{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,13]],"date-time":"2026-04-13T15:44:02Z","timestamp":1776095042509,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":30,"publisher":"ACM","license":[{"start":{"date-parts":[[2015,5,18]],"date-time":"2015-05-18T00:00:00Z","timestamp":1431907200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2015,5,18]]},"DOI":"10.1145\/2742647.2742653","type":"proceedings-article","created":{"date-parts":[[2015,5,11]],"date-time":"2015-05-11T16:31:04Z","timestamp":1431361864000},"page":"59-73","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":55,"title":["MAdScope"],"prefix":"10.1145","author":[{"given":"Suman","family":"Nath","sequence":"first","affiliation":[{"name":"Microsoft Research, Redmond, WA, USA"}]}],"member":"320","published-online":{"date-parts":[[2015,5,18]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1145\/2566486.2567992"},{"key":"e_1_3_2_1_2_1","volume-title":"USENIX Security","author":"Bhoraskar R.","year":"2014","unstructured":"R. Bhoraskar , S. Han , J. Jeon , T. Azim , S. Chen , J. Jung , S. Nath , R. Wang , and D. Wetherall . Brahmastra: Driving apps to test the security of third-party components . In USENIX Security , 2014 . R. Bhoraskar, S. Han, J. Jeon, T. Azim, S. Chen, J. Jung, S. Nath, R. Wang, and D. Wetherall. Brahmastra: Driving apps to test the security of third-party components. In USENIX Security, 2014."},{"key":"e_1_3_2_1_3_1","volume-title":"Betrayed by Your Ads! In PETS- Privacy Enhancing Tools Symposium","author":"Castelluccia C.","year":"2012","unstructured":"C. Castelluccia , M. A. Kaafar , and T. Minh-Dung . Betrayed by Your Ads! In PETS- Privacy Enhancing Tools Symposium , 2012 . C. Castelluccia, M. A. Kaafar, and T. Minh-Dung. Betrayed by Your Ads! In PETS- Privacy Enhancing Tools Symposium, 2012."},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1145\/2525526.2525848"},{"issue":"2","key":"e_1_3_2_1_5_1","volume":"1","author":"Online Fraud B. S.","year":"2006","unstructured":"B. S. click-fraud with unwitting accessories. Mona gandhi and markus jakobsson and jacob ratkiewicz. Online Fraud , Part I Journal of Digital Forensic Practice , 1 ( 2 ), 2006 . B. S. click-fraud with unwitting accessories. Mona gandhi and markus jakobsson and jacob ratkiewicz. Online Fraud, Part I Journal of Digital Forensic Practice, 1(2), 2006.","journal-title":"Part I Journal of Digital Forensic Practice"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1145\/2594368.2594391"},{"key":"e_1_3_2_1_7_1","unstructured":"T. Danny. Flurry releases newest app use stats.myurlhttp:\/\/tech.co\/flurry-app-stats-2014-09.  T. Danny. Flurry releases newest app use stats.myurlhttp:\/\/tech.co\/flurry-app-stats-2014-09."},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1257\/jep.23.3.37"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1145\/2187836.2187852"},{"key":"e_1_3_2_1_10_1","unstructured":"GameHouse. Mobile advertising statistics ? 5 big trends you need to know!myurlhttp:\/\/partners.gamehouse.com\/mobile-advertising-statistics-5-big-trends-need-know\/.  GameHouse. Mobile advertising statistics ? 5 big trends you need to know!myurlhttp:\/\/partners.gamehouse.com\/mobile-advertising-statistics-5-big-trends-need-know\/."},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1287\/mksc.1100.0583"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/2185448.2185464"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1145\/1879141.1879152"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1145\/2594368.2594390"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1145\/2462456.2464436"},{"key":"e_1_3_2_1_16_1","volume-title":"USENIX Security","author":"L\u00e9cuyer M.","year":"2014","unstructured":"M. L\u00e9cuyer , G. Ducoffe , F. Lan , A. Papancea , T. Petsios , R. Spahn , A. Chaintreau , and R. Geambasu . Xray: Enhancing the web\\textquoterights transparency with differential correlation . In USENIX Security , 2014 . M. L\u00e9cuyer, G. Ducoffe, F. Lan, A. Papancea, T. Petsios, R. Spahn, A. Chaintreau, and R. Geambasu. Xray: Enhancing the web\\textquoterights transparency with differential correlation. In USENIX Security, 2014."},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1145\/2162081.2162084"},{"key":"e_1_3_2_1_18_1","volume-title":"USENIX NSDI","author":"Liu B.","year":"2014","unstructured":"B. Liu , S. Nath , R. Govindan , and J. Liu . DECAF: Detecting and characterizing ad fraud in mobile apps . In USENIX NSDI , 2014 . B. Liu, S. Nath, R. Govindan, and J. Liu. DECAF: Detecting and characterizing ad fraud in mobile apps. In USENIX NSDI, 2014."},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1145\/2465351.2465378"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1145\/2414456.2414498"},{"key":"e_1_3_2_1_21_1","unstructured":"T. Peterson. Google tests way to track consumers from mobile browsers to the apps they use.myurlhttp:\/\/adage.com\/article\/digital\/google-tie-mobile-web-app-trackers-ad-targeting\/294502\/.  T. Peterson. Google tests way to track consumers from mobile browsers to the apps they use.myurlhttp:\/\/adage.com\/article\/digital\/google-tie-mobile-web-app-trackers-ad-targeting\/294502\/."},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1145\/2594368.2594377"},{"key":"e_1_3_2_1_23_1","volume-title":"Betrayed by Your Ads! In USENIX NSDI","author":"Roesner F.","year":"2012","unstructured":"F. Roesner , T. Kohno , and D. Wetherall . Betrayed by Your Ads! In USENIX NSDI , 2012 . F. Roesner, T. Kohno, and D. Wetherall. Betrayed by Your Ads! In USENIX NSDI, 2012."},{"key":"e_1_3_2_1_24_1","volume-title":"USENIX Security Symposium","author":"Shekhar S.","year":"2012","unstructured":"S. Shekhar , M. Dietz , and D. S. Wallach . Adsplit: Separating smartphone advertising from applications . In USENIX Security Symposium , 2012 . S. Shekhar, M. Dietz, and D. S. Wallach. Adsplit: Separating smartphone advertising from applications. In USENIX Security Symposium, 2012."},{"key":"e_1_3_2_1_25_1","volume-title":"Text mining: classification, clustering, and applications","author":"Srivastava A. N.","year":"2010","unstructured":"A. N. Srivastava and M. Sahami . Text mining: classification, clustering, and applications . CRC Press , 2010 . A. N. Srivastava and M. Sahami. Text mining: classification, clustering, and applications. CRC Press, 2010."},{"key":"e_1_3_2_1_26_1","volume-title":"Investigating user privacy in android ad libraries","author":"Stevens R.","year":"2012","unstructured":"R. Stevens , C. Gibler , J. Crussell , , J. Erickson , and H. Chen . Investigating user privacy in android ad libraries . In IEEE Mobile Security Technologies (MoST) , 2012 . R. Stevens, C. Gibler, J. Crussell, , J. Erickson, and H. Chen. Investigating user privacy in android ad libraries. In IEEE Mobile Security Technologies (MoST), 2012."},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOMW.2014.6849290"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1145\/2398776.2398812"},{"key":"e_1_3_2_1_29_1","unstructured":"W3C. Same origin policy.myurlhttp:\/\/www.w3.org\/Security\/wiki\/Same\\_Origin\\_Policy.  W3C. Same origin policy.myurlhttp:\/\/www.w3.org\/Security\/wiki\/Same\\_Origin\\_Policy."},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1145\/1526709.1526745"}],"event":{"name":"MobiSys'15: The 13th Annual International Conference on Mobile Systems, Applications, and Services","location":"Florence Italy","acronym":"MobiSys'15","sponsor":["SIGMOBILE ACM Special Interest Group on Mobility of Systems, Users, Data and Computing","SIGOPS ACM Special Interest Group on Operating Systems"]},"container-title":["Proceedings of the 13th Annual International Conference on Mobile Systems, Applications, and Services"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2742647.2742653","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2742647.2742653","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T07:00:33Z","timestamp":1750230033000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2742647.2742653"}},"subtitle":["Characterizing Mobile In-App Targeted Ads"],"short-title":[],"issued":{"date-parts":[[2015,5,18]]},"references-count":30,"alternative-id":["10.1145\/2742647.2742653","10.1145\/2742647"],"URL":"https:\/\/doi.org\/10.1145\/2742647.2742653","relation":{},"subject":[],"published":{"date-parts":[[2015,5,18]]},"assertion":[{"value":"2015-05-18","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}