{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,25]],"date-time":"2025-11-25T06:55:58Z","timestamp":1764053758383,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":37,"publisher":"ACM","license":[{"start":{"date-parts":[[2021,12,2]],"date-time":"2021-12-02T00:00:00Z","timestamp":1638403200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/100010661","name":"Horizon 2020 Framework Programme","doi-asserted-by":"publisher","award":["871370"],"award-info":[{"award-number":["871370"]}],"id":[{"id":"10.13039\/100010661","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2021,12,2]]},"DOI":"10.1145\/3485983.3494859","type":"proceedings-article","created":{"date-parts":[[2021,12,3]],"date-time":"2021-12-03T22:36:56Z","timestamp":1638571016000},"page":"212-222","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":5,"title":["User profiling by network observers"],"prefix":"10.1145","author":[{"given":"Roberto","family":"Gonzalez","sequence":"first","affiliation":[{"name":"NEC Labs Europe, Spain"}]},{"given":"Claudio","family":"Soriente","sequence":"additional","affiliation":[{"name":"NEC Labs Europe, Spain"}]},{"given":"Juan Miguel","family":"Carrascosa","sequence":"additional","affiliation":[{"name":"TYRCEO Data Solutions, Spain"}]},{"given":"Alberto","family":"Garcia-Duran","sequence":"additional","affiliation":[{"name":"Atinary Tech., Switzerland"}]},{"given":"Costas","family":"Iordanou","sequence":"additional","affiliation":[{"name":"Cyprus University of Technology, Cyprus"}]},{"given":"Mathias","family":"Niepert","sequence":"additional","affiliation":[{"name":"NEC Labs Europe, Germany"}]}],"member":"320","published-online":{"date-parts":[[2021,12,3]]},"reference":[{"key":"e_1_3_2_2_1_1","unstructured":"\"Data Transparency Lab.\" http:\/\/datatransparencylab.org 2015.  \"Data Transparency Lab.\" http:\/\/datatransparencylab.org 2015."},{"key":"e_1_3_2_2_2_1","first-page":"1","volume-title":"Adreveal: improving transparency into online targeted advertising,\" in Twelfth ACM Workshop on Hot Topics in Networks (HotNets)","author":"Liu B.","year":"2013","unstructured":"B. Liu , A. Sheth , U. Weinsberg , J. Chandrashekar , and R. Govindan , \" Adreveal: improving transparency into online targeted advertising,\" in Twelfth ACM Workshop on Hot Topics in Networks (HotNets) , pp. 12: 1 -- 12 :7, 2013 . B. Liu, A. Sheth, U. Weinsberg, J. Chandrashekar, and R. Govindan, \"Adreveal: improving transparency into online targeted advertising,\" in Twelfth ACM Workshop on Hot Topics in Networks (HotNets), pp. 12:1--12:7, 2013."},{"key":"e_1_3_2_2_3_1","volume-title":"I Always Fell Like Somebody's Watching Me. Measuring Online Behavioral Advertising,\" in CONEXT","author":"Carrascosa J. M.","year":"2015","unstructured":"J. M. Carrascosa , J. Mikians , R. Cuevas , V. Erramilli , and N. Laoutaris , \" I Always Fell Like Somebody's Watching Me. Measuring Online Behavioral Advertising,\" in CONEXT , 2015 . J. M. Carrascosa, J. Mikians, R. Cuevas, V. Erramilli, and N. Laoutaris, \"I Always Fell Like Somebody's Watching Me. Measuring Online Behavioral Advertising,\" in CONEXT, 2015."},{"key":"e_1_3_2_2_4_1","volume-title":"ACM","author":"Gonzalez R.","year":"2016","unstructured":"R. Gonzalez , C. Soriente , and N. Laoutaris , \" User profiling in the time of https,\" in Proceedings of the 2016 Internet Measurement Conference, pp. 373--379 , ACM , 2016 . R. Gonzalez, C. Soriente, and N. Laoutaris, \"User profiling in the time of https,\" in Proceedings of the 2016 Internet Measurement Conference, pp. 373--379, ACM, 2016."},{"key":"e_1_3_2_2_5_1","first-page":"427","volume-title":"Short Papers","author":"Joulin A.","year":"2017","unstructured":"A. Joulin , E. Grave , P. Bojanowski , and T. Mikolov , \" Bag of tricks for efficient text classification,\" in Proceedings of the 15th Conference of the European Chapter of the Association for Computational Linguistics: Volume 2 , Short Papers , pp. 427 -- 431 , Association for Computational Linguistics , April 2017 . A. Joulin, E. Grave, P. Bojanowski, and T. Mikolov, \"Bag of tricks for efficient text classification,\" in Proceedings of the 15th Conference of the European Chapter of the Association for Computational Linguistics: Volume 2, Short Papers, pp. 427--431, Association for Computational Linguistics, April 2017."},{"key":"e_1_3_2_2_6_1","volume-title":"Internet Jones and the Raiders of the Lost Trackers: An Archaeological Study of Web Tracking from 1996 to","author":"Lerner A.","year":"2016","unstructured":"A. Lerner , A. K. Simpson , T. Kohno , and F. Roesner , \" Internet Jones and the Raiders of the Lost Trackers: An Archaeological Study of Web Tracking from 1996 to 2016 ,\" in USENIX Security Symposium , 2016. A. Lerner, A. K. Simpson, T. Kohno, and F. Roesner, \"Internet Jones and the Raiders of the Lost Trackers: An Archaeological Study of Web Tracking from 1996 to 2016,\" in USENIX Security Symposium, 2016."},{"key":"e_1_3_2_2_7_1","volume-title":"Online Tracking: A 1-million-site Measurement and Analysis,\" in ACM CCS","author":"Steven E.","year":"2016","unstructured":"E. Steven and A. Narayanan , \" Online Tracking: A 1-million-site Measurement and Analysis,\" in ACM CCS , 2016 . E. Steven and A. Narayanan, \"Online Tracking: A 1-million-site Measurement and Analysis,\" in ACM CCS, 2016."},{"key":"e_1_3_2_2_8_1","volume-title":"Third-Party Web Tracking: Policy and Technology,\" in IEEE Symposium on Security and Privacy","author":"Mayer J. R.","year":"2012","unstructured":"J. R. Mayer and J. C. Mitchell , \" Third-Party Web Tracking: Policy and Technology,\" in IEEE Symposium on Security and Privacy , 2012 . J. R. Mayer and J. C. Mitchell, \"Third-Party Web Tracking: Policy and Technology,\" in IEEE Symposium on Security and Privacy, 2012."},{"key":"e_1_3_2_2_9_1","doi-asserted-by":"publisher","DOI":"10.1145\/2398776.2398812"},{"key":"e_1_3_2_2_10_1","volume-title":"Trackers, Privacy, and Regulators: A Global Study of the Mobile Tracking Ecosystem,\" in NDSS","author":"Razaghpanah A.","year":"2018","unstructured":"A. Razaghpanah , R. Nithyanand , N. Vallina-Rodriguez , S. Sundaresan , M. Allman , C. Kreibich , and P. Gill , \" Apps , Trackers, Privacy, and Regulators: A Global Study of the Mobile Tracking Ecosystem,\" in NDSS , 2018 . A. Razaghpanah, R. Nithyanand, N. Vallina-Rodriguez, S. Sundaresan, M. Allman, C. Kreibich, and P. Gill, \"Apps, Trackers, Privacy, and Regulators: A Global Study of the Mobile Tracking Ecosystem,\" in NDSS, 2018."},{"key":"e_1_3_2_2_11_1","doi-asserted-by":"publisher","DOI":"10.1145\/2987443.2987456"},{"key":"e_1_3_2_2_12_1","volume-title":"Third Party Tracking in the Mobile Ecosystem,\" CoRR","author":"Reuben B.","year":"2018","unstructured":"B. Reuben , L. Ulrik , M. V. Kleek , J. Zhao , T. Libert , and N. Shadbolt , \" Third Party Tracking in the Mobile Ecosystem,\" CoRR , 2018 . B. Reuben, L. Ulrik, M. V. Kleek, J. Zhao, T. Libert, and N. Shadbolt, \"Third Party Tracking in the Mobile Ecosystem,\" CoRR, 2018."},{"key":"e_1_3_2_2_13_1","first-page":"245","volume-title":"IMC '19","author":"Vallina P.","unstructured":"P. Vallina , A. Feal , J. Gamba , N. Vallina-Rodriguez , and A. F. Anta , \" Tales from the porn: A comprehensive privacy analysis of the web porn ecosystem,\" in Proceedings of the Internet Measurement Conference , IMC '19 , (New York, NY, USA) , p. 245 -- 258 , Association for Computing Machinery, 2019. P. Vallina, A. Feal, J. Gamba, N. Vallina-Rodriguez, and A. F. Anta, \"Tales from the porn: A comprehensive privacy analysis of the web porn ecosystem,\" in Proceedings of the Internet Measurement Conference, IMC '19, (New York, NY, USA), p. 245--258, Association for Computing Machinery, 2019."},{"key":"e_1_3_2_2_14_1","first-page":"280","volume-title":"IMC '19","author":"Pachilakis M.","unstructured":"M. Pachilakis , P. Papadopoulos , E. P. Markatos , and N. Kourtellis , \" No more chasing waterfalls: A measurement study of the header bidding ad-ecosystem,\" in Proceedings of the Internet Measurement Conference , IMC '19 , (New York, NY, USA) , p. 280 -- 293 , Association for Computing Machinery, 2019. M. Pachilakis, P. Papadopoulos, E. P. Markatos, and N. Kourtellis, \"No more chasing waterfalls: A measurement study of the header bidding ad-ecosystem,\" in Proceedings of the Internet Measurement Conference, IMC '19, (New York, NY, USA), p. 280--293, Association for Computing Machinery, 2019."},{"key":"e_1_3_2_2_15_1","doi-asserted-by":"publisher","DOI":"10.1145\/2566486.2568045"},{"key":"e_1_3_2_2_16_1","volume-title":"ACM","author":"Mislove A.","year":"2010","unstructured":"A. Mislove , B. Viswanath , K. P. Gummadi , and P. Druschel , \" You are who you know: inferring user profiles in online social networks,\" in Proceedings of the third ACM international conference on Web search and data mining, pp. 251--260 , ACM , 2010 . A. Mislove, B. Viswanath, K. P. Gummadi, and P. Druschel, \"You are who you know: inferring user profiles in online social networks,\" in Proceedings of the third ACM international conference on Web search and data mining, pp. 251--260, ACM, 2010."},{"key":"e_1_3_2_2_17_1","volume-title":"User profiling based deep neural network for temporal news recommendation,\" in 2017 IEEE International Conference on Data Mining Workshops (ICDMW)","author":"Kumar V.","year":"2017","unstructured":"V. Kumar , D. Khattar , S. Gupta , M. Gupta , and V. Varma , \" User profiling based deep neural network for temporal news recommendation,\" in 2017 IEEE International Conference on Data Mining Workshops (ICDMW) , 2017 . V. Kumar, D. Khattar, S. Gupta, M. Gupta, and V. Varma, \"User profiling based deep neural network for temporal news recommendation,\" in 2017 IEEE International Conference on Data Mining Workshops (ICDMW), 2017."},{"key":"e_1_3_2_2_18_1","volume-title":"User profiling from network traffic via novel application-level interactions,\" in 2016 11th International Conference for Internet Technology and Secured Transactions (ICITST)","author":"Alotibi G.","year":"2016","unstructured":"G. Alotibi , N. Clarke , F. Li , and S. Furnell , \" User profiling from network traffic via novel application-level interactions,\" in 2016 11th International Conference for Internet Technology and Secured Transactions (ICITST) , 2016 . G. Alotibi, N. Clarke, F. Li, and S. Furnell, \"User profiling from network traffic via novel application-level interactions,\" in 2016 11th International Conference for Internet Technology and Secured Transactions (ICITST), 2016."},{"key":"e_1_3_2_2_19_1","unstructured":"L. Partners \"Display LUMAscape.\" https:\/\/lumapartners.com\/content\/lumascapes\/display-ad-tech-lumascape\/. \"[Online; accessed 13-May-2019]\".  L. Partners \"Display LUMAscape.\" https:\/\/lumapartners.com\/content\/lumascapes\/display-ad-tech-lumascape\/. \"[Online; accessed 13-May-2019]\"."},{"key":"e_1_3_2_2_20_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.3047343"},{"key":"e_1_3_2_2_21_1","doi-asserted-by":"publisher","DOI":"10.1515\/popets-2015-0007"},{"key":"e_1_3_2_2_22_1","volume-title":"https:\/\/adwords.google.com\/","author":"AdWords Google","year":"2018","unstructured":"Google AdWords . https:\/\/adwords.google.com\/ , 2018 . Google AdWords. https:\/\/adwords.google.com\/, 2018."},{"key":"e_1_3_2_2_23_1","volume-title":"Efficient estimation of word representations in vector space,\" arXiv preprint arXiv:1301.3781","author":"Mikolov T.","year":"2013","unstructured":"T. Mikolov , K. Chen , G. Corrado , and J. Dean , \" Efficient estimation of word representations in vector space,\" arXiv preprint arXiv:1301.3781 , 2013 . T. Mikolov, K. Chen, G. Corrado, and J. Dean, \"Efficient estimation of word representations in vector space,\" arXiv preprint arXiv:1301.3781, 2013."},{"key":"e_1_3_2_2_24_1","first-page":"2177","volume-title":"Neural word embedding as implicit matrix factorization,\" in Advances in neural information processing systems","author":"Levy O.","year":"2014","unstructured":"O. Levy and Y. Goldberg , \" Neural word embedding as implicit matrix factorization,\" in Advances in neural information processing systems , pp. 2177 -- 2185 , 2014 . O. Levy and Y. Goldberg, \"Neural word embedding as implicit matrix factorization,\" in Advances in neural information processing systems, pp. 2177--2185, 2014."},{"key":"e_1_3_2_2_25_1","volume-title":"ACM","author":"Benevenuto F.","year":"2009","unstructured":"F. Benevenuto , T. Rodrigues , M. Cha , and V. Almeida , \" Characterizing user behavior in online social networks,\" in Proceedings of the 9th ACM SIGCOMM Conference on Internet Measurement, pp. 49--62 , ACM , 2009 . F. Benevenuto, T. Rodrigues, M. Cha, and V. Almeida, \"Characterizing user behavior in online social networks,\" in Proceedings of the 9th ACM SIGCOMM Conference on Internet Measurement, pp. 49--62, ACM, 2009."},{"key":"e_1_3_2_2_26_1","first-page":"297","volume-title":"Noise-contrastive estimation: A new estimation principle for unnormalized statistical models,\" in Proceedings of the Thirteenth International Conference on Artificial Intelligence and Statistics","author":"Gutmann M.","year":"2010","unstructured":"M. Gutmann and A. Hyv\u00e4rinen , \" Noise-contrastive estimation: A new estimation principle for unnormalized statistical models,\" in Proceedings of the Thirteenth International Conference on Artificial Intelligence and Statistics , pp. 297 -- 304 , 2010 . M. Gutmann and A. Hyv\u00e4rinen, \"Noise-contrastive estimation: A new estimation principle for unnormalized statistical models,\" in Proceedings of the Thirteenth International Conference on Artificial Intelligence and Statistics, pp. 297--304, 2010."},{"key":"e_1_3_2_2_27_1","first-page":"45","volume-title":"Software Framework for Topic Modelling with Large Corpora,\" in Proceedings of the LREC 2010 Workshop on New Challenges for NLP Frameworks","author":"\u0158eh\u016f\u0159ek R.","year":"2010","unstructured":"R. \u0158eh\u016f\u0159ek and P. Sojka , \" Software Framework for Topic Modelling with Large Corpora,\" in Proceedings of the LREC 2010 Workshop on New Challenges for NLP Frameworks , pp. 45 -- 50 , ELRA , 2010 . R. \u0158eh\u016f\u0159ek and P. Sojka, \"Software Framework for Topic Modelling with Large Corpora,\" in Proceedings of the LREC 2010 Workshop on New Challenges for NLP Frameworks, pp. 45--50, ELRA, 2010."},{"key":"e_1_3_2_2_28_1","first-page":"2579","article-title":"Visualizing data using t-sne","volume":"9","author":"Maaten L. v. d.","year":"2008","unstructured":"L. v. d. Maaten and G. Hinton , \" Visualizing data using t-sne ,\" Journal of machine learning research , vol. 9 , no. Nov, pp. 2579 -- 2605 , 2008 . L. v. d. Maaten and G. Hinton, \"Visualizing data using t-sne,\" Journal of machine learning research, vol. 9, no. Nov, pp. 2579--2605, 2008.","journal-title":"Journal of machine learning research"},{"key":"e_1_3_2_2_29_1","unstructured":"K. Volovich \"What's a Good Clickthrough Rate? New Benchmark Data for Google AdWords.\" https:\/\/blog.hubspot.com\/agency\/google-adwords-benchmark-data\/. \"[Online; accessed 13-May-2019]\".  K. Volovich \"What's a Good Clickthrough Rate? New Benchmark Data for Google AdWords.\" https:\/\/blog.hubspot.com\/agency\/google-adwords-benchmark-data\/. \"[Online; accessed 13-May-2019]\"."},{"key":"e_1_3_2_2_30_1","volume-title":"Learn How Your CTR Compares.\" https:\/\/www.wordstream.com\/average-ctr. \"[Online","author":"Click-Through Average CTR","year":"2019","unstructured":"WordStream, \" Average CTR ( Click-Through Rate) : Learn How Your CTR Compares.\" https:\/\/www.wordstream.com\/average-ctr. \"[Online ; accessed 13- May - 2019 ]\". WordStream, \"Average CTR (Click-Through Rate): Learn How Your CTR Compares.\" https:\/\/www.wordstream.com\/average-ctr. \"[Online; accessed 13-May-2019]\"."},{"key":"e_1_3_2_2_31_1","volume-title":"Mobile Ads Actually Do Work - Especially In Apps.\" https:\/\/www.forbes.com\/sites\/roberthof\/2014\/08\/27\/study-mobile-ads-actually-do-work-especially-in-apps\/. \"[Online","author":"Hof R.","year":"2019","unstructured":"R. Hof , \"Study : Mobile Ads Actually Do Work - Especially In Apps.\" https:\/\/www.forbes.com\/sites\/roberthof\/2014\/08\/27\/study-mobile-ads-actually-do-work-especially-in-apps\/. \"[Online ; accessed 13- May - 2019 ]\". R. Hof, \"Study: Mobile Ads Actually Do Work - Especially In Apps.\" https:\/\/www.forbes.com\/sites\/roberthof\/2014\/08\/27\/study-mobile-ads-actually-do-work-especially-in-apps\/. \"[Online; accessed 13-May-2019]\"."},{"key":"e_1_3_2_2_32_1","volume-title":"International World Wide Web Conferences Steering Committee","author":"Marciel M.","year":"2016","unstructured":"M. Marciel , R. Cuevas , A. Banchs , R. Gonz\u00e1lez , S. Traverso , M. Ahmed , and A. Azcorra , \" Understanding the detection of view fraud in video content portals,\" in Proceedings of the 25th International Conference on World Wide Web, pp. 357--368 , International World Wide Web Conferences Steering Committee , 2016 . M. Marciel, R. Cuevas, A. Banchs, R. Gonz\u00e1lez, S. Traverso, M. Ahmed, and A. Azcorra, \"Understanding the detection of view fraud in video content portals,\" in Proceedings of the 25th International Conference on World Wide Web, pp. 357--368, International World Wide Web Conferences Steering Committee, 2016."},{"key":"e_1_3_2_2_33_1","volume-title":"Encrypted dns\u2192 privacy,\" A Traffic Analysis Perspective (Proc. of the NDSS)","author":"Siby S.","year":"2020","unstructured":"S. Siby , M. Juarez , C. Diaz , N. Vallina-Rodriguez , and C. Troncoso , \" Encrypted dns\u2192 privacy,\" A Traffic Analysis Perspective (Proc. of the NDSS) , 2020 . S. Siby, M. Juarez, C. Diaz, N. Vallina-Rodriguez, and C. Troncoso, \"Encrypted dns\u2192 privacy,\" A Traffic Analysis Perspective (Proc. of the NDSS), 2020."},{"key":"e_1_3_2_2_34_1","unstructured":"M. Ingram \"Here's Why Verizon Wants to Buy Yahoo So Badly.\" https:\/\/fortune.com\/2016\/04\/19\/verizon-yahoo\/. \"[Online; accessed 24-Sep-2019]\".  M. Ingram \"Here's Why Verizon Wants to Buy Yahoo So Badly.\" https:\/\/fortune.com\/2016\/04\/19\/verizon-yahoo\/. \"[Online; accessed 24-Sep-2019]\"."},{"key":"e_1_3_2_2_35_1","unstructured":"AT&T \"AT&T Launches New Advertising Company Xandr.\" https:\/\/about.att.com\/story\/2018\/attlaunchesxandr.html. \"[Online; accessed 24-Sep-2019]\".  AT&T \"AT&T Launches New Advertising Company Xandr.\" https:\/\/about.att.com\/story\/2018\/att l aunches x andr.html. \"[Online; accessed 24-Sep-2019]\"."},{"key":"e_1_3_2_2_36_1","volume-title":"ACM","author":"Johnson A.","year":"2013","unstructured":"A. Johnson , C. Wacek , R. Jansen , M. Sherr , and P. Syverson , \" Users get routed: Traffic correlation on tor by realistic adversaries,\" in Proceedings of the 2013 ACM SIGSAC conference on Computer & communications security, pp. 337--348 , ACM , 2013 . A. Johnson, C. Wacek, R. Jansen, M. Sherr, and P. Syverson, \"Users get routed: Traffic correlation on tor by realistic adversaries,\" in Proceedings of the 2013 ACM SIGSAC conference on Computer & communications security, pp. 337--348, ACM, 2013."},{"volume-title":"Raptor: Routing attacks on privacy in tor,\" in 24th USENIX Security Symposium, pages=271--286, year=2015","author":"Sun Y.","key":"e_1_3_2_2_37_1","unstructured":"Y. Sun , A. Edmundson , L. Vanbever , O. Li , J. Rexford , M. Chiang , and P. Mittal , \" Raptor: Routing attacks on privacy in tor,\" in 24th USENIX Security Symposium, pages=271--286, year=2015 . Y. Sun, A. Edmundson, L. Vanbever, O. Li, J. Rexford, M. Chiang, and P. Mittal, \"Raptor: Routing attacks on privacy in tor,\" in 24th USENIX Security Symposium, pages=271--286, year=2015."}],"event":{"name":"CoNEXT '21: The 17th International Conference on emerging Networking EXperiments and Technologies","sponsor":["SIGCOMM ACM Special Interest Group on Data Communication"],"location":"Virtual Event Germany","acronym":"CoNEXT '21"},"container-title":["Proceedings of the 17th International Conference on emerging Networking EXperiments and Technologies"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3485983.3494859","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3485983.3494859","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T20:12:31Z","timestamp":1750191151000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3485983.3494859"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,12,2]]},"references-count":37,"alternative-id":["10.1145\/3485983.3494859","10.1145\/3485983"],"URL":"https:\/\/doi.org\/10.1145\/3485983.3494859","relation":{},"subject":[],"published":{"date-parts":[[2021,12,2]]},"assertion":[{"value":"2021-12-03","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}