Primer on Information Theory and Privacy ,
[Online; accessed 17, 0131. ,
https://digitalcontentnext.org/blog/ press/digital-content-next-research-indicates-33-of-consumers-likely- to-try-ad-blocking-software-in-next-three-months, 2015. ,
http://www.dmnews.com/opinions/why-millennials- block-ads/article [Online; accessed 17, 2015. ,
[Online; accessed 17, 2016. ,
The Web Never Forgets, Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security, CCS '14, pp.674-689, 2014. ,
DOI : 10.1007/978-3-642-31284-7_25
The Web Never Forgets, Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security, CCS '14, pp.674-689, 2014. ,
DOI : 10.1007/978-3-642-31284-7_25
On the Unicity of Smartphone Applications, The 14th ACM Workshop on Privacy in the Electronic Society (ACM WPES), 2015. ,
Short Paper: WifiLeaks: Underestimated Privacy Implications of the Access_Wifi_State Android Permission, The 7th ACM Conference on Security and Privacy in Wireless & Mobile Networks (ACM WiSec), 2014. ,
Detecting privacy leaks in the RATP App: how we proceeded and what we found, Journal of Computer Virology and Hacking Techniques, 2014. ,
MyTracking- Choices: Pacifying the Ad-Block War by Enforcing User Privacy Preferences, The 15th Annual Workshop on the Economics of Information Security (WEIS), 2016. ,
MobileAppScrutinator: A Simple yet Efficient Dynamic Analysis Approach for Detecting Privacy Leaks across Mobile OSs, Annual Computer Security Applications Conference (ACSAC), 2016. ,
Probabilistic Kmanonymity: Efficient Anonymization of Large Set-valued Datasets, IEEE International Conference on Big Data, p.2015 ,
DOI : 10.1109/bigdata.2015.7363870
ProtectMyPrivacy, Proceeding of the 11th annual international conference on Mobile systems, applications, and services, MobiSys '13, 2013. ,
DOI : 10.1145/2462456.2464460
Search marketing tops online retail customer acquisition tactics, pp.2016-2017, 2014. ,
Web-scale user modeling for targeting, Proceedings of the 21st international conference companion on World Wide Web, WWW '12 Companion, pp.3-12, 2012. ,
DOI : 10.1145/2187980.2187982
URL : http://www2012.wwwconference.org/proceedings/companion/p3.pdf
The ethics of modern web ad-blocking, 2015. ,
Flowdroid: Precise context, flow, field, object-sensitive and lifecycle-aware taint analysis for android apps, Proceedings of the 35th annual ACM SIGPLAN conference on Programming Language Design and Implementation, p.2014, 2014. ,
Adscape, Proceedings of the 23rd international conference on World wide web, WWW '14, pp.597-608, 2014. ,
DOI : 10.1145/2566486.2567992
Solving Large-Scale Sparse Semidefinite Programs for Combinatorial Optimization, SIAM Journal on Optimization, vol.10, issue.2, pp.443-461, 2000. ,
DOI : 10.1137/S1052623497328008
URL : ftp://dollar.biz.uiowa.edu/pub/yyye/largesdp.ps
Revising the wordnet domains hierarchy, Proceedings of the Workshop on Multilingual Linguistic Ressources, MLR '04, pp.101-108, 2004. ,
DOI : 10.3115/1706238.1706254
Open source (mixed integer) linear programming system, 2004. ,
Using nyc taxi data to identify muslim taxi drivers ,
Smartphone sensor reliability for augmented reality applications, Mobile and Ubiquitous Systems: Computing, Networking, and Services, 2013. ,
Longitudinal analysis of android ad library permissions. arXiv preprint, 2013. ,
A case of collusion, Proceedings of the Third ACM workshop on Security and privacy in smartphones & mobile devices, SPSM '13, 2013. ,
DOI : 10.1145/2516760.2516762
CSDP, A C library for semidefinite programming, Optimization Methods and Software, vol.6, issue.1-4, pp.613-623, 1999. ,
DOI : 10.1145/292395.292412
URL : http://www.nmt.edu/~borchers/csdppaper.ps
Convex Optimization, 2004. ,
Case study: How display ad remarketing works in travel, pp.2016-2017, 2010. ,
Your browsing behavior for a big mac, Proceedings of the 22nd international conference on World Wide Web, WWW '13, pp.189-200, 2013. ,
DOI : 10.1016/0167-2681(80)90051-7
Understanding interest-based behavioural targeted advertising, 2014. ,
Laoutaris. I always feel like somebody's watching me. measuring online behavioural advertising, Proc. ACM Int, 2015. ,
User perceptions of sharing, advertising, and tracking, Eleventh Symposium On Usable Privacy and Security, pp.53-67, 2015. ,
Understanding the metropolis-hastings algorithm, 1995. ,
DOI : 10.2307/2684568
URL : http://astro.temple.edu/~msobel/courses_files/firstmetropolis.pdf
Googling Security: How Much Does Google Know About You?, 2008. ,
Microsoft and Amazon pay to get around ad blocking tool, Financial Times, pp.2016-2018, 2015. ,
Elements of Information Theory, 2006. ,
DOI : 10.1002/047174882x
Information extraction, Communications of the ACM, vol.39, issue.1, 1996. ,
DOI : 10.1145/234173.234209
Linking wireless devices using information contained in wi-fi probe requests, Pervasive and Mobile Computing, 2013. ,
OPTI: Lowering the barrier between open source optimizers and the industrial Matlab user, Proc. Found. Comput.-Aided Process Oper, 2012. ,
Snoopy: Distributed tracking and profiling framework, 2012. ,
Abstract, Proc. Int. Symp, 2015. ,
DOI : 10.1515/popets-2015-0007
Validation and tuning of wordnet mapping techniques, Proc. Int. Conf. Recent Adv. Nat. Lang. Process, 2003. ,
Ftc's julie brill tells ad tech companies to improve privacy protections, 2015. ,
Unique in the Crowd: The privacy bounds of human mobility, Scientific Reports, vol.23, issue.1, 2013. ,
DOI : 10.1007/BF00344744
Unique in the shopping mall: On the reidentifiability of credit card metadata, Science, vol.3, issue.6210, p.347, 2015. ,
DOI : 10.1038/srep01645
How unique is your web browser? In PETS, 2010. ,
DOI : 10.1007/978-3-642-14527-8_1
URL : http://www.freehaven.net/anonbib/cache/pets2010:eckersley2010unique.pdf
PiOS : Detecting privacy leaks in iOS applications, NDSS 2011, 18th Annual Network and Distributed System Security Symposium, 2011. ,
TaintDroid, Proc. of the USENIX Symposium on Operating Systems Design and Implementation (OSDI), 2010. ,
DOI : 10.1145/1629575.1629604
The hidden perils of cookie syncing, pp.2014-2026, 2014. ,
Online Tracking, Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, CCS'16, 2016. ,
DOI : 10.1145/2663716.2663719
Online Tracking, Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, CCS'16, 0135. ,
DOI : 10.1145/2663716.2663719
Cookies That Give You Away, Proceedings of the 24th International Conference on World Wide Web, WWW '15, pp.289-299, 2015. ,
DOI : 10.1109/SP.2011.34
Android permissions demystified, Proceedings of the 18th ACM Conference on Computer and Communications Security, 2011. ,
Android permissions: User attention, comprehension, and behavior. SOUPS '12 ,
chapter Secure Database Systems, pp.353-403, 2000. ,
Hoteliers rake in returns through retargeting, Hotel News Now, pp.2016-2017, 2012. ,
Variations in tracking in relation to geographic location, 1506. ,
Scandroid: Automated security certification of android applications, 2009. ,
The adaptive Web, chapter User profiles for personalized information access, pp.54-89, 2007. ,
DOI : 10.1007/978-3-540-72079-9_2
URL : http://www.dcs.warwick.ac.uk/~acristea/courses/CS411/2008/Book - The Adaptive Web/UserProfilesforPersonalizedInfoAccess.pdf
Object-oriented software for quadratic programming, ACM Transactions on Mathematical Software, vol.29, issue.1, pp.58-81, 2003. ,
DOI : 10.1145/641876.641880
URL : http://pages.cs.wisc.edu/~swright/ooqp/ooqp-paper.pdf
Evaluating the accuracy of sampling-based approaches to the calculation of posterior moments, Bayesian Statistics, pp.169-193, 1992. ,
AndroidLeaks: Automatically Detecting Potential Privacy Leaks in Android Applications on a Large Scale, Trust and Trustworthy Computing, 2012. ,
DOI : 10.1007/978-3-642-30921-2_17
Who does what on the web: A large-scale study of browsing behavior, 2012. ,
Multilingual central repository version 3.0: upgrading a very large lexical knowledge base, Proc. Global WordNet Conf, 2012. ,
Can Ferris Bueller still have his day off? protecting privacy in the wireless era, USENIX HotOS workshop, 2007. ,
Challenges in measuring online advertising systems, Proceedings of the 10th annual conference on Internet measurement, IMC '10, 2010. ,
DOI : 10.1145/1879141.1879152
URL : http://saikat.guha.cc/pub/imc10-ads.pdf
AdBlock. https://getadblock, pp.2016-2016 ,
A study of third-party tracking by mobile apps in the wild, 2011. ,
Uniquely me! how much information does it take to single out one person among billions?, 2014. ,
Probability Inequalities for Sums of Bounded Random Variables, Journal of the American Statistical Association, vol.1, issue.301, pp.13-30, 1963. ,
DOI : 10.1007/BF02883985
Click Fraud, Computer, vol.40, issue.7, pp.85-86, 2007. ,
DOI : 10.1109/MC.2007.232
Information Theory and Statistical Mechanics. II, Physical Review, vol.102, issue.2, pp.171-190, 1957. ,
DOI : 10.1103/PhysRev.102.151
On the rationale of maximum-entropy methods, Proc. IEEE, pp.939-952, 1982. ,
DOI : 10.1109/PROC.1982.12425
Symdroid: Symbolic execution for dalvik bytecode, 2012. ,
NLopt nonlinear-optimization package. accessed on, pp.2015-2024 ,
Categorization of display ads using image and landing page features, Proceedings of the Third Workshop on Large Scale Data Mining Theory and Applications, LDMTA '11, pp.1-8, 2011. ,
DOI : 10.1145/2002945.2002946
http://www.lumapartners.com/ lumascapes/display-ad-tech-lumascape, pp.2016-2023 ,
Scandal: Static analyzer for detecting privacy leaks in android applications ,
Robust Discrete Optimization and Its Applications, 1996. ,
DOI : 10.1007/978-1-4757-2620-6
Upgrading HTTPS in mid-air: An Empirical Study of Strict Transport Security and Key Pinning, Proceedings 2015 Network and Distributed System Security Symposium, 2015. ,
DOI : 10.14722/ndss.2015.23162
Survey on search engine use, pp.2016-2018, 2012. ,
A characterization of online browsing behavior, Proceedings of the 19th international conference on World wide web, WWW '10, pp.561-570, 2010. ,
DOI : 10.1145/1772690.1772748
Place Lab: Device Positioning Using Radio Beacons in the Wild, Pervasive computing, 2005. ,
DOI : 10.1007/11428572_8
XRay: Enhancing the web's transparency with differential correlation, Proc. Conf. USENIX Secur. Symp, p.137, 2014. ,
Sunlight, Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, CCS '15, 2015. ,
DOI : 10.1007/978-3-319-04918-2_13
SIMD compression and the intersection of sorted integers. CoRR, abs/1401, 2014. ,
What matters to users?: Factors that affect users' willingness to share information with online advertisers, Proceedings of the Ninth Symposium on Usable Privacy and Security, SOUPS '13, pp.1-7, 2013. ,
Markov Chains and Mixing Times, 2009. ,
DOI : 10.1090/mbk/058
Principles of Signal Detection and Parameter Estimation, 2008. ,
DOI : 10.1007/978-0-387-76544-0
Privacy-preserving 802.11 access-point discovery, Proceedings of the second ACM conference on Wireless network security, WiSec '09, 2009. ,
DOI : 10.1145/1514274.1514293
AdReveal, Proceedings of the Twelfth ACM Workshop on Hot Topics in Networks, HotNets-XII, pp.1-127, 2013. ,
DOI : 10.1145/2535771.2535783
The Common Optimization INterface for Operations Research: Promoting open-source software in the operations research community, IBM Journal of Research and Development, vol.47, issue.1, pp.57-66, 2003. ,
DOI : 10.1147/rd.471.0057
CHEX, Proceedings of the 2012 ACM conference on Computer and communications security, CCS '12, 2012. ,
DOI : 10.1145/2382196.2382223
-diversity, ACM Transactions on Knowledge Discovery from Data, vol.1, issue.1, 2007. ,
DOI : 10.1145/1217299.1217302
Integrating subject field codes into wordnet, Proc. Lang. Resource, Evaluation (LREC), pp.1413-1418, 2000. ,
Foundations of Statistical Natural Language Processing, 1999. ,
Targeted Advertising Considered Harmful, pp.2016-2018 ,
Consumers now notice retargeted ads, pp.2015-2023, 2013. ,
Device-to-identity linking attack using targeted wi-fi geolocation spoofing, Proceedings of the 8th ACM Conference on Security & Privacy in Wireless and Mobile Networks, WiSec '15, p.2015 ,
DOI : 10.1145/2348543.2348578
URL : https://hal.archives-ouvertes.fr/hal-01176842
Third-Party Web Tracking: Policy and Technology, 2012 IEEE Symposium on Security and Privacy, p.12, 2012. ,
DOI : 10.1109/SP.2012.47
URL : http://doi.org/10.1109/sp.2012.47
Equation of state calculations by fast computing machines, The Journal of Chemical Physics, issue.6, pp.1087-1092 ,
WordNet: a lexical database for English, Communications of the ACM, vol.38, issue.11, pp.39-41, 1995. ,
DOI : 10.1145/219717.219748
Customer data: Designing for transparency and trust, pp.2014-2016, 2015. ,
Pixel perfect: Fingerprinting canvas in HTML5, Proc. IEEE Web 2.0 Workshop Secur., Priv. (W2SP), 2012. ,
Tracking unmodified smartphones using wi-fi monitors, Proceedings of the 10th ACM Conference on Embedded Network Sensor Systems, SenSys '12, 2012. ,
DOI : 10.1145/2426656.2426685
URL : http://www.cs.uic.edu/~jakob/papers/musa-sensys12.pdf
The rise of ad-blocking could herald the end of the free internet, pp.2015-2025, 2015. ,
Robust Estimation, Regression and Ranking with Applications in Portfolio Optimization, 2009. ,
Measuring the Privacy Risks and Value of Web Tracking, Nat. Inst. Res. Comput. Sci., Contr. (INRIA), 2015. ,
Selling off Privacy at Auction, Proceedings 2014 Network and Distributed System Security Symposium, 2014. ,
DOI : 10.14722/ndss.2014.23270
URL : https://hal.archives-ouvertes.fr/hal-00915249
Report on sensors apis: privacy and transparency perspective, 2016. ,
The Leaking Battery, 2016. ,
DOI : 10.1109/SP.2013.43
On the uniqueness of Web browsing history patterns, annals of telecommunications - annales des t??l??communications, vol.1, issue.1-2, 2014. ,
DOI : 10.1504/IJBM.2008.018665
URL : https://hal.archives-ouvertes.fr/hal-00917042
Selling off Privacy at Auction, Proceedings 2014 Network and Distributed System Security Symposium, 2013. ,
DOI : 10.14722/ndss.2014.23270
URL : https://hal.archives-ouvertes.fr/hal-00915249
Ion Stoica, Eemil Lagerspetz, and Sasu Tarkoma. Carat: Collaborative energy diagnosis for mobile devices, ACM SenSys, 2013. ,
The cost of ad blocking. https://downloads.pagefair.com/wp- content/uploads, pp.2016-2023, 2015. ,
Learning to target, Proceedings of the 20th ACM international conference on Information and knowledge management, CIKM '11, pp.1805-1814, 2011. ,
DOI : 10.1145/2063576.2063837
Measuring the privacy of user profiles in personalized information systems, Future Generation Computer Systems, vol.33, pp.53-63, 2014. ,
DOI : 10.1016/j.future.2013.01.001
MyAd- Choices: Bringing Transparency and Control to Online Advertising, 2016. ,
You Never Surf Alone. Ubiquitous Tracking of Users??? Browsing Habits, Proc. Int. Workshop Data Priv. Manage. (DPM), Lecture Notes Comput. Sci. (LNCS), 2015. ,
DOI : 10.1007/978-3-642-54568-9_24
Search engine use 2012, Res. rep., Pew Internet, Amer. Life Project, 2012. ,
Haystack: In situ mobile traffic analysis in user space, 2015. ,
An Information-Theoretic Privacy Criterion for Query Forgery in Information Retrieval, Proc. Int. Conf. Secur. Technol.(SecTech), pp.146-154, 2011. ,
DOI : 10.1109/TIT.1978.1055892
Cognitive disconnect, Proceedings of the second edition of the ACM conference on Online social networks, COSN '14, 2014. ,
DOI : 10.1145/2660460.2660471
Detecting and defending against third-party tracking on the web ,
How business can gain consumers' trust around data ,
A vector space model for automatic indexing, Communications of the ACM, vol.18, issue.11, pp.613-620, 1975. ,
DOI : 10.1145/361219.361220
URL : http://ecommons.cornell.edu/bitstream/1813/6057/1/74-218.pdf
On the effectiveness of dynamic taint analysis for protecting against private information leaks on android-based devices, 10th International Conference on Security and Cryptography (SECRYPT), 2013. ,
Adblock extension begins whitelisting " acceptable ads, 2015. ,
Theory of Statistics, 1995. ,
DOI : 10.1007/978-1-4612-4250-5
Path and hipster iphone apps leak sensitive data without notification . https://nakedsecurity.sophos.com/2012/02/08/apple-mobile-apps- path-and-hipster-and-leak-sensitive-data-without-notification, pp.2012-2016 ,
Predicting user traits from a snapshot of apps installed on a smartphone. SIGMO- BILE Mob, Comput. Commun. Rev, 2014. ,
Targeted: How Technology Is Revolutionizing Advertising and the Way Companies Reach Consumers, 2014. ,
Flash Cookies and Privacy, Proc. AAAI Spring Symp, 2010. ,
DOI : 10.2139/ssrn.1446862
URL : http://www.aaai.org/ocs/index.php/SSS/SSS10/paper/download/1070/1505/
No Honor Among Thieves, Proceedings of the 25th International Conference on World Wide Web, WWW '16, pp.1021-1032 ,
DOI : 10.1145/2382196.2382274
Simple demographics often identify people uniquely, 2000. ,
Computational Disclosure Control: A Primer on Data Privacy Protection, 2001. ,
Rise of ad-blockers shows advertising does not understand mobile, say experts, pp.2015-2025, 2015. ,
Tlc trip record data ,
Adnostic: Privacy preserving targeted advertising, Proc. IEEE Symp, pp.1-21, 2010. ,
The company you keep: Mobile malware infection rates and inexpensive risk indicators, WWW, 2014. ,
Consumer attitudes toward mobile advertising: An empirical study, Int. J. Electron. Commer, vol.8, issue.3, pp.65-78, 2004. ,
Americans Reject Tailored Advertising and Three Activities that Enable It, SSRN Electronic Journal, 2009. ,
DOI : 10.2139/ssrn.1478214
URL : https://repository.upenn.edu/cgi/viewcontent.cgi?article=1138&context=asc_papers
On the implementation of an interior-point filter line-search algorithm for large-scale nonlinear programming, Mathematical Programming, vol.10, issue.1, pp.25-57, 2006. ,
DOI : 10.1007/BFb0120945
Facebook slammed after advertising funeral directors to a cancer patient, 2015. ,
How much can behavioral targeting help online advertising?, Proceedings of the 18th international conference on World wide web, WWW '09, pp.261-270, 2009. ,
DOI : 10.1145/1526709.1526745
Distributed Robust Optimization for Communication Networks, IEEE INFOCOM 2008, The 27th Conference on Computer Communications, 2008. ,
DOI : 10.1109/INFOCOM.2008.171
URL : http://www.princeton.edu/~verdu/reprints/YanWuHuaWanVer.ICC2008.pdf
AppIntent, Proceedings of the 2013 ACM SIGSAC conference on Computer & communications security, CCS '13 ,
DOI : 10.1145/2508859.2516676
Internet advertising: An interplay among advertisers, online publishers, ad exchanges and web users. arXiv: 1206.1754, 2012. arXiv preprint. 141 [207] ZDNet. Twitter uploads contact list data without consent; retains for 18 months. http://www.zdnet.com/article/twitter-uploads-contact-list-data- without-consent-retains-for-18-months, pp.2012-2016 ,
Identity, location, disease and more, Proceedings of the 2013 ACM SIGSAC conference on Computer & communications security, CCS '13 ,
DOI : 10.1145/2508859.2516661
Algorithm 778: L-BFGS-B: Fortran subroutines for large-scale bound-constrained optimization, ACM Transactions on Mathematical Software, vol.23, issue.4, pp.550-560, 2007. ,
DOI : 10.1145/279232.279236
Robust Estimation in Signal Processing: A Tutorial-Style Treatment of Fundamental Concepts, IEEE Signal Processing Magazine, vol.29, issue.4, pp.61-80, 2012. ,
DOI : 10.1109/MSP.2012.2183773