{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,18]],"date-time":"2025-11-18T20:59:48Z","timestamp":1763499588759,"version":"3.45.0"},"publisher-location":"New York, NY, USA","reference-count":40,"publisher":"ACM","license":[{"start":{"date-parts":[[2021,11,12]],"date-time":"2021-11-12T00:00:00Z","timestamp":1636675200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61972453?62132013"],"award-info":[{"award-number":["61972453?62132013"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100000923","name":"Australian Research Council","doi-asserted-by":"publisher","award":["DP210102670"],"award-info":[{"award-number":["DP210102670"]}],"id":[{"id":"10.13039\/501100000923","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2021,11,12]]},"DOI":"10.1145\/3460120.3484547","type":"proceedings-article","created":{"date-parts":[[2021,11,13]],"date-time":"2021-11-13T12:05:34Z","timestamp":1636805134000},"page":"287-303","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":21,"title":["Understanding and Detecting Mobile Ad Fraud Through the Lens of Invalid Traffic"],"prefix":"10.1145","author":[{"given":"Suibin","family":"Sun","sequence":"first","affiliation":[{"name":"Shanghai Jiao Tong University, Shanghai, China"}]},{"given":"Le","family":"Yu","sequence":"additional","affiliation":[{"name":"Shanghai Jiao Tong University, Shanghai, China"}]},{"given":"Xiaokuan","family":"Zhang","sequence":"additional","affiliation":[{"name":"The Ohio State University, Columbus, OH, USA"}]},{"given":"Minhui","family":"Xue","sequence":"additional","affiliation":[{"name":"The University of Adelaide, Adelaide, SA, Australia"}]},{"given":"Ren","family":"Zhou","sequence":"additional","affiliation":[{"name":"Shanghai Jiao Tong University, Shanghai, China"}]},{"given":"Haojin","family":"Zhu","sequence":"additional","affiliation":[{"name":"Shanghai Jiao Tong University, Shanghai, China"}]},{"given":"Shuang","family":"Hao","sequence":"additional","affiliation":[{"name":"University of Texas at Dallas, Dallas, TX, USA"}]},{"given":"Xiaodong","family":"Lin","sequence":"additional","affiliation":[{"name":"University of Guelph, Guelph, Canada"}]}],"member":"320","published-online":{"date-parts":[[2021,11,13]]},"reference":[{"unstructured":"Apple. 2021. Upcoming AppTrackingTransparency requirements. https:\/\/developer.apple.com\/news\/?id=ecvrtzt2 . (Accessed on 04\/21\/2021).","key":"e_1_3_2_2_1_1"},{"doi-asserted-by":"publisher","key":"e_1_3_2_2_2_1","DOI":"10.1088\/1742--5468\/2008\/10\/p10008"},{"doi-asserted-by":"publisher","key":"e_1_3_2_2_3_1","DOI":"10.1145\/1961189.1961199"},{"doi-asserted-by":"publisher","key":"e_1_3_2_2_4_1","DOI":"10.1186\/s13635-015-0027-7"},{"doi-asserted-by":"publisher","key":"e_1_3_2_2_5_1","DOI":"10.1109\/ARES.2015.62"},{"key":"e_1_3_2_2_6_1","volume-title":"Businesses could lose $16.4 billion to online advert fraud","author":"CNBC.","year":"2017","unstructured":"CNBC. 2017. Businesses could lose $16.4 billion to online advert fraud in 2017. https:\/\/www.cnbc.com\/2017\/03\/15\/businesses-could-lose-164-billion-to-online-advert-fraud-in-2017.html. (Accessed on 08\/08\/2020)."},{"doi-asserted-by":"publisher","key":"e_1_3_2_2_7_1","DOI":"10.1145\/2342356.2342394"},{"doi-asserted-by":"publisher","key":"e_1_3_2_2_8_1","DOI":"10.1145\/2508859.2516688"},{"key":"e_1_3_2_2_9_1","volume-title":"20th USENIX Security Symposium (USENIX Security 11)","author":"Dietz Michael","year":"2011","unstructured":"Michael Dietz, Shashi Shekhar, Yuliy Pisetsky, Anhei Shu, and Dan S Wallach. 2011. QUIRE: Lightweight provenance for smart phone operating systems. In 20th USENIX Security Symposium (USENIX Security 11) ."},{"unstructured":"Google White Ops. 2018. The Hunt for 3ve Taking down a major ad fraud operation through industry collaboration . https:\/\/services.google.com\/fh\/files\/blogs\/3ve_google_whiteops_whitepaper_final_nov_2018.pdf .","key":"e_1_3_2_2_10_1"},{"doi-asserted-by":"publisher","key":"e_1_3_2_2_11_1","DOI":"10.1145\/1764873.1764877"},{"unstructured":"IAB Tech Lab. 2019 a. IAB OpenRTB Ads.txt Public Specification Version 1.0.2. https:\/\/iabtechlab.com\/wp-content\/uploads\/2019\/03\/IAB-OpenRTB-Ads.txt-Public-Spec-1.0.2.pdf . (Accessed on 08\/30\/2020).","key":"e_1_3_2_2_12_1"},{"unstructured":"IAB Tech Lab. 2019 b. IAB Tech Lab Authorized Sellers for Apps (app-ads.txt). https:\/\/iabtechlab.com\/wp-content\/uploads\/2019\/03\/app-ads.txt-v1.0-final-.pdf . (Accessed on 08\/30\/2020).","key":"e_1_3_2_2_13_1"},{"unstructured":"IAB Tech Lab. 2020. OpenRTB Specification Version 3.0 .","key":"e_1_3_2_2_14_1"},{"doi-asserted-by":"publisher","key":"e_1_3_2_2_15_1","DOI":"10.5555\/1362903.1362905"},{"key":"e_1_3_2_2_16_1","volume-title":"Proceedings of the 31st International Conference on Neural Information Processing Systems (NIPS'17)","author":"Ke Guolin","year":"2017","unstructured":"Guolin Ke, Qi Meng, Thomas Finley, Taifeng Wang, Wei Chen, Weidong Ma, Qiwei Ye, and Tie-Yan Liu. 2017. Lightgbm: A highly efficient gradient boosting decision tree. In Proceedings of the 31st International Conference on Neural Information Processing Systems (NIPS'17). 3149--3157."},{"doi-asserted-by":"publisher","key":"e_1_3_2_2_17_1","DOI":"10.1145\/2742647.2742676"},{"unstructured":"Media Rating Council. 2020. Invalid Traffic Detection and Filtration Standards Addendum . http:\/\/mediaratingcouncil.org\/MRC%20Invalid%20Traffic%20Detection%20and%20Filtration.pdf . (Accessed on 07\/18\/2020).","key":"e_1_3_2_2_18_1"},{"doi-asserted-by":"publisher","key":"e_1_3_2_2_19_1","DOI":"10.1109\/SP.2019.00011"},{"unstructured":"Mirror. 2017. The bizarre `click farm' of 10 000 phones that give FAKE `likes' to our most-loved apps. https:\/\/www.mirror.co.uk\/news\/world-news\/bizarre-click-farm-10000-phones-10419403 . (Accessed on 08\/26\/2020).","key":"e_1_3_2_2_20_1"},{"doi-asserted-by":"publisher","key":"e_1_3_2_2_21_1","DOI":"10.5555\/2627435.2627438"},{"doi-asserted-by":"publisher","key":"e_1_3_2_2_22_1","DOI":"10.1109\/ACCESS.2020.3047343"},{"doi-asserted-by":"publisher","key":"e_1_3_2_2_23_1","DOI":"10.1145\/3308558.3313601"},{"doi-asserted-by":"publisher","key":"e_1_3_2_2_24_1","DOI":"10.1145\/2660267.2660369"},{"doi-asserted-by":"publisher","key":"e_1_3_2_2_25_1","DOI":"10.5555\/1953048.2078195"},{"unstructured":"PPC Protect. 2019. What Is a Click Farm? The Quick Way to Thousands of Likes . https:\/\/ppcprotect.com\/what-is-a-click-farm\/. (Accessed on 08\/26\/2020).","key":"e_1_3_2_2_26_1"},{"key":"e_1_3_2_2_27_1","volume-title":"Worldwide Analysis on the Real-time Bidding Market","author":"Markets Research","year":"2019","unstructured":"Research and Markets. 2019. Worldwide Analysis on the Real-time Bidding Market, 2019 to 2024 - Anticipated to Record a CAGR of 32.9% During the Forecast Period. https:\/\/www.prnewswire.com\/news-releases\/worldwide-analysis-on-the-real-time-bidding-market-2019-to-2024--anticipated-to-record-a-cagr-of-32--9-during-the-forecast-period-300811841.html . (Accessed on 07\/21\/2020)."},{"volume-title":"Active Learning in Recommender Systems","author":"Rubens Neil","unstructured":"Neil Rubens, Mehdi Elahi, Masashi Sugiyama, and Dain Kaplan. 2015. Active Learning in Recommender Systems .Springer US, Boston, MA, 809--846.","key":"e_1_3_2_2_28_1"},{"key":"e_1_3_2_2_29_1","volume-title":"Active Learning Literature Survey","author":"Settles Burr","year":"2010","unstructured":"Burr Settles. 2010. Active Learning Literature Survey. University of Wisconsin, Madison, Vol. 52 (07 2010)."},{"key":"e_1_3_2_2_30_1","volume-title":"21st USENIX Security Symposium (USENIX Security 12)","author":"Shekhar Shashi","year":"2012","unstructured":"Shashi Shekhar, Michael Dietz, and Dan S Wallach. 2012. AdSplit: Separating smartphone advertising from applications. In 21st USENIX Security Symposium (USENIX Security 12). 553--567."},{"key":"e_1_3_2_2_31_1","volume-title":"22nd USENIX Security Symposium (USENIX Security 13)","author":"Springborn Kevin","year":"2013","unstructured":"Kevin Springborn and Paul Barford. 2013. Impression fraud in on-line advertising via pay-per-view networks. In 22nd USENIX Security Symposium (USENIX Security 13). 211--226."},{"doi-asserted-by":"publisher","key":"e_1_3_2_2_32_1","DOI":"10.1145\/2487575.2488207"},{"doi-asserted-by":"publisher","key":"e_1_3_2_2_33_1","DOI":"10.1145\/2068816.2068843"},{"doi-asserted-by":"publisher","key":"e_1_3_2_2_34_1","DOI":"10.1145\/2736277.2741136"},{"doi-asserted-by":"publisher","key":"e_1_3_2_2_35_1","DOI":"10.1109\/CNS.2018.8433126"},{"unstructured":"White Ops and ANA. 2019. 2018--2019 Bot Baseline: Fraud in Digital Advertising. https:\/\/www.ana.net\/miccontent\/show\/id\/rr-2019-bot-baseline . (Accessed on 07\/29\/2020).","key":"e_1_3_2_2_36_1"},{"doi-asserted-by":"publisher","key":"e_1_3_2_2_37_1","DOI":"10.1109\/CompComm.2018.8781056"},{"unstructured":"XDA Developers. 2018. Huawei will stop providing bootloader unlocking for all new devices. https:\/\/www.xda-developers.com\/huawei-stop-providing-bootloader-unlock-codes\/. (Accessed on 09\/03\/2020).","key":"e_1_3_2_2_38_1"},{"doi-asserted-by":"publisher","key":"e_1_3_2_2_39_1","DOI":"10.1007\/978-3-319-11212-1_24"},{"volume-title":"Proceedings of 25th Annual Network and Distributed System Security Symposium, NDSS.","author":"Zheng Haizhong","unstructured":"Haizhong Zheng, Minhui Xue, Hao Lu, Shuang Hao, Haojin Zhu, Xiaohui Liang, and Keith W. Ross. 2018. Smoke screener or straight shooter: Detecting elite sybil attacks in user-review social networks. In Proceedings of 25th Annual Network and Distributed System Security Symposium, NDSS.","key":"e_1_3_2_2_40_1"}],"event":{"sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"],"acronym":"CCS '21","name":"CCS '21: 2021 ACM SIGSAC Conference on Computer and Communications Security","location":"Virtual Event Republic of Korea"},"container-title":["Proceedings of the 2021 ACM SIGSAC Conference on Computer and Communications Security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3460120.3484547","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3460120.3484547","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,11,18]],"date-time":"2025-11-18T20:53:41Z","timestamp":1763499221000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3460120.3484547"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,11,12]]},"references-count":40,"alternative-id":["10.1145\/3460120.3484547","10.1145\/3460120"],"URL":"https:\/\/doi.org\/10.1145\/3460120.3484547","relation":{},"subject":[],"published":{"date-parts":[[2021,11,12]]},"assertion":[{"value":"2021-11-13","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}