Crowdsourcing"],"prefix":"10.1109","volume":"13","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-8817-0757","authenticated-orcid":false,"given":"Bahman","family":"Rashidi","sequence":"first","affiliation":[]},{"given":"Carol","family":"Fung","sequence":"additional","affiliation":[]},{"given":"Anh","family":"Nguyen","sequence":"additional","affiliation":[]},{"given":"Tam","family":"Vu","sequence":"additional","affiliation":[]},{"given":"Elisa","family":"Bertino","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"doi-asserted-by":"publisher","key":"ref33","DOI":"10.1109\/iThings\/CPSCom.2011.128"},{"doi-asserted-by":"publisher","key":"ref32","DOI":"10.1145\/2381934.2381940"},{"doi-asserted-by":"publisher","key":"ref31","DOI":"10.1097\/ICU.0000000000000251"},{"year":"2017","journal-title":"Number of apps available in leading app stores as of June 2016","key":"ref30"},{"key":"ref10","first-page":"691","article-title":"Boxify: Full-fledged app sandboxing for stock Android","author":"backes","year":"2015","journal-title":"Proc 24th USENIX Secur Symp (USENIX Security)"},{"doi-asserted-by":"publisher","key":"ref11","DOI":"10.1145\/2184489.2184500"},{"key":"ref12","doi-asserted-by":"crossref","DOI":"10.7551\/mitpress\/9693.001.0001","author":"brabham","year":"2013","journal-title":"Crowdsourcing"},{"doi-asserted-by":"publisher","key":"ref13","DOI":"10.1214\/aoms\/1177731017"},{"key":"ref14","first-page":"347","article-title":"Quire: Lightweight provenance for smart phone operating systems","author":"dietz","year":"2011","journal-title":"Proc Usenix Secur Symp"},{"doi-asserted-by":"publisher","key":"ref15","DOI":"10.1145\/2046707.2046779"},{"doi-asserted-by":"publisher","key":"ref16","DOI":"10.1145\/2335356.2335360"},{"doi-asserted-by":"publisher","key":"ref17","DOI":"10.1007\/978-3-642-16732-4_12"},{"doi-asserted-by":"publisher","key":"ref18","DOI":"10.1145\/2702123.2702370"},{"doi-asserted-by":"publisher","key":"ref19","DOI":"10.1145\/2046614.2046623"},{"doi-asserted-by":"publisher","key":"ref28","DOI":"10.1007\/978-0-387-85820-3_1"},{"year":"2015","journal-title":"Gartner 1 1 billion android smartphones tablets expected to ship in 2014","key":"ref4"},{"doi-asserted-by":"publisher","key":"ref27","DOI":"10.1007\/978-3-319-45744-4_24"},{"year":"2017","journal-title":"Download Statistics Distribution of Downloads in the Android Market","key":"ref3"},{"doi-asserted-by":"publisher","key":"ref6","DOI":"10.1109\/SOSE.2015.53"},{"year":"2017","author":"rothman","journal-title":"Smart phone malware The six worst offenders","key":"ref29"},{"doi-asserted-by":"publisher","key":"ref5","DOI":"10.1145\/2462456.2464460"},{"key":"ref8","first-page":"80","article-title":"Towards task recommendation in micro-task markets","author":"ambati","year":"2011","journal-title":"Proc 11th AAAI Conf Human Comput (AAAIWS)"},{"year":"0","author":"amadeo","journal-title":"App Ops Android 4 3&#x2019;s Hidden App Permission Manager Control Permissions for Individual Apps!","key":"ref7"},{"year":"2017","journal-title":"Apps by Downloads Download Distribution of Android Apps","key":"ref2"},{"year":"2014","author":"amini","article-title":"Analyzing mobile App privacy using computation and crowdsourcing","key":"ref9"},{"year":"2017","journal-title":"What is the price of free","key":"ref1"},{"key":"ref20","first-page":"199","article-title":"Modeling users&#x2019; mobile app privacy preferences: Restoring usability in a sea of permission settings","author":"lin","year":"2014","journal-title":"Proc Symp Usable Privacy and Security (SOUPS ' 08"},{"key":"ref22","first-page":"57","article-title":"DECAF: Detecting and characterizing ad fraud in mobile apps","author":"liu","year":"2014","journal-title":"Proc 11th USENIX Symp NSDI"},{"doi-asserted-by":"publisher","key":"ref21","DOI":"10.1145\/2566486.2568035"},{"doi-asserted-by":"publisher","key":"ref24","DOI":"10.1109\/PerComW.2013.6529508"},{"doi-asserted-by":"publisher","key":"ref23","DOI":"10.1109\/MobServ.2015.30"},{"doi-asserted-by":"publisher","key":"ref26","DOI":"10.1145\/2543581.2543594"},{"doi-asserted-by":"publisher","key":"ref25","DOI":"10.1145\/2348543.2348583"}],"container-title":["IEEE Transactions on Information Forensics and Security"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/10206\/8225765\/08085138.pdf?arnumber=8085138","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,1,12]],"date-time":"2022-01-12T16:24:05Z","timestamp":1642004645000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/8085138\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,3]]},"references-count":33,"journal-issue":{"issue":"3"},"URL":"https:\/\/doi.org\/10.1109\/tifs.2017.2767019","relation":{},"ISSN":["1556-6013","1556-6021"],"issn-type":[{"type":"print","value":"1556-6013"},{"type":"electronic","value":"1556-6021"}],"subject":[],"published":{"date-parts":[[2018,3]]}}}