{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,10]],"date-time":"2026-01-10T03:52:39Z","timestamp":1768017159800,"version":"3.49.0"},"publisher-location":"New York, NY, USA","reference-count":52,"publisher":"ACM","license":[{"start":{"date-parts":[[2022,10,26]],"date-time":"2022-10-26T00:00:00Z","timestamp":1666742400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61902265, U20B2045"],"award-info":[{"award-number":["61902265, U20B2045"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100012166","name":"National Key Research and Development Program of China","doi-asserted-by":"publisher","award":["2021YFB3100500"],"award-info":[{"award-number":["2021YFB3100500"]}],"id":[{"id":"10.13039\/501100012166","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2022,10,26]]},"DOI":"10.1145\/3545948.3545952","type":"proceedings-article","created":{"date-parts":[[2022,10,17]],"date-time":"2022-10-17T11:21:49Z","timestamp":1666005709000},"page":"409-430","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":4,"title":["Viopolicy-Detector: An Automated Approach to Detecting GDPR Suspected Compliance Violations in Websites"],"prefix":"10.1145","author":[{"given":"Haoran","family":"Ou","sequence":"first","affiliation":[{"name":"School of Cyber Science and Engineering, Sichuan University, China"}]},{"given":"Yong","family":"Fang","sequence":"additional","affiliation":[{"name":"School of Cyber Science and Engineering, Sichuan University, China"}]},{"given":"Yongyan","family":"Guo","sequence":"additional","affiliation":[{"name":"School of Cyber Science and Engineering, Sichuan University, China"}]},{"given":"Wenbo","family":"Guo","sequence":"additional","affiliation":[{"name":"School of Cyber Science and Engineering, Sichuan University, China"}]},{"given":"Cheng","family":"Huang","sequence":"additional","affiliation":[{"name":"School of Cyber Science and Engineering, Sichuan University, China"}]}],"member":"320","published-online":{"date-parts":[[2022,10,26]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.chb.2021.106729"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1145\/2907942"},{"key":"e_1_3_2_1_3_1","volume-title":"Hands-On Web Scraping with Python: Perform advanced scraping operations using various Python libraries and tools such as Selenium, Regex, and others","author":"Chapagain Anish","unstructured":"Anish Chapagain . 2019. Hands-On Web Scraping with Python: Perform advanced scraping operations using various Python libraries and tools such as Selenium, Regex, and others . Packt Publishing Ltd . Anish Chapagain. 2019. Hands-On Web Scraping with Python: Perform advanced scraping operations using various Python libraries and tools such as Selenium, Regex, and others. Packt Publishing Ltd."},{"key":"e_1_3_2_1_4_1","volume-title":"EU personal data protection in policy and practice","author":"Custers Bart","unstructured":"Bart Custers , Alan\u00a0 M Sears , Francien Dechesne , Ilina Georgieva , Tommaso Tani , and Simone Van\u00a0der Hof . 2019. EU personal data protection in policy and practice . Springer . Bart Custers, Alan\u00a0M Sears, Francien Dechesne, Ilina Georgieva, Tommaso Tani, and Simone Van\u00a0der Hof. 2019. EU personal data protection in policy and practice. Springer."},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"crossref","unstructured":"Martin Degeling Christine Utz Christopher Lentzsch Henry Hosseini Florian Schaub and Thorsten Holz. 2018. We value your privacy... now take some cookies: Measuring the GDPR\u2019s impact on web privacy. arXiv preprint arXiv:1808.05096(2018).  Martin Degeling Christine Utz Christopher Lentzsch Henry Hosseini Florian Schaub and Thorsten Holz. 2018. We value your privacy... now take some cookies: Measuring the GDPR\u2019s impact on web privacy. arXiv preprint arXiv:1808.05096(2018).","DOI":"10.14722\/ndss.2019.23378"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.infsof.2020.106466"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2021.3123950"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1109\/ISSRE5003.2020.00032"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1109\/EuroSPW51379.2020.00051"},{"key":"e_1_3_2_1_10_1","volume-title":"O\u2019Reilly Media","author":"Grinberg Miguel","unstructured":"Miguel Grinberg . 2018. Flask web development: developing web applications with python . \u201d O\u2019Reilly Media , Inc .\u201d. Miguel Grinberg. 2018. Flask web development: developing web applications with python. \u201d O\u2019Reilly Media, Inc.\u201d."},{"key":"e_1_3_2_1_11_1","volume-title":"27th USENIX Security Symposium (USENIX Security 18)","author":"Harkous Hamza","year":"2018","unstructured":"Hamza Harkous , Kassem Fawaz , R\u00e9mi Lebret , Florian Schaub , Kang\u00a0 G Shin , and Karl Aberer . 2018 . Polisis: Automated analysis and presentation of privacy policies using deep learning . In 27th USENIX Security Symposium (USENIX Security 18) . 531\u2013548. Hamza Harkous, Kassem Fawaz, R\u00e9mi Lebret, Florian Schaub, Kang\u00a0G Shin, and Karl Aberer. 2018. Polisis: Automated analysis and presentation of privacy policies using deep learning. In 27th USENIX Security Symposium (USENIX Security 18). 531\u2013548."},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/3460120.3484823"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2021.102218"},{"key":"e_1_3_2_1_14_1","first-page":"1117","article-title":"Implementing Privacy Policy: Who Should Do What","volume":"29","author":"Hyman A","year":"2018","unstructured":"David\u00a0 A Hyman and William\u00a0 E Kovacic . 2018 . Implementing Privacy Policy: Who Should Do What . Fordham Intell. Prop. Media & Ent. LJ 29 (2018), 1117 . David\u00a0A Hyman and William\u00a0E Kovacic. 2018. Implementing Privacy Policy: Who Should Do What. Fordham Intell. Prop. Media & Ent. LJ 29 (2018), 1117.","journal-title":"Fordham Intell. Prop. Media & Ent. LJ"},{"key":"e_1_3_2_1_15_1","volume-title":"Image Information Collection System Based on Python Web Crawler Technology. CONVERTER","author":"Jin Dong","year":"2021","unstructured":"Dong Jin . 2021. Image Information Collection System Based on Python Web Crawler Technology. CONVERTER ( 2021 ), 606\u2013612. Dong Jin. 2021. Image Information Collection System Based on Python Web Crawler Technology. CONVERTER (2021), 606\u2013612."},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1145\/1753326.1753561"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.clsr.2015.01.004"},{"key":"e_1_3_2_1_18_1","unstructured":"Timothy Libert Lucas Graves and Rasmus\u00a0Kleis Nielsen. 2018. Changes in third-party content on European News Websites after GDPR. (2018).  Timothy Libert Lucas Graves and Rasmus\u00a0Kleis Nielsen. 2018. Changes in third-party content on European News Websites after GDPR. (2018)."},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.2478\/popets-2020-0004"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1145\/3436755"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP40000.2020.00076"},{"key":"e_1_3_2_1_22_1","unstructured":"Eric Matthes. 2019. Python crash course: A hands-on project-based introduction to programming. no starch press.  Eric Matthes. 2019. Python crash course: A hands-on project-based introduction to programming. no starch press."},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1145\/1572532.1572586"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.17645\/mac.v8i2.2846"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1515\/popets-2016-0009"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.7717\/peerj-cs.103"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-27947-9_13"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1145\/3313831.3376321"},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1145\/3442381.3450056"},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1002\/spy2.15"},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2018.23353"},{"key":"e_1_3_2_1_32_1","volume-title":"Journal of Physics: Conference Series, Vol.\u00a0978","author":"Rosmaini Elly","year":"2042","unstructured":"Elly Rosmaini , T\u00a0Fabrianti Kusumasari , Muharman Lubis , and A\u00a0Ridho Lubis . 2018. Insights to develop privacy policy for organization in Indonesia . In Journal of Physics: Conference Series, Vol.\u00a0978 . IOP Publishing , 01 2042 . Elly Rosmaini, T\u00a0Fabrianti Kusumasari, Muharman Lubis, and A\u00a0Ridho Lubis. 2018. Insights to develop privacy policy for organization in Indonesia. In Journal of Physics: Conference Series, Vol.\u00a0978. IOP Publishing, 012042."},{"key":"e_1_3_2_1_33_1","first-page":"809","article-title":"Intangible privacy rights: How europe\u2019s gdpr will set a new global standard for personal data protection","volume":"47","author":"Safari A","year":"2016","unstructured":"Beata\u00a0 A Safari . 2016 . Intangible privacy rights: How europe\u2019s gdpr will set a new global standard for personal data protection . Seton Hall L. Rev. 47 (2016), 809 . Beata\u00a0A Safari. 2016. Intangible privacy rights: How europe\u2019s gdpr will set a new global standard for personal data protection. Seton Hall L. Rev. 47(2016), 809.","journal-title":"Seton Hall L. Rev."},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1145\/3321705.3329806"},{"key":"e_1_3_2_1_35_1","unstructured":"Cristiana Santos Nataliia Bielova and C\u00e9lestin Matte. 2019. Are cookie banners indeed compliant with the law? deciphering eu legal requirements on consent and technical means to verify compliance of cookie banners. arXiv preprint arXiv:1912.07144(2019).  Cristiana Santos Nataliia Bielova and C\u00e9lestin Matte. 2019. Are cookie banners indeed compliant with the law? deciphering eu legal requirements on consent and technical means to verify compliance of cookie banners. arXiv preprint arXiv:1912.07144(2019)."},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1145\/3463676.3485611"},{"key":"e_1_3_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.18653\/v1\/D17-1294"},{"key":"e_1_3_2_1_38_1","volume-title":"Eleventh symposium on usable privacy and security (SOUPS","author":"Schaub Florian","year":"2015","unstructured":"Florian Schaub , Rebecca Balebako , Adam\u00a0 L Durity , and Lorrie\u00a0Faith Cranor . 2015 . A design space for effective privacy notices . In Eleventh symposium on usable privacy and security (SOUPS 2015). 1\u201317. Florian Schaub, Rebecca Balebako, Adam\u00a0L Durity, and Lorrie\u00a0Faith Cranor. 2015. A design space for effective privacy notices. In Eleventh symposium on usable privacy and security (SOUPS 2015). 1\u201317."},{"key":"e_1_3_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.1002\/ece3.8098"},{"key":"e_1_3_2_1_40_1","doi-asserted-by":"publisher","DOI":"10.1145\/3180445.3180447"},{"key":"e_1_3_2_1_41_1","doi-asserted-by":"publisher","DOI":"10.1109\/RE48521.2020.00025"},{"key":"e_1_3_2_1_42_1","doi-asserted-by":"publisher","DOI":"10.1145\/3319535.3354212"},{"key":"e_1_3_2_1_43_1","doi-asserted-by":"publisher","DOI":"10.1145\/3355369.3355583"},{"key":"e_1_3_2_1_44_1","unstructured":"Rob Van\u00a0Eijk Hadi Asghari Philipp Winter and Arvind Narayanan. 2021. The impact of user location on cookie notices (inside and outside of the European Union). arXiv preprint arXiv:2110.09832(2021).  Rob Van\u00a0Eijk Hadi Asghari Philipp Winter and Arvind Narayanan. 2021. The impact of user location on cookie notices (inside and outside of the European Union). arXiv preprint arXiv:2110.09832(2021)."},{"key":"e_1_3_2_1_45_1","unstructured":"Meng Wang Javier Santillan and Fernando Kuipers. 2018. Thingpot: an interactive internet-of-things honeypot. arXiv preprint arXiv:1807.04114(2018).  Meng Wang Javier Santillan and Fernando Kuipers. 2018. Thingpot: an interactive internet-of-things honeypot. arXiv preprint arXiv:1807.04114(2018)."},{"key":"e_1_3_2_1_46_1","doi-asserted-by":"publisher","DOI":"10.18653\/v1\/P16-1126"},{"key":"e_1_3_2_1_47_1","doi-asserted-by":"publisher","DOI":"10.1109\/MTS.2016.2554419"},{"key":"e_1_3_2_1_48_1","doi-asserted-by":"publisher","DOI":"10.1109\/DSN.2016.55"},{"key":"e_1_3_2_1_49_1","doi-asserted-by":"publisher","DOI":"10.1145\/3389685"},{"key":"e_1_3_2_1_50_1","doi-asserted-by":"publisher","DOI":"10.1145\/3319921.3319922"},{"key":"e_1_3_2_1_51_1","volume-title":"23rd USENIX Security Symposium (USENIX Security 14)","author":"Zimmeck Sebastian","year":"2014","unstructured":"Sebastian Zimmeck and Steven\u00a0 M Bellovin . 2014 . Privee: An architecture for automatically analyzing web privacy policies . In 23rd USENIX Security Symposium (USENIX Security 14) . 1\u201316. Sebastian Zimmeck and Steven\u00a0M Bellovin. 2014. Privee: An architecture for automatically analyzing web privacy policies. In 23rd USENIX Security Symposium (USENIX Security 14). 1\u201316."},{"key":"e_1_3_2_1_52_1","volume-title":"2016 AAAI Fall Symposium Series.","author":"Zimmeck Sebastian","year":"2016","unstructured":"Sebastian Zimmeck , Ziqi Wang , Lieyong Zou , Roger Iyengar , Bin Liu , Florian Schaub , Shomir Wilson , Norman Sadeh , Steven Bellovin , and Joel Reidenberg . 2016 . Automated analysis of privacy requirements for mobile apps . In 2016 AAAI Fall Symposium Series. Sebastian Zimmeck, Ziqi Wang, Lieyong Zou, Roger Iyengar, Bin Liu, Florian Schaub, Shomir Wilson, Norman Sadeh, Steven Bellovin, and Joel Reidenberg. 2016. Automated analysis of privacy requirements for mobile apps. In 2016 AAAI Fall Symposium Series."}],"event":{"name":"RAID 2022: 25th International Symposium on Research in Attacks, Intrusions and Defenses","location":"Limassol Cyprus","acronym":"RAID 2022"},"container-title":["Proceedings of the 25th International Symposium on Research in Attacks, Intrusions and Defenses"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3545948.3545952","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3545948.3545952","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T19:30:27Z","timestamp":1750188627000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3545948.3545952"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,10,26]]},"references-count":52,"alternative-id":["10.1145\/3545948.3545952","10.1145\/3545948"],"URL":"https:\/\/doi.org\/10.1145\/3545948.3545952","relation":{},"subject":[],"published":{"date-parts":[[2022,10,26]]},"assertion":[{"value":"2022-10-26","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}