{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,15]],"date-time":"2025-12-15T17:28:37Z","timestamp":1765819717736,"version":"3.48.0"},"publisher-location":"New York, NY, USA","reference-count":95,"publisher":"ACM","license":[{"start":{"date-parts":[[2022,11,2]],"date-time":"2022-11-02T00:00:00Z","timestamp":1667347200000},"content-version":"vor","delay-in-days":365,"URL":"http:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/100000001","name":"National Science Foundation","doi-asserted-by":"publisher","award":["CNS-2013671, CNS-2114911"],"award-info":[{"award-number":["CNS-2013671, CNS-2114911"]}],"id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100004419","name":"CRDF Global","doi-asserted-by":"publisher","award":["G-202105-67826"],"award-info":[{"award-number":["G-202105-67826"]}],"id":[{"id":"10.13039\/100004419","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2021,11,2]]},"DOI":"10.1145\/3487552.3487837","type":"proceedings-article","created":{"date-parts":[[2021,11,1]],"date-time":"2021-11-01T17:35:11Z","timestamp":1635788111000},"page":"639-657","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":1,"title":["RacketStore"],"prefix":"10.1145","author":[{"given":"Nestor","family":"Hernandez","sequence":"first","affiliation":[{"name":"FIU"}]},{"given":"Ruben","family":"Recabarren","sequence":"additional","affiliation":[{"name":"FIU"}]},{"given":"Bogdan","family":"Carbunar","sequence":"additional","affiliation":[{"name":"FIU"}]},{"given":"Syed Ishtiaque","family":"Ahmed","sequence":"additional","affiliation":[{"name":"University of Toronto"}]}],"member":"320","published-online":{"date-parts":[[2021,11,2]]},"reference":[{"volume-title":"d.]. 15 U.S. Code &sect","key":"e_1_3_2_1_1_1","unstructured":"[n. d.]. 15 U.S. Code &sect; 45 - Unfair methods of competition unlawful; prevention by Commission. Legal Information Institute, https:\/\/www.law.cornell.edu\/uscode\/text\/15\/45."},{"key":"e_1_3_2_1_2_1","unstructured":"[n. d.]. Apple Media Services Terms and Conditions. https:\/\/www.apple.com\/legal\/internet-services\/itunes\/us\/terms.html."},{"key":"e_1_3_2_1_3_1","unstructured":"[n. d.]. Boostyourapps: Buy App Reviews and Get Installs and Rating for Free. https:\/\/boostyourapps.org\/."},{"key":"e_1_3_2_1_4_1","unstructured":"[n. d.]. Deploy machine learning models on mobile and IoT devices. https:\/\/www.tensorflow.org\/lite."},{"key":"e_1_3_2_1_5_1","unstructured":"[n. d.]. Google Digital Wellbeing. https:\/\/wellbeing.google\/tools\/."},{"key":"e_1_3_2_1_6_1","unstructured":"[n. d.]. Google Play. https:\/\/play.google.com\/store?hl=en."},{"key":"e_1_3_2_1_7_1","unstructured":"[n. d.]. MobiASO: Mobile App Marketing Agency. https:\/\/mobiaso.com\/."},{"key":"e_1_3_2_1_8_1","unstructured":"[n. d.]. Number of Android apps on Google Play: 2 969 894. AppBrain https:\/\/www.appbrain.com\/stats\/number-of-android-apps month=."},{"key":"e_1_3_2_1_9_1","unstructured":"[n. d.]. Permissions Overview. https:\/\/bit.ly\/2x4HKiW."},{"key":"e_1_3_2_1_10_1","unstructured":"[n. d.]. RacketStore Code. https:\/\/github.com\/nestorghh\/racketstore."},{"key":"e_1_3_2_1_11_1","unstructured":"[n. d.]. Ratings and Reviews on the Play Store. https:\/\/play.google.com\/about\/comment-posting-policy\/."},{"key":"e_1_3_2_1_12_1","unstructured":"[n. d.]. Retention Rate Meaning. https:\/\/www.adjust.com\/glossary\/retention-rate\/."},{"key":"e_1_3_2_1_13_1","unstructured":"[n. d.]. TapJoy: Mobile Advertising and App Monetization Platform. https:\/\/www.tapjoy.com\/."},{"key":"e_1_3_2_1_14_1","unstructured":"[n. d.]. Untrue misleading or unauthorized use of tests and testimonials. https:\/\/www.competitionbureau.gc.ca\/eic\/site\/cb-bc.nsf\/eng\/00527.html."},{"key":"e_1_3_2_1_15_1","unstructured":"[n. d.]. VirusTotal. https:\/\/www.virustotal.com\/gui\/home."},{"key":"e_1_3_2_1_16_1","unstructured":"2005. Directive 2005\/29\/EC of the European Parliament and of the Council. Official Journal of the European Union https:\/\/eur-lex.europa.eu\/LexUriServ\/LexUriServ.do?uri=OJ:L:2005:149:0022:0039:en:PDF."},{"key":"e_1_3_2_1_17_1","unstructured":"2012. Cell phone culture: How cultural differences affect mobile use. CNN Business https:\/\/www.cnn.com\/2012\/09\/27\/tech\/mobile-culture-usage\/."},{"volume-title":"Bangladesh","year":"2018","key":"e_1_3_2_1_18_1","unstructured":"2018. Freedom on the Net, Bangladesh. Freedom House, https:\/\/freedomhouse.org\/report\/freedom-net\/2018\/bangladesh."},{"key":"e_1_3_2_1_19_1","unstructured":"2018. Journalists activists in Bangladesh arrested under ICT Act for posting on social media. AccessNow https:\/\/www.accessnow.org\/bangladesh-ict-act\/."},{"key":"e_1_3_2_1_20_1","unstructured":"2018. No Place for Criticism. Bangladesh Crackdown on Social Media Commentary. https:\/\/www.hrw.org\/report\/2018\/05\/09\/no-place-criticism\/bangladesh-crackdown-social-media-commentary."},{"key":"e_1_3_2_1_21_1","unstructured":"2020. AndroidID. https:\/\/developer.android.com\/reference\/android\/provider\/Settings.Secure.html#ANDROID_ID."},{"volume-title":"And Segment Forecasts, 2020","year":"2027","key":"e_1_3_2_1_22_1","unstructured":"2020. Mobile Application Market Size, and Trends Analysis Report By Store Type (Google Store, Apple Store), By Application (Gaming, Music and Entertainment, Health and Fitness), By Region, And Segment Forecasts, 2020 - 2027. https:\/\/www.grandviewresearch.com\/industry-analysis\/mobile-application-market."},{"key":"e_1_3_2_1_23_1","unstructured":"2020. Privacy Security and Deception. Developer Policy Center https:\/\/play.google.com\/about\/privacy-security-deception\/user-data\/."},{"volume-title":"Mobile App Download and Usage Statistics","year":"2021","key":"e_1_3_2_1_24_1","unstructured":"2021. Mobile App Download and Usage Statistics (2021). BuildFire, https:\/\/buildfire.com\/app-statistics\/."},{"volume-title":"What is App Store Optimization? Ultimate Guide to ASO","year":"2021","key":"e_1_3_2_1_25_1","unstructured":"2021. What is App Store Optimization? Ultimate Guide to ASO in 2021. App Radar, https:\/\/appradar.com\/academy\/aso-basics\/what-is-app-store-optimization-aso."},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1145\/3025453.3025961"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1145\/2983323.2983695"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1145\/2488388.2488400"},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2015.62"},{"key":"e_1_3_2_1_30_1","volume-title":"Mary Ellen Macdonald, and Eric Racine","author":"Bracken-Roche Dearbhail","year":"2017","unstructured":"Dearbhail Bracken-Roche, Emily Bell, Mary Ellen Macdonald, and Eric Racine. 2017. The concept of 'vulnerability'in research ethics: an in-depth analysis of policies and guidelines. Health research policy and systems 15, 1 (2017), 8."},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1023\/A:1010933404324"},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1145\/2660267.2660269"},{"key":"e_1_3_2_1_33_1","volume-title":"SMOTE: Synthetic Minority Over-sampling Technique. Journal of Artificial Intelligence Research 16","author":"Chawla N. V.","year":"2002","unstructured":"N. V. Chawla, K. W. Bowyer, L. O. Hall, and W. P. Kegelmeyer. 2002. SMOTE: Synthetic Minority Over-sampling Technique. Journal of Artificial Intelligence Research 16 (2002)."},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1145\/2335356.2335358"},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1145\/2663716.2663729"},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1145\/3131365.3131393"},{"key":"e_1_3_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.1145\/3341161.3345306"},{"key":"e_1_3_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.1145\/3419394.3423662"},{"key":"e_1_3_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.1145\/2766462.2767742"},{"key":"e_1_3_2_1_40_1","volume-title":"Proceedings of the 7th International Conference on Weblogs and Social Media, ICWSM","author":"Fei G","year":"2013","unstructured":"G Fei, A Mukherjee, B Liu, M Hsu, M Castellanos, and R Ghosh. 2013. Exploiting burstiness in reviews for review spammer detection. In Proceedings of the 7th International Conference on Weblogs and Social Media, ICWSM 2013. 175--184."},{"key":"e_1_3_2_1_41_1","doi-asserted-by":"publisher","DOI":"10.1145\/2307636.2307663"},{"key":"e_1_3_2_1_42_1","doi-asserted-by":"publisher","DOI":"10.1145\/2623330.2623721"},{"key":"e_1_3_2_1_43_1","doi-asserted-by":"publisher","DOI":"10.1145\/3243734.3243770"},{"key":"e_1_3_2_1_44_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2016.03.020"},{"key":"e_1_3_2_1_45_1","volume-title":"BIRDNEST: Bayesian Inference for Ratings-Fraud Detection. CoRR abs\/1511.06030. arXiv:1511.06030 http:\/\/arxiv.org\/abs\/1511.06030","author":"Hooi Bryan","year":"2015","unstructured":"Bryan Hooi, Neil Shah, Alex Beutel, Stephan G\u00fcnnemann, Leman Akoglu, Mohit Kumar, Disha Makhija, and Christos Faloutsos. 2015. BIRDNEST: Bayesian Inference for Ratings-Fraud Detection. CoRR abs\/1511.06030. arXiv:1511.06030 http:\/\/arxiv.org\/abs\/1511.06030"},{"key":"e_1_3_2_1_46_1","doi-asserted-by":"publisher","DOI":"10.1145\/3366423.3380243"},{"volume-title":"Proceedings of the SIGCHI Conference on Human Factors in Computing Systems (CHI '10)","author":"Irani Lilly","key":"e_1_3_2_1_47_1","unstructured":"Lilly Irani, Janet Vertesi, Paul Dourish, Kavita Philip, and Rebecca E. Grinter. 2010. Postcolonial Computing: A Lens on Design and Development. In Proceedings of the SIGCHI Conference on Human Factors in Computing Systems (CHI '10). 1311--1320."},{"key":"e_1_3_2_1_48_1","doi-asserted-by":"crossref","unstructured":"Meng Jiang Peng Cui Alex Beutel Christos Faloutsos and Shiqiang Yang. 2014. Inferring Strange Behavior from Connectivity Pattern in Social Networks. In Advances in Knowledge Discovery and Data Mining Vincent S. Tseng Tu Bao Ho Zhi-Hua Zhou Arbee L. P. Chen and Hung-Yu Kao (Eds.).","DOI":"10.1007\/978-3-319-06608-0_11"},{"key":"e_1_3_2_1_49_1","unstructured":"Dave Johnson. 2020. How to check your app usage stats an Android device to figure out which apps you spend the most battery data and time on. Business Insider https:\/\/www.businessinsider.com\/how-to-check-app-usage-on-android."},{"key":"e_1_3_2_1_50_1","doi-asserted-by":"publisher","DOI":"10.1145\/3159652.3159726"},{"key":"e_1_3_2_1_51_1","doi-asserted-by":"publisher","DOI":"10.1145\/3038912.3052582"},{"key":"e_1_3_2_1_52_1","doi-asserted-by":"publisher","DOI":"10.1145\/3077136.3080741"},{"key":"e_1_3_2_1_53_1","doi-asserted-by":"publisher","DOI":"10.1145\/1871437.1871557"},{"key":"e_1_3_2_1_54_1","doi-asserted-by":"publisher","DOI":"10.1145\/3274694.3274731"},{"key":"e_1_3_2_1_55_1","doi-asserted-by":"publisher","DOI":"10.1145\/3308558.3313489"},{"key":"e_1_3_2_1_56_1","volume-title":"Internet geolocation and evasion","author":"Muir James A","year":"2006","unstructured":"James A Muir and PC Van Oorschot. 2006. Internet geolocation and evasion. Ottawa: School of Computer Science, Carleton University (2006)."},{"key":"e_1_3_2_1_57_1","doi-asserted-by":"publisher","DOI":"10.1145\/2487575.2487580"},{"key":"e_1_3_2_1_58_1","unstructured":"Arjun Mukherjee Vivek Venkataraman Bing Liu and Natalie Glance. 2013. What Yelp Fake Review Filter Might Be Doing? https:\/\/www.aaai.org\/ocs\/index.php\/ICWSM\/ICWSM13\/paper\/view\/6006"},{"key":"e_1_3_2_1_59_1","doi-asserted-by":"publisher","DOI":"10.1145\/3308558.3313647"},{"key":"e_1_3_2_1_60_1","volume-title":"Exploring Syscall-Based Semantics Reconstruction of Android Applications. In 22nd International Symposium on Research in Attacks, Intrusions and Defenses (RAID 2019","author":"Nisi Dario","year":"2019","unstructured":"Dario Nisi, Antonio Bianchi, and Yanick Fratantonio. 2019. Exploring Syscall-Based Semantics Reconstruction of Android Applications. In 22nd International Symposium on Research in Attacks, Intrusions and Defenses (RAID 2019). USENIX Association, Chaoyang District, Beijing, 517--531. https:\/\/www.usenix.org\/conference\/raid2019\/presentation\/nisi"},{"key":"e_1_3_2_1_61_1","doi-asserted-by":"publisher","DOI":"10.1145\/3313391"},{"key":"e_1_3_2_1_62_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10796-009-9172-1"},{"key":"e_1_3_2_1_63_1","volume-title":"Official Journal of the European Union","author":"Parliament TE","year":"2016","unstructured":"TE Parliament. 2016. Regulation (eu) 2016\/679 of the european parliament and of the council. Official Journal of the European Union (2016)."},{"key":"e_1_3_2_1_64_1","volume-title":"28th USENIX Security Symposium (USENIX Security 19)","author":"Pendlebury Feargus","year":"2019","unstructured":"Feargus Pendlebury, Fabio Pierazzi, Roberto Jordaney, Johannes Kinder, and Lorenzo Cavallaro. 2019. TESSERACT: Eliminating Experimental Bias in Malware Classification across Space and Time. In 28th USENIX Security Symposium (USENIX Security 19). USENIX Association, Santa Clara, CA, 729--746. https:\/\/www.usenix.org\/conference\/usenixsecurity19\/presentation\/pendlebury"},{"key":"e_1_3_2_1_65_1","doi-asserted-by":"publisher","DOI":"10.1145\/3209542.3209555"},{"key":"e_1_3_2_1_66_1","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2020.2975170"},{"key":"e_1_3_2_1_67_1","doi-asserted-by":"publisher","DOI":"10.1145\/3319535.3345658"},{"key":"e_1_3_2_1_68_1","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2017.2667658"},{"key":"e_1_3_2_1_69_1","volume-title":"Harvesting Runtime Values in Android Applications That Feature Anti-Analysis Techniques. In 23rd Annual Network and Distributed System Security Symposium, NDSS 2016","author":"Rasthofer Siegfried","year":"2016","unstructured":"Siegfried Rasthofer, Steven Arzt, Marc Miltenberger, and Eric Bodden. 2016. Harvesting Runtime Values in Android Applications That Feature Anti-Analysis Techniques. In 23rd Annual Network and Distributed System Security Symposium, NDSS 2016, San Diego, California, USA, February 21-24, 2016. The Internet Society. https:\/\/bit.ly\/38ZZ4qe"},{"key":"e_1_3_2_1_70_1","volume-title":"28th USENIX Security Symposium (USENIX Security 19)","author":"Reardon Joel","year":"2019","unstructured":"Joel Reardon, \u00c1lvaro Feal, Primal Wijesekera, Amit Elazari Bar On, Narseo Vallina-Rodriguez, and Serge Egelman. 2019. 50 Ways to Leak Your Data: An Exploration of Apps' Circumvention of the Android Permissions System. In 28th USENIX Security Symposium (USENIX Security 19). USENIX Association, Santa Clara, CA, 603--620. https:\/\/www.usenix.org\/conference\/usenixsecurity19\/presentation\/reardon"},{"key":"e_1_3_2_1_71_1","doi-asserted-by":"publisher","DOI":"10.2478\/popets-2020-0083"},{"key":"e_1_3_2_1_72_1","doi-asserted-by":"publisher","DOI":"10.1145\/2810103.2813661"},{"key":"e_1_3_2_1_73_1","volume-title":"EVILCOHORT: Detecting Communities of Malicious Accounts on Online Services. In 24th USENIX Security Symposium (USENIX Security 15)","author":"Stringhini Gianluca","year":"2015","unstructured":"Gianluca Stringhini, Pierre Mourlanne, Gregoire Jacob, Manuel Egele, Christopher Kruegel, and Giovanni Vigna. 2015. EVILCOHORT: Detecting Communities of Malicious Accounts on Online Services. In 24th USENIX Security Symposium (USENIX Security 15). USENIX Association, Washington, D.C., 563--578. https:\/\/www.usenix.org\/conference\/usenixsecurity15\/technical-sessions\/presentation\/stringhini"},{"key":"e_1_3_2_1_74_1","doi-asserted-by":"publisher","DOI":"10.1145\/2504730.2504731"},{"key":"e_1_3_2_1_75_1","doi-asserted-by":"publisher","DOI":"10.1145\/2068816.2068840"},{"key":"e_1_3_2_1_76_1","volume-title":"Proceedings of the 22nd USENIX Conference on Security (SEC'13)","author":"Thomas Kurt","year":"2013","unstructured":"Kurt Thomas, Damon McCoy, Chris Grier, Alek Kolcz, and Vern Paxson. 2013. Trafficking Fraudulent Accounts: The Role of the Underground Market in Twitter Spam and Abuse. In Proceedings of the 22nd USENIX Conference on Security (SEC'13). USENIX Association, USA, 195--210."},{"key":"e_1_3_2_1_77_1","unstructured":"Ben Thorn. 2019. Fake Reviews and the Australian Consumer Law. https:\/\/xuveo.legal\/blog\/fake-reviews-australian-consumer-law."},{"key":"e_1_3_2_1_78_1","doi-asserted-by":"publisher","DOI":"10.1145\/2736277.2741136"},{"key":"e_1_3_2_1_79_1","volume-title":"Virustotal-free online virus, malware and url scanner. Online: https:\/\/www.virustotal.com\/en","author":"Total Virus","year":"2012","unstructured":"Virus Total. 2012. Virustotal-free online virus, malware and url scanner. Online: https:\/\/www.virustotal.com\/en (2012)."},{"key":"e_1_3_2_1_80_1","doi-asserted-by":"publisher","DOI":"10.1145\/3278532.3278558"},{"key":"e_1_3_2_1_81_1","doi-asserted-by":"publisher","DOI":"10.1145\/3219819.3220106"},{"key":"e_1_3_2_1_82_1","volume-title":"IPCC","author":"Wei C.","year":"2005","unstructured":"C. Wei and B. E. Kolko. 2005. Studying mobile phone use in context: cultural, political, and economic dimensions of mobile phone use. In IPCC 2005."},{"key":"e_1_3_2_1_83_1","unstructured":"Madeleine Wilson. 2019. How to Improve App Ratings and Reviews. Apptentive https:\/\/www.apptentive.com\/blog\/2019\/08\/22\/improve-mobile-app-ratings-and-reviews\/."},{"key":"e_1_3_2_1_84_1","doi-asserted-by":"publisher","DOI":"10.1145\/2339530.2339662"},{"key":"e_1_3_2_1_85_1","doi-asserted-by":"publisher","DOI":"10.1145\/2627393.2627409"},{"key":"e_1_3_2_1_86_1","doi-asserted-by":"publisher","DOI":"10.1145\/2766498.2766510"},{"key":"e_1_3_2_1_87_1","doi-asserted-by":"publisher","DOI":"10.1145\/2991079.2991099"},{"key":"e_1_3_2_1_88_1","doi-asserted-by":"publisher","DOI":"10.1145\/2513166.2513176"},{"key":"e_1_3_2_1_89_1","doi-asserted-by":"publisher","DOI":"10.1137\/1.9781611974010.20"},{"key":"e_1_3_2_1_90_1","volume-title":"Deep Entity Classification: Abusive Account Detection for Online Social Networks. In Usenix Security Symposium.","author":"Goossen Teng","year":"2021","unstructured":"Xu, Teng and Goossen, Gerard and Cevahir, Huseyin Kerem and Khodeir, Sara and Jin, Yingyezhe and Li, Frank and Shan, Shawn and Patel, Sagar and Freeman, David and Pearce, Paul. 2021. Deep Entity Classification: Abusive Account Detection for Online Social Networks. In Usenix Security Symposium."},{"key":"e_1_3_2_1_91_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.2015.50"},{"key":"e_1_3_2_1_92_1","volume-title":"Proceedings of the Tenth International Conference on Web and Social Media","author":"Ye Junting","year":"2016","unstructured":"Junting Ye, Santhosh Kumar, and Leman Akoglu. 2016. Temporal Opinion Spam Detection by Multivariate Indicative Signals. In Proceedings of the Tenth International Conference on Web and Social Media, Cologne, Germany, May 17-20, 2016. 743--746."},{"key":"e_1_3_2_1_93_1","doi-asserted-by":"publisher","DOI":"10.1145\/3319535.3363198"},{"key":"e_1_3_2_1_94_1","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2018.23009"},{"key":"e_1_3_2_1_95_1","volume-title":"Network and Distributed System Security Symposium, NDSS","volume":"25","author":"Zhou Yajin","year":"2012","unstructured":"Yajin Zhou, Zhi Wang, Wu Zhou, and Xuxian Jiang. 2012. Hey, you, get off of my market: detecting malicious apps in official and alternative android markets. In Network and Distributed System Security Symposium, NDSS, Vol. 25. 50--52."}],"event":{"name":"IMC '21: ACM Internet Measurement Conference","sponsor":["SIGCOMM ACM Special Interest Group on Data Communication","SIGMETRICS ACM Special Interest Group on Measurement and Evaluation","USENIX Assoc USENIX Assoc"],"location":"Virtual Event","acronym":"IMC '21"},"container-title":["Proceedings of the 21st ACM Internet Measurement Conference"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3487552.3487837","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/abs\/10.1145\/3487552.3487837","content-type":"text\/html","content-version":"vor","intended-application":"syndication"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3487552.3487837","content-type":"application\/pdf","content-version":"vor","intended-application":"syndication"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3487552.3487837","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,12,15]],"date-time":"2025-12-15T17:25:05Z","timestamp":1765819505000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3487552.3487837"}},"subtitle":["measurements of ASO deception in Google play via mobile and app usage"],"short-title":[],"issued":{"date-parts":[[2021,11,2]]},"references-count":95,"alternative-id":["10.1145\/3487552.3487837","10.1145\/3487552"],"URL":"https:\/\/doi.org\/10.1145\/3487552.3487837","relation":{},"subject":[],"published":{"date-parts":[[2021,11,2]]},"assertion":[{"value":"2021-11-02","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}