{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,3]],"date-time":"2025-06-03T06:42:54Z","timestamp":1748932974283,"version":"3.37.3"},"reference-count":53,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"3","license":[{"start":{"date-parts":[[2020,5,1]],"date-time":"2020-05-01T00:00:00Z","timestamp":1588291200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2020,5,1]],"date-time":"2020-05-01T00:00:00Z","timestamp":1588291200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2020,5,1]],"date-time":"2020-05-01T00:00:00Z","timestamp":1588291200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"name":"Research Grants Council of Hong Kong","award":["CityU 138513","CityU 11276816"],"award-info":[{"award-number":["CityU 138513","CityU 11276816"]}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61572412","61472316"],"award-info":[{"award-number":["61572412","61472316"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Innovation and Technology Commission of Hong Kong","award":["ITS\/307\/15"],"award-info":[{"award-number":["ITS\/307\/15"]}]},{"name":"AWS Education Research Grant"},{"name":"Science and Technology Project of Shaanxi Province","award":["2016ZDJC-05"],"award-info":[{"award-number":["2016ZDJC-05"]}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans. Serv. Comput."],"published-print":{"date-parts":[[2020,5,1]]},"DOI":"10.1109\/tsc.2017.2697385","type":"journal-article","created":{"date-parts":[[2017,4,24]],"date-time":"2017-04-24T18:07:06Z","timestamp":1493057226000},"page":"410-424","source":"Crossref","is-referenced-by-count":9,"title":["A Practical System for Privacy-Aware Targeted Mobile Advertising Services"],"prefix":"10.1109","volume":"13","author":[{"given":"Jinghua","family":"Jiang","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-7852-6051","authenticated-orcid":false,"given":"Yifeng","family":"Zheng","sequence":"additional","affiliation":[]},{"given":"Zhenkui","family":"Shi","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-3701-4946","authenticated-orcid":false,"given":"Xingliang","family":"Yuan","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-4384-9891","authenticated-orcid":false,"given":"Xiaolin","family":"Gui","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-0547-315X","authenticated-orcid":false,"given":"Cong","family":"Wang","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref39","first-page":"44","article-title":"Distributed paillier cryptosystem without trusted dealer","author":"nishide","year":"2010","journal-title":"Proc 11th Int Conf Inf Secur Appl"},{"key":"ref38","first-page":"119","article-title":"A generalisation, a simplification and some applications of paillier's probabilistic public-key system","author":"damg\u00e5rd","year":"2001","journal-title":"Proc Sixth Int l Workshop Theory and Practice in Public Key Cryptography Public Key Cryptography"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1145\/1999995.2000007"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1145\/2046707.2046782"},{"year":"0","key":"ref31"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1145\/2462456.2464452"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1145\/1217299.1217302"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1145\/2462456.2464436"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1145\/2465351.2465378"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1145\/1864349.1864364"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2016.23407"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/ICDMW.2010.137"},{"key":"ref29","first-page":"132","article-title":"New constructions and practical applications for private stream searching (extended abstract)","author":"bethencourt","year":"2006","journal-title":"Proc IEEE Symp Secur Privacy"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM.2015.7218422"},{"key":"ref1","first-page":"79","article-title":"Towards secure and practical targeted mobile advertising","author":"jiang","year":"2015","journal-title":"Proc Int Conf Mobile Ad-Hoc and Sensor Networks"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1145\/2664243.2664266"},{"key":"ref22","doi-asserted-by":"crossref","first-page":"14","DOI":"10.1109\/MWC.2013.6549279","article-title":"Gearing resource-poor mobile devices with powerful clouds: Architectures, challenges, and applications","volume":"20","author":"liu","year":"2013","journal-title":"IEEE Wireless Commun"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.2013.6566762"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1145\/1455526.1455529"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1007\/11535218_14"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1145\/2660267.2660305"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/TMC.2014.2346785"},{"key":"ref50","first-page":"553","article-title":"AdSplit: Separating smartphone advertising from applications","author":"shekhar","year":"2012","journal-title":"Proc Usenix Secur Symp"},{"key":"ref51","doi-asserted-by":"publisher","DOI":"10.1145\/2523649.2523652"},{"key":"ref53","doi-asserted-by":"publisher","DOI":"10.1109\/SFCS.1997.646125"},{"key":"ref52","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2016.23485"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1145\/2742647.2742653"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1145\/2382196.2382266"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1109\/ICDCS.2015.38"},{"article-title":"GCreep: Google engineer stalked teens, spied on chats (updated)","year":"0","author":"chen","key":"ref12"},{"key":"ref13","first-page":"1","article-title":"Adnostic: Privacy preserving targeted advertising","author":"toubiana","year":"2010","journal-title":"Proc Symp Network and Distributed System Security"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2014.12.017"},{"key":"ref15","first-page":"169","article-title":"Privad: Practical privacy in online advertising","author":"guha","year":"2011","journal-title":"Proc 8th USENIX Conf Netw Syst Des Implementation"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2012.25"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2008.33"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-11212-1_8"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.2012.6195609"},{"year":"0","key":"ref4","article-title":"Mobile Marketing Statistics compilation"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/ICPP.2015.100"},{"year":"0","key":"ref6"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/TC.2015.2401032"},{"year":"0","key":"ref8"},{"year":"0","key":"ref7"},{"key":"ref49","doi-asserted-by":"publisher","DOI":"10.1145\/2414456.2414498"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/ICDCS.2015.37"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2016.23234"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1145\/2830834.2830839"},{"key":"ref48","article-title":"Longitudinal analysis of android ad library permissions","author":"book","year":"2013","journal-title":"Proc 3rd Workshop Mobile Secur Technol"},{"key":"ref47","first-page":"1","article-title":"Investigating user privacy in android ad libraries","author":"stevens","year":"2012","journal-title":"Proc 3rd Workshop Mobile Secur Technol"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1145\/2185448.2185464"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1145\/1999995.2000027"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1145\/2398776.2398812"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOMW.2014.6849290"}],"container-title":["IEEE Transactions on Services Computing"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/4629386\/9114375\/07909009.pdf?arnumber=7909009","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,4,27]],"date-time":"2022-04-27T17:12:11Z","timestamp":1651079531000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/7909009\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,5,1]]},"references-count":53,"journal-issue":{"issue":"3"},"URL":"https:\/\/doi.org\/10.1109\/tsc.2017.2697385","relation":{},"ISSN":["1939-1374","2372-0204"],"issn-type":[{"type":"electronic","value":"1939-1374"},{"type":"electronic","value":"2372-0204"}],"subject":[],"published":{"date-parts":[[2020,5,1]]}}}