{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,8,22]],"date-time":"2025-08-22T05:13:50Z","timestamp":1755839630248,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":53,"publisher":"ACM","license":[{"start":{"date-parts":[[2023,11,26]],"date-time":"2023-11-26T00:00:00Z","timestamp":1700956800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2023,11,26]]},"DOI":"10.1145\/3603216.3624958","type":"proceedings-article","created":{"date-parts":[[2023,11,23]],"date-time":"2023-11-23T01:38:42Z","timestamp":1700703522000},"page":"31-43","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":1,"title":["UA-Radar: Exploring the Impact of User Agents on the Web"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0009-0002-0525-1565","authenticated-orcid":false,"given":"Jean Luc","family":"Intumwayase","sequence":"first","affiliation":[{"name":"Univ. Lille, CNRS, Inria, Lille, France"}]},{"ORCID":"https:\/\/orcid.org\/0009-0006-7613-0428","authenticated-orcid":false,"given":"Imane","family":"Fouad","sequence":"additional","affiliation":[{"name":"Univ. Lille, CNRS, Inria, Lille, France"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-6901-3596","authenticated-orcid":false,"given":"Pierre","family":"Laperdrix","sequence":"additional","affiliation":[{"name":"CNRS, Univ Lille, Inria, Lille, France"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-1771-8791","authenticated-orcid":false,"given":"Romain","family":"Rouvoy","sequence":"additional","affiliation":[{"name":"Univ. Lille, CNRS, Inria, Lille, France"}]}],"member":"320","published-online":{"date-parts":[[2023,11,26]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"1329996 - (uplift_tor_fingerprinting) [META] Tor Uplift: Fingerprinting Resistance. en. url: https:\/\/bugzilla.mozilla.org\/show_bug.cgi?id=1329996."},{"key":"e_1_3_2_1_2_1","unstructured":"A research-oriented top sites ranking hardened against manipulation - Tranco. url: https:\/\/tranco-list.eu\/."},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-39984-1_3"},{"key":"e_1_3_2_1_4_1","unstructured":"Aaron Andersen. History of the browser user-agent string. url: https:\/\/webaim. org\/blog\/user-agent-string-history\/."},{"key":"e_1_3_2_1_5_1","first-page":"680","volume-title":"Proceedings of the ACM Internet Measurement Conference. IMC '20","author":"Waqar","year":"2020","unstructured":"Waqar Aqeel et al. \"On Landing and Internal Web Pages: The Strange Case of Jekyll and Hyde in Web Performance Measurement\". In: Proceedings of the ACM Internet Measurement Conference. IMC '20. New York, NY, USA: ACM, Oct. 2020, pp. 680--695. isbn: 978--1--4503--8138--3."},{"key":"e_1_3_2_1_6_1","first-page":"217","volume-title":"Theoretical Computer Science 337.1--3 (June","author":"Bille Philip","year":"2005","unstructured":"Philip Bille. \"A survey on tree edit distance and related problems\". en. In: Theoretical Computer Science 337.1--3 (June 2005), pp. 217--239. issn: 03043975."},{"key":"e_1_3_2_1_7_1","volume-title":"SFTM: Fast Matching of Web Pages using Similarity-based Flexible Tree Matching","author":"Sacha Brisset","year":"2022","unstructured":"Sacha Brisset et al. \"SFTM: Fast Matching of Web Pages using Similarity-based Flexible Tree Matching\". In: Information Systems (2022)."},{"key":"e_1_3_2_1_8_1","unstructured":"David Buttler. \"A Short Survey of Document Structure Similarity Algorithms\". en. In: ()."},{"key":"e_1_3_2_1_9_1","first-page":"679","volume-title":"Conference Name: IEEE Transactions on Pattern Analysis and Machine Intelligence","author":"Canny John","year":"1939","unstructured":"John Canny. \"A Computational Approach to Edge Detection\". In: IEEE Transactions on Pattern Analysis and Machine Intelligence PAMI-8.6 (Nov. 1986). Conference Name: IEEE Transactions on Pattern Analysis and Machine Intelligence, pp. 679--698. issn: 1939--3539."},{"key":"e_1_3_2_1_10_1","unstructured":"Check Single URL. url: https:\/\/sitelookup.mcafee.com\/en\/feedback\/url?action= checksingle&sid=BF6DB84A3A60F9AEB8F69A93DA023455."},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1145\/775152.775184"},{"key":"e_1_3_2_1_12_1","first-page":"1146","volume-title":"2011 33rd International Conference on Software Engineering (ICSE). 2011 33rd International Conference on Software Engineering (ICSE). ISSN: 1558--1225","author":"Choudhary Shauvik Roy","year":"2011","unstructured":"Shauvik Roy Choudhary. \"Detecting cross-browser issues in web applications\". In: 2011 33rd International Conference on Software Engineering (ICSE). 2011 33rd International Conference on Software Engineering (ICSE). ISSN: 1558--1225. May 2011, pp. 1146--1148."},{"key":"e_1_3_2_1_13_1","first-page":"253","volume-title":"Proceedings of the twentieth annual symposium on Computational geometry. Brooklyn New York USA: ACM","author":"Mayur","year":"2004","unstructured":"Mayur Datar et al. \"Locality-sensitive hashing scheme based on p-stable distributions\". en. In: Proceedings of the twentieth annual symposium on Computational geometry. Brooklyn New York USA: ACM, June 2004, pp. 253--262. isbn: 978--1--58113--885--6."},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"crossref","unstructured":"Andrea Drmic et al. \"Evaluating robustness of perceptual image hashing algorithms\". In: 2017 40th International Convention on Information and Communication Technology Electronics and Microelectronics (MIPRO). 2017 40th International Convention on Information and Communication Technology Electronics and Microelectronics (MIPRO). May 2017 pp. 995--1000.","DOI":"10.23919\/MIPRO.2017.7973569"},{"key":"e_1_3_2_1_15_1","series-title":"Lecture Notes in Computer Science","first-page":"1","volume-title":"by Mikhail J. Atallah and Nicholas J. Hopper","author":"Eckersley Peter","year":"2010","unstructured":"Peter Eckersley. \"How Unique Is Your Web Browser\"\" In: Privacy Enhancing Technologies. Ed. by Mikhail J. Atallah and Nicholas J. Hopper. Lecture Notes in Computer Science. Berlin, Heidelberg: Springer, 2010, pp. 1--18. isbn: 978--3- 642--14527--8."},{"key":"e_1_3_2_1_16_1","first-page":"1388","volume-title":"Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security. CCS'16: 2016 ACM SIGSAC Conference on Computer and Communications Security. Vienna Austria: ACM","author":"Englehardt Steven","year":"2016","unstructured":"Steven Englehardt and Arvind Narayanan. \"Online Tracking: A 1-million-site Measurement and Analysis\". In: Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security. CCS'16: 2016 ACM SIGSAC Conference on Computer and Communications Security. Vienna Austria: ACM, Oct. 24, 2016, pp. 1388--1401. isbn: 978--1--4503--4139--4."},{"key":"e_1_3_2_1_17_1","first-page":"181","volume-title":"2016 12th International Conference on Network and Service Management (CNSM). ISSN: 2165--963X.","author":"Jacob Steffie","year":"2016","unstructured":"Steffie Jacob Eravuchira et al. \"Measuring web similarity from dual-stacked hosts\". In: 2016 12th International Conference on Network and Service Management (CNSM). ISSN: 2165--963X. Oct. 2016, pp. 181--187."},{"key":"e_1_3_2_1_18_1","first-page":"313","volume-title":"Proceedings of the 29th ACM\/IEEE international conference on Automated software engineering. ASE '14: ACM\/IEEE International Conference on Automated Software Engineering. Vasteras Sweden: ACM","author":"Jean-R\u00e9my","year":"2014","unstructured":"Jean-R\u00e9my Falleri et al. \"Fine-grained and accurate source code differencing\". In: Proceedings of the 29th ACM\/IEEE international conference on Automated software engineering. ASE '14: ACM\/IEEE International Conference on Automated Software Engineering. Vasteras Sweden: ACM, Sept. 15, 2014, pp. 313--324. isbn: 978--1--4503--3013--8. url: https:\/\/dl.acm.org\/doi\/10.1145\/2642937.2642982."},{"key":"e_1_3_2_1_19_1","volume-title":"Proceedings of the 2018 World Wide Web Conference on World Wide Web,WWW2018","author":"G\u00f3mez-Boix Alejandro","year":"2018","unstructured":"Alejandro G\u00f3mez-Boix, Pierre Laperdrix, and Benoit Baudry. \"Hiding in the Crowd: an Analysis of the Effectiveness of Browser Fingerprinting at Large Scale\". In: Proceedings of the 2018 World Wide Web Conference on World Wide Web,WWW2018, Lyon, France, April 23--27, 2018. Ed. by Pierre-Antoine Champin et al. ACM, 2018, pp. 309--318."},{"volume-title":"original-date: 2018-01--23T19:42:02Z","year":"2023","key":"e_1_3_2_1_20_1","unstructured":"google\/diff-match-patch. original-date: 2018-01--23T19:42:02Z. Jan. 2023. url: https:\/\/github.com\/google\/diff-match-patch."},{"key":"e_1_3_2_1_21_1","first-page":"24","volume-title":"()","author":"Grosskurth Alan","unstructured":"Alan Grosskurth and Michael W Godfrey. \"Architecture and evolution of the modern web browser\". In: (), p. 24."},{"key":"e_1_3_2_1_22_1","first-page":"2400","volume-title":"Proceedings of the ACM Web Conference 2022. WWW '22: The ACM Web Conference 2022","author":"Waleed","year":"2022","unstructured":"Waleed Hashmi et al. \"QLUE: A Computer Vision Tool for Uniform Qualitative Evaluation of Web Pages\". In: Proceedings of the ACM Web Conference 2022. WWW '22: The ACM Web Conference 2022. Virtual Event, Lyon France: ACM, Apr. 25, 2022, pp. 2400--2410. isbn: 978--1--4503--9096--5."},{"key":"e_1_3_2_1_23_1","volume-title":"uBlock Origin (uBO). original-date: 2015-04-01T17:51:11Z","author":"Hill Raymond","year":"2023","unstructured":"Raymond Hill. uBlock Origin (uBO). original-date: 2015-04-01T17:51:11Z. Aug. 2023. url: https:\/\/github.com\/gorhill\/uBlock (visited on 07\/28\/2023)."},{"key":"e_1_3_2_1_24_1","unstructured":"HTTP Request fields. url: https:\/\/www.w3.org\/Protocols\/HTTP\/HTRQ_ Headers.html."},{"key":"e_1_3_2_1_25_1","volume-title":"en","author":"User-Agent Client Improving","year":"2020","unstructured":"Improving user privacy and developer experience with User-Agent Client Hints. en. June 2020. url: https:\/\/developer.chrome.com\/articles\/user-agent-client-hints\/ (visited on 07\/31\/2023)."},{"key":"e_1_3_2_1_26_1","first-page":"2","volume-title":"en","author":"Kheir Nizar","year":"2012","unstructured":"Nizar Kheir. \"Behavioral classification and detection of malware through HTTP user agent anomalies\". en. In: Journal of Information Security and Applications. SETOP'2012 and FPS'2012 Special Issue 18.1 (July 2013), pp. 2--13. issn: 2214- 2126."},{"key":"e_1_3_2_1_27_1","first-page":"184","volume-title":"Proceedings of the 2017 Internet Measurement Conference. IMC '17: Internet Measurement Conference. London United Kingdom: ACM","author":"Jeff","year":"2017","unstructured":"Jeff Kline et al. \"On the structure and characteristics of user agent string\". In: Proceedings of the 2017 Internet Measurement Conference. IMC '17: Internet Measurement Conference. London United Kingdom: ACM, Nov. 2017, pp. 184-- 190. isbn: 978--1--4503--5118--8."},{"key":"e_1_3_2_1_28_1","volume-title":"eng - Ingl\u00e9s. In: (Feb","author":"Kotsarenko Yuriy","year":"2018","unstructured":"Yuriy Kotsarenko. \"Measuring perceived color difference using YIQ NTSC transmission color space in mobile applications\". eng - Ingl\u00e9s. In: (Feb. 2018). Accepted: 2018-02--13T19:35:28Z Publisher: Universidad Aut\u00f3noma del Estado de Morelos. issn: 2007--3283. url: http:\/\/riaa.uaem.mx\/xmlui\/handle\/20.500. 12055\/91."},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2016.57"},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1145\/3386040"},{"key":"e_1_3_2_1_31_1","first-page":"3991","article-title":"Structural and visual similarity learning for Web page archiving","author":"Law M. T.","year":"1949","unstructured":"M. T. Law et al. \"Structural and visual similarity learning for Web page archiving\". In: ISSN: 1949--3991. June 2012, pp. 1--6.","journal-title":"ISSN"},{"key":"e_1_3_2_1_32_1","first-page":"251","volume-title":"Algorithmica 1.1--4 (Nov.","author":"Myers Eugene W.","year":"1986","unstructured":"Eugene W. Myers. \"AnO(ND) difference algorithm and its variations\". en. In: Algorithmica 1.1--4 (Nov. 1986), pp. 251--266. issn: 0178--4617, 1432-0541."},{"key":"e_1_3_2_1_33_1","unstructured":"Javad Nejati and Aruna Balasubramanian. \"An In-depth Study of Mobile Browser Performance\". In: Proceedings of the 25th International Conference on World Wide Web. WWW '16: 25th International World Wide Web Conference. Montr\u00e9al Qu\u00e9bec Canada: International World Wide Web Conferences Steering Committee Apr. 11 2016 pp. 1305--1315. isbn: 978--1--4503--4143--1."},{"key":"e_1_3_2_1_34_1","first-page":"147","article-title":"Network Monitoring Using MMT: An Application Based on the User-Agent Field in HTTP Headers","year":"2016","unstructured":"\"Network Monitoring Using MMT: An Application Based on the User-Agent Field in HTTP Headers\". In: ISSN: 1550--445X. Mar. 2016, pp. 147--154.","journal-title":"ISSN: 1550--445X."},{"key":"e_1_3_2_1_35_1","first-page":"541","volume-title":"2013 IEEE Symposium on Security and Privacy. 2013 IEEE Symposium on Security and Privacy. ISSN: 1081--6011","author":"Nick","year":"2013","unstructured":"Nick Nikiforakis et al. \"Cookieless Monster: Exploring the Ecosystem of Web- Based Device Fingerprinting\". In: 2013 IEEE Symposium on Security and Privacy. 2013 IEEE Symposium on Security and Privacy. ISSN: 1081--6011. May 2013, pp. 541--555."},{"key":"e_1_3_2_1_36_1","unstructured":"OpenCV: Structural Analysis and Shape Descriptors. url: https:\/\/docs.opencv.org\/ 3.4\/d3\/dc0\/group__imgproc__shape.html#ga17ed9f5d79ae97bd4c7cf18403e1689a."},{"key":"e_1_3_2_1_37_1","doi-asserted-by":"crossref","unstructured":"Kien Pham A\u00e9cio Santos and Juliana Freire. \"UnderstandingWebsite Behavior based on User Agent\". In: Proceedings of the 39th International ACM SIGIR conference on Research and Development in Information Retrieval. SIGIR '16: The 39th International ACM SIGIR conference on research and development in Information Retrieval. Pisa Italy: ACM July 7 2016 pp. 1053--1056. isbn: 978--1--4503--4069--4.","DOI":"10.1145\/2911451.2914757"},{"key":"e_1_3_2_1_38_1","unstructured":"Playwright Library | Playwright. en. url: https:\/\/playwright.dev\/docs\/api\/classplaywright."},{"key":"e_1_3_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.1145\/988672.988740"},{"key":"e_1_3_2_1_40_1","volume-title":"Section: Safari Technology Preview","author":"Safari Technology Release Notes","year":"2017","unstructured":"Release Notes for Safari Technology Preview 46. Section: Safari Technology Preview. Dec. 2017. url: https:\/\/webkit.org\/blog\/8042\/release-notes-for-safaritechnology- preview-46\/."},{"key":"e_1_3_2_1_41_1","volume-title":"Handbook of Usability Testing: How to Plan, Design, and Conduct Effective Tests. English","author":"Rubin Jeffrey","year":"2008","unstructured":"Jeffrey Rubin, Dana Chisnell, and Jared Spool. Handbook of Usability Testing: How to Plan, Design, and Conduct Effective Tests. English. 2nd edition. Indianapolis, IN: Wiley, May 2008. isbn: 978-0--470--18548--3.","edition":"2"},{"key":"e_1_3_2_1_42_1","first-page":"478 5619","volume-title":"Proceedings of the Internet Measurement Conference 2018","author":"Quirin","year":"2018","unstructured":"Quirin Scheitle et al. \"A Long Way to the Top: Significance, Structure, and Stability of Internet Top Lists\". en. In: Proceedings of the Internet Measurement Conference 2018. Boston MA USA: ACM, Oct. 2018, pp. 478--493. isbn: 978--1- 4503--5619-0."},{"key":"e_1_3_2_1_43_1","doi-asserted-by":"publisher","DOI":"10.1145\/2072298.2072354"},{"key":"e_1_3_2_1_44_1","first-page":"7","volume-title":"en. In: ()","author":"Strehl Alexander","unstructured":"Alexander Strehl, Joydeep Ghosh, and Raymond Mooney. \"Impact of Similarity Measures on Web-Page Clustering\". en. In: (), p. 7."},{"key":"e_1_3_2_1_45_1","doi-asserted-by":"publisher","DOI":"10.1016\/0734-189X(85)90016-7"},{"key":"e_1_3_2_1_46_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-31865-1_35"},{"key":"e_1_3_2_1_47_1","first-page":"7","volume-title":"Jan.","year":"2014","unstructured":"\"User-agent based access control for DLNA devices\". In: Jan. 2014, pp. 7--11."},{"key":"e_1_3_2_1_48_1","unstructured":"User-Agent reduction. en. url: https:\/\/developer.chrome.com\/docs\/privacysandbox\/ user-agent\/."},{"key":"e_1_3_2_1_49_1","volume-title":"Needle In A Haystack","author":"Vallez Cyril","year":"2022","unstructured":"Cyril Vallez, Andrei Kucharavy, and Ljiljana Dolamic. Needle In A Haystack, Fast: Benchmarking Image Perceptual Similarity Metrics At Scale. Number: arXiv:2206.00282. June 1, 2022. arXiv: 2206.00282[cs]. url: http:\/\/arxiv.org\/abs\/ 2206.00282."},{"key":"e_1_3_2_1_50_1","volume-title":"ELECTRONCS AND ELECTRICAL ENGINEERING (Oct.","author":"Vysniauskas Vytautas","year":"2009","unstructured":"Vytautas Vysniauskas. \"Anti-aliased Pixel and Intensity Slope Detector\". In: ELECTRONCS AND ELECTRICAL ENGINEERING (Oct. 2009)."},{"key":"e_1_3_2_1_51_1","first-page":"575","volume-title":"Proceedings of the 23rd international conference on World wide web. WWW '14","author":"HaoyuWang","year":"2014","unstructured":"HaoyuWang et al. \"Similarity-based web browser optimization\". In: Proceedings of the 23rd international conference on World wide web. WWW '14. New York, NY, USA: ACM, 2014, pp. 575--584. isbn: 978--1--4503--2744--2."},{"key":"e_1_3_2_1_52_1","doi-asserted-by":"publisher","DOI":"10.1145\/1062745.1062868"},{"key":"e_1_3_2_1_53_1","first-page":"1091","volume-title":"Conference Name: IEEE Transactions on Pattern Analysis and Machine Intelligence","author":"Yujian Li","year":"1939","unstructured":"Li Yujian and Liu Bo. \"A Normalized Levenshtein Distance Metric\". In: IEEE Transactions on Pattern Analysis and Machine Intelligence 29.6 (June 2007). Conference Name: IEEE Transactions on Pattern Analysis and Machine Intelligence, pp. 1091--1095. issn: 1939--3539."}],"event":{"name":"CCS '23: ACM SIGSAC Conference on Computer and Communications Security","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"],"location":"Copenhagen Denmark","acronym":"CCS '23"},"container-title":["Proceedings of the 22nd Workshop on Privacy in the Electronic Society"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3603216.3624958","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3603216.3624958","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T22:49:11Z","timestamp":1750286951000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3603216.3624958"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,11,26]]},"references-count":53,"alternative-id":["10.1145\/3603216.3624958","10.1145\/3603216"],"URL":"https:\/\/doi.org\/10.1145\/3603216.3624958","relation":{},"subject":[],"published":{"date-parts":[[2023,11,26]]},"assertion":[{"value":"2023-11-26","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}