{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,27]],"date-time":"2025-10-27T16:23:04Z","timestamp":1761582184685,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":28,"publisher":"ACM","license":[{"start":{"date-parts":[[2022,4,14]],"date-time":"2022-04-14T00:00:00Z","timestamp":1649894400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/501100019186","name":"MIT Portugal","doi-asserted-by":"publisher","award":["CENTRO-01-0247-FEDER-045929"],"award-info":[{"award-number":["CENTRO-01-0247-FEDER-045929"]}],"id":[{"id":"10.13039\/501100019186","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Funda\u00e7\u00e3o para a Ci\u00eancia e a Tecnologia","award":["CENTRO-01-0247-FEDER-045929"],"award-info":[{"award-number":["CENTRO-01-0247-FEDER-045929"]}]},{"name":"Ngi trust","award":["825618"],"award-info":[{"award-number":["825618"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2022,4,14]]},"DOI":"10.1145\/3508398.3511526","type":"proceedings-article","created":{"date-parts":[[2022,4,16]],"date-time":"2022-04-16T04:13:31Z","timestamp":1650082411000},"page":"89-100","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":13,"title":["Prediction of Mobile App Privacy Preferences with User Profiles via Federated Learning"],"prefix":"10.1145","author":[{"given":"Andr\u00e9","family":"Brand\u00e3o","sequence":"first","affiliation":[{"name":"University of Porto, Porto, Portugal"}]},{"given":"Ricardo","family":"Mendes","sequence":"additional","affiliation":[{"name":"University of Coimbra, Coimbra, Portugal"}]},{"given":"Jo\u00e3o P.","family":"Vilela","sequence":"additional","affiliation":[{"name":"University of Porto, Porto, Portugal"}]}],"member":"320","published-online":{"date-parts":[[2022,4,15]]},"reference":[{"key":"e_1_3_2_2_1_1","doi-asserted-by":"publisher","DOI":"10.1145\/2462456.2464460"},{"key":"e_1_3_2_2_2_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jisa.2018.02.004"},{"volume-title":"Advances in Intelligent","author":"Andr\u00e9 Brand","key":"e_1_3_2_2_3_1","unstructured":"Andr\u00e9 Brand ao, Ricardo Mendes , and Jo ao P Vilela . 2021. Efficient privacy preserving distributed K-means for non-IID data . In Advances in Intelligent Data Analysis XIX. Springer International Publishing , Cham , 439--451. Andr\u00e9 Brand ao, Ricardo Mendes, and Jo ao P Vilela. 2021. Efficient privacy preserving distributed K-means for non-IID data. In Advances in Intelligent Data Analysis XIX. Springer International Publishing, Cham, 439--451."},{"key":"e_1_3_2_2_4_1","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2017.1600349CM"},{"key":"e_1_3_2_2_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/2335356.2335360"},{"key":"e_1_3_2_2_6_1","volume-title":"International Conference on Software Engineering","author":"Gorla Alessandra","year":"2014","unstructured":"Alessandra Gorla , Ilaria Tavecchia , Florian Gross , and Andreas Zeller . 2014 . Checking App Behavior against App Descriptions . In International Conference on Software Engineering ( Hyderabad, India). Association for Computing Machinery, New York, NY, USA, 1025--1035. https:\/\/doi.org\/10.1145\/2568225.2568276 10.1145\/2568225.2568276 Alessandra Gorla, Ilaria Tavecchia, Florian Gross, and Andreas Zeller. 2014. Checking App Behavior against App Descriptions. In International Conference on Software Engineering (Hyderabad, India). Association for Computing Machinery, New York, NY, USA, 1025--1035. https:\/\/doi.org\/10.1145\/2568225.2568276"},{"key":"e_1_3_2_2_7_1","doi-asserted-by":"publisher","DOI":"10.1109\/PDP2018.2018.00075"},{"key":"e_1_3_2_2_8_1","unstructured":"International Data Corporation. 2018. Smartphone Market Share. https:\/\/www.theguardian.com\/news\/2018\/mar\/17\/cambridge-analytica-facebook-influence-us-election . Accessed: 2021--10--11.  International Data Corporation. 2018. Smartphone Market Share. https:\/\/www.theguardian.com\/news\/2018\/mar\/17\/cambridge-analytica-facebook-influence-us-election . Accessed: 2021--10--11."},{"key":"e_1_3_2_2_9_1","volume-title":"Reiter","author":"Ismail Qatrunnada","year":"2015","unstructured":"Qatrunnada Ismail , Tousif Ahmed , Apu Kapadia , and Michael K . Reiter . 2015 . Crowdsourced Exploration of Security Configurations .Association for Computing Machinery, New York, NY, USA , 467--476. https:\/\/doi.org\/10.1145\/2702123.2702370 10.1145\/2702123.2702370 Qatrunnada Ismail, Tousif Ahmed, Apu Kapadia, and Michael K. Reiter. 2015. Crowdsourced Exploration of Security Configurations .Association for Computing Machinery, New York, NY, USA, 467--476. https:\/\/doi.org\/10.1145\/2702123.2702370"},{"key":"e_1_3_2_2_10_1","volume-title":"Lorrie Faith Cranor","author":"Kelley Patrick Gage","year":"2012","unstructured":"Patrick Gage Kelley , Sunny Consolvo , Lorrie Faith Cranor , Jaeyeon Jung, Norman Sadeh , and David Wetherall. 2012 . A Conundrum of Permissions: Installing Applications on an Android Smartphone. In Financial Cryptography and Data Security, Jim Blyth, Sven Dietrich, and L. Jean Camp (Eds.). Springer Berlin Heidelberg , Berlin, Heidelberg, 68--79. Patrick Gage Kelley, Sunny Consolvo, Lorrie Faith Cranor, Jaeyeon Jung, Norman Sadeh, and David Wetherall. 2012. A Conundrum of Permissions: Installing Applications on an Android Smartphone. In Financial Cryptography and Data Security, Jim Blyth, Sven Dietrich, and L. Jean Camp (Eds.). Springer Berlin Heidelberg, Berlin, Heidelberg, 68--79."},{"volume-title":"Proceedings of the Tenth USENIX Conference on Usable Privacy and Security","author":"Lin Jialiu","key":"e_1_3_2_2_11_1","unstructured":"Jialiu Lin , Bin Liu , Norman Sadeh , and Jason I. Hong . 2014. Modeling Users' Mobile App Privacy Preferences: Restoring Usability in a Sea of Permission Settings . In Proceedings of the Tenth USENIX Conference on Usable Privacy and Security ( Menlo Park, CA) (SOUPS '14). USENIX Association, USA, 199--212. Jialiu Lin, Bin Liu, Norman Sadeh, and Jason I. Hong. 2014. Modeling Users' Mobile App Privacy Preferences: Restoring Usability in a Sea of Permission Settings. In Proceedings of the Tenth USENIX Conference on Usable Privacy and Security (Menlo Park, CA) (SOUPS '14). USENIX Association, USA, 199--212."},{"key":"e_1_3_2_2_12_1","volume-title":"Proceedings of the Twelfth USENIX Conference on Usable Privacy and Security","author":"Liu Bin","year":"2016","unstructured":"Bin Liu , Mads Schaarup Andersen , Florian Schaub , Hazim Almuhimedi , Shikun Zhang , Norman Sadeh , Alessandro Acquisti , and Yuvraj Agarwal . 2016 . Follow My Recommendations: A Personalized Privacy Assistant for Mobile App Permissions . In Proceedings of the Twelfth USENIX Conference on Usable Privacy and Security ( Denver, CO, USA) (SOUPS '16). USENIX Association, USA, 27--41. Bin Liu, Mads Schaarup Andersen, Florian Schaub, Hazim Almuhimedi, Shikun Zhang, Norman Sadeh, Alessandro Acquisti, and Yuvraj Agarwal. 2016. Follow My Recommendations: A Personalized Privacy Assistant for Mobile App Permissions. In Proceedings of the Twelfth USENIX Conference on Usable Privacy and Security (Denver, CO, USA) (SOUPS '16). USENIX Association, USA, 27--41."},{"key":"e_1_3_2_2_13_1","doi-asserted-by":"publisher","DOI":"10.1145\/2566486.2568035"},{"key":"e_1_3_2_2_14_1","volume-title":"Proceedings of the 20th International Conference on Artificial Intelligence and Statistics (Proceedings of Machine Learning Research","volume":"1282","author":"McMahan Brendan","year":"2017","unstructured":"Brendan McMahan , Eider Moore , Daniel Ramage , Seth Hampson , and Blaise Aguera y Arcas . 2017 . Communication-Efficient Learning of Deep Networks from Decentralized Data . In Proceedings of the 20th International Conference on Artificial Intelligence and Statistics (Proceedings of Machine Learning Research , Vol. 54). PMLR, 1273-- 1282 . Brendan McMahan, Eider Moore, Daniel Ramage, Seth Hampson, and Blaise Aguera y Arcas. 2017. Communication-Efficient Learning of Deep Networks from Decentralized Data. In Proceedings of the 20th International Conference on Artificial Intelligence and Statistics (Proceedings of Machine Learning Research, Vol. 54). PMLR, 1273--1282."},{"volume-title":"Effect of User Expectancy on Mobile App Privacy: A Field Study. In 2022 IEEE international conference on pervasive computing and communications (PerCom) .","author":"Mendes Ricardo","key":"e_1_3_2_2_15_1","unstructured":"Ricardo Mendes , Andr\u00e9 Brand\u00e3o , J. P. Vilela , and Alastair R. Beresford . 2022 . Effect of User Expectancy on Mobile App Privacy: A Field Study. In 2022 IEEE international conference on pervasive computing and communications (PerCom) . Ricardo Mendes, Andr\u00e9 Brand\u00e3o, J. P. Vilela, and Alastair R. Beresford. 2022. Effect of User Expectancy on Mobile App Privacy: A Field Study. In 2022 IEEE international conference on pervasive computing and communications (PerCom) ."},{"key":"e_1_3_2_2_16_1","doi-asserted-by":"publisher","DOI":"10.1111\/j.1745-6606.2006.00070.x"},{"key":"e_1_3_2_2_17_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2017.25"},{"key":"e_1_3_2_2_18_1","doi-asserted-by":"publisher","DOI":"10.5555\/1953048.2078195"},{"key":"e_1_3_2_2_19_1","doi-asserted-by":"publisher","DOI":"10.1109\/INM.2015.7140304"},{"key":"e_1_3_2_2_20_1","doi-asserted-by":"publisher","DOI":"10.1145\/1572532.1572587"},{"volume-title":"Trust, Privacy and Security in Digital Business, Steven Furnell, Haralambos Mouratidis, and G\u00fcnther Pernul (Eds.)","author":"Reinfelder Lena","key":"e_1_3_2_2_21_1","unstructured":"Lena Reinfelder , Andrea Schankin , Sophie Russ , and Zinaida Benenson . 2018. An Inquiry into Perception and Usage of Smartphone Permission Models . In Trust, Privacy and Security in Digital Business, Steven Furnell, Haralambos Mouratidis, and G\u00fcnther Pernul (Eds.) . Springer International Publishing , Cham , 9--22. Lena Reinfelder, Andrea Schankin, Sophie Russ, and Zinaida Benenson. 2018. An Inquiry into Perception and Usage of Smartphone Permission Models. In Trust, Privacy and Security in Digital Business, Steven Furnell, Haralambos Mouratidis, and G\u00fcnther Pernul (Eds.). Springer International Publishing, Cham, 9--22."},{"key":"e_1_3_2_2_22_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11257-019-09246-3"},{"key":"#cr-split#-e_1_3_2_2_23_1.1","doi-asserted-by":"crossref","unstructured":"United Nation General Assembly. 1948. Universal Declaration of Human Rights . 6 pages. https:\/\/doi.org\/10.1080\/13642989808406748 arxiv: arXiv:1011.1669v3 10.1080\/13642989808406748","DOI":"10.1080\/13642989808406748"},{"key":"#cr-split#-e_1_3_2_2_23_1.2","doi-asserted-by":"crossref","unstructured":"United Nation General Assembly. 1948. Universal Declaration of Human Rights . 6 pages. https:\/\/doi.org\/10.1080\/13642989808406748 arxiv: arXiv:1011.1669v3","DOI":"10.1080\/13642989808406748"},{"key":"e_1_3_2_2_24_1","doi-asserted-by":"publisher","DOI":"10.1145\/775047.775142"},{"key":"e_1_3_2_2_25_1","doi-asserted-by":"publisher","DOI":"10.1145\/2420950.2420956"},{"key":"e_1_3_2_2_26_1","doi-asserted-by":"publisher","DOI":"10.1145\/2557500.2557504"},{"key":"e_1_3_2_2_27_1","doi-asserted-by":"publisher","DOI":"10.4108\/icst.mobiquitous.2014.258017"}],"event":{"name":"CODASPY '22: Twelveth ACM Conference on Data and Application Security and Privacy","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"],"location":"Baltimore MD USA","acronym":"CODASPY '22"},"container-title":["Proceedings of the Twelfth ACM Conference on Data and Application Security and Privacy"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3508398.3511526","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3508398.3511526","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T19:30:40Z","timestamp":1750188640000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3508398.3511526"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,4,14]]},"references-count":28,"alternative-id":["10.1145\/3508398.3511526","10.1145\/3508398"],"URL":"https:\/\/doi.org\/10.1145\/3508398.3511526","relation":{},"subject":[],"published":{"date-parts":[[2022,4,14]]},"assertion":[{"value":"2022-04-15","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}