{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,4,9]],"date-time":"2025-04-09T06:09:50Z","timestamp":1744178990917,"version":"3.37.3"},"reference-count":4,"publisher":"Wiley","license":[{"start":{"date-parts":[[2016,1,1]],"date-time":"2016-01-01T00:00:00Z","timestamp":1451606400000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61502045","612212","B08004"],"award-info":[{"award-number":["61502045","612212","B08004"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100004963","name":"Seventh Framework Programme","doi-asserted-by":"publisher","award":["61502045","612212","B08004"],"award-info":[{"award-number":["61502045","612212","B08004"]}],"id":[{"id":"10.13039\/501100004963","id-type":"DOI","asserted-by":"publisher"}]},{"name":"the 111 Project","award":["61502045","612212","B08004"],"award-info":[{"award-number":["61502045","612212","B08004"]}]},{"DOI":"10.13039\/501100012226","name":"Fundamental Research Funds for the Central Universities","doi-asserted-by":"crossref","award":["61502045","612212","B08004"],"award-info":[{"award-number":["61502045","612212","B08004"]}],"id":[{"id":"10.13039\/501100012226","id-type":"DOI","asserted-by":"crossref"}]},{"DOI":"10.13039\/501100010026","name":"Beijing Higher Education Young Elite Teacher Project","doi-asserted-by":"crossref","award":["61502045","612212","B08004"],"award-info":[{"award-number":["61502045","612212","B08004"]}],"id":[{"id":"10.13039\/501100010026","id-type":"DOI","asserted-by":"crossref"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Mobile Information Systems"],"published-print":{"date-parts":[[2016]]},"abstract":"<jats:p>With the rapid proliferation of mobile devices, explosive mobile applications (apps) are developed in the past few years. However, the functions of mobile apps are varied and the designs of them are not well understood by end users, especially the activities and functions related to user privacy. Therefore, understanding how much danger of mobile apps with respect to privacy violation to mobile users is becomes a critical issue when people use mobile devices. In this paper, we evaluate the mobile app privacy violation of mobile users by computing the danger coefficient. In order to help people reduce the privacy leakage, we combine both the user preference to mobile apps and the privacy risk of apps and propose a mobile app usage recommendation method named AppURank to recommend the secure apps with the same function as the \u201cdangerous\u201d one for people use. The evaluation results show that our recommendation can reduce the privacy leakage by 50%.<\/jats:p>","DOI":"10.1155\/2016\/6804379","type":"journal-article","created":{"date-parts":[[2016,6,27]],"date-time":"2016-06-27T21:02:21Z","timestamp":1467061341000},"page":"1-10","source":"Crossref","is-referenced-by-count":12,"title":["How Dangerous Are Your Smartphones? App Usage Recommendation with Privacy Preserving"],"prefix":"10.1155","volume":"2016","author":[{"given":"Konglin","family":"Zhu","sequence":"first","affiliation":[{"name":"School of Information and Communication Engineering, Beijing University of Posts and Telecommunications, Beijing 100876, China"}]},{"given":"Xiaoman","family":"He","sequence":"additional","affiliation":[{"name":"School of Information and Communication Engineering, Beijing University of Posts and Telecommunications, Beijing 100876, China"}]},{"given":"Bin","family":"Xiang","sequence":"additional","affiliation":[{"name":"School of Information and Communication Engineering, Beijing University of Posts and Telecommunications, Beijing 100876, China"}]},{"given":"Lin","family":"Zhang","sequence":"additional","affiliation":[{"name":"School of Information and Communication Engineering, Beijing University of Posts and Telecommunications, Beijing 100876, China"}]},{"given":"Achille","family":"Pattavina","sequence":"additional","affiliation":[{"name":"Dipartimento di Elettronica e Informazione, Politecnico di Milano, 20133 Milano, Italy"}]}],"member":"311","reference":[{"key":"2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-30217-6_36"},{"key":"3","doi-asserted-by":"publisher","DOI":"10.1145\/2532515"},{"key":"13","doi-asserted-by":"publisher","DOI":"10.1080\/00401706.1968.10490580"},{"issue":"4-5","key":"14","first-page":"993","volume":"3","year":"2003","journal-title":"The Journal of Machine Learning Research"}],"container-title":["Mobile Information Systems"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/downloads.hindawi.com\/journals\/misy\/2016\/6804379.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/downloads.hindawi.com\/journals\/misy\/2016\/6804379.xml","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/downloads.hindawi.com\/journals\/misy\/2016\/6804379.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,5,17]],"date-time":"2020-05-17T00:17:46Z","timestamp":1589674666000},"score":1,"resource":{"primary":{"URL":"http:\/\/www.hindawi.com\/journals\/misy\/2016\/6804379\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016]]},"references-count":4,"alternative-id":["6804379","6804379"],"URL":"https:\/\/doi.org\/10.1155\/2016\/6804379","relation":{},"ISSN":["1574-017X","1875-905X"],"issn-type":[{"type":"print","value":"1574-017X"},{"type":"electronic","value":"1875-905X"}],"subject":[],"published":{"date-parts":[[2016]]}}}