{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,15]],"date-time":"2025-12-15T23:42:10Z","timestamp":1765842130328,"version":"3.48.0"},"publisher-location":"New York, NY, USA","reference-count":91,"publisher":"ACM","license":[{"start":{"date-parts":[[2020,10,27]],"date-time":"2020-10-27T00:00:00Z","timestamp":1603756800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"European Research Council (ERC) Starting Grant ResolutioNet","award":["ERC-StG-679158"],"award-info":[{"award-number":["ERC-StG-679158"]}]},{"name":"European Union Horizon 2020 research and innovation programme","award":["871370 - PIMCity"],"award-info":[{"award-number":["871370 - PIMCity"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2020,10,27]]},"DOI":"10.1145\/3419394.3423653","type":"proceedings-article","created":{"date-parts":[[2020,10,22]],"date-time":"2020-10-22T20:30:22Z","timestamp":1603398622000},"page":"619-633","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":7,"title":["Identifying Sensitive URLs at Web-Scale"],"prefix":"10.1145","author":[{"given":"Srdjan","family":"Matic","sequence":"first","affiliation":[{"name":"TU Berlin"}]},{"given":"Costas","family":"Iordanou","sequence":"additional","affiliation":[{"name":"Cyprus University of Technology"}]},{"given":"Georgios","family":"Smaragdakis","sequence":"additional","affiliation":[{"name":"TU Berlin"}]},{"given":"Nikolaos","family":"Laoutaris","sequence":"additional","affiliation":[{"name":"IMDEA Networks Institute"}]}],"member":"320","published-online":{"date-parts":[[2020,10,27]]},"reference":[{"key":"e_1_3_2_2_1_1","unstructured":"1998. Children's Online Privacy Protection Act (COPPA). https:\/\/www.ftc.gov\/enforcement\/rules\/rulemaking-regulatory-reformproceedings\/childrens-online-privacy-protection-rule."},{"key":"e_1_3_2_2_2_1","unstructured":"2020. Brand Safety by Oracle. https:\/\/www.oracle.com\/data-cloud\/brand-safety-suitability\/."},{"key":"e_1_3_2_2_3_1","unstructured":"2020. Brand Safety Controls | Facebook Business Help Center. https:\/\/www. facebook.com\/business\/help\/1926878614264962?id=1769156093197771."},{"key":"e_1_3_2_2_4_1","unstructured":"2020. gensim v.3.8.1. https:\/\/pypi.org\/project\/gensim\/3.8.1\/."},{"key":"e_1_3_2_2_5_1","unstructured":"2020. sklearn CountVectorizer. https:\/\/scikit-learn.org\/stable\/modules\/generated\/sklearn.feature_extraction.text.CountVectorizer.html."},{"key":"e_1_3_2_2_6_1","unstructured":"2020. sklearn TfidfVectorizer. https:\/\/scikit-learn.org\/stable\/modules\/generated\/sklearn.feature_extraction.text.TfidfVectorizer.html."},{"key":"e_1_3_2_2_7_1","unstructured":"2020. sklearn v.0.21.3. https:\/\/scikit-learn.org\/stable\/whats_new\/v0.21.html."},{"key":"e_1_3_2_2_8_1","volume-title":"Wild: Analyzing Internet Filtering in Syria. In ACM IMC.","author":"Abdelberi C.","year":"2014","unstructured":"C. Abdelberi, T. Chen, M. Cunche, E. De Cristofaro, A. Friedman, and M. A. K\u00e2afar. 2014. Censorship in the Wild: Analyzing Internet Filtering in Syria. In ACM IMC."},{"key":"e_1_3_2_2_9_1","doi-asserted-by":"crossref","unstructured":"A. B. Adetunji J. P. Oguntoye O. D. Fenwa and N. O. Akande. 2018. Web Document Classification Using Na\u00efve Bayes. Advances in Mathematics and Computer Science 29 (2018).","DOI":"10.9734\/JAMCS\/2018\/34128"},{"key":"e_1_3_2_2_10_1","unstructured":"G. Aggarwal E. Bursztein C. Jackson and D. Boneh. 2010. An Analysis of Private Browsing Modes in Modern Browsers. In USENIX Security."},{"key":"e_1_3_2_2_11_1","unstructured":"Alexa Internet. 2019. Alexa top websites by category. https:\/\/www.alexa.com\/topsites\/category."},{"key":"e_1_3_2_2_12_1","doi-asserted-by":"crossref","unstructured":"L. Arras F. Horn G. Montavon K-R M\u00fcller and W. Samek. 2017. What is relevant in a text document: An interpretable machine learning approach. PLOS One (2017).","DOI":"10.1371\/journal.pone.0181142"},{"key":"e_1_3_2_2_13_1","unstructured":"R. Balebako P. G. Le\u00f3n R. Shay B. Ur Y.Wang and L. F. Cranor. 2012. Measuring the Effectiveness of Privacy Tools for Limiting Behavioral Advertising. In W2SP Workshop."},{"key":"e_1_3_2_2_14_1","volume-title":"Regular Contents: Dissecting the Web Hosting Ecosystem. In IFIP Networking.","author":"Bangera P.","year":"2017","unstructured":"P. Bangera and S. Gorinsky. 2017. Ads versus Regular Contents: Dissecting the Web Hosting Ecosystem. In IFIP Networking."},{"key":"e_1_3_2_2_15_1","unstructured":"M. A. Bashir S. Arshad W. Robertson and C. Wilson. 2016. Tracing Information Flows Between Ad Exchanges Using Retargeted Ads. In USENIX Security."},{"key":"e_1_3_2_2_16_1","unstructured":"E. Baykan M. Henzinger L. Marian and I. Weber. 2009. In WWW."},{"key":"e_1_3_2_2_17_1","doi-asserted-by":"crossref","unstructured":"E. Baykan M. Henzinger L. Marian and I. Weber. 2011. A comprehensive study of features and algorithms for URL-based topic classification. ACM Transactions on the Web (TWEB) 5 3 (2011).","DOI":"10.1145\/1993053.1993057"},{"key":"e_1_3_2_2_18_1","unstructured":"J. G. Cabanas A. Cuevas and R. Cuevas. 2018. Facebook Use of Sensitive Data for Advertising in Europe. arXiv:cs.SI\/1802.05030"},{"key":"e_1_3_2_2_19_1","doi-asserted-by":"crossref","unstructured":"P. Calado M. Cristo E. Moura N. Ziviani B. Ribeiro-Neto and M. A. Gon\u00e7alves. 2003. Combining Link-based and Content-based Methods for Web Document Classification. In ACM CIKM.","DOI":"10.1145\/956935.956938"},{"key":"e_1_3_2_2_20_1","doi-asserted-by":"crossref","unstructured":"J. M. Carrascosa J. Mikians R. Cuevas V. Erramilli and N. Laoutaris. 2015. I Always Fell Like Somebody's Watching Me. Measuring Online Behavioral Advertising. In ACM CoNEXT.","DOI":"10.1145\/2716281.2836098"},{"key":"e_1_3_2_2_21_1","doi-asserted-by":"crossref","unstructured":"S. Chakrabarti S. Roy and M. V. Soundalgekar. 2003. Fast and accurate text classification via multiple linear discriminant projections. The VLDB Journal 12 (2003).","DOI":"10.1007\/s00778-003-0098-9"},{"key":"e_1_3_2_2_22_1","volume-title":"Web page classification based on a support vector machine using a weighted vote schema. Expert Systems with Applications 31","author":"Chen R.-C.","year":"2006","unstructured":"R.-C. Chen and C.-H. Hsieh. 2006. Web page classification based on a support vector machine using a weighted vote schema. Expert Systems with Applications 31 (2006)."},{"volume-title":"Proc. of the Eighteenth National Conference on Artificial Intelligence.","author":"Chieu H. L.","key":"e_1_3_2_2_23_1","unstructured":"H. L. Chieu and H. T. Ng. 2002. A Maximum Entropy Approach to Information Extraction from Semi-structured and Free Text. In Proc. of the Eighteenth National Conference on Artificial Intelligence."},{"key":"e_1_3_2_2_24_1","unstructured":"Common Crawl. 2018. August Crawl Archive Introduces Language Annotations. https:\/\/commoncrawl.org\/2018\/08\/august-2018-crawl-archive-now-available\/."},{"key":"e_1_3_2_2_25_1","unstructured":"Common Crawl. 2020. Commn Crawl. http:\/\/commoncrawl.org\/."},{"key":"e_1_3_2_2_26_1","unstructured":"Common Crawl. 2020. So you're ready to get started. https:\/\/commoncrawl.org\/the-data\/get-started\/."},{"key":"e_1_3_2_2_27_1","unstructured":"Curlie.org. 2018. How to Get Curlie Data. https:\/\/curlie.org\/docs\/en\/help\/getdata. html."},{"key":"e_1_3_2_2_28_1","unstructured":"Curlie.org. 2019. Any plans to resume RDF data updates? https:\/\/www.resource-zone.com\/forum\/t\/any-plans-to-resume-rdf-data-updates-please-please.54035\/."},{"key":"e_1_3_2_2_29_1","unstructured":"Curlie.org. 2019. Curlie - Become and Editor. https:\/\/www.curlie.org\/docs\/en\/help\/become.html."},{"key":"e_1_3_2_2_30_1","unstructured":"Curlie.org. 2019. Curlie - The Collector of URLs. https:\/\/curlie.org\/."},{"key":"e_1_3_2_2_31_1","unstructured":"CYREN. 2019. Enterprise SaaS Security Threat Intelligence Services - Cyren. https:\/\/www.cyren.com\/."},{"key":"e_1_3_2_2_32_1","doi-asserted-by":"crossref","unstructured":"L. Denoyer and Gallinari P. 2004. Bayesian Network Model for Semi-structured Document Classification. Information Processing and Management 40 (2004).","DOI":"10.1016\/j.ipm.2004.04.009"},{"key":"e_1_3_2_2_33_1","doi-asserted-by":"crossref","unstructured":"P. Domingos and M. Pazzani. 1997. On the Optimality of the Simple Bayesian Classifier under Zero-One Loss. Machine Learning 29 (1997).","DOI":"10.1023\/A:1007413511361"},{"key":"e_1_3_2_2_34_1","doi-asserted-by":"publisher","DOI":"10.1145\/2976749.2978313"},{"key":"e_1_3_2_2_35_1","volume":"200","author":"Estruch V.","unstructured":"V. Estruch, C. Ferri, J. Hernandez-Orallo, and M.J. Ramirez-Quintana. 2006. Web Categorisation Using Distance-Based Decision Trees. Electronic Notes in Theoretical Computer Science 157 (2006).","journal-title":"J. Ramirez-Quintana."},{"key":"e_1_3_2_2_36_1","unstructured":"European Commission. 2018. Art. 9 GDPRProcessing of special categories of personal data. https:\/\/gdpr-info.eu\/art-9-gdpr\/."},{"key":"e_1_3_2_2_37_1","volume-title":"The General Data Protection Regulation (GDPR)","author":"European Commission","year":"2016","unstructured":"European Commission. 2018. Data protection in the EU, The General Data Protection Regulation (GDPR); Regulation (EU) 2016\/679. https:\/\/ec.europa.eu\/info\/law\/law-topic\/data-protection\/."},{"key":"e_1_3_2_2_38_1","doi-asserted-by":"publisher","DOI":"10.1145\/2665943.2665953"},{"key":"e_1_3_2_2_39_1","unstructured":"Google. 2019. Google Ads - About Display Planner. https:\/\/support.google.com\/google-ads\/answer\/3056432?hl=en."},{"key":"e_1_3_2_2_40_1","volume-title":"Weighing the Impact of GDPR. Comm. of the ACM 61, 11","author":"Greengard S.","year":"2018","unstructured":"S. Greengard. 2018. Weighing the Impact of GDPR. Comm. of the ACM 61, 11 (2018)."},{"volume-title":"Proc. of the 5th Pacific-Asia Conference on Knowledge Discovery and Data Mining.","author":"Han E. H.","key":"e_1_3_2_2_41_1","unstructured":"E. H. Han, G. Karypis, and V. Kumar. 2001. Text Categorization UsingWeight Adjusted k-Nearest Neighbor Classification. In Proc. of the 5th Pacific-Asia Conference on Knowledge Discovery and Data Mining."},{"key":"e_1_3_2_2_42_1","doi-asserted-by":"crossref","unstructured":"L. Howard P. Liam B. Yevgen and X. Y. Simon. 2010. Document Classification Using Information Theory And A Fast Back-Propagation Neural Network. Intelligent Automation and Soft Computing 16 (2010).","DOI":"10.1080\/10798587.2010.10643061"},{"key":"e_1_3_2_2_43_1","doi-asserted-by":"crossref","unstructured":"C. Iordanou G. Smaragdakis I. Poese and N. Laoutaris. 2018. Tracing Cross Border Web Tracking. In ACM IMC.","DOI":"10.1145\/3278532.3278561"},{"key":"e_1_3_2_2_44_1","doi-asserted-by":"publisher","DOI":"10.1145\/3310326"},{"key":"e_1_3_2_2_45_1","doi-asserted-by":"crossref","unstructured":"S. Khattak M. Javed S. A. Khayam Z. A. Uzmi and V. Paxson. 2014. A Look at the Consequences of Internet Censorship Through an ISP Lens. In ACM IMC.","DOI":"10.1145\/2663716.2663750"},{"key":"e_1_3_2_2_46_1","doi-asserted-by":"crossref","unstructured":"Y. Ko. 2012. A Study of Term Weighting Schemes Using Class Information for Text Classification. In ACM SIGIR.","DOI":"10.1145\/2348283.2348453"},{"key":"e_1_3_2_2_47_1","doi-asserted-by":"crossref","unstructured":"K. Kowsari K. J. Meimandi M. Heidarysafa S. Mendu L. E. Barnes and D. E. Brown. 2019. Text Classification Algorithms: A Survey. Information 10 4 (2019).","DOI":"10.3390\/info10040150"},{"key":"e_1_3_2_2_48_1","unstructured":"G. Krishnaveni and T. Sudha. 2016. Naive Bayes Text Classification. A Comparison of Event Models. Imperial Journal of Interdisciplinary Research 3 (2016)."},{"key":"e_1_3_2_2_49_1","doi-asserted-by":"crossref","unstructured":"O. Kwon and L. Jong-Hyeok. 2003. Text categorization based on k-nearest neighbor approach for Web site classification. Information Processing and Management 39 (2003).","DOI":"10.1016\/S0306-4573(02)00022-5"},{"volume-title":"International Conference on Machine Learning.","author":"Le Q.","key":"e_1_3_2_2_50_1","unstructured":"Q. Le and T. Mikolov. 2014. Distributed representations of sentences and documents. In International Conference on Machine Learning."},{"key":"e_1_3_2_2_51_1","volume-title":"Lost Trackers: An Archaeological Study of Web Tracking from 1996 to","author":"Lerner A.","year":"2016","unstructured":"A. Lerner, A. Kornfeld Simpson, T. Kohno, and F. Roesner. 2016. Internet Jones and the Raiders of the Lost Trackers: An Archaeological Study of Web Tracking from 1996 to 2016. In USENIX Security."},{"key":"e_1_3_2_2_52_1","doi-asserted-by":"crossref","unstructured":"C. Leung J. Ren D. Choffnes and C. Wilson. 2016. Should You Use the App for That?: Comparing the Privacy Implications of App- and Web-based Online Services. In ACM IMC.","DOI":"10.1145\/2987443.2987456"},{"key":"e_1_3_2_2_53_1","unstructured":"McAfee LLC. 2020. Customer URL Ticketing System. https:\/\/www.trustedsource. org\/."},{"key":"e_1_3_2_2_54_1","doi-asserted-by":"crossref","unstructured":"M. Trevisan and S. Traverso and E. Bassi and M. Mellia. 2019. 4 Years of EU Cookie Law: Results and Lessons Learned. PoPETs (2019).","DOI":"10.2478\/popets-2019-0023"},{"key":"e_1_3_2_2_55_1","unstructured":"KM. Mahesh DH. Saroja GD. Prashant and C. Niranjah. 2015. Text mining approach to classify technical research documents using naivebayes. International Journal of Advanced Research in Computer and Communication Engineering 4 (2015)."},{"key":"e_1_3_2_2_56_1","doi-asserted-by":"crossref","unstructured":"L. Manevitz and M. Yousef. 2007. One-class document classification via Neural Networks. Neurocomputing 70 (2007).","DOI":"10.1016\/j.neucom.2006.05.013"},{"key":"e_1_3_2_2_57_1","doi-asserted-by":"crossref","unstructured":"S. Matic G. Tyson and G. Stringhini. 2019. PYTHIA: a Framework for the Automated Analysis of Web Hosting Environments. In WWW.","DOI":"10.1145\/3308558.3313664"},{"volume-title":"Third-Party Web Tracking: Policy and Technology. In IEEE Symposium on Security and Privacy.","author":"Mayer J. R.","key":"e_1_3_2_2_58_1","unstructured":"J. R. Mayer and J. C. Mitchell. 2012. Third-Party Web Tracking: Policy and Technology. In IEEE Symposium on Security and Privacy."},{"key":"e_1_3_2_2_59_1","volume":"201","author":"Meng Y.","unstructured":"Y. Meng, J. Shen, C. Zhang, and J. Han. 2018. Weakly-Supervised Neural Text Classification. In ACM CIKM.","journal-title":"J. Han."},{"key":"e_1_3_2_2_60_1","volume":"201","author":"Mikolov T.","unstructured":"T. Mikolov, I. Sutskever, K. Chen, G. S. Corrado, and J. Dean. 2013. Distributed representations of words and phrases and their compositionality. In Advances in neural information processing systems.","journal-title":"J. Dean."},{"volume-title":"Unveiling and Quantifying Facebook Exploitation of Sensitive Personal Data for Advertising Purposes. In USENIX Security Symposium.","author":"J. G.","key":"e_1_3_2_2_61_1","unstructured":"J. G. Caba nas, A. Cuevas, and R. Cuevas. 2018. Unveiling and Quantifying Facebook Exploitation of Sensitive Personal Data for Advertising Purposes. In USENIX Security Symposium."},{"volume-title":"Australian Privacy Principles guidelines","author":"Office of the Australian Information Commission","key":"e_1_3_2_2_62_1","unstructured":"Office of the Australian Information Commissioner. 2018. Australian Privacy Principles guidelines; Australian Privacy Principle 5. Notification of the collection of personal information. https:\/\/www.oaic.gov.au\/agencies-and-organisations\/app-guidelines\/."},{"key":"e_1_3_2_2_63_1","unstructured":"Office of the Privacy Commissioner of Canada. 2018. Amended Act on The Personal Information Protection and Electronic Documents Act. https:\/\/www.priv.gc.ca\/en\/privacy-topics\/privacy-laws-in-canada\/the-personal-information-protection-and-electronic-documents-act-pipeda\/."},{"key":"e_1_3_2_2_64_1","unstructured":"K. Oppenheimer. 2015. Topical web-page classification. MSc thesis Computer Science Brandeis University https:\/\/github.com\/kahliloppenheimer\/Web-page-classification\/blob\/master\/paper.pdf."},{"key":"e_1_3_2_2_65_1","unstructured":"Personal Information Protection Commission Japan. 2017. Amended Act on the Protection of Personal Information. https:\/\/www.ppc.go.jp\/en\/."},{"key":"e_1_3_2_2_66_1","volume-title":"Tranco: A Research-Oriented Top Sites Ranking Hardened Against Manipulation. In NDSS.","author":"Le Pochat V.","year":"2019","unstructured":"V. Le Pochat, T. Van Goethem, S. Tajalizadehkhoob, M. Korczy.ski, andW. Joosen. 2019. Tranco: A Research-Oriented Top Sites Ranking Hardened Against Manipulation. In NDSS."},{"key":"e_1_3_2_2_67_1","doi-asserted-by":"publisher","DOI":"10.1145\/2815675.2815705"},{"key":"e_1_3_2_2_68_1","doi-asserted-by":"crossref","unstructured":"A. Razaghpanah R. Nithyanand N. Vallina-Rodriguez S. Sundaresan M. Allman C. Kreibich and P. Gill. 2018. Apps Trackers Privacy and Regulators: A Global Study of the Mobile Tracking Ecosystem. In NDSS.","DOI":"10.14722\/ndss.2018.23353"},{"key":"e_1_3_2_2_69_1","doi-asserted-by":"crossref","unstructured":"A. Razaghpanah R. Nithyanand N. Vallina-Rodriguez S. Sundaresan M. Allman C. Kreibich and P. Gill. 2019. Apps Trackers Privacy and Regulators: A Global Study of the Mobile Tracking Ecosystem. In NDSS.","DOI":"10.14722\/ndss.2018.23353"},{"key":"e_1_3_2_2_70_1","unstructured":"B. Reuben L. Ulrik M. Van Kleek J. Zhao T. Libert and N. Shadbolt. 2018. Third Party Tracking in the Mobile Ecosystem. CoRR (2018)."},{"key":"e_1_3_2_2_71_1","doi-asserted-by":"crossref","unstructured":"I. Reyes P. Wijesekera J. Reardon A. Elazari A. Razaghpanah N. Vallina- Rodriguez and S. Egelman. 2018. Won't Somebody Think of the Children?. Examining COPPA Compliance at Scale. (2018).","DOI":"10.1515\/popets-2018-0021"},{"key":"e_1_3_2_2_72_1","doi-asserted-by":"crossref","unstructured":"G. Salton and C. Buckley. 1988. Term-weighting approaches in automatic text retrieval. Information Processing and Management 24 (1988).","DOI":"10.1016\/0306-4573(88)90021-0"},{"key":"e_1_3_2_2_73_1","doi-asserted-by":"crossref","unstructured":"I. Sanchez-Rola M. Dell'Amico P. Kotzias D. Balzarotti L. Bilge P-A. Vervier and I. Santos. 2019. Can I Opt Out Yet?: GDPR and the Global Illusion of Cookie Control. In ASIACCS.","DOI":"10.1145\/3321705.3329806"},{"key":"e_1_3_2_2_74_1","unstructured":"SimilarWeb. 2019. SimilarWeb - Top sites ranking for all categories in the world. https:\/\/www.similarweb.com\/top-websites."},{"key":"e_1_3_2_2_75_1","volume-title":"TALON: An Automated Framework for Cross-Device Tracking Detection. In RAID.","author":"Solomos K.","year":"2019","unstructured":"K. Solomos, P. Ilia, S. Ioannidis, and N. Kourtellis. 2019. TALON: An Automated Framework for Cross-Device Tracking Detection. In RAID."},{"key":"e_1_3_2_2_76_1","unstructured":"State of California. 2018. California Consumer Privacy Act. Assembly Bill No. 375. https:\/\/leginfo.legislature.ca.gov\/faces\/billTextClient.xhtml?bill_id= 201720180AB375."},{"key":"e_1_3_2_2_77_1","doi-asserted-by":"publisher","DOI":"10.1145\/584931.584952"},{"key":"e_1_3_2_2_78_1","unstructured":"Symantec. 2018. Symantec RuleSpace: OEM URL Categorization Database and Real-Time Web Categorization Technology. https:\/\/www.symantec.com\/products\/rulespace."},{"key":"e_1_3_2_2_79_1","unstructured":"The Privacy Protection Authority of Israel. 2018. Protection of privacy regulations (data security)5777--2017. https:\/\/www.gov.il\/en\/Departments\/legalInfo\/data_security_regulation."},{"volume-title":"Proc. IEEE\/WIC International Conference on Web Intelligence.","author":"Tian Y.","key":"e_1_3_2_2_80_1","unstructured":"Y. Tian, T. Huang, W. Gao, J. Cheng, and P. Kang. 2003. Two-phase Web site classification based on hidden Markov tree models. In Proc. IEEE\/WIC International Conference on Web Intelligence."},{"key":"e_1_3_2_2_81_1","volume-title":"Is Naive Bayes a Good Classifier for Document Classification? International Journal of Software Engineering and Its Applications 5","author":"Ting S. L.","year":"2011","unstructured":"S. L. Ting, W. H. Ip, and A. H. C. Tsang. 2011. Is Naive Bayes a Good Classifier for Document Classification? International Journal of Software Engineering and Its Applications 5 (2011)."},{"key":"e_1_3_2_2_82_1","volume-title":"Porn: A Comprehensive Privacy Analysis of the Web Porn Ecosystem. In ACM IMC.","author":"Vallina P.","year":"2019","unstructured":"P. Vallina, A. Feal, J. Gamba, N. Vallina-Rodriguez, and A. F. Anta. 2019. Tales from the Porn: A Comprehensive Privacy Analysis of the Web Porn Ecosystem. In ACM IMC."},{"key":"e_1_3_2_2_83_1","volume":"201","author":"Vallina-Rodriguez N.","unstructured":"N. Vallina-Rodriguez, J. Shah, A. Finamore, Y. Grunenberger, K. Papagiannaki, H. Haddadi, and J. Crowcroft. 2012. Breaking for commercials: Characterizing mobile advertising. In ACM IMC.","journal-title":"J. Crowcroft."},{"key":"e_1_3_2_2_84_1","unstructured":"W3C. 2014. RDF - Semantic Web Standards. https:\/\/www.w3.org\/RDF\/."},{"key":"e_1_3_2_2_85_1","doi-asserted-by":"crossref","unstructured":"F. Wang Q. Wang N. Feiping Y. Weizhong and W. Rong. 2018. Efficient tree classifiers for large scale datasets. Neurocomputing 284 (2018).","DOI":"10.1016\/j.neucom.2017.12.061"},{"key":"e_1_3_2_2_86_1","doi-asserted-by":"crossref","unstructured":"C. E. Wills and C. Tatar. 2012. Understanding what they do with what they know. In WPES.","DOI":"10.1145\/2381966.2381969"},{"key":"e_1_3_2_2_87_1","doi-asserted-by":"crossref","unstructured":"Y. Wu P. Gupta M. Wei Y. Acar S. Fahl and B. Ur. 2018. Your Secrets Are Safe: How Browsers' Explanations Impact Misconceptions About Private Browsing Mode. In WWW.","DOI":"10.1145\/3178876.3186088"},{"key":"e_1_3_2_2_88_1","unstructured":"www.odp.org. 2019. Open Directory Project.org: ODP Web Directory Built With the DMOZ RDF Database. https:\/\/www.odp.org\/."},{"key":"e_1_3_2_2_89_1","volume-title":"Performance: Empirical Analysis of Machine Learning as a Service. In IMC.","author":"Yao Y.","year":"2017","unstructured":"Y. Yao and Z. Xiao and B. Wang and B. Viswanath and H. Zheng and B. Y. Zhao. 2017. Complexity vs. Performance: Empirical Analysis of Machine Learning as a Service. In IMC."},{"key":"e_1_3_2_2_90_1","doi-asserted-by":"crossref","unstructured":"D. Zhang and W. S. Lee. 2004. Web Taxonomy Integration Using Support Vector Machines. In WWW.","DOI":"10.1145\/988672.988736"},{"key":"e_1_3_2_2_91_1","unstructured":"zvelo. 2019. Check a URL Category | URL Database For DNS\/IP & Web Filtering. https:\/\/tools.zvelo.com\/."}],"event":{"name":"IMC '20: ACM Internet Measurement Conference","sponsor":["SIGCOMM ACM Special Interest Group on Data Communication","SIGMETRICS ACM Special Interest Group on Measurement and Evaluation"],"location":"Virtual Event USA","acronym":"IMC '20"},"container-title":["Proceedings of the ACM Internet Measurement Conference"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3419394.3423653","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3419394.3423653","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,12,15]],"date-time":"2025-12-15T23:37:06Z","timestamp":1765841826000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3419394.3423653"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,10,27]]},"references-count":91,"alternative-id":["10.1145\/3419394.3423653","10.1145\/3419394"],"URL":"https:\/\/doi.org\/10.1145\/3419394.3423653","relation":{},"subject":[],"published":{"date-parts":[[2020,10,27]]},"assertion":[{"value":"2020-10-27","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}