{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,7,15]],"date-time":"2025-07-15T03:37:05Z","timestamp":1752550625052,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":57,"publisher":"ACM","license":[{"start":{"date-parts":[[2019,12,3]],"date-time":"2019-12-03T00:00:00Z","timestamp":1575331200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/100011264","name":"Marie Curie","doi-asserted-by":"publisher","award":["690972"],"award-info":[{"award-number":["690972"]}],"id":[{"id":"10.13039\/100011264","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100007601","name":"Horizon 2020","doi-asserted-by":"publisher","award":["653449,786669,786741"],"award-info":[{"award-number":["653449,786669,786741"]}],"id":[{"id":"10.13039\/501100007601","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2019,12,3]]},"DOI":"10.1145\/3359989.3365428","type":"proceedings-article","created":{"date-parts":[[2019,12,5]],"date-time":"2019-12-05T14:07:37Z","timestamp":1575554857000},"page":"110-122","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":19,"title":["Beyond content analysis"],"prefix":"10.1145","author":[{"given":"Costas","family":"Iordanou","sequence":"first","affiliation":[{"name":"MPI-Informatics, Germany"}]},{"given":"Nicolas","family":"Kourtellis","sequence":"additional","affiliation":[{"name":"Telefonica Research, Spain"}]},{"given":"Juan Miguel","family":"Carrascosa","sequence":"additional","affiliation":[{"name":"LSTech"}]},{"given":"Claudio","family":"Soriente","sequence":"additional","affiliation":[{"name":"NEC Laboratories Europe"}]},{"given":"Ruben","family":"Cuevas","sequence":"additional","affiliation":[{"name":"Universidad Carlos III de Madrid"}]},{"given":"Nikolaos","family":"Laoutaris","sequence":"additional","affiliation":[{"name":"IMDEA Networks Institute"}]}],"member":"320","published-online":{"date-parts":[[2019,12,3]]},"reference":[{"key":"e_1_3_2_2_1_1","unstructured":"[n. d.]. Easylist - The primary filter list that removes most adverts from international webpages. https:\/\/easylist.to\/. ([n. d.]).  [n. d.]. Easylist - The primary filter list that removes most adverts from international webpages. https:\/\/easylist.to\/. ([n. d.])."},{"key":"e_1_3_2_2_2_1","unstructured":"1998. Children's Online Privacy Protection Act (COPPA). https:\/\/www.ftc.gov\/enforcement\/rules\/rulemaking-regulatory-reform-proceedings\/childrens-online-privacy-protection-rule. (1998). [Online: accessed 30-January-2019].  1998. Children's Online Privacy Protection Act (COPPA). https:\/\/www.ftc.gov\/enforcement\/rules\/rulemaking-regulatory-reform-proceedings\/childrens-online-privacy-protection-rule. (1998). [Online: accessed 30-January-2019]."},{"key":"e_1_3_2_2_3_1","unstructured":"adblockplus.org. 2019. Adblock Plus. Surf the web without annoying ads! https:\/\/adblockplus.org\/. (2019). [Online: accessed 30-January-2019].  adblockplus.org. 2019. Adblock Plus. Surf the web without annoying ads! https:\/\/adblockplus.org\/. (2019). [Online: accessed 30-January-2019]."},{"key":"e_1_3_2_2_4_1","unstructured":"adguard.com. 2019. Adguard AdBlocker browser extension. https:\/\/adguard.com\/en\/adguard-adblock-browser-extension\/overview.html. (2019). [Online: accessed 30-January-2019].  adguard.com. 2019. Adguard AdBlocker browser extension. https:\/\/adguard.com\/en\/adguard-adblock-browser-extension\/overview.html. (2019). [Online: accessed 30-January-2019]."},{"key":"e_1_3_2_2_5_1","unstructured":"Digital Advertising Alliance. 2019. YourAdChoices. http:\/\/youradchoices.com\/. (2019). [Online: accessed 30-January-2019].  Digital Advertising Alliance. 2019. YourAdChoices. http:\/\/youradchoices.com\/. (2019). [Online: accessed 30-January-2019]."},{"key":"e_1_3_2_2_6_1","volume-title":"Amazon Technologies","author":"Inc.","year":"2016","unstructured":"Inc. Amazon Technologies . 2016 . Personalized Landing Pages. https:\/\/patentimages.storage.googleapis.com\/72\/fb\/61\/7dd01f31aca7be\/US20160180389A1.pdf. (2016). [Online: accessed 30-January-2019]. Inc. Amazon Technologies. 2016. Personalized Landing Pages. https:\/\/patentimages.storage.googleapis.com\/72\/fb\/61\/7dd01f31aca7be\/US20160180389A1.pdf. (2016). [Online: accessed 30-January-2019]."},{"key":"e_1_3_2_2_7_1","unstructured":"A. Arrate J. G. Cabanas A. Cuevas M. Calderon and R. Cuevas. 2019. Large-scale analysis of user exposure to online advertising on Facebook. IEEE Access (2019).  A. Arrate J. G. Cabanas A. Cuevas M. Calderon and R. Cuevas. 2019. Large-scale analysis of user exposure to online advertising on Facebook. IEEE Access (2019)."},{"volume-title":"Proc. of the Conference on World Wide Web, (WWW'14)","author":"Barford P.","key":"e_1_3_2_2_8_1","unstructured":"P. Barford , I. Canadi , D. Krushevskaja , Q. Ma , and S. Muthukrishnan . 2014. Adscape: Harvesting and Analyzing Online Display Ads . In Proc. of the Conference on World Wide Web, (WWW'14) . P. Barford, I. Canadi, D. Krushevskaja, Q. Ma, and S. Muthukrishnan. 2014. Adscape: Harvesting and Analyzing Online Display Ads. In Proc. of the Conference on World Wide Web, (WWW'14)."},{"volume-title":"Proc. of the Internet measurement conference, (IMC'18)","author":"Bashir M.","key":"e_1_3_2_2_9_1","unstructured":"M. Bashir , S. Arshad , E. Kirda , W. Robertson , and C. Wilson . 2018. How Tracking Companies Circumvented Ad Blockers Using WebSockets . In Proc. of the Internet measurement conference, (IMC'18) . M. Bashir, S. Arshad, E. Kirda, W. Robertson, and C. Wilson. 2018. How Tracking Companies Circumvented Ad Blockers Using WebSockets. In Proc. of the Internet measurement conference, (IMC'18)."},{"volume-title":"Proc. of the USENIX Security Symposium, (SEC'16)","author":"Bashir M.","key":"e_1_3_2_2_10_1","unstructured":"M. Bashir , S. Arshad , W. Robertson , and C. Wilson . 2016. Tracing Information Flows Between Ad Exchanges Using Retargeted Ads . In Proc. of the USENIX Security Symposium, (SEC'16) . M. Bashir, S. Arshad, W. Robertson, and C. Wilson. 2016. Tracing Information Flows Between Ad Exchanges Using Retargeted Ads. In Proc. of the USENIX Security Symposium, (SEC'16)."},{"volume-title":"Proc. of Digital Information and Communication Technology and Its Applications.","author":"Boughareb D.","key":"e_1_3_2_2_11_1","unstructured":"D. Boughareb and N. Farah . 2011. Toward a Web Search Personalization Approach Based on Temporal Context . In Proc. of Digital Information and Communication Technology and Its Applications. D. Boughareb and N. Farah. 2011. Toward a Web Search Personalization Approach Based on Temporal Context. In Proc. of Digital Information and Communication Technology and Its Applications."},{"key":"e_1_3_2_2_12_1","unstructured":"P. Bradshaw. 2016. It's official: The Walking Dead helped elect Donald Trump. https:\/\/www.theguardian.com\/commentisfree\/2016\/nov\/23\/walking-elect-dead-trump-immigration-zombies. (2016). [Online: accessed 30-January-2019].  P. Bradshaw. 2016. It's official: The Walking Dead helped elect Donald Trump. https:\/\/www.theguardian.com\/commentisfree\/2016\/nov\/23\/walking-elect-dead-trump-immigration-zombies. (2016). [Online: accessed 30-January-2019]."},{"key":"e_1_3_2_2_13_1","unstructured":"C. Brooks. 2017. Invasion of Privacy: What Consumers Think of Personalized Online Ads. http:\/\/www.businessnewsdaily.com\/4632-online-shoppers-personal-ads.html. (2017). [Online: accessed 30-January-2019].  C. Brooks. 2017. Invasion of Privacy: What Consumers Think of Personalized Online Ads. http:\/\/www.businessnewsdaily.com\/4632-online-shoppers-personal-ads.html. (2017). [Online: accessed 30-January-2019]."},{"key":"e_1_3_2_2_14_1","unstructured":"Interactive Advertising Bureau. 2018. IAB Internet Advertising Revenue Report. https:\/\/www.iab.com\/wp-content\/uploads\/2018\/11\/REPORT-IAB-Internet-Advertising-Revenue-Report-HY-2018.pdf. (2018). [Online: accessed 30-January-2019].  Interactive Advertising Bureau. 2018. IAB Internet Advertising Revenue Report. https:\/\/www.iab.com\/wp-content\/uploads\/2018\/11\/REPORT-IAB-Internet-Advertising-Revenue-Report-HY-2018.pdf. (2018). [Online: accessed 30-January-2019]."},{"volume-title":"Proc. of the 38th Annual Symposium on Simulation, (ANSS'05)","author":"Burklen S.","key":"e_1_3_2_2_15_1","unstructured":"S. Burklen , P. J. Marron , S. Fritsch , and K. Rothermel . 2005. User Centric Walk: An Integrated Approach for Modeling the Browsing Behavior of Users on the Web . In Proc. of the 38th Annual Symposium on Simulation, (ANSS'05) . S. Burklen, P. J. Marron, S. Fritsch, and K. Rothermel. 2005. User Centric Walk: An Integrated Approach for Modeling the Browsing Behavior of Users on the Web. In Proc. of the 38th Annual Symposium on Simulation, (ANSS'05)."},{"volume-title":"Proc. of the 12th USENIX Conference on Networked Systems Design and Implementation, (NSDI'15)","author":"Butkiewicz M.","key":"e_1_3_2_2_16_1","unstructured":"M. Butkiewicz , D. Wang , Z. Wu , H. V. Madhyastha , and V. Sekar . 2015. KLOTSKI: Reprioritizing Web Content to Improve User Experience on Mobile Devices . In Proc. of the 12th USENIX Conference on Networked Systems Design and Implementation, (NSDI'15) . M. Butkiewicz, D. Wang, Z. Wu, H. V. Madhyastha, and V. Sekar. 2015. KLOTSKI: Reprioritizing Web Content to Improve User Experience on Mobile Devices. In Proc. of the 12th USENIX Conference on Networked Systems Design and Implementation, (NSDI'15)."},{"volume-title":"Proc. of the Conference on Emerging Networking Experiments and Technologies, (CoNEXT'15)","author":"Carrascosa J. M.","key":"e_1_3_2_2_17_1","unstructured":"J. M. Carrascosa , J. Mikians , R. Cuevas , V. Erramilli , and N. Laoutaris . 2015. I Always Feel Like Somebody's Watching Me: Measuring Online Behavioural Advertising . In Proc. of the Conference on Emerging Networking Experiments and Technologies, (CoNEXT'15) . J. M. Carrascosa, J. Mikians, R. Cuevas, V. Erramilli, and N. Laoutaris. 2015. I Always Feel Like Somebody's Watching Me: Measuring Online Behavioural Advertising. In Proc. of the Conference on Emerging Networking Experiments and Technologies, (CoNEXT'15)."},{"volume-title":"Proc. of the Conference on Privacy Enhancing Technologies, (PETS'12)","author":"Castelluccia C.","key":"e_1_3_2_2_18_1","unstructured":"C. Castelluccia , M. Kaafar , and M. Tran . 2012. Betrayed by Your Ads!: Reconstructing User Profiles from Targeted Ads . In Proc. of the Conference on Privacy Enhancing Technologies, (PETS'12) . C. Castelluccia, M. Kaafar, and M. Tran. 2012. Betrayed by Your Ads!: Reconstructing User Profiles from Targeted Ads. In Proc. of the Conference on Privacy Enhancing Technologies, (PETS'12)."},{"key":"e_1_3_2_2_19_1","doi-asserted-by":"crossref","unstructured":"C. Castellucciae A. C-F. Chan E. Mykletun and G. Tsudik. 2009. Efficient and Provably Secure Aggregation of Encrypted Data in Wireless Sensor Networks. ACM Trans. Sen. Netw. 5 (2009).  C. Castellucciae A. C-F. Chan E. Mykletun and G. Tsudik. 2009. Efficient and Provably Secure Aggregation of Encrypted Data in Wireless Sensor Networks. ACM Trans. Sen. Netw. 5 (2009).","DOI":"10.1145\/1525856.1525858"},{"volume-title":"Proc. of the International Conference on Management of Data, (SIGMOD'03)","author":"Cohen S.","key":"e_1_3_2_2_20_1","unstructured":"S. Cohen and Y. Matias . 2003. Spectral Bloom Filters . In Proc. of the International Conference on Management of Data, (SIGMOD'03) . S. Cohen and Y. Matias. 2003. Spectral Bloom Filters. In Proc. of the International Conference on Management of Data, (SIGMOD'03)."},{"key":"e_1_3_2_2_21_1","unstructured":"A. Datta M. C. Tschantz and A. Datta. 2014. Automated Experiments on Ad Privacy Settings: A Tale of Opacity Choice and Discrimination. CoRR abs\/1408.6491 (2014).  A. Datta M. C. Tschantz and A. Datta. 2014. Automated Experiments on Ad Privacy Settings: A Tale of Opacity Choice and Discrimination. CoRR abs\/1408.6491 (2014)."},{"key":"e_1_3_2_2_22_1","unstructured":"Electronic Frontier Foundation EFF. 2019. Do Not Track. https:\/\/www.eff.org\/issues\/do-not-track. (2019). [Online: accessed 30-January-2019].  Electronic Frontier Foundation EFF. 2019. Do Not Track. https:\/\/www.eff.org\/issues\/do-not-track. (2019). [Online: accessed 30-January-2019]."},{"key":"e_1_3_2_2_23_1","unstructured":"eff.org. 2018. Privacy Badger blocks spying ads and invisible trackers. https:\/\/www.eff.org\/privacybadger. (2018). [Online: accessed 30-January-2019].  eff.org. 2018. Privacy Badger blocks spying ads and invisible trackers. https:\/\/www.eff.org\/privacybadger. (2018). [Online: accessed 30-January-2019]."},{"key":"e_1_3_2_2_24_1","volume-title":"The General Data Protection Regulation (GDPR)","author":"European Commission","year":"2016","unstructured":"European Commission . 2018. Data protection in the EU , The General Data Protection Regulation (GDPR) ; Regulation (EU) 2016 \/679. https:\/\/ec.europa.eu\/info\/law\/law-topic\/data-protection\/. (2018). [Online: accessed 30-January-2019]. European Commission. 2018. Data protection in the EU, The General Data Protection Regulation (GDPR); Regulation (EU) 2016\/679. https:\/\/ec.europa.eu\/info\/law\/law-topic\/data-protection\/. (2018). [Online: accessed 30-January-2019]."},{"volume-title":"Proc. of the 24th USENIX Security Symposium.","author":"Everspaugh A.","key":"e_1_3_2_2_25_1","unstructured":"A. Everspaugh , R. Chatterjee , S. Scott , A. Juels , and T. Ristenpart . 2015. The Pythia PRF Service . In Proc. of the 24th USENIX Security Symposium. A. Everspaugh, R. Chatterjee, S. Scott, A. Juels, and T. Ristenpart. 2015. The Pythia PRF Service. In Proc. of the 24th USENIX Security Symposium."},{"key":"e_1_3_2_2_26_1","volume-title":"Building a RAPPOR with the Unknown: Privacy-Preserving Learning of Associations and Data Dictionaries. PoPETs","author":"Fanti G. C.","year":"2016","unstructured":"G. C. Fanti , V. Pihur , and \u00da. Erlingsson. 2016. Building a RAPPOR with the Unknown: Privacy-Preserving Learning of Associations and Data Dictionaries. PoPETs ( 2016 ). G. C. Fanti, V. Pihur, and \u00da. Erlingsson. 2016. Building a RAPPOR with the Unknown: Privacy-Preserving Learning of Associations and Data Dictionaries. PoPETs (2016)."},{"key":"e_1_3_2_2_27_1","unstructured":"FigureEight. 2019. Human-in-the-loop for Machine Learning. https:\/\/www.figure-eight.com\/. (2019). [Online: accessed 30-January-2019].  FigureEight. 2019. Human-in-the-loop for Machine Learning. https:\/\/www.figure-eight.com\/. (2019). [Online: accessed 30-January-2019]."},{"volume-title":"Proc. of the Second International Conference on Theory of Cryptography, (TTC'05)","author":"Freedman J. M.","key":"e_1_3_2_2_28_1","unstructured":"J. M. Freedman , Y. Ishai , B. Pinkas , and O. Reingold . 2005. Keyword Search and Oblivious Pseudorandom Functions . In Proc. of the Second International Conference on Theory of Cryptography, (TTC'05) . J. M. Freedman, Y. Ishai, B. Pinkas, and O. Reingold. 2005. Keyword Search and Oblivious Pseudorandom Functions. In Proc. of the Second International Conference on Theory of Cryptography, (TTC'05)."},{"key":"e_1_3_2_2_29_1","unstructured":"ghostery.com. 2019. Ghostery - Cleaner faster and safer browsing. https:\/\/www.ghostery.com\/. (2019). [Online: accessed 30-January-2019].  ghostery.com. 2019. Ghostery - Cleaner faster and safer browsing. https:\/\/www.ghostery.com\/. (2019). [Online: accessed 30-January-2019]."},{"key":"e_1_3_2_2_30_1","doi-asserted-by":"crossref","unstructured":"C. Graham and S. Muthukrishnan. 2005. An improved data stream summary: the count-min sketch and its applications. Journal of Algorithms 55 (2005).  C. Graham and S. Muthukrishnan. 2005. An improved data stream summary: the count-min sketch and its applications. Journal of Algorithms 55 (2005).","DOI":"10.1016\/j.jalgor.2003.12.001"},{"volume-title":"Proc. of the Internet measurement conference, (IMC'14)","author":"Hannak A.","key":"e_1_3_2_2_31_1","unstructured":"A. Hannak , G. Soeller , D. Lazer , A. Mislove , and C. Wilson . 2014. Measuring Price Discrimination and Steering on E-commerce Web Sites . In Proc. of the Internet measurement conference, (IMC'14) . A. Hannak, G. Soeller, D. Lazer, A. Mislove, and C. Wilson. 2014. Measuring Price Discrimination and Steering on E-commerce Web Sites. In Proc. of the Internet measurement conference, (IMC'14)."},{"volume-title":"Proc. of the Special Interest Group on Data Communication, (SIGCOMM'17)","author":"Iordanou C.","key":"e_1_3_2_2_32_1","unstructured":"C. Iordanou , C. Soriente , M. Sirivianos , and N. Laoutaris . 2017. Who is Fiddling with Prices? Building and Deploying a Watchdog Service for E-commerce . In Proc. of the Special Interest Group on Data Communication, (SIGCOMM'17) . C. Iordanou, C. Soriente, M. Sirivianos, and N. Laoutaris. 2017. Who is Fiddling with Prices? Building and Deploying a Watchdog Service for E-commerce. In Proc. of the Special Interest Group on Data Communication, (SIGCOMM'17)."},{"key":"e_1_3_2_2_33_1","unstructured":"iWnder. 2019. iWnder Simulator. https:\/\/github.com\/cosior\/AdSimulator. (2019).  iWnder. 2019. iWnder Simulator. https:\/\/github.com\/cosior\/AdSimulator. (2019)."},{"volume-title":"Proc. of the 6th Theory of Cryptography Conference on Theory of Cryptography, (TTC'09)","author":"Jarecki S.","key":"e_1_3_2_2_34_1","unstructured":"S. Jarecki and X. Liu . 2009. Efficient Oblivious Pseudorandom Function with Applications to Adaptive OT and Secure Computation of Set Intersection . In Proc. of the 6th Theory of Cryptography Conference on Theory of Cryptography, (TTC'09) . S. Jarecki and X. Liu. 2009. Efficient Oblivious Pseudorandom Function with Applications to Adaptive OT and Secure Computation of Set Intersection. In Proc. of the 6th Theory of Cryptography Conference on Theory of Cryptography, (TTC'09)."},{"volume-title":"Proc. of the 16th ACM Workshop on Hot Topics in Networks, (HotNets'17)","author":"Javaid H.","key":"e_1_3_2_2_35_1","unstructured":"H. Javaid , H. K. Khalil , Z. A. Uzmi , and I. A. Qazi . 2017. Online Advertising Under Internet Censorship . In Proc. of the 16th ACM Workshop on Hot Topics in Networks, (HotNets'17) . H. Javaid, H. K. Khalil, Z. A. Uzmi, and I. A. Qazi. 2017. Online Advertising Under Internet Censorship. In Proc. of the 16th ACM Workshop on Hot Topics in Networks, (HotNets'17)."},{"volume-title":"Proc. of the 22th USENIX Security Symposium.","author":"Keelveedhi S.","key":"e_1_3_2_2_36_1","unstructured":"S. Keelveedhi , M. Bellare , and T. Ristenpart . 2013. DupLESS: Server-Aided Encryption for Deduplicated Storage . In Proc. of the 22th USENIX Security Symposium. S. Keelveedhi, M. Bellare, and T. Ristenpart. 2013. DupLESS: Server-Aided Encryption for Deduplicated Storage. In Proc. of the 22th USENIX Security Symposium."},{"volume-title":"Proc. of the Privacy Enhancing Technologies, (PETS'11)","author":"Kursawe K.","key":"e_1_3_2_2_37_1","unstructured":"K. Kursawe , G. Danezis , and M. Kohlweiss . 2011. Privacy-Friendly Aggregation for the Smart-Grid . In Proc. of the Privacy Enhancing Technologies, (PETS'11) . K. Kursawe, G. Danezis, and M. Kohlweiss. 2011. Privacy-Friendly Aggregation for the Smart-Grid. In Proc. of the Privacy Enhancing Technologies, (PETS'11)."},{"key":"e_1_3_2_2_38_1","volume-title":"Proc. of the IEEE 106","author":"Laoutaris N.","year":"2018","unstructured":"N. Laoutaris . 2018 . Data Transparency: Concerns and Prospects . Proc. of the IEEE 106 (2018). N. Laoutaris. 2018. Data Transparency: Concerns and Prospects. Proc. of the IEEE 106 (2018)."},{"volume-title":"Proc. of the USENIX conference on Security Symposium, (SEC'14)","author":"Lecuyer M.","key":"e_1_3_2_2_39_1","unstructured":"M. Lecuyer , G. Ducoffe , F. Lan , A. Papancea , T. Petsios , R. Spahn , A. Chaintreau , and R. Geambasu . 2014. XRay: Enhancing the Web's Transparency with Differential Correlation . In Proc. of the USENIX conference on Security Symposium, (SEC'14) . M. Lecuyer, G. Ducoffe, F. Lan, A. Papancea, T. Petsios, R. Spahn, A. Chaintreau, and R. Geambasu. 2014. XRay: Enhancing the Web's Transparency with Differential Correlation. In Proc. of the USENIX conference on Security Symposium, (SEC'14)."},{"volume-title":"Proc. of the Conference on Computer and Communications Security, (CCS'15)","author":"Lecuyer M.","key":"e_1_3_2_2_40_1","unstructured":"M. Lecuyer , R. Spahn , Y. Spiliopolous , A. Chaintreau , R. Geambasu , and D. Hsu . 2015. Sunlight: Fine-grained Targeting Detection at Scale with Statistical Confidence . In Proc. of the Conference on Computer and Communications Security, (CCS'15) . M. Lecuyer, R. Spahn, Y. Spiliopolous, A. Chaintreau, R. Geambasu, and D. Hsu. 2015. Sunlight: Fine-grained Targeting Detection at Scale with Statistical Confidence. In Proc. of the Conference on Computer and Communications Security, (CCS'15)."},{"volume-title":"Proc. of the Workshop on Hot Topics in Networks, (HotNets'13)","author":"Liu B.","key":"e_1_3_2_2_41_1","unstructured":"B. Liu , A. Sheth , U. Weinsberg , J. Chandrashekar , and R. Govindan . 2013. AdReveal: Improving Transparency into Online Targeted Advertising . In Proc. of the Workshop on Hot Topics in Networks, (HotNets'13) . B. Liu, A. Sheth, U. Weinsberg, J. Chandrashekar, and R. Govindan. 2013. AdReveal: Improving Transparency into Online Targeted Advertising. In Proc. of the Workshop on Hot Topics in Networks, (HotNets'13)."},{"volume-title":"Proc. of 23rd Annual Network and Distributed System Security Symposium, (NDSS'16)","author":"Melis L.","key":"e_1_3_2_2_42_1","unstructured":"L. Melis , G. Danezis , and E. De Cristofaro . 2016. Efficient Private Statistics with Succinct Sketches . In Proc. of 23rd Annual Network and Distributed System Security Symposium, (NDSS'16) . L. Melis, G. Danezis, and E. De Cristofaro. 2016. Efficient Private Statistics with Succinct Sketches. In Proc. of 23rd Annual Network and Distributed System Security Symposium, (NDSS'16)."},{"volume-title":"Proc. of the Hot Topics in Networks, (HotNets'12)","author":"Mikians J.","key":"e_1_3_2_2_43_1","unstructured":"J. Mikians , L. Gyarmati , V. Erramilli , and N. Laoutaris . 2012. Detecting Price and Search Discrimination on the Internet . In Proc. of the Hot Topics in Networks, (HotNets'12) . J. Mikians, L. Gyarmati, V. Erramilli, and N. Laoutaris. 2012. Detecting Price and Search Discrimination on the Internet. In Proc. of the Hot Topics in Networks, (HotNets'12)."},{"volume-title":"Proc. of the Conference on emerging Networking EXperiments and Technologies, (CoNEXT'13)","author":"Mikians J.","key":"e_1_3_2_2_44_1","unstructured":"J. Mikians , L. Gyarmati , V. Erramilli , and N. Laoutaris . 2013. Crowd-assisted Search for Price Discrimination in e-Commerce: First Results . In Proc. of the Conference on emerging Networking EXperiments and Technologies, (CoNEXT'13) . J. Mikians, L. Gyarmati, V. Erramilli, and N. Laoutaris. 2013. Crowd-assisted Search for Price Discrimination in e-Commerce: First Results. In Proc. of the Conference on emerging Networking EXperiments and Technologies, (CoNEXT'13)."},{"key":"e_1_3_2_2_45_1","unstructured":"noscript.net. 2019. NoScript Firefox Extension. https:\/\/noscript.net\/. (2019). [Online: accessed 30-January-2019].  noscript.net. 2019. NoScript Firefox Extension. https:\/\/noscript.net\/. (2019). [Online: accessed 30-January-2019]."},{"volume-title":"Proc. of the 14th ACM Workshop on Hot Topics in Networks, (HotNets'15)","author":"Papaodyssefs F.","key":"e_1_3_2_2_46_1","unstructured":"F. Papaodyssefs , C. Iordanou , J. Blackburn , N. Laoutaris , and K. Papagiannaki . 2015. Web Identity Translator: Behavioral Advertising and Identity Privacy with WIT . In Proc. of the 14th ACM Workshop on Hot Topics in Networks, (HotNets'15) . F. Papaodyssefs, C. Iordanou, J. Blackburn, N. Laoutaris, and K. Papagiannaki. 2015. Web Identity Translator: Behavioral Advertising and Identity Privacy with WIT. In Proc. of the 14th ACM Workshop on Hot Topics in Networks, (HotNets'15)."},{"key":"e_1_3_2_2_47_1","doi-asserted-by":"crossref","unstructured":"J. Parra-Arnau J. P. Achara and C. Castelluccia. 2017. MyAdChoices: Bringing Transparency and Control to Online Advertising. ACM Trans. Web 11 (2017).  J. Parra-Arnau J. P. Achara and C. Castelluccia. 2017. MyAdChoices: Bringing Transparency and Control to Online Advertising. ACM Trans. Web 11 (2017).","DOI":"10.1145\/2996466"},{"volume-title":"Proc. of the USENIX Conference on Security Symposium, (SEC'17)","author":"Plane A.","key":"e_1_3_2_2_48_1","unstructured":"A. Plane , E. Redmiles , M. Mazurek , and M. Tschantz . 2017. Exploring User Perceptions of Discrimination in Online Targeted Advertising . In Proc. of the USENIX Conference on Security Symposium, (SEC'17) . A. Plane, E. Redmiles, M. Mazurek, and M. Tschantz. 2017. Exploring User Perceptions of Discrimination in Online Targeted Advertising. In Proc. of the USENIX Conference on Security Symposium, (SEC'17)."},{"volume-title":"Proc. of the Conference on Fairness, Accountability, and Transparency, (FAT*'19)","author":"Ribeiro F. N.","key":"e_1_3_2_2_49_1","unstructured":"F. N. Ribeiro , K. Saha , M. Babaei , L. Henrique , J. Messias , F. Benevenuto , O. Goga , K. P. Gummadi , and E. M. Redmiles . 2019. On Microtargeting Socially Divisive Ads: A Case Study of Russia-Linked Ad Campaigns on Facebook . In Proc. of the Conference on Fairness, Accountability, and Transparency, (FAT*'19) . F. N. Ribeiro, K. Saha, M. Babaei, L. Henrique, J. Messias, F. Benevenuto, O. Goga, K. P. Gummadi, and E. M. Redmiles. 2019. On Microtargeting Socially Divisive Ads: A Case Study of Russia-Linked Ad Campaigns on Facebook. In Proc. of the Conference on Fairness, Accountability, and Transparency, (FAT*'19)."},{"key":"e_1_3_2_2_50_1","unstructured":"B. Rody-Mantha. 2017. Mobile targeting: Where's the line between cool and creepy? http:\/\/mediaincanada.com\/2017\/03\/20\/when-it-comes-to-targeting-how-much-is-too-much-for-canadians\/. (2017). [Online: accessed 30-January-2019].  B. Rody-Mantha. 2017. Mobile targeting: Where's the line between cool and creepy? http:\/\/mediaincanada.com\/2017\/03\/20\/when-it-comes-to-targeting-how-much-is-too-much-for-canadians\/. (2017). [Online: accessed 30-January-2019]."},{"key":"e_1_3_2_2_51_1","unstructured":"E. T. Schneiderman. 2016. A.G. Schneiderman Announces Results Of \"Operation Child Tracker\". https:\/\/ag.ny.gov\/press-release\/. (2016). [Online: accessed 30-January-2019].  E. T. Schneiderman. 2016. A.G. Schneiderman Announces Results Of \"Operation Child Tracker\". https:\/\/ag.ny.gov\/press-release\/. (2016). [Online: accessed 30-January-2019]."},{"volume-title":"Density Estimation for Statistics and Data Analysis","author":"Silverman B. W.","key":"e_1_3_2_2_52_1","unstructured":"B. W. Silverman . 1986. Density Estimation for Statistics and Data Analysis . Chapman and Hall\/CRC. B. W. Silverman. 1986. Density Estimation for Statistics and Data Analysis. Chapman and Hall\/CRC."},{"key":"e_1_3_2_2_53_1","unstructured":"State of California. 2018. California Consumer Privacy Act - Assembly Bill No. 375. https:\/\/leginfo.legislature.ca.gov\/faces\/billTextClient.xhtml?bill_id=201720180AB375. (2018). [Online: accessed 30-January-2019].  State of California. 2018. California Consumer Privacy Act - Assembly Bill No. 375. https:\/\/leginfo.legislature.ca.gov\/faces\/billTextClient.xhtml?bill_id=201720180AB375. (2018). [Online: accessed 30-January-2019]."},{"volume-title":"Proc. of the 2015 IEEE Symposium on Security and Privacy, (SP'15)","author":"Thomas K.","key":"e_1_3_2_2_54_1","unstructured":"K. Thomas , E. Bursztein , C. Grier , G. Ho , N. Jagpal , A. Kapravelos , D. Mccoy , A. Nappa , V. Paxson , P. Pearce , N. Provos , and M. A. Rajab . 2015. Ad Injection at Scale: Assessing Deceptive Advertisement Modifications . In Proc. of the 2015 IEEE Symposium on Security and Privacy, (SP'15) . K. Thomas, E. Bursztein, C. Grier, G. Ho, N. Jagpal, A. Kapravelos, D. Mccoy, A. Nappa, V. Paxson, P. Pearce, N. Provos, and M. A. Rajab. 2015. Ad Injection at Scale: Assessing Deceptive Advertisement Modifications. In Proc. of the 2015 IEEE Symposium on Security and Privacy, (SP'15)."},{"volume-title":"Proc. of the 17th ACM Workshop on Hot Topics in Networks, (HotNets'18)","author":"Venkatadri G.","key":"e_1_3_2_2_55_1","unstructured":"G. Venkatadri , A. Mislove , and K. P. Gummadi . 2018. Treads: Transparency-Enhancing Ads . In Proc. of the 17th ACM Workshop on Hot Topics in Networks, (HotNets'18) . G. Venkatadri, A. Mislove, and K. P. Gummadi. 2018. Treads: Transparency-Enhancing Ads. In Proc. of the 17th ACM Workshop on Hot Topics in Networks, (HotNets'18)."},{"volume-title":"Proc. of the Workshop on Privacy in the Electronic Society, (WPES'12)","author":"Wills C. E.","key":"e_1_3_2_2_56_1","unstructured":"C. E. Wills and C. Tatar . 2012. Understanding What They Do with What They Know . In Proc. of the Workshop on Privacy in the Electronic Society, (WPES'12) . C. E. Wills and C. Tatar. 2012. Understanding What They Do with What They Know. In Proc. of the Workshop on Privacy in the Electronic Society, (WPES'12)."},{"key":"e_1_3_2_2_57_1","unstructured":"youradchoices.com. 2019. YourAdChoices Gives You Control. http:\/\/youradchoices.com\/. (2019). [Online: accessed 30-January-2019].  youradchoices.com. 2019. YourAdChoices Gives You Control. http:\/\/youradchoices.com\/. (2019). [Online: accessed 30-January-2019]."}],"event":{"name":"CoNEXT '19: The 15th International Conference on emerging Networking EXperiments and Technologies","sponsor":["SIGCOMM ACM Special Interest Group on Data Communication"],"location":"Orlando Florida","acronym":"CoNEXT '19"},"container-title":["Proceedings of the 15th International Conference on Emerging Networking Experiments And Technologies"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3359989.3365428","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3359989.3365428","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T23:13:28Z","timestamp":1750202008000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3359989.3365428"}},"subtitle":["detecting targeted ads via distributed counting"],"short-title":[],"issued":{"date-parts":[[2019,12,3]]},"references-count":57,"alternative-id":["10.1145\/3359989.3365428","10.1145\/3359989"],"URL":"https:\/\/doi.org\/10.1145\/3359989.3365428","relation":{},"subject":[],"published":{"date-parts":[[2019,12,3]]},"assertion":[{"value":"2019-12-03","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}