{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,30]],"date-time":"2026-04-30T19:42:37Z","timestamp":1777578157348,"version":"3.51.4"},"publisher-location":"New York, NY, USA","reference-count":34,"publisher":"ACM","license":[{"start":{"date-parts":[[2019,4,18]],"date-time":"2019-04-18T00:00:00Z","timestamp":1555545600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2019,4,18]]},"DOI":"10.1145\/3299815.3314453","type":"proceedings-article","created":{"date-parts":[[2019,5,7]],"date-time":"2019-05-07T12:16:01Z","timestamp":1557231361000},"page":"176-181","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":34,"title":["Deep Learning-based Model to Fight Against Ad Click Fraud"],"prefix":"10.1145","author":[{"given":"G. S.","family":"Thejas","sequence":"first","affiliation":[{"name":"Florida International University, Miami, FL, USA"}]},{"given":"Kianoosh G.","family":"Boroojeni","sequence":"additional","affiliation":[{"name":"Florida International University, Miami, FL, USA"}]},{"given":"Kshitij","family":"Chandna","sequence":"additional","affiliation":[{"name":"Siddaganga Institute of Technology, Tumkur, Karnataka, India"}]},{"given":"Isha","family":"Bhatia","sequence":"additional","affiliation":[{"name":"R.V.College of Engineering, Bangalore, Karnataka, India"}]},{"given":"S. S.","family":"Iyengar","sequence":"additional","affiliation":[{"name":"Florida International University, Miami, FL, USA"}]},{"given":"N. R.","family":"Sunitha","sequence":"additional","affiliation":[{"name":"Siddaganga Institute of Technology, Tumkur, Karnataka, India"}]}],"member":"320","published-online":{"date-parts":[[2019,4,18]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1109\/ISCC.2011.5983854"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","unstructured":"M. Barreno B. Nelson A. Joseph and J. Tygar. 2010. The Security of Machine Learning. Machine Learning 81 2 (01 Nov 2010) pp. 121--148. 10.1007\/s10994-010-5188-5","DOI":"10.1007\/s10994-010-5188-5"},{"key":"e_1_3_2_1_3_1","first-page":"105","volume-title":"Security Evaluation of Support Vector Machines in Adversarial Environments. Springer International Publishing","author":"Biggio B.","unstructured":"B. Biggio, I. Corona, B. Nelson, B. B. Rubinstein, D. Maiorca, G. Fumera, G. Giacinto, and F. Roli. 2014. Security Evaluation of Support Vector Machines in Adversarial Environments. Springer International Publishing, Cham, pp. 105--153."},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2013.57"},{"key":"e_1_3_2_1_5_1","first-page":"97","volume-title":"Proceedings of the Asian Conference on Machine Learning (Proceedings of Machine Learning Research), Chun-Nan Hsu and Wee Sun Lee (Eds.)","volume":"20","author":"Biggio B.","unstructured":"B. Biggio, B. Nelson, and P. Laskov. 2011. Support Vector Machines Under Adversarial Label Noise. In Proceedings of the Asian Conference on Machine Learning (Proceedings of Machine Learning Research), Chun-Nan Hsu and Wee Sun Lee (Eds.), Vol. 20. PMLR, South Garden Hotels and Resorts, Taoyuan, Taiwain, pp. 97--112. http:\/\/proceedings.mlr.press\/v20\/biggio11.html"},{"key":"e_1_3_2_1_6_1","volume-title":"Keras: Deep Learning Library for Theano and Tensorflow. https:\/\/keras.io\/","author":"Chollet F.","year":"2015","unstructured":"F. Chollet. 2015. Keras: Deep Learning Library for Theano and Tensorflow. https:\/\/keras.io\/"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1109\/SERE-C.2012.13"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1145\/2594368.2594391"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1145\/2342356.2342394"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/2627534.2627538"},{"key":"e_1_3_2_1_11_1","first-page":"464","volume-title":"2016 14th Annual Conference on Privacy, Security and Trust (PST)","author":"Faou M.","unstructured":"M. Faou, A. Lemay, D. D\u00e9cary-H\u00e9tu, J. Calvet, F. Labr\u00e9che, M.Jean, B. Dupont, and J. M. Fernande. 2016. Follow the Traffic: Stopping Click Fraud by Disrupting the Value Chain. In 2016 14th Annual Conference on Privacy, Security and Trust (PST). Auckland, New Zealand, pp. 464--476."},{"key":"e_1_3_2_1_12_1","first-page":"249","volume-title":"Proceedings of the thirteenth international conference on artificial intelligence and statistics.","author":"Glorot X.","unstructured":"X. Glorot and Y. Bengio. 2010. Understanding the Difficulty of Training Deep Feedforward Neural Networks. In Proceedings of the thirteenth international conference on artificial intelligence and statistics. pp. 249--256."},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.5555\/2969033.2969125"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1145\/1764873.1764877"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2018.02.021"},{"key":"e_1_3_2_1_16_1","unstructured":"Kaggle.com. 2018. TalkingData AdTracking Fraud Detection Challenge. https:\/\/www.kaggle.com\/c\/talkingdata-adtracking-fraud-detection"},{"key":"e_1_3_2_1_17_1","volume-title":"Adam: A Method for Stochastic Optimization. arXiv eprints (Dec.","author":"Kingma D. P.","year":"2014","unstructured":"D. P. Kingma and J. Ba. 2014. Adam: A Method for Stochastic Optimization. arXiv eprints (Dec. 2014). arXiv:1412.6980"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.5555\/2969033.2969226"},{"key":"e_1_3_2_1_19_1","unstructured":"B. J. Kitts T. Najm and B. Burdick. 2008. Identifying Automated Click Fraud Programs. Abandoned May. 7th. 2007 Application on Nov. 13th. 2008."},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1016\/S0004-3702(97)00043-X"},{"key":"e_1_3_2_1_21_1","first-page":"85","volume-title":"PsyBoG: Power Spectral Density Analysis for Detecting Botnet Groups. In 2014 9th International Conference on Malicious and Unwanted Software: The Americas (MALWARE). PR, USA","author":"Kwon J.","unstructured":"J. Kwon, J. Kim, J. Lee, H. Lee, and A. Perrig. 2014. PsyBoG: Power Spectral Density Analysis for Detecting Botnet Groups. In 2014 9th International Conference on Malicious and Unwanted Software: The Americas (MALWARE). PR, USA, pp. 85--92."},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1145\/2742647.2742676"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.5555\/2616448.2616455"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1145\/1242572.1242606"},{"key":"e_1_3_2_1_25_1","unstructured":"B. Nelson B. Rubinstein L. Huang A. Joseph S. Lee S. Rao and J. Tygar. 2010. Query Strategies for Evading Convex-Inducing Classifiers. CoRR abs\/1007.0484 (2010). arXiv:1007.0484 http:\/\/arxiv.org\/abs\/1007.0484"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"crossref","unstructured":"A. Nisser and N. B. Weidman. 2016. Measuring Ethnic Preferences in Bosnia and Herzegovina with Mobile Advertising. PLOS ONE 11 12 (12 2016) pp. 1--11.","DOI":"10.1371\/journal.pone.0167779"},{"key":"e_1_3_2_1_27_1","first-page":"1","volume-title":"ETCF: An Ensemble Model for CTR Prediction. In 2018 15th International Conference on Service Systems and Service Management (ICSSSM)","author":"Qiu X.","unstructured":"X. Qiu, Y. Zuo, and G. Liu. 2018. ETCF: An Ensemble Model for CTR Prediction. In 2018 15th International Conference on Service Systems and Service Management (ICSSSM). Hangzhou, China, pp. 1--5."},{"key":"e_1_3_2_1_28_1","first-page":"323","volume-title":"Nature International Journal of Science","author":"Rumelhart D. E.","year":"1986","unstructured":"D. E. Rumelhart, G. E. Hinton, and R. J. Williams. 1986. Learning Representations by Back-propagating Errors. Nature International Journal of Science (1986), pp. 323--536."},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.5555\/2627435.2670313"},{"key":"e_1_3_2_1_30_1","first-page":"97","volume-title":"Proceedings of International Symposium on Sensor Networks, Systems and Security, Nageswara S.V. Rao, Richard R. Brooks, and Chase Q. Wu (Eds.). Springer International Publishing","author":"Thejas G. S.","unstructured":"G. S. Thejas, T. C. Pramod, S. S. Iyengar, and N. R. Sunitha. 2018. Intelligent Access Control: A Self-Adaptable Trust-Based Access Control (SATBAC) Framework Using Game Theory Strategy. In Proceedings of International Symposium on Sensor Networks, Systems and Security, Nageswara S.V. Rao, Richard R. Brooks, and Chase Q. Wu (Eds.). Springer International Publishing, Cham, pp. 97--111."},{"key":"e_1_3_2_1_31_1","first-page":"1","volume-title":"Huntsville","author":"Thejas G. S.","unstructured":"G. S. Thejas, J. Soni, K. Chandna, S. S. Iyengar, N. R. Sunitha, and N. Prabakar. 2019. Learning-Based Model to Fight against Fake Like Clicks on Instagram Posts. In SoutheastCon 2019. Huntsville, Alabama, USA, pp. 1--8. In press."},{"key":"e_1_3_2_1_32_1","first-page":"49","volume-title":"2016 IEEE 2nd International Conference on Big Data Security on Cloud, HPSC, and IDS. NY, USA","author":"Veeramachaneni K.","unstructured":"K. Veeramachaneni, I. Arnaldo, V. Korrapati, C. Bassias, and K. Li. 2016. AI 2: Training a Big Data Machine to Defend. In 2016 IEEE 2nd International Conference on Big Data Security on Cloud, HPSC, and IDS. NY, USA, pp. 49--54."},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1145\/1390156.1390294"},{"key":"e_1_3_2_1_34_1","unstructured":"J. Williams. 2014. Click Fraud - The 5 Most Common Forms of Click Fraud. https:\/\/fruition.net\/about\/blog\/types-click-fraud-detect\/"}],"event":{"name":"ACM SE '19: 2019 ACM Southeast Conference","location":"Kennesaw GA USA","acronym":"ACM SE '19","sponsor":["ACM Association for Computing Machinery"]},"container-title":["Proceedings of the 2019 ACM Southeast Conference"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3299815.3314453","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3299815.3314453","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T01:39:15Z","timestamp":1750210755000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3299815.3314453"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,4,18]]},"references-count":34,"alternative-id":["10.1145\/3299815.3314453","10.1145\/3299815"],"URL":"https:\/\/doi.org\/10.1145\/3299815.3314453","relation":{},"subject":[],"published":{"date-parts":[[2019,4,18]]},"assertion":[{"value":"2019-04-18","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}