{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,15]],"date-time":"2025-11-15T17:13:47Z","timestamp":1763226827797,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":30,"publisher":"ACM","license":[{"start":{"date-parts":[[2020,4,20]],"date-time":"2020-04-20T00:00:00Z","timestamp":1587340800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2020,4,20]]},"DOI":"10.1145\/3366423.3380161","type":"proceedings-article","created":{"date-parts":[[2020,5,4]],"date-time":"2020-05-04T08:11:44Z","timestamp":1588579904000},"page":"808-815","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":26,"title":["Don\u2019t Count Me Out: On the Relevance of IP\u00a0Address in\u00a0the\u00a0Tracking\u00a0Ecosystem"],"prefix":"10.1145","author":[{"given":"Vikas","family":"Mishra","sequence":"first","affiliation":[{"name":"Inria \/ Univ. Lille"}]},{"given":"Pierre","family":"Laperdrix","sequence":"additional","affiliation":[{"name":"CNRS \/ Univ. Lille \/ Inria"}]},{"given":"Antoine","family":"Vastel","sequence":"additional","affiliation":[{"name":"Univ. Lille \/ Inria"}]},{"given":"Walter","family":"Rudametkin","sequence":"additional","affiliation":[{"name":"Univ. Lille \/ Inria"}]},{"given":"Romain","family":"Rouvoy","sequence":"additional","affiliation":[{"name":"Univ. Lille \/ Inria \/ IUF"}]},{"given":"Martin","family":"Lopatka","sequence":"additional","affiliation":[{"name":"Mozilla"}]}],"member":"320","published-online":{"date-parts":[[2020,4,20]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"2019. Tor Browser - Tor Project Official website. https:\/\/www.torproject.org\/projects\/torbrowser.html.  2019. Tor Browser - Tor Project Official website. https:\/\/www.torproject.org\/projects\/torbrowser.html."},{"key":"e_1_3_2_1_2_1","unstructured":"Accessed on 2019-10-04. AmIUnique: Platform to collect browser fingerprints. https:\/\/amiunique.org  Accessed on 2019-10-04. AmIUnique: Platform to collect browser fingerprints. https:\/\/amiunique.org"},{"key":"e_1_3_2_1_3_1","unstructured":"AdBlock. 2018. AdBlock. https:\/\/getadblock.com\/  AdBlock. 2018. AdBlock. https:\/\/getadblock.com\/"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1145\/2508859.2516735"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"crossref","unstructured":"Mika\u00a0D Ayenson Dietrich\u00a0James Wambach Ashkan Soltani Nathan Good and Chris\u00a0Jay Hoofnagle. 2011. Flash cookies and privacy II: Now with HTML5 and ETag respawning. Available at SSRN 1898390(2011).  Mika\u00a0D Ayenson Dietrich\u00a0James Wambach Ashkan Soltani Nathan Good and Chris\u00a0Jay Hoofnagle. 2011. Flash cookies and privacy II: Now with HTML5 and ETag respawning. Available at SSRN 1898390(2011).","DOI":"10.2139\/ssrn.1898390"},{"key":"e_1_3_2_1_6_1","unstructured":"Facebook business. 2019. Help your ads find the people who will love your business.https:\/\/www.facebook.com\/business\/ads\/ad-targeting  Facebook business. 2019. Help your ads find the people who will love your business.https:\/\/www.facebook.com\/business\/ads\/ad-targeting"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"crossref","unstructured":"Yves-Alexandre De\u00a0Montjoye C\u00e9sar\u00a0A Hidalgo Michel Verleysen and Vincent\u00a0D Blondel. 2013. Unique in the crowd: The privacy bounds of human mobility. Scientific reports 3(2013) 1376.  Yves-Alexandre De\u00a0Montjoye C\u00e9sar\u00a0A Hidalgo Michel Verleysen and Vincent\u00a0D Blondel. 2013. Unique in the crowd: The privacy bounds of human mobility. Scientific reports 3(2013) 1376.","DOI":"10.1038\/srep01376"},{"key":"e_1_3_2_1_8_1","unstructured":"Arthur Edelstein. 2019. Protections Against Fingerprinting and Cryptocurrency Mining Available in Firefox Nightly and Beta. https:\/\/blog.mozilla.org\/futurereleases\/2019\/04\/09\/protections-against-fingerprinting-and-cryptocurrency-mining-available-in-firefox-nightly-and-beta\/  Arthur Edelstein. 2019. Protections Against Fingerprinting and Cryptocurrency Mining Available in Firefox Nightly and Beta. https:\/\/blog.mozilla.org\/futurereleases\/2019\/04\/09\/protections-against-fingerprinting-and-cryptocurrency-mining-available-in-firefox-nightly-and-beta\/"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1145\/2976749.2978313"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/2736277.2741679"},{"key":"e_1_3_2_1_11_1","unstructured":"Electronic\u00a0Frontier Foundation. 2018. Privacy Badger. https:\/\/www.eff.org\/fr\/node\/99095  Electronic\u00a0Frontier Foundation. 2018. Privacy Badger. https:\/\/www.eff.org\/fr\/node\/99095"},{"key":"e_1_3_2_1_12_1","unstructured":"Cliqz\u00a0International GmbH. 2018. Ghostery. https:\/\/www.ghostery.com  Cliqz\u00a0International GmbH. 2018. Ghostery. https:\/\/www.ghostery.com"},{"key":"e_1_3_2_1_13_1","unstructured":"Eyeo GmbH. 2018. Adblock Plus. https:\/\/adblockplus.org\/  Eyeo GmbH. 2018. Adblock Plus. https:\/\/adblockplus.org\/"},{"key":"e_1_3_2_1_14_1","unstructured":"Raymond Hill. 2018. uBlock Origin - An efficient blocker for Chromium and Firefox. Fast and lean.https:\/\/github.com\/gorhill\/uBlock  Raymond Hill. 2018. uBlock Origin - An efficient blocker for Chromium and Firefox. Fast and lean.https:\/\/github.com\/gorhill\/uBlock"},{"volume-title":"ADGRAPH: A Graph-Based Approach to Ad and Tracker Blocking","year":"2020","author":"Iqbal Umar","key":"e_1_3_2_1_15_1"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2016.57"},{"key":"e_1_3_2_1_17_1","article-title":"Exposing the Invisible Web: An Analysis of Third-Party HTTP Requests on 1 Million Websites","volume":"9","author":"Libert Timothy","year":"2015","journal-title":"International Journal of Communication"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM.2018.8486223"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1145\/1644893.1644904"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2012.47"},{"volume-title":"Resident Evil: Understanding residential ip proxy as a dark service. In Resident Evil: Understanding Residential IP Proxy as a Dark Service","year":"2019","author":"Mi Xianghang","key":"e_1_3_2_1_21_1"},{"key":"e_1_3_2_1_22_1","unstructured":"Opera. 2019. Free VPN | Browser with built-in VPN | Download | Opera. https:\/\/www.opera.com\/computer\/features\/free-vpn  Opera. 2019. Free VPN | Browser with built-in VPN | Download | Opera. https:\/\/www.opera.com\/computer\/features\/free-vpn"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1145\/2987443.2987461"},{"key":"e_1_3_2_1_24_1","unstructured":"Justin Schuh. 2019. Building a more private web. https:\/\/www.blog.google\/products\/chrome\/building-a-more-private-web\/  Justin Schuh. 2019. Building a more private web. https:\/\/www.blog.google\/products\/chrome\/building-a-more-private-web\/"},{"volume-title":"FP-STALKER: Tracking Browser Fingerprint Evolutions","year":"2018","author":"Vastel Antoine","key":"e_1_3_2_1_25_1"},{"key":"e_1_3_2_1_26_1","unstructured":"John Wilander. 2017. Intelligent Tracking Prevention | WebKit. https:\/\/webkit.org\/blog\/7675\/intelligent-tracking-prevention\/  John Wilander. 2017. Intelligent Tracking Prevention | WebKit. https:\/\/webkit.org\/blog\/7675\/intelligent-tracking-prevention\/"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-08506-7_16"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"crossref","unstructured":"Yinglian Xie Fang Yu Kannan Achan Eliot Gillum Moises Goldszmidt and Ted Wobber. 2007. How dynamic are IP addresses?. In ACM SIGCOMM Computer Communication Review Vol.\u00a037. ACM 301\u2013312.  Yinglian Xie Fang Yu Kannan Achan Eliot Gillum Moises Goldszmidt and Ted Wobber. 2007. How dynamic are IP addresses?. In ACM SIGCOMM Computer Communication Review Vol.\u00a037. ACM 301\u2013312.","DOI":"10.1145\/1282427.1282415"},{"key":"e_1_3_2_1_29_1","unstructured":"Ting-Fang Yen Yinglian Xie Fang Yu Roger\u00a0Peng Yu and Martin Abadi. 2012. Host Fingerprinting and Tracking on the Web: Privacy and Security Implications.. In NDSS Vol.\u00a062. Citeseer 66.  Ting-Fang Yen Yinglian Xie Fang Yu Roger\u00a0Peng Yu and Martin Abadi. 2012. Host Fingerprinting and Tracking on the Web: Privacy and Security Implications.. In NDSS Vol.\u00a062. Citeseer 66."},{"volume-title":"26th USENIX Security Symposium (USENIX Security 17)","year":"2017","author":"Zimmeck Sebastian","key":"e_1_3_2_1_30_1"}],"event":{"name":"WWW '20: The Web Conference 2020","sponsor":["SIGWEB ACM Special Interest Group on Hypertext, Hypermedia, and Web"],"location":"Taipei Taiwan","acronym":"WWW '20"},"container-title":["Proceedings of The Web Conference 2020"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3366423.3380161","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3366423.3380161","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T22:33:00Z","timestamp":1750199580000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3366423.3380161"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,4,20]]},"references-count":30,"alternative-id":["10.1145\/3366423.3380161","10.1145\/3366423"],"URL":"https:\/\/doi.org\/10.1145\/3366423.3380161","relation":{},"subject":[],"published":{"date-parts":[[2020,4,20]]},"assertion":[{"value":"2020-04-20","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}