{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,25]],"date-time":"2026-04-25T04:21:05Z","timestamp":1777090865713,"version":"3.51.4"},"publisher-location":"New York, NY, USA","reference-count":87,"publisher":"ACM","license":[{"start":{"date-parts":[[2025,4,22]],"date-time":"2025-04-22T00:00:00Z","timestamp":1745280000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"funder":[{"name":"OpenAI"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2025,4,22]]},"DOI":"10.1145\/3696410.3714573","type":"proceedings-article","created":{"date-parts":[[2025,4,22]],"date-time":"2025-04-22T22:57:28Z","timestamp":1745362648000},"page":"990-1003","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":2,"title":["Harmful Terms and Where to Find Them: Measuring and Modeling Unfavorable Financial Terms and Conditions in Shopping Websites at Scale"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-6026-070X","authenticated-orcid":false,"given":"Elisa","family":"Tsai","sequence":"first","affiliation":[{"name":"University of Michigan, Ann Arbor, Michigan, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-0684-4971","authenticated-orcid":false,"given":"Neal","family":"Mangaokar","sequence":"additional","affiliation":[{"name":"University of Michigan, Ann Arbor, Michigan, USA"}]},{"ORCID":"https:\/\/orcid.org\/0009-0002-3884-8237","authenticated-orcid":false,"given":"Boyuan","family":"Zheng","sequence":"additional","affiliation":[{"name":"University of Michigan, Ann Arbor, Michigan, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-3723-8701","authenticated-orcid":false,"given":"Haizhong","family":"Zheng","sequence":"additional","affiliation":[{"name":"University of Michigan, Ann Arbor, Michigan, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-4907-3687","authenticated-orcid":false,"given":"Atul","family":"Prakash","sequence":"additional","affiliation":[{"name":"University of Michigan, Ann Arbor, Michigan, USA"}]}],"member":"320","published-online":{"date-parts":[[2025,4,22]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1145\/3460120.3485335"},{"key":"e_1_3_2_1_2_1","volume-title":"Justin Whitaker, William Enck, Bradley Reaves, Kapil Singh, and Tao Xie.","author":"Andow Benjamin","year":"2019","unstructured":"Benjamin Andow, Samin Yaseer Mahmud,WenyuWang, Justin Whitaker, William Enck, Bradley Reaves, Kapil Singh, and Tao Xie. 2019. {PolicyLint}: investigating internal privacy policy contradictions on google play. In 28th USENIX security symposium (USENIX security 19). USENIX Association, Berkeley, CA, USA, 585--602."},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1086\/674424"},{"key":"e_1_3_2_1_4_1","volume-title":"Exposure: Finding malicious domains using passive DNS analysis.. In Ndss","author":"Bilge Leyla","year":"2011","unstructured":"Leyla Bilge, Engin Kirda, Christopher Kruegel, and Marco Balduzzi. 2011. Exposure: Finding malicious domains using passive DNS analysis.. In Ndss. Internet Society, Reston, VA, USA, 1--17."},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP46215.2023.10179461"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1109\/eCrime51433.2020.9493260"},{"key":"e_1_3_2_1_7_1","first-page":"993","article-title":"Latent dirichlet allocation","author":"Ng Y","year":"2003","unstructured":"DavidMBlei, AndrewY Ng, and Michael I Jordan. 2003. Latent dirichlet allocation. Journal of machine Learning research 3, Jan (2003), 993--1022.","journal-title":"Journal of machine Learning research 3"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1145\/1866423.1866434"},{"key":"e_1_3_2_1_9_1","volume-title":"Designing Interactive Systems Conference","author":"Bongard-Blanchy Kerstin","year":"2021","unstructured":"Kerstin Bongard-Blanchy, Arianna Rossi, Salvador Rivas, Sophie Doublet, Vincent Koenig, and Gabriele Lenzini. 2021. \" I am Definitely Manipulated, Even When I am Aware of it. It's Ridiculous!\"-Dark Patterns from the End-User Perspective. In Designing Interactive Systems Conference 2021. Association for Computing Machinery, New York, NY, USA, 763--776."},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.18653\/v1\/2021.nlp4posimpact-1.10"},{"key":"e_1_3_2_1_11_1","unstructured":"Tom Brown Benjamin Mann Nick Ryder Melanie Subbiah Jared D Kaplan Prafulla Dhariwal Arvind Neelakantan Pranav Shyam Girish Sastry Amanda Askell et al. 2020. Language models are few-shot learners. Advances in neural information processing systems 33 (2020) 1877--1901."},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP46215.2023.10179338"},{"key":"e_1_3_2_1_13_1","unstructured":"Celsius. 2023. 1.7 million people call Celsius their home for crypto. https: \/\/celsius.network\/."},{"key":"e_1_3_2_1_14_1","unstructured":"Federal Trade Commission. 1914. Federal Trade Commission Act Section 5: Unfair or Deceptive Acts or Practices. https:\/\/www.federalreserve.gov\/boarddocs\/ supmanual\/cch\/200806\/ftca.pdf."},{"key":"e_1_3_2_1_15_1","unstructured":"Federal Trade Commission. 1983. FTC Policy Statement on Deception. https:\/\/www.ftc.gov\/system\/files\/documents\/public_statements\/410531\/ 831014deceptionstmt.pdf."},{"key":"e_1_3_2_1_16_1","volume-title":"32nd USENIX Security Symposium (USENIX Security 23)","author":"Cui Hao","year":"2023","unstructured":"Hao Cui, Rahmadi Trimananda, Athina Markopoulou, and Scott Jordan. 2023. {PoliGraph}: Automated privacy policy analysis using knowledge graphs. In 32nd USENIX Security Symposium (USENIX Security 23). USENIX Association, Berkeley, CA, USA, 1037--1054."},{"key":"e_1_3_2_1_17_1","unstructured":"Michal Danilk. 2024. langdetect. https:\/\/pypi.org\/project\/langdetect\/."},{"key":"e_1_3_2_1_18_1","volume-title":"Bert: Pre-training of deep bidirectional transformers for language understanding.","author":"Devlin Jacob","year":"2018","unstructured":"Jacob Devlin. 2018. Bert: Pre-training of deep bidirectional transformers for language understanding."},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1145\/3313831.3376600"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.18653\/v1\/2021.nllp-1.1"},{"key":"e_1_3_2_1_21_1","volume-title":"15th Symposium on Usable Privacy and Security (SOUPS'19)","author":"Drury Vincent","year":"2019","unstructured":"Vincent Drury and Ulrike Meyer. 2019. Certified phishing: taking a look at public key certificates of phishing websites. In 15th Symposium on Usable Privacy and Security (SOUPS'19). USENIX Association, Berkeley, CA, USA, 211--223."},{"key":"e_1_3_2_1_22_1","volume-title":"US Ecommerce Forecast","year":"2024","unstructured":"Emarketer. 2024. US Ecommerce Forecast 2024. https:\/\/www.emarketer.com\/ content\/us-ecommerce-forecast-2024\/."},{"key":"e_1_3_2_1_23_1","volume-title":"Proceedings of the 2nd International Conference on Knowledge Discovery and Data Mining (KDD). AAAI Press, Online, 226--231","author":"Ester Martin","year":"1996","unstructured":"Martin Ester, Hans-Peter Kriegel, J\u00f6rg Sander, Xiaowei Xu, et al. 1996. A densitybased algorithm for discovering clusters in large spatial databases with noise. In Proceedings of the 2nd International Conference on Knowledge Discovery and Data Mining (KDD). AAAI Press, Online, 226--231."},{"key":"e_1_3_2_1_24_1","unstructured":"Mirgita Frasheri Arian Bakhtiarnia Lukas Esterle and Aleksandros Iosifidis. 2024. Are LLM-based methods good enough for detecting unfair terms of service?"},{"key":"e_1_3_2_1_25_1","volume-title":"Proceedings of the 28th international conference on computational linguistics. International Committee on Computational Linguistics (ICCL)","author":"Galassi Andrea","year":"2020","unstructured":"Andrea Galassi, Kasper Drazewski, Marco Lippi, and Paolo Torroni. 2020. Crosslingual annotation projection in legal texts. In Proceedings of the 28th international conference on computational linguistics. International Committee on Computational Linguistics (ICCL), Barcelona, Spain, 915--926."},{"key":"e_1_3_2_1_26_1","volume-title":"Unfair clause detection in terms of service across multiple languages. Artificial Intelligence and Law","author":"Galassi Andrea","year":"2024","unstructured":"Andrea Galassi, Francesca Lagioia, Agnieszka Jablonowska, and Marco Lippi. 2024. Unfair clause detection in terms of service across multiple languages. Artificial Intelligence and Law (2024), 1--49."},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"crossref","unstructured":"Leo A Goodman. 1961. Snowball sampling. 148--170 pages.","DOI":"10.1214\/aoms\/1177705148"},{"key":"e_1_3_2_1_28_1","unstructured":"Google. 2024. Google Safe Browsing. https:\/\/safebrowsing.google.com\/."},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1145\/3411764.3445779"},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1145\/3605764.3623985"},{"key":"e_1_3_2_1_31_1","unstructured":"Maarten Grootendorst. 2022. BERTopic: Neural topic modeling with a class-based TF-IDF procedure."},{"key":"e_1_3_2_1_32_1","volume-title":"27th USENIX Security Symposium (USENIX Security 18)","author":"Harkous Hamza","year":"2018","unstructured":"Hamza Harkous, Kassem Fawaz, R\u00e9mi Lebret, Florian Schaub, Kang G Shin, and Karl Aberer. 2018. Polisis: Automated analysis and presentation of privacy policies using deep learning. In 27th USENIX Security Symposium (USENIX Security 18). USENIX Association, Berkeley, CA, USA, 531--548."},{"key":"e_1_3_2_1_33_1","unstructured":"Hugging Face. 2024. Llama-3.2--90B-Vision Model. https:\/\/huggingface.co\/metallama\/ Llama-3.2--90B-Vision."},{"key":"e_1_3_2_1_34_1","unstructured":"Investopedia. 2023. Judge Rules Celsius Networks Owns Customers' Crypto Depositss. https:\/\/www.investopedia.com\/judge-s-ruling-on-celsius-7092044."},{"key":"e_1_3_2_1_35_1","volume-title":"Legal knowledge and information systems","author":"Jablonowska Agnieszka","unstructured":"Agnieszka Jablonowska, Francesca Lagioia, Marco Lippi, Hans-Wolfgang Micklitz, Giovanni Sartor, and Giacomo Tagiuri. 2021. Assessing the cross-market generalization capability of the claudette system. In Legal knowledge and information systems. IOS Press, Online, 62--67."},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"crossref","unstructured":"Ankit Kumar Jain and Brij B Gupta. 2017. Phishing detection: analysis of visual similarity based approaches.","DOI":"10.1155\/2017\/5421046"},{"key":"e_1_3_2_1_37_1","doi-asserted-by":"publisher","unstructured":"Audrone Janaviciute and Agnius Liutkevicius. 2023. Fraudulent and Legitimate Online Shops Dataset. doi:10.17632\/m7xtkx7g5m.1","DOI":"10.17632\/m7xtkx7g5m.1"},{"key":"e_1_3_2_1_38_1","volume-title":"Diego de las Casas, Florian Bressand, Gianna Lengyel, Guillaume Lample, Lucile Saulnier, and et al.","author":"Jiang Albert Q","year":"2023","unstructured":"Albert Q Jiang, Alexandre Sablayrolles, Arthur Mensch, Chris Bamford, Devendra Singh Chaplot, Diego de las Casas, Florian Bressand, Gianna Lengyel, Guillaume Lample, Lucile Saulnier, and et al. 2023. Mistral 7B."},{"key":"e_1_3_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2018.00044"},{"key":"e_1_3_2_1_40_1","volume-title":"Legal Knowledge and Information Systems: JURIX 2017: The Thirtieth Annual Conference","volume":"302","author":"Francesca LAGIOIA","year":"2017","unstructured":"Francesca LAGIOIA, Hans-Wolfgang MICKLITZ, Yannis PANAGIS, Giovanni SARTOR, and Paolo TORRONI. 2017. Automated detection of unfair clauses in online consumer contracts. In Legal Knowledge and Information Systems: JURIX 2017: The Thirtieth Annual Conference, Vol. 302. IOS Press, Amsterdam, The Netherlands, 145."},{"key":"e_1_3_2_1_41_1","doi-asserted-by":"publisher","DOI":"10.1109\/CC.2018.8357744"},{"key":"e_1_3_2_1_42_1","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2023.24584"},{"key":"e_1_3_2_1_43_1","doi-asserted-by":"publisher","DOI":"10.18653\/v1\/2021.nllp-1.22"},{"key":"e_1_3_2_1_44_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10506-019-09243-2"},{"key":"e_1_3_2_1_45_1","volume-title":"Autodan: Generating stealthy jailbreak prompts on aligned large language models.","author":"Liu Xiaogeng","year":"2023","unstructured":"Xiaogeng Liu, Nan Xu, Muhao Chen, and Chaowei Xiao. 2023. Autodan: Generating stealthy jailbreak prompts on aligned large language models."},{"key":"e_1_3_2_1_46_1","volume-title":"Roberta: A robustly optimized bert pretraining approach.","author":"Liu Yinhan","year":"2019","unstructured":"Yinhan Liu, Myle Ott, Naman Goyal, Jingfei Du, Mandar Joshi, Danqi Chen, Omer Levy, Mike Lewis, Luke Zettlemoyer, and Veselin Stoyanov. 2019. Roberta: A robustly optimized bert pretraining approach."},{"key":"e_1_3_2_1_47_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10603-015-9303-7"},{"key":"e_1_3_2_1_48_1","doi-asserted-by":"publisher","DOI":"10.1093\/jla\/laaa006"},{"key":"e_1_3_2_1_49_1","doi-asserted-by":"publisher","DOI":"10.1145\/3359183"},{"key":"e_1_3_2_1_50_1","volume-title":"Proceedings of the 2021 CHI conference on human factors in computing systems. Association for Computing Machinery","author":"Mathur Arunesh","year":"2021","unstructured":"Arunesh Mathur, Mihir Kshirsagar, and Jonathan Mayer. 2021. What makes a dark pattern... dark? Design attributes, normative considerations, and measurement methods. In Proceedings of the 2021 CHI conference on human factors in computing systems. Association for Computing Machinery, New York, NY, USA, 1--18."},{"key":"e_1_3_2_1_51_1","unstructured":"Microsoft. 2024. Microsoft Defender SmartScreen. https:\/\/learn.microsoft.com\/enus\/ windows\/security\/operating-system-security\/virus-and-threatprotection\/ microsoft-defender-smartscreen\/."},{"key":"e_1_3_2_1_52_1","volume-title":"New rule-based phishing detection method. Expert systems with applications 53","author":"Moghimi Mahmood","year":"2016","unstructured":"Mahmood Moghimi and Ali Yazdian Varjani. 2016. New rule-based phishing detection method. Expert systems with applications 53 (2016), 231--242."},{"key":"e_1_3_2_1_53_1","unstructured":"Yida Mu Chun Dong Kalina Bontcheva and Xingyi Song. 2024. Large Language Models Offer an Alternative to the Traditional Approach of Topic Modelling."},{"key":"e_1_3_2_1_54_1","doi-asserted-by":"publisher","DOI":"10.1145\/3400899.3400901"},{"key":"e_1_3_2_1_55_1","unstructured":"National Park Reservations. 2024. National Park Reservations. https:\/\/www. nationalparkreservations.com\/."},{"key":"e_1_3_2_1_56_1","volume-title":"Neteller: Online Payment Account. https:\/\/www.neteller.com","year":"2024","unstructured":"Neteller. 2024. Neteller: Online Payment Account. https:\/\/www.neteller.com"},{"key":"e_1_3_2_1_57_1","doi-asserted-by":"publisher","DOI":"10.1145\/3313831.3376321"},{"key":"e_1_3_2_1_58_1","doi-asserted-by":"publisher","DOI":"10.1080\/1369118X.2018.1486870"},{"key":"e_1_3_2_1_59_1","unstructured":"OpenAI. 2023. Best Practices for Prompt Engineering with the OpenAI API. https:\/\/help.openai.com\/en\/articles\/6654000-best-practices-for-promptengineering-with-the-openai-api."},{"key":"e_1_3_2_1_61_1","first-page":"1","article-title":"Exploring the limits of transfer learning with a unified text-to-text transformer","volume":"21","author":"Raffel Colin","year":"2020","unstructured":"Colin Raffel, Noam Shazeer, Adam Roberts, Katherine Lee, Sharan Narang, Michael Matena, Yanqi Zhou, Wei Li, and Peter J Liu. 2020. Exploring the limits of transfer learning with a unified text-to-text transformer. Journal of machine learning research 21, 140 (2020), 1--67.","journal-title":"Journal of machine learning research"},{"key":"e_1_3_2_1_62_1","volume-title":"Jose M Del Alamo, and Norman Sadeh","author":"Rodriguez David","year":"2024","unstructured":"David Rodriguez, Ian Yang, Jose M Del Alamo, and Norman Sadeh. 2024. Large language models: a new approach for privacy policy analysis at scale. 25 pages."},{"key":"e_1_3_2_1_63_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2018.09.029"},{"key":"e_1_3_2_1_64_1","doi-asserted-by":"publisher","DOI":"10.1109\/EuroSPW51379.2020.00077"},{"key":"e_1_3_2_1_65_1","doi-asserted-by":"publisher","DOI":"10.1145\/3308560.3317585"},{"key":"e_1_3_2_1_66_1","unstructured":"ScamAdviser. 2019. ScamAdviser Algorithm Explainer. https:\/\/www.scamadviser. com\/articles\/scamadviser-algorithm-explainer."},{"key":"e_1_3_2_1_67_1","unstructured":"ScamAdviser. 2024. ScamAdviser. https:\/\/www.scamadviser.com."},{"key":"e_1_3_2_1_68_1","unstructured":"Kabir Manandhar Shrestha Katie Wood D Goodman and M Mistica. 2023. Do We Need Subject Matter Experts? A Case Study of Measuring Up GPT-4 Against Scholars in Topic Evaluation. In Proceedings of the Seventh Workshop on Natural Language for Artificial Intelligence (NL4AI 2023) co-located with 22th International Conference of the Italian Association for Artificial Intelligence (AI* IA 2023). CEURWS Rome Italy."},{"key":"e_1_3_2_1_69_1","doi-asserted-by":"publisher","DOI":"10.1609\/hcomp.v7i1.5266"},{"key":"e_1_3_2_1_70_1","volume-title":"Computers in human behavior 55","author":"Steinfeld Nili","year":"2016","unstructured":"Nili Steinfeld. 2016. \"I agree to the terms and conditions\":(How) do users read privacy policies online? An eye-tracking experiment. Computers in human behavior 55 (2016), 992--1000."},{"key":"e_1_3_2_1_71_1","unstructured":"Xiaofei Sun Xiaoya Li Jiwei Li Fei Wu Shangwei Guo Tianwei Zhang and Guoyin Wang. 2023. Text classification via large language models."},{"key":"e_1_3_2_1_72_1","volume-title":"Juliette Love, et al.","author":"Team Gemma","year":"2024","unstructured":"Gemma Team, Thomas Mesnard, Cassidy Hardin, Robert Dadashi, Surya Bhupatiraju, Shreya Pathak, Laurent Sifre, Morgane Rivi\u00e8re, Mihir Sanjay Kale, Juliette Love, et al. 2024. Gemma: Open models based on gemini research and technology."},{"key":"e_1_3_2_1_73_1","volume-title":"Llama: Open and efficient foundation language models.","author":"Touvron Hugo","year":"2023","unstructured":"Hugo Touvron, Thibaut Lavril, Gautier Izacard, Xavier Martinet, Marie-Anne Lachaux, Timoth\u00e9e Lacroix, Baptiste Rozi\u00e8re, Naman Goyal, Eric Hambro, Faisal Azhar, et al. 2023. Llama: Open and efficient foundation language models."},{"key":"e_1_3_2_1_74_1","unstructured":"Tranco. 2024. Tranco A Research-Oriented Top Sites Ranking Hardened Against Manipulation. https:\/\/tranco-list.eu\/."},{"key":"e_1_3_2_1_75_1","volume-title":"Trustpilot Reviews: Experience the power of customer reviews. https:\/\/www.trustpilot.com","year":"2024","unstructured":"Trustpilot. 2024. Trustpilot Reviews: Experience the power of customer reviews. https:\/\/www.trustpilot.com"},{"key":"e_1_3_2_1_76_1","unstructured":"European Union. 1993. Council Directive 93\/13\/EEC of 5 April 1993 on unfair terms in consumer contracts. Official Journal of the European Communities 29--34 pages."},{"key":"e_1_3_2_1_77_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-98785-5_1"},{"key":"e_1_3_2_1_78_1","volume-title":"Cognitive biases, dark patterns, and the 'privacy paradox'. Current opinion in psychology 31","author":"Waldman Ari Ezra","year":"2020","unstructured":"Ari Ezra Waldman. 2020. Cognitive biases, dark patterns, and the 'privacy paradox'. Current opinion in psychology 31 (2020), 105--109."},{"key":"e_1_3_2_1_79_1","doi-asserted-by":"publisher","DOI":"10.1145\/3576915.3623067"},{"key":"e_1_3_2_1_80_1","doi-asserted-by":"publisher","DOI":"10.1145\/2019599.2019606"},{"key":"e_1_3_2_1_81_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2892066"},{"key":"e_1_3_2_1_82_1","volume-title":"32nd USENIX Security Symposium (USENIX Security 23)","author":"Yang Zheng","year":"2023","unstructured":"Zheng Yang, Joey Allen, Matthew Landen, Roberto Perdisci, andWenke Lee. 2023. {TRIDENT}: Towards Detecting and Mitigating Web-based Social Engineering Attacks. In 32nd USENIX Security Symposium (USENIX Security 23). USENIX Association, Berkeley, CA, USA, 6701--6718."},{"key":"e_1_3_2_1_83_1","volume-title":"Tommy WS Chow, and Wenyin Liu","author":"Zhang Haijun","year":"2011","unstructured":"Haijun Zhang, Gang Liu, Tommy WS Chow, and Wenyin Liu. 2011. Textual and visual content-based anti-phishing: a Bayesian approach. IEEE transactions on neural networks 22, 10 (2011), 1532--1546."},{"key":"e_1_3_2_1_84_1","doi-asserted-by":"publisher","DOI":"10.1109\/GLOCOM.2014.7036889"},{"key":"e_1_3_2_1_85_1","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2018.23009"},{"key":"e_1_3_2_1_86_1","volume-title":"32nd USENIX Security Symposium (USENIX Security 23)","author":"Zhou Lu","year":"2023","unstructured":"Lu Zhou, ChengyongxiaoWei, Tong Zhu, Guoxing Chen, Xiaokuan Zhang, Suguo Du, Hui Cao, and Haojin Zhu. 2023. {POLICYCOMP}: Counterpart Comparison of Privacy Policies Uncovers Overbroad Personal Data Collection Practices. In 32nd USENIX Security Symposium (USENIX Security 23). USENIX Association, Berkeley, CA, USA, 1073--1090."},{"key":"e_1_3_2_1_87_1","unstructured":"Andy Zou Zifan Wang J Zico Kolter and Matt Fredrikson. 2023. Universal and transferable adversarial attacks on aligned language models."},{"key":"e_1_3_2_1_88_1","doi-asserted-by":"publisher","DOI":"10.1186\/s13673-017-0098-1"}],"event":{"name":"WWW '25: The ACM Web Conference 2025","location":"Sydney NSW Australia","acronym":"WWW '25","sponsor":["SIGWEB ACM Special Interest Group on Hypertext, Hypermedia, and Web"]},"container-title":["Proceedings of the ACM on Web Conference 2025"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3696410.3714573","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3696410.3714573","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T01:18:33Z","timestamp":1750295913000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3696410.3714573"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,4,22]]},"references-count":87,"alternative-id":["10.1145\/3696410.3714573","10.1145\/3696410"],"URL":"https:\/\/doi.org\/10.1145\/3696410.3714573","relation":{},"subject":[],"published":{"date-parts":[[2025,4,22]]},"assertion":[{"value":"2025-04-22","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}