{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,4]],"date-time":"2026-02-04T15:23:11Z","timestamp":1770218591156,"version":"3.49.0"},"publisher-location":"New York, NY, USA","reference-count":37,"publisher":"ACM","license":[{"start":{"date-parts":[[2015,10,17]],"date-time":"2015-10-17T00:00:00Z","timestamp":1445040000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2015,10,17]]},"DOI":"10.1145\/2806416.2806579","type":"proceedings-article","created":{"date-parts":[[2015,10,27]],"date-time":"2015-10-27T13:03:43Z","timestamp":1445951023000},"page":"1111-1120","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":17,"title":["Protecting Your Children from Inappropriate Content in Mobile Apps"],"prefix":"10.1145","author":[{"given":"Bing","family":"Hu","sequence":"first","affiliation":[{"name":"Samsung Research America, Mountain View, CA, USA"}]},{"given":"Bin","family":"Liu","sequence":"additional","affiliation":[{"name":"Rutgers University, Piscataway, NJ, USA"}]},{"given":"Neil Zhenqiang","family":"Gong","sequence":"additional","affiliation":[{"name":"Iowa State University, Ames, IA, USA"}]},{"given":"Deguang","family":"Kong","sequence":"additional","affiliation":[{"name":"Samsung Research America, Mountain View, CA, USA"}]},{"given":"Hongxia","family":"Jin","sequence":"additional","affiliation":[{"name":"Samsung Research America, Mountain View, CA, USA"}]}],"member":"320","published-online":{"date-parts":[[2015,10,17]]},"reference":[{"key":"e_1_3_2_1_1_1","volume-title":"https:\/\/support.google.com\/googleplay\/android-developer\/answer\/188189","author":"Andriod App","year":"2014","unstructured":"Andriod App Ratings 2014. https:\/\/support.google.com\/googleplay\/android-developer\/answer\/188189 , 2014 . Andriod App Ratings 2014. https:\/\/support.google.com\/googleplay\/android-developer\/answer\/188189, 2014."},{"key":"e_1_3_2_1_2_1","unstructured":"Apple Store new Apps. http:\/\/goo.gl\/ojrhp2.  Apple Store new Apps. http:\/\/goo.gl\/ojrhp2."},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1137\/1.9781611974010.74"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV.2013.28"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/2488388.2488407"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1145\/1961189.1961199"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1023\/A:1022627411411"},{"key":"e_1_3_2_1_8_1","article-title":"On the algorithmic implementation of multiclass kernel-based vector machines","volume":"2","author":"Crammer K.","year":"2002","unstructured":"K. Crammer and Y. Singer . On the algorithmic implementation of multiclass kernel-based vector machines . J. Mach. Learn. Res. , 2 , Mar. 2002 . K. Crammer and Y. Singer. On the algorithmic implementation of multiclass kernel-based vector machines. J. Mach. Learn. Res., 2, Mar. 2002.","journal-title":"J. Mach. Learn. Res."},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-01536-6_8"},{"key":"e_1_3_2_1_10_1","volume-title":"Usenix Security","author":"Dietz M.","year":"2011","unstructured":"M. Dietz , S. Shekhar , Y. Pisetsky , A. Shu , and D. S. Wallach . Quire: Lightweight provenance for smart phone operating systems . In Usenix Security , 2011 . M. Dietz, S. Shekhar, Y. Pisetsky, A. Shu, and D. S. Wallach. Quire: Lightweight provenance for smart phone operating systems. In Usenix Security, 2011."},{"key":"e_1_3_2_1_11_1","first-page":"9","article-title":"Liblinear: A library for large linear classification","author":"Fan R.","year":"2008","unstructured":"R. Fan , K. Chang , C. Hsieh , X. Wang , and C. Lin . Liblinear: A library for large linear classification . Journal of Machine Learning Research , 9 , 2008 . R. Fan, K. Chang, C. Hsieh, X. Wang, and C. Lin. Liblinear: A library for large linear classification. Journal of Machine Learning Research, 9, 2008.","journal-title":"Journal of Machine Learning Research"},{"key":"e_1_3_2_1_12_1","volume-title":"Usenix Security","author":"Felt A. P.","year":"2011","unstructured":"A. P. Felt , H. J. Wang , A. Moshchuk , S. Hanna , and E. Chin . Permission re-delegation: Attacks and defenses . In Usenix Security , 2011 . A. P. Felt, H. J. Wang, A. Moshchuk, S. Hanna, and E. Chin. Permission re-delegation: Attacks and defenses. In Usenix Security, 2011."},{"key":"e_1_3_2_1_13_1","volume-title":"Exposure to childhood sexual and physical abuse and adjustment in early adulthood. Child abuse & neglect, 32(6)","author":"Fergusson D. M.","year":"2008","unstructured":"D. M. Fergusson , J. M. Boden , and L. J. Horwood . Exposure to childhood sexual and physical abuse and adjustment in early adulthood. Child abuse & neglect, 32(6) , 2008 . D. M. Fergusson, J. M. Boden, and L. J. Horwood. Exposure to childhood sexual and physical abuse and adjustment in early adulthood. Child abuse & neglect, 32(6), 2008."},{"key":"e_1_3_2_1_14_1","volume-title":"Word","author":"Harris Z. S.","year":"1954","unstructured":"Z. S. Harris . Distributional structure . Word , 1954 . Z. S. Harris. Distributional structure. Word, 1954."},{"key":"e_1_3_2_1_15_1","unstructured":"Inappropriate content making its way to mobile apps. http:\/\/goo.gl\/dqi1cg.  Inappropriate content making its way to mobile apps. http:\/\/goo.gl\/dqi1cg."},{"key":"e_1_3_2_1_16_1","volume-title":"https:\/\/developer.apple.com\/library\/ios\/documentation\/LanguagesUtilities\/Conceptual\/iTunesConnect_Guide\/iTunesConnect_Guide.pdf","author":"App OS","year":"2014","unstructured":"i OS App Ratings 2014. https:\/\/developer.apple.com\/library\/ios\/documentation\/LanguagesUtilities\/Conceptual\/iTunesConnect_Guide\/iTunesConnect_Guide.pdf , 2014 . iOS App Ratings 2014. https:\/\/developer.apple.com\/library\/ios\/documentation\/LanguagesUtilities\/Conceptual\/iTunesConnect_Guide\/iTunesConnect_Guide.pdf, 2014."},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.5555\/572351"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1145\/2810103.2813689"},{"key":"e_1_3_2_1_19_1","first-page":"2352","volume-title":"CVPR","author":"Kong D.","year":"2012","unstructured":"D. Kong , C. H. Q. Ding , H. Huang , and H. Zhao . Multi-label relieff and f-statistic feature selections for image annotation . In CVPR , pages 2352 -- 2359 , 2012 . D. Kong, C. H. Q. Ding, H. Huang, and H. Zhao. Multi-label relieff and f-statistic feature selections for image annotation. In CVPR, pages 2352--2359, 2012."},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1137\/1.9781611974010.68"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1145\/2684822.2685322"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.5555\/311445"},{"key":"e_1_3_2_1_23_1","volume-title":"Efficient estimation of word representations in vector space. CoRR, abs\/1301.3781","author":"Mikolov T.","year":"2013","unstructured":"T. Mikolov , K. Chen , G. Corrado , and J. Dean . Efficient estimation of word representations in vector space. CoRR, abs\/1301.3781 , 2013 . T. Mikolov, K. Chen, G. Corrado, and J. Dean. Efficient estimation of word representations in vector space. CoRR, abs\/1301.3781, 2013."},{"key":"e_1_3_2_1_24_1","volume-title":"NIPS","author":"Mikolov T.","year":"2013","unstructured":"T. Mikolov , I. Sutskever , K. Chen , G. S. Corrado , and J. Dean . Distributed representations of words and phrases and their compositionality . In NIPS , 2013 . T. Mikolov, I. Sutskever, K. Chen, G. S. Corrado, and J. Dean. Distributed representations of words and phrases and their compositionality. In NIPS, 2013."},{"key":"e_1_3_2_1_25_1","unstructured":"Mobile Apps for Kids: Current Privacy Disclosures are Disappointing. http:\/\/goo.gl\/xr1udt.  Mobile Apps for Kids: Current Privacy Disclosures are Disappointing. http:\/\/goo.gl\/xr1udt."},{"key":"e_1_3_2_1_26_1","volume-title":"Usenix Security","author":"Octeau D.","year":"2013","unstructured":"D. Octeau , P. McDaniel , S. Jha , A. Bartel , E. Bodden , J. Klein , and Y. L. Traon . Effective inter-component communication mapping in android withepicc: An essential step towards holistic security analysis . In Usenix Security , 2013 . D. Octeau, P. McDaniel, S. Jha, A. Bartel, E. Bodden, J. Klein, and Y. L. Traon. Effective inter-component communication mapping in android withepicc: An essential step towards holistic security analysis. In Usenix Security, 2013."},{"key":"e_1_3_2_1_27_1","volume-title":"Greater exposure to sexual content in popular movies predicts earlier sexual debut and increased sexual risk taking. Psychological science, 23(9)","author":"O'Hara R. E.","year":"2012","unstructured":"R. E. O'Hara , F. X. Gibbons , M. Gerrard , Z. Li , and J. D. Sargent . Greater exposure to sexual content in popular movies predicts earlier sexual debut and increased sexual risk taking. Psychological science, 23(9) , 2012 . R. E. O'Hara, F. X. Gibbons, M. Gerrard, Z. Li, and J. D. Sargent. Greater exposure to sexual content in popular movies predicts earlier sexual debut and increased sexual risk taking. Psychological science, 23(9), 2012."},{"key":"e_1_3_2_1_28_1","unstructured":"Overexposed and Under-Prepared: The Effects of Early Exposure to Sexual Content. http:\/\/goo.gl\/x2whgr.  Overexposed and Under-Prepared: The Effects of Early Exposure to Sexual Content. http:\/\/goo.gl\/x2whgr."},{"key":"e_1_3_2_1_29_1","volume-title":"HCOMP 2013","author":"Sadilek A.","year":"2013","unstructured":"A. Sadilek , S. P. Brennan , H. A. Kautz , and V. Silenzio . nemesis: Which restaurants should you avoid today ? In HCOMP 2013 , 2013 . A. Sadilek, S. P. Brennan, H. A. Kautz, and V. Silenzio. nemesis: Which restaurants should you avoid today? In HCOMP 2013, 2013."},{"key":"e_1_3_2_1_30_1","first-page":"11","volume-title":"A statistical interpretation of term specificity and its application in retrieval","author":"Sp\u00e4rck-Jones K.","year":"1972","unstructured":"K. Sp\u00e4rck-Jones . A statistical interpretation of term specificity and its application in retrieval . pages 11 -- 21 , 1972 . K. Sp\u00e4rck-Jones. A statistical interpretation of term specificity and its application in retrieval. pages 11--21, 1972."},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1145\/2785830.2785845"},{"key":"e_1_3_2_1_32_1","unstructured":"Word2Vec Tool for Computing Continuous Distributed Representations of Words. https:\/\/code.google.com\/p\/word2vec\/.  Word2Vec Tool for Computing Continuous Distributed Representations of Words. https:\/\/code.google.com\/p\/word2vec\/."},{"key":"e_1_3_2_1_33_1","volume-title":"ICML 1997","author":"Yang Y.","year":"1997","unstructured":"Y. Yang and J. O. Pedersen . A comparative study on feature selection in text categorization . In ICML 1997 , 1997 . Y. Yang and J. O. Pedersen. A comparative study on feature selection in text categorization. In ICML 1997, 1997."},{"key":"e_1_3_2_1_34_1","volume-title":"Product title classification versus text classification","author":"Yu H.-F.","year":"2012","unstructured":"H.-F. Yu , C.-H. Ho , P. Arunachalam , M. Somaiya , and C.-J. Lin . Product title classification versus text classification . 2012 . H.-F. Yu, C.-H. Ho, P. Arunachalam, M. Somaiya, and C.-J. Lin. Product title classification versus text classification. 2012."},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1109\/JPROC.2012.2188013"},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2013.39"},{"issue":"8","key":"e_1_3_2_1_37_1","first-page":"1819","article-title":"A review on multi-label learning algorithms. Knowledge and Data Engineering","volume":"26","author":"Zhang M.-L.","year":"2014","unstructured":"M.-L. Zhang and Z.-H. Zhou . A review on multi-label learning algorithms. Knowledge and Data Engineering , IEEE Transactions on , 26 ( 8 ): 1819 -- 1837 , Aug 2014 . M.-L. Zhang and Z.-H. Zhou. A review on multi-label learning algorithms. Knowledge and Data Engineering, IEEE Transactions on, 26(8):1819--1837, Aug 2014.","journal-title":"IEEE Transactions on"}],"event":{"name":"CIKM'15: 24th ACM International Conference on Information and Knowledge Management","location":"Melbourne Australia","acronym":"CIKM'15","sponsor":["SIGWEB ACM Special Interest Group on Hypertext, Hypermedia, and Web","SIGIR ACM Special Interest Group on Information Retrieval"]},"container-title":["Proceedings of the 24th ACM International on Conference on Information and Knowledge Management"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2806416.2806579","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2806416.2806579","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T05:43:43Z","timestamp":1750225423000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2806416.2806579"}},"subtitle":["An Automatic Maturity Rating Framework"],"short-title":[],"issued":{"date-parts":[[2015,10,17]]},"references-count":37,"alternative-id":["10.1145\/2806416.2806579","10.1145\/2806416"],"URL":"https:\/\/doi.org\/10.1145\/2806416.2806579","relation":{},"subject":[],"published":{"date-parts":[[2015,10,17]]},"assertion":[{"value":"2015-10-17","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}