{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,13]],"date-time":"2026-04-13T16:53:56Z","timestamp":1776099236794,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":91,"publisher":"ACM","license":[{"start":{"date-parts":[[2024,12,2]],"date-time":"2024-12-02T00:00:00Z","timestamp":1733097600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/501100006374","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["62172104,62172105,62102093,62102091"],"award-info":[{"award-number":["62172104,62172105,62102093,62102091"]}],"id":[{"id":"10.13039\/501100006374","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Funding of Ministry of Industry and Information Technology of the People?s Republic of China","award":["TC220H079"],"award-info":[{"award-number":["TC220H079"]}]},{"name":"National Key Research and Development Program","award":["2021YFB3101200"],"award-info":[{"award-number":["2021YFB3101200"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2024,12,2]]},"DOI":"10.1145\/3658644.3670377","type":"proceedings-article","created":{"date-parts":[[2024,12,9]],"date-time":"2024-12-09T12:19:20Z","timestamp":1733746760000},"page":"1581-1595","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":3,"title":["Are We Getting Well-informed? An In-depth Study of Runtime Privacy Notice Practice in Mobile Apps"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-4593-7019","authenticated-orcid":false,"given":"Shuai","family":"Li","sequence":"first","affiliation":[{"name":"Fudan University, Shanghai, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-1854-639X","authenticated-orcid":false,"given":"Zhemin","family":"Yang","sequence":"additional","affiliation":[{"name":"Fudan University, Shanghai, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-9597-9888","authenticated-orcid":false,"given":"Yuhong","family":"Nan","sequence":"additional","affiliation":[{"name":"Sun Yat-sen University, Guangzhou, China"}]},{"ORCID":"https:\/\/orcid.org\/0009-0002-2970-2666","authenticated-orcid":false,"given":"Shutian","family":"Yu","sequence":"additional","affiliation":[{"name":"Fudan University, Shanghai, China"}]},{"ORCID":"https:\/\/orcid.org\/0009-0002-7766-4131","authenticated-orcid":false,"given":"Qirui","family":"Zhu","sequence":"additional","affiliation":[{"name":"Fudan University, Shanghai, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-9714-5545","authenticated-orcid":false,"given":"Min","family":"Yang","sequence":"additional","affiliation":[{"name":"Fudan University, Shanghai, China"}]}],"member":"320","published-online":{"date-parts":[[2024,12,9]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"2023. About us - Apkcombo.com. https:\/\/apkcombo.com\/about."},{"key":"e_1_3_2_1_2_1","unstructured":"2023. Amended Act on the Protection of Personal Information. https:\/\/www.ppc.go.jp\/files\/pdf\/APPI_english.pdf."},{"key":"e_1_3_2_1_3_1","unstructured":"2023. Apkcombo Apk Downloader. https:\/\/apkcombo.com\/."},{"key":"e_1_3_2_1_4_1","unstructured":"2023. App Store Review Guidelines. https:\/\/developer.apple.com\/app-store\/review\/guidelines\/."},{"key":"e_1_3_2_1_5_1","unstructured":"2023. Art. 4 GDPR Definitions. https:\/\/gdpr-info.eu\/art-4-gdpr\/."},{"key":"e_1_3_2_1_6_1","unstructured":"2023. California Consumer Privacy Act (CCPA). https:\/\/oag.ca.gov\/privacy\/ccpa."},{"key":"e_1_3_2_1_7_1","unstructured":"2023. CCPA - Right to Know. https:\/\/oag.ca.gov\/privacy\/ccpa#sectionc."},{"key":"e_1_3_2_1_8_1","unstructured":"2023. Childrens Online Privacy Protection Rule (\"COPPA\"). https:\/\/www.ftc.gov\/legal-library\/browse\/rules\/childrens-online-privacy-protection-rule-coppa."},{"key":"e_1_3_2_1_9_1","unstructured":"2023. CMP List - IAB Europe. https:\/\/iabeurope.eu\/cmp-list\/."},{"key":"e_1_3_2_1_10_1","volume-title":"Code of Virginia Code -","unstructured":"2023. Code of Virginia Code - Chapter 53. Consumer Data Protection Act. https:\/\/law.lis.virginia.gov\/vacode\/title59.1\/chapter53\/."},{"key":"e_1_3_2_1_11_1","unstructured":"2023. Consumers Right to Know What Personal Information is Being Collected. https:\/\/thecpra.org\/#1798.110."},{"key":"e_1_3_2_1_12_1","unstructured":"2023. Cybersecurity Law of the Peoples Republic of China. http:\/\/www.cac.gov.cn\/2016--11\/07\/c_1119867116.htm."},{"key":"e_1_3_2_1_13_1","volume-title":"Data Protection Act","year":"2018","unstructured":"2023. Data Protection Act 2018. https:\/\/www.legislation.gov.uk\/ukpga\/2018\/12\/part\/3\/chapter\/2."},{"key":"e_1_3_2_1_14_1","unstructured":"2023. Digital Millennium Copyright Act. https:\/\/en.wikipedia.org\/wiki\/Digital_Millennium_Copyright_Act."},{"key":"e_1_3_2_1_15_1","unstructured":"2023. Duty to provide information. https:\/\/www.edoeb.admin.ch\/edoeb\/en\/home\/datenschutz\/grundlagen\/informationspflicht.html."},{"key":"e_1_3_2_1_16_1","unstructured":"2023. Federal Data Protection Act (BDSG). https:\/\/www.gesetze-im-internet.de\/englisch_bdsg\/englisch_bdsg.html."},{"key":"e_1_3_2_1_17_1","unstructured":"2023. Fedlex. https:\/\/www.fedlex.admin.ch\/eli\/cc\/2022\/491\/en."},{"key":"e_1_3_2_1_18_1","unstructured":"2023. Free app store rank data for Google Play. https:\/\/apptopia.com\/store-insights\/top-charts\/google-play."},{"key":"e_1_3_2_1_19_1","unstructured":"2023. GDPR - Right to be Informed. https:\/\/gdpr-info.eu\/issues\/right-to-be-informed\/."},{"key":"e_1_3_2_1_20_1","unstructured":"2023. General Data Protection Regulation. https:\/\/gdpr-info.eu\/."},{"key":"e_1_3_2_1_21_1","unstructured":"2023. Information to be provided where personal data are collected from the data subject. https:\/\/gdpr-info.eu\/art-13-gdpr\/."},{"key":"e_1_3_2_1_22_1","unstructured":"2023. Introducing ChatGPT. https:\/\/openai.com\/blog\/chatgpt."},{"key":"e_1_3_2_1_23_1","unstructured":"2023. Mobile App Tools (SDKs) Simplified: How to Choose the Best For Your App. https:\/\/appguardians.com\/blog\/mobile-sdks-simplified-how-to-choose-the-best-for-your-app\/.."},{"key":"e_1_3_2_1_24_1","unstructured":"2023. Package Index | Android Developers. https:\/\/developer.android.com\/reference\/packages."},{"key":"e_1_3_2_1_25_1","unstructured":"2023. Personal Data Protection Act 2012 - Singapore Statutes Online. https:\/\/sso.agc.gov.sg\/Act\/PDPA2012."},{"key":"e_1_3_2_1_26_1","unstructured":"2023. Prepare for Google Plays data disclosure requirements. https:\/\/developers.google.com\/maps\/documentation\/android-sdk\/play-data-disclosure?hl=en."},{"key":"e_1_3_2_1_27_1","unstructured":"2023. Preview: User Data. https:\/\/support.google.com\/googleplay\/android-developer\/answer\/13316080."},{"key":"e_1_3_2_1_28_1","unstructured":"2023. Privacy Act 1988. https:\/\/www.legislation.gov.au\/Details\/C2021C00452."},{"key":"e_1_3_2_1_29_1","unstructured":"2023. Privacy and Security in Firebase. https:\/\/firebase.google.com\/support\/privacy?hl=en#firebase_support_for_gdpr_and_ccpa."},{"key":"e_1_3_2_1_30_1","unstructured":"2023. Prompt Engineering Guide. https:\/\/www.promptingguide.ai\/zh\/introduction\/tips."},{"key":"e_1_3_2_1_31_1","unstructured":"2023. Providing a safe and trusted experience for everyone. https:\/\/play.google.com\/about\/developer-content-policy\/?hl=en."},{"key":"e_1_3_2_1_32_1","volume-title":"The Data Protection, Privacy and Electronic Communications (Amendments etc) (EU Exit) Regulations","year":"2019","unstructured":"2023. The Data Protection, Privacy and Electronic Communications (Amendments etc) (EU Exit) Regulations 2019. https:\/\/www.legislation.gov.uk\/uksi\/2019\/419\/schedule\/1."},{"key":"e_1_3_2_1_33_1","unstructured":"2023. The Personal Information Protection Law of the People?s Republic of China. https:\/\/www.gov.cn\/xinwen\/2021-08\/20\/content_5632486.htm."},{"key":"e_1_3_2_1_34_1","unstructured":"2023. Understand app privacy security practices with Google Play?s Data safety section. https:\/\/support.google.com\/googleplay\/answer\/11416267?hl=en&visit_id=638308615428898834--2971702574&p=data-safety&rd=1."},{"key":"e_1_3_2_1_35_1","unstructured":"Cortesi Aldo Hils Maximilian and Raumfresser. 2021. Mitmproxy - an interactive HTTPS proxy. https:\/\/mitmproxy.org\/."},{"key":"e_1_3_2_1_36_1","volume-title":"Wenyu Wang, Justin Whitaker, William Enck, Bradley Reaves, Kapil Singh, and Tao Xie.","author":"Andow Benjamin","year":"2019","unstructured":"Benjamin Andow, Samin Yaseer Mahmud, Wenyu Wang, Justin Whitaker, William Enck, Bradley Reaves, Kapil Singh, and Tao Xie. 2019. PolicyLint: investigating internal privacy policy contradictions on google play. In 28th USENIX security symposium (USENIX security)."},{"key":"e_1_3_2_1_37_1","volume-title":"29th USENIX Security Symposium (USENIX Security).","author":"Andow Benjamin","year":"2020","unstructured":"Benjamin Andow, Samin Yaseer Mahmud, Justin Whitaker, William Enck, Bradley Reaves, Kapil Singh, and Serge Egelman. 2020. Actions speak louder than words: Entity-Sensitive privacy policy and data flow analysis with PoliCheck. In 29th USENIX Security Symposium (USENIX Security)."},{"key":"e_1_3_2_1_38_1","unstructured":"Appen. 2024. Quadrant | App Monetisation and Consent Management Platform SDK. https:\/\/www.quadrant.io\/app-monetisation-and-consent-management-platform."},{"key":"e_1_3_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.1145\/2382196.2382222"},{"key":"e_1_3_2_1_40_1","volume-title":"Disclosure Decisions in Android Runtime Permissions Model. In 2020 IEEE 19th International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom).","author":"Baalous Rawan","year":"2020","unstructured":"Rawan Baalous and Ronald Poet. 2020. Factors Affecting Users? Disclosure Decisions in Android Runtime Permissions Model. In 2020 IEEE 19th International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom)."},{"key":"e_1_3_2_1_41_1","volume-title":"5th annual ACM CCS workshop on security and privacy in smartphones and mobile devices.","author":"Balebako Rebecca","unstructured":"Rebecca Balebako, Florian Schaub, Idris Adjerid, Alessandro Acquisti, and Lorrie Cranor. 2015. The impact of timing on the salience of smartphone app privacy notices. In 5th annual ACM CCS workshop on security and privacy in smartphones and mobile devices."},{"key":"e_1_3_2_1_42_1","volume-title":"23rd USENIX Security Symposium (USENIX Security).","author":"Bhoraskar Ravi","year":"2014","unstructured":"Ravi Bhoraskar, Seungyeop Han, Jinseong Jeon, Tanzirul Azim, Shuo Chen, Jaeyeon Jung, Suman Nath, Rui Wang, and David Wetherall. 2014. Brahmastra: Driving Apps to Test the Security of Third-Party Components. In 23rd USENIX Security Symposium (USENIX Security)."},{"key":"e_1_3_2_1_43_1","volume-title":"How is ChatGPT?s behavior changing over time? arXiv preprint arXiv:2307.09009","author":"Chen Lingjiao","year":"2023","unstructured":"Lingjiao Chen, Matei Zaharia, and James Zou. 2023. How is ChatGPT?s behavior changing over time? arXiv preprint arXiv:2307.09009 (2023)."},{"key":"e_1_3_2_1_44_1","unstructured":"Clarip. 2024. Universal Consent Management Platform - Clarip. https:\/\/www.clarip.com\/consent-management."},{"key":"e_1_3_2_1_45_1","volume-title":"USA: Federal Trade Commission","author":"Federal Trade Commission et al.","year":"2013","unstructured":"Federal Trade Commission et al. 2013. Mobile privacy disclosures: Building trust through transparency. USA: Federal Trade Commission (2013)."},{"key":"e_1_3_2_1_46_1","volume-title":"We value your privacy... now take some cookies: Measuring the GDPRs impact on web privacy. arXiv preprint arXiv:1808.05096","author":"Degeling Martin","year":"2018","unstructured":"Martin Degeling, Christine Utz, Christopher Lentzsch, Henry Hosseini, Florian Schaub, and Thorsten Holz. 2018. We value your privacy... now take some cookies: Measuring the GDPRs impact on web privacy. arXiv preprint arXiv:1808.05096 (2018)."},{"key":"e_1_3_2_1_47_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijinfomgt.2019.05.010"},{"key":"e_1_3_2_1_48_1","unstructured":"DIDOMI. 2024. MAKE PRIVACY PART OF YOUR STRATEGY. https:\/\/www.didomi.io\/."},{"key":"e_1_3_2_1_49_1","volume-title":"30th USENIX Security Symposium (USENIX Security).","author":"Elbitar Yusra","year":"2021","unstructured":"Yusra Elbitar, Michael Schilling, Trung Tin Nguyen, Michael Backes, and Sven Bugiel. 2021. Explanation beats context: The effect of timing & rationales on users runtime permission decisions. In 30th USENIX Security Symposium (USENIX Security)."},{"key":"e_1_3_2_1_50_1","volume-title":"Privacy and Data Protection Conference (CPDP).","author":"Feal \u00c1lvaro","year":"2020","unstructured":"\u00c1lvaro Feal, Julien Gamba, Narseo Vallina-Rodriguez, Primal Wijesekera, Joel Reardon, Serge Egelman, Juan Tapiador, et al . 2020. Dont accept candies from strangers: An analysis of third-party SDKs. In Computers, Privacy and Data Protection Conference (CPDP)."},{"key":"e_1_3_2_1_51_1","unstructured":"Geoffrey A. Fowler. 2022. I tried to read all my app privacy policies. It was 1 million words. https:\/\/www.washingtonpost.com\/technology\/2022\/05\/31\/abolish-privacy-policies\/."},{"key":"e_1_3_2_1_52_1","unstructured":"Geeksforgeeks. 2024. Inside-outside-beginning (tagging). https:\/\/www.geeksforgeeks.org\/nlp-iob-tags\/."},{"key":"e_1_3_2_1_53_1","unstructured":"Google. 2023. TensorFlow code and pre-trained models for BERT. https:\/\/github.com\/google-research\/bert."},{"key":"e_1_3_2_1_54_1","unstructured":"Google. 2024. Request Runtime Permissions | Android Developers. https:\/\/developer.android.com\/training\/permissions\/requesting?hl=en#explain."},{"key":"e_1_3_2_1_55_1","unstructured":"Google. 2024. Runtime Permissions | Android Open Source Project. https:\/\/source.android.com\/docs\/core\/permissions\/runtime_perms?hl=en."},{"key":"e_1_3_2_1_56_1","volume-title":"27th USENIX Security Symposium (USENIX Security 18)","author":"Harkous Hamza","year":"2018","unstructured":"Hamza Harkous, Kassem Fawaz, R\u00e9mi Lebret, Florian Schaub, Kang G Shin, and Karl Aberer. 2018. Polisis: Automated analysis and presentation of privacy policies using deep learning. In 27th USENIX Security Symposium (USENIX Security 18)."},{"key":"e_1_3_2_1_57_1","volume-title":"24th Usenix Security Symposium (USENIX Security).","author":"Huang Jianjun","year":"2015","unstructured":"Jianjun Huang, Zhichun Li, Xusheng Xiao, Zhenyu Wu, Kangjie Lu, Xiangyu Zhang, and Guofei Jiang. 2015. SUPOR: Precise and scalable sensitive user input detection for android apps. In 24th Usenix Security Symposium (USENIX Security)."},{"key":"e_1_3_2_1_58_1","unstructured":"InMobi. 2024. Foster Trust. Unlock Revenue. https:\/\/www.quantcast.com\/products\/choice-consent-management-platform\/."},{"key":"e_1_3_2_1_59_1","volume-title":"The OK Is Not Enough: A Large Scale Study of Consent Dialogs in Smartphone Applications. In 32nd USENIX Security Symposium (USENIX Security).","author":"Koch Simon","year":"2023","unstructured":"Simon Koch, Benjamin Altpeter, and Martin Johns. 2023. The OK Is Not Enough: A Large Scale Study of Consent Dialogs in Smartphone Applications. In 32nd USENIX Security Symposium (USENIX Security)."},{"key":"e_1_3_2_1_60_1","doi-asserted-by":"publisher","DOI":"10.56553\/popets-2022-0119"},{"key":"e_1_3_2_1_61_1","volume-title":"Automatic detection of vague words and sentences in privacy policies. arXiv preprint arXiv:1808.06219","author":"Lebanoff Logan","year":"2018","unstructured":"Logan Lebanoff and Fei Liu. 2018. Automatic detection of vague words and sentences in privacy policies. arXiv preprint arXiv:1808.06219 (2018)."},{"key":"e_1_3_2_1_62_1","volume-title":"2017 IEEE\/ACM 39th International Conference on Software Engineering Companion (ICSE-C).","author":"Li Yuanchun","year":"2017","unstructured":"Yuanchun Li, Ziyue Yang, Yao Guo, and Xiangqun Chen. 2017. Droidbot: a lightweight ui-guided test input generator for android. In 2017 IEEE\/ACM 39th International Conference on Software Engineering Companion (ICSE-C)."},{"key":"e_1_3_2_1_63_1","doi-asserted-by":"publisher","DOI":"10.1145\/3442381.3450022"},{"key":"e_1_3_2_1_64_1","doi-asserted-by":"publisher","DOI":"10.1109\/VLHCC.2018.8506574"},{"key":"e_1_3_2_1_65_1","unstructured":"lonePatient. 2023. Chinese NER(Named Entity Recognition) using BERT(Softmax CRF Span). https:\/\/github.com\/lonePatient\/BERT-NER-Pytorch."},{"key":"e_1_3_2_1_66_1","volume-title":"31st USENIX Security Symposium (USENIX Security).","author":"Manandhar Sunil","year":"2022","unstructured":"Sunil Manandhar, Kaushal Kafle, Benjamin Andow, Kapil Singh, and Adwait Nadkarni. 2022. Smart Home Privacy Policies Demystified: A Study of Availability, Content, and Coverage. In 31st USENIX Security Symposium (USENIX Security)."},{"key":"e_1_3_2_1_67_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP40000.2020.00076"},{"key":"e_1_3_2_1_68_1","first-page":"543","article-title":"The cost of reading privacy policies","volume":"4","author":"McDonald Aleecia M","year":"2008","unstructured":"Aleecia M McDonald and Lorrie Faith Cranor. 2008. The cost of reading privacy policies. Isjlp 4 (2008), 543.","journal-title":"Isjlp"},{"key":"e_1_3_2_1_69_1","volume-title":"24th Usenix Security Symposium (USENIX Security).","author":"Nan Yuhong","year":"2015","unstructured":"Yuhong Nan, Min Yang, Zhemin Yang, Shunfan Zhou, Guofei Gu, and XiaoFeng Wang. 2015. Uipicker: User-input privacy identification in mobile applications. In 24th Usenix Security Symposium (USENIX Security)."},{"key":"e_1_3_2_1_70_1","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2018.23092"},{"key":"e_1_3_2_1_71_1","unstructured":"CET News. 2020. Many people accept privacy policies without reading them study reveals. https:\/\/thepaypers.com\/payments-general\/many-people-accept-privacy-policies-without-reading-them-study-reveals--1245901."},{"key":"e_1_3_2_1_72_1","volume-title":"30th USENIX Security Symposium (USENIX Security).","author":"Nguyen Trung Tin","year":"2021","unstructured":"Trung Tin Nguyen, Michael Backes, Ninja Marnau, and Ben Stock. 2021. Share First, Ask Later (or Never?) Studying Violations of GDPR?s Explicit Consent in Android Apps. In 30th USENIX Security Symposium (USENIX Security)."},{"key":"e_1_3_2_1_73_1","doi-asserted-by":"publisher","DOI":"10.1145\/3548606.3560564"},{"key":"e_1_3_2_1_74_1","doi-asserted-by":"publisher","DOI":"10.1145\/3313831.3376321"},{"key":"e_1_3_2_1_75_1","unstructured":"Oleavr. 2021. Frida binary instrumentation toolkit. https:\/\/frida.re."},{"key":"e_1_3_2_1_76_1","unstructured":"Osano. 2024. The Intuitive Data Privacy Platform for Simplifying Compliance Osano. https:\/\/www.osano.com\/."},{"key":"e_1_3_2_1_77_1","volume-title":"Contextual Privacy Policies for Mobile Applications and An Approach Toward Automated Generation. arXiv preprint arXiv:2402.14544","author":"Pan Shidong","year":"2024","unstructured":"Shidong Pan, Zhen Tao, Thong Hoang, Dawen Zhang, Tianshi Li, Zhenchang Xing, Sherry Xu, Mark Staples, Thierry Rakotoarivelo, and David Lo. 2024. {A New Hope}: Contextual Privacy Policies for Mobile Applications and An Approach Toward Automated Generation. arXiv preprint arXiv:2402.14544 (2024)."},{"key":"e_1_3_2_1_78_1","volume-title":"Customer Data: Designing for Transparency and Trust. https:\/\/hbr.org\/2015\/05\/customer-data-designing-for-transparency-and-trust.","author":"Review Harvard Business","year":"2015","unstructured":"Harvard Business Review. 2015. Customer Data: Designing for Transparency and Trust. https:\/\/hbr.org\/2015\/05\/customer-data-designing-for-transparency-and-trust."},{"key":"e_1_3_2_1_79_1","unstructured":"SFBX. 2024. AppConsent\u00ae the transparency-based consent management platform. https:\/\/appconsent.io\/en."},{"key":"e_1_3_2_1_80_1","volume-title":"30th USENIX Security Symposium (USENIX Security).","author":"Shen Bingyu","year":"2021","unstructured":"Bingyu Shen, Lili Wei, Chengcheng Xiang, Yudong Wu, Mingyao Shen, Yuanyuan Zhou, and Xinxin Jin. 2021. Can systems explain permissions better? understanding users? misperceptions under smartphone runtime permission model. In 30th USENIX Security Symposium (USENIX Security)."},{"key":"e_1_3_2_1_81_1","doi-asserted-by":"publisher","DOI":"10.4018\/jmhci.2011010104"},{"key":"e_1_3_2_1_82_1","doi-asserted-by":"publisher","DOI":"10.1145\/2884781.2884855"},{"key":"e_1_3_2_1_83_1","unstructured":"Sourcepoint. 2024. PRIVACY TECHNOLOGY FOR DIGITAL MARKETING. https:\/\/sourcepoint.com\/."},{"key":"e_1_3_2_1_84_1","doi-asserted-by":"publisher","DOI":"10.1145\/2556288.2557400"},{"key":"e_1_3_2_1_85_1","doi-asserted-by":"publisher","DOI":"10.1145\/3319535.3354212"},{"key":"e_1_3_2_1_86_1","volume-title":"30th USENIX Security Symposium (USENIX Security).","author":"Wang Jice","year":"2021","unstructured":"Jice Wang, Yue Xiao, Xueqiang Wang, Yuhong Nan, Luyi Xing, Xiaojing Liao, JinWei Dong, Nicolas Serrano, Haoran Lu, XiaoFeng Wang, et al . 2021. Understanding malicious cross-library data harvesting on android. In 30th USENIX Security Symposium (USENIX Security)."},{"key":"e_1_3_2_1_87_1","unstructured":"Wikipedia. 2024. Softmax function - Wikipedia. https:\/\/en.wikipedia.org\/wiki\/Softmax_function."},{"key":"e_1_3_2_1_88_1","doi-asserted-by":"publisher","DOI":"10.1145\/3491102.3517688"},{"key":"e_1_3_2_1_89_1","doi-asserted-by":"publisher","DOI":"10.1109\/DSN.2016.55"},{"key":"e_1_3_2_1_90_1","doi-asserted-by":"publisher","DOI":"10.2478\/popets-2019-0037"},{"key":"e_1_3_2_1_91_1","volume-title":"2016 AAAI Fall Symposium Series.","author":"Zimmeck Sebastian","year":"2016","unstructured":"Sebastian Zimmeck, Ziqi Wang, Lieyong Zou, Roger Iyengar, Bin Liu, Florian Schaub, Shomir Wilson, Norman Sadeh, Steven Bellovin, and Joel Reidenberg. 2016. Automated analysis of privacy requirements for mobile apps. In 2016 AAAI Fall Symposium Series."}],"event":{"name":"CCS '24: ACM SIGSAC Conference on Computer and Communications Security","location":"Salt Lake City UT USA","acronym":"CCS '24","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"]},"container-title":["Proceedings of the 2024 on ACM SIGSAC Conference on Computer and Communications Security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3658644.3670377","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3658644.3670377","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,8,22]],"date-time":"2025-08-22T06:10:55Z","timestamp":1755843055000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3658644.3670377"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,12,2]]},"references-count":91,"alternative-id":["10.1145\/3658644.3670377","10.1145\/3658644"],"URL":"https:\/\/doi.org\/10.1145\/3658644.3670377","relation":{},"subject":[],"published":{"date-parts":[[2024,12,2]]},"assertion":[{"value":"2024-12-09","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}