A. D. Mytrackingchoices and . Bibliography, Primer on Information Theory and Privacy

A. Acceptable and . Manifesto, [Online; accessed 17, 0131.

. Dcn-consumer-ad-block-report, https://digitalcontentnext.org/blog/ press/digital-content-next-research-indicates-33-of-consumers-likely- to-try-ad-blocking-software-in-next-three-months, 2015.

W. Millennials and B. Ads, http://www.dmnews.com/opinions/why-millennials- block-ads/article [Online; accessed 17, 2015.

. Brave, [Online; accessed 17, 2016.

G. Acar, C. Eubank, S. Englehardt, M. Juarez, A. Narayanan et al., The Web Never Forgets, Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security, CCS '14, pp.674-689, 2014.
DOI : 10.1007/978-3-642-31284-7_25

G. Acar, C. Eubank, S. Englehardt, M. Juarez, A. Narayanan et al., The Web Never Forgets, Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security, CCS '14, pp.674-689, 2014.
DOI : 10.1007/978-3-642-31284-7_25

J. Prasad-achara, G. Acs, and C. Castelluccia, On the Unicity of Smartphone Applications, The 14th ACM Workshop on Privacy in the Electronic Society (ACM WPES), 2015.

J. Prasad-achara, M. Cunche, V. Roca, and A. Francillon, Short Paper: WifiLeaks: Underestimated Privacy Implications of the Access_Wifi_State Android Permission, The 7th ACM Conference on Security and Privacy in Wireless & Mobile Networks (ACM WiSec), 2014.

J. Prasad-achara, J. Lefruit, V. Roca, and C. Castelluccia, Detecting privacy leaks in the RATP App: how we proceeded and what we found, Journal of Computer Virology and Hacking Techniques, 2014.

J. Prasad-achara, J. Parra-arnau, and C. Castelluccia, MyTracking- Choices: Pacifying the Ad-Block War by Enforcing User Privacy Preferences, The 15th Annual Workshop on the Economics of Information Security (WEIS), 2016.

J. Prasad-achara, V. Roca, C. Castelluccia, and A. Francillon, MobileAppScrutinator: A Simple yet Efficient Dynamic Analysis Approach for Detecting Privacy Leaks across Mobile OSs, Annual Computer Security Applications Conference (ACSAC), 2016.

G. Acs, J. Prasad-achara, and C. Castelluccia, Probabilistic Kmanonymity: Efficient Anonymization of Large Set-valued Datasets, IEEE International Conference on Big Data, p.2015
DOI : 10.1109/bigdata.2015.7363870

Y. Agarwal and . Other, ProtectMyPrivacy, Proceeding of the 11th annual international conference on Mobile systems, applications, and services, MobiSys '13, 2013.
DOI : 10.1145/2462456.2464460

K. G. Allen, Search marketing tops online retail customer acquisition tactics, pp.2016-2017, 2014.

M. Aly, A. Hatch, V. Josifovski, and V. K. Narayanan, Web-scale user modeling for targeting, Proceedings of the 21st international conference companion on World Wide Web, WWW '12 Companion, pp.3-12, 2012.
DOI : 10.1145/2187980.2187982

URL : http://www2012.wwwconference.org/proceedings/companion/p3.pdf

M. Arment, The ethics of modern web ad-blocking, 2015.

S. Arzt, S. Rasthofer, . Bodden, . Bartel, . Klein et al., Flowdroid: Precise context, flow, field, object-sensitive and lifecycle-aware taint analysis for android apps, Proceedings of the 35th annual ACM SIGPLAN conference on Programming Language Design and Implementation, p.2014, 2014.

P. Barford, I. Canadi, D. Krushevskaja, Q. Ma, and S. Muthukrishnan, Adscape, Proceedings of the 23rd international conference on World wide web, WWW '14, pp.597-608, 2014.
DOI : 10.1145/2566486.2567992

S. J. Benson, Y. Ye, and X. Zhang, Solving Large-Scale Sparse Semidefinite Programs for Combinatorial Optimization, SIAM Journal on Optimization, vol.10, issue.2, pp.443-461, 2000.
DOI : 10.1137/S1052623497328008

URL : ftp://dollar.biz.uiowa.edu/pub/yyye/largesdp.ps

L. Bentivogli, P. Forner, B. Magnini, and E. Pianta, Revising the wordnet domains hierarchy, Proceedings of the Workshop on Multilingual Linguistic Ressources, MLR '04, pp.101-108, 2004.
DOI : 10.3115/1706238.1706254

M. Berkelaar, K. Eikland, and P. Notebaert, Open source (mixed integer) linear programming system, 2004.

A. Berlee, Using nyc taxi data to identify muslim taxi drivers

R. Jeffrey, . Blum, G. Daniel, J. R. Greencorn, and . Cooperstock, Smartphone sensor reliability for augmented reality applications, Mobile and Ubiquitous Systems: Computing, Networking, and Services, 2013.

T. Book, A. Pridgen, and D. S. Wallach, Longitudinal analysis of android ad library permissions. arXiv preprint, 2013.

T. Book and D. S. Wallach, A case of collusion, Proceedings of the Third ACM workshop on Security and privacy in smartphones & mobile devices, SPSM '13, 2013.
DOI : 10.1145/2516760.2516762

B. Borchers, CSDP, A C library for semidefinite programming, Optimization Methods and Software, vol.6, issue.1-4, pp.613-623, 1999.
DOI : 10.1145/292395.292412

URL : http://www.nmt.edu/~borchers/csdppaper.ps

S. Boyd and L. Vandenberghe, Convex Optimization, 2004.

J. Butler, Case study: How display ad remarketing works in travel, pp.2016-2017, 2010.

J. P. Carrascal, C. Riederer, V. Erramilli, M. Cherubini, and R. Oliveira, Your browsing behavior for a big mac, Proceedings of the 22nd international conference on World Wide Web, WWW '13, pp.189-200, 2013.
DOI : 10.1016/0167-2681(80)90051-7

J. M. Carrascosa, J. Mikians, R. Cuevas, V. Erramilli, and N. Laoutaris, Understanding interest-based behavioural targeted advertising, 2014.

J. M. Carrascosa, J. Mikians, R. Cuevas, V. Erramilli, and N. , Laoutaris. I always feel like somebody's watching me. measuring online behavioural advertising, Proc. ACM Int, 2015.

F. Chanchary and S. Chiasson, User perceptions of sharing, advertising, and tracking, Eleventh Symposium On Usable Privacy and Security, pp.53-67, 2015.

S. Chib and E. Greenberg, Understanding the metropolis-hastings algorithm, 1995.
DOI : 10.2307/2684568

URL : http://astro.temple.edu/~msobel/courses_files/firstmetropolis.pdf

G. Conti, Googling Security: How Much Does Google Know About You?, 2008.

R. Cookson and . Google, Microsoft and Amazon pay to get around ad blocking tool, Financial Times, pp.2016-2018, 2015.

T. M. Cover and J. A. Thomas, Elements of Information Theory, 2006.
DOI : 10.1002/047174882x

J. Cowie and W. Lehnert, Information extraction, Communications of the ACM, vol.39, issue.1, 1996.
DOI : 10.1145/234173.234209

M. Mathieu-cunche, R. Kaafar, and . Boreli, Linking wireless devices using information contained in wi-fi probe requests, Pervasive and Mobile Computing, 2013.

J. Currie and D. I. Wilson, OPTI: Lowering the barrier between open source optimizers and the industrial Matlab user, Proc. Found. Comput.-Aided Process Oper, 2012.

C. Daniel and W. Glenn, Snoopy: Distributed tracking and profiling framework, 2012.

A. Datta, M. C. Tschantz, and A. Datta, Abstract, Proc. Int. Symp, 2015.
DOI : 10.1515/popets-2015-0007

J. Daudé, L. Padró, and G. Rigau, Validation and tuning of wordnet mapping techniques, Proc. Int. Conf. Recent Adv. Nat. Lang. Process, 2003.

W. Davis, Ftc's julie brill tells ad tech companies to improve privacy protections, 2015.

Y. De-montjoye, C. A. Hidalgo, M. Verleysen, and V. D. Blondel, Unique in the Crowd: The privacy bounds of human mobility, Scientific Reports, vol.23, issue.1, 2013.
DOI : 10.1007/BF00344744

Y. De-montjoye, L. Radaelli, . Vivek-kumar, A. Singh, and . Pentland, Unique in the shopping mall: On the reidentifiability of credit card metadata, Science, vol.3, issue.6210, p.347, 2015.
DOI : 10.1038/srep01645

P. Eckersley, How unique is your web browser? In PETS, 2010.
DOI : 10.1007/978-3-642-14527-8_1

URL : http://www.freehaven.net/anonbib/cache/pets2010:eckersley2010unique.pdf

M. Egele, C. Kruegel, E. Kirda, and G. Vigna, PiOS : Detecting privacy leaks in iOS applications, NDSS 2011, 18th Annual Network and Distributed System Security Symposium, 2011.

W. Enck, P. Gilbert, . Byung-gon-chun, P. Landon, J. Cox et al., TaintDroid, Proc. of the USENIX Symposium on Operating Systems Design and Implementation (OSDI), 2010.
DOI : 10.1145/1629575.1629604

S. Englehardt, The hidden perils of cookie syncing, pp.2014-2026, 2014.

S. Englehardt and A. Narayanan, Online Tracking, Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, CCS'16, 2016.
DOI : 10.1145/2663716.2663719

S. Englehardt and A. Narayanan, Online Tracking, Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, CCS'16, 0135.
DOI : 10.1145/2663716.2663719

S. Englehardt, D. Reisman, C. Eubank, P. Zimmerman, J. Mayer et al., Cookies That Give You Away, Proceedings of the 24th International Conference on World Wide Web, WWW '15, pp.289-299, 2015.
DOI : 10.1109/SP.2011.34

A. Porter-felt, E. Chin, S. Hanna, D. Song, and D. Wagner, Android permissions demystified, Proceedings of the 18th ACM Conference on Computer and Communications Security, 2011.

A. Porter-felt, E. Ha, S. Egelman, A. Haney, E. Chin et al., Android permissions: User attention, comprehension, and behavior. SOUPS '12

E. Ferrari and B. Thuraisingham, chapter Secure Database Systems, pp.353-403, 2000.

J. Q. Freed, Hoteliers rake in returns through retargeting, Hotel News Now, pp.2016-2017, 2012.

N. Fruchter, H. Miao, S. Stevenson, and R. Balebako, Variations in tracking in relation to geographic location, 1506.

P. Adam, A. Fuchs, . Chaudhuri, S. Jeffrey, and . Foster, Scandroid: Automated security certification of android applications, 2009.

S. Gauch, M. Speretta, A. Chandramouli, and A. Micarelli, The adaptive Web, chapter User profiles for personalized information access, pp.54-89, 2007.
DOI : 10.1007/978-3-540-72079-9_2

URL : http://www.dcs.warwick.ac.uk/~acristea/courses/CS411/2008/Book - The Adaptive Web/UserProfilesforPersonalizedInfoAccess.pdf

E. M. Gertz and S. J. Wright, Object-oriented software for quadratic programming, ACM Transactions on Mathematical Software, vol.29, issue.1, pp.58-81, 2003.
DOI : 10.1145/641876.641880

URL : http://pages.cs.wisc.edu/~swright/ooqp/ooqp-paper.pdf

J. Geweke, Evaluating the accuracy of sampling-based approaches to the calculation of posterior moments, Bayesian Statistics, pp.169-193, 1992.

C. Gibler, J. Crussell, J. Erickson, and H. Chen, AndroidLeaks: Automatically Detecting Potential Privacy Leaks in Android Applications on a Large Scale, Trust and Trustworthy Computing, 2012.
DOI : 10.1007/978-3-642-30921-2_17

S. Goel, J. M. Hofman, and . Sirer, Who does what on the web: A large-scale study of browsing behavior, 2012.

A. Gonzalez-agirre, E. Laparra, and G. Rigau, Multilingual central repository version 3.0: upgrading a very large lexical knowledge base, Proc. Global WordNet Conf, 2012.

B. Greenstein, R. Gummadi, J. Pang, M. Y. Chen, T. Kohno et al., Can Ferris Bueller still have his day off? protecting privacy in the wireless era, USENIX HotOS workshop, 2007.

S. Guha, B. Cheng, and P. Francis, Challenges in measuring online advertising systems, Proceedings of the 10th annual conference on Internet measurement, IMC '10, 2010.
DOI : 10.1145/1879141.1879152

URL : http://saikat.guha.cc/pub/imc10-ads.pdf

M. Gundlach, AdBlock. https://getadblock, pp.2016-2016

S. Han, A study of third-party tracking by mobile apps in the wild, 2011.

B. Hayes, Uniquely me! how much information does it take to single out one person among billions?, 2014.

W. Hoeffding, Probability Inequalities for Sums of Bounded Random Variables, Journal of the American Statistical Association, vol.1, issue.301, pp.13-30, 1963.
DOI : 10.1007/BF02883985

B. J. Jansen, Click Fraud, Computer, vol.40, issue.7, pp.85-86, 2007.
DOI : 10.1109/MC.2007.232

E. T. Jaynes, Information Theory and Statistical Mechanics. II, Physical Review, vol.102, issue.2, pp.171-190, 1957.
DOI : 10.1103/PhysRev.102.151

E. T. Jaynes, On the rationale of maximum-entropy methods, Proc. IEEE, pp.939-952, 1982.
DOI : 10.1109/PROC.1982.12425

J. Jeon, K. Kristopher, . Micinski, S. Jeffrey, and . Foster, Symdroid: Symbolic execution for dalvik bytecode, 2012.

S. G. Johnson, NLopt nonlinear-optimization package. accessed on, pp.2015-2024

A. Kae, K. Kan, V. K. Narayanan, and D. Yankov, Categorization of display ads using image and landing page features, Proceedings of the Third Workshop on Large Scale Data Mining Theory and Applications, LDMTA '11, pp.1-8, 2011.
DOI : 10.1145/2002945.2002946

T. D. Kawaja and . Lumascape, http://www.lumapartners.com/ lumascapes/display-ad-tech-lumascape, pp.2016-2023

J. Kim, Y. Yoon, K. Yi, J. Shin, and S. Center, Scandal: Static analyzer for detecting privacy leaks in android applications

P. Kouvelis and G. Yu, Robust Discrete Optimization and Its Applications, 1996.
DOI : 10.1007/978-1-4757-2620-6

M. Kranch and J. Bonneau, Upgrading HTTPS in mid-air: An Empirical Study of Strict Transport Security and Key Pinning, Proceedings 2015 Network and Distributed System Security Symposium, 2015.
DOI : 10.14722/ndss.2015.23162

J. Brenner, K. Purcell, and L. Rainie, Survey on search engine use, pp.2016-2018, 2012.

R. Kumar and A. Tomkins, A characterization of online browsing behavior, Proceedings of the 19th international conference on World wide web, WWW '10, pp.561-570, 2010.
DOI : 10.1145/1772690.1772748

A. Lamarca, Y. Chawathe, S. Consolvo, J. Hightower, I. Smith et al., Place Lab: Device Positioning Using Radio Beacons in the Wild, Pervasive computing, 2005.
DOI : 10.1007/11428572_8

M. Lecuyer, G. Ducoffe, F. Lan, A. Papancea, T. Petsios et al., XRay: Enhancing the web's transparency with differential correlation, Proc. Conf. USENIX Secur. Symp, p.137, 2014.

M. Lecuyer, R. Spahn, Y. Spiliopoulos, A. Chaintreau, R. Geambasu et al., Sunlight, Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, CCS '15, 2015.
DOI : 10.1007/978-3-319-04918-2_13

D. Lemire, L. Boytsov, and N. Kurz, SIMD compression and the intersection of sorted integers. CoRR, abs/1401, 2014.

P. G. , L. , B. Ur, Y. Wang, M. Sleeper et al., What matters to users?: Factors that affect users' willingness to share information with online advertisers, Proceedings of the Ninth Symposium on Usable Privacy and Security, SOUPS '13, pp.1-7, 2013.

D. A. Levin, Y. Peres, and E. L. Wilmer, Markov Chains and Mixing Times, 2009.
DOI : 10.1090/mbk/058

B. C. Levy, Principles of Signal Detection and Parameter Estimation, 2008.
DOI : 10.1007/978-0-387-76544-0

J. Lindqvist, T. Aura, G. Danezis, T. Koponen, A. Myllyniemi et al., Privacy-preserving 802.11 access-point discovery, Proceedings of the second ACM conference on Wireless network security, WiSec '09, 2009.
DOI : 10.1145/1514274.1514293

B. Liu, A. Sheth, U. Weinsberg, J. Chandrashekar, and R. Govindan, AdReveal, Proceedings of the Twelfth ACM Workshop on Hot Topics in Networks, HotNets-XII, pp.1-127, 2013.
DOI : 10.1145/2535771.2535783

R. Lougee-heimer, The Common Optimization INterface for Operations Research: Promoting open-source software in the operations research community, IBM Journal of Research and Development, vol.47, issue.1, pp.57-66, 2003.
DOI : 10.1147/rd.471.0057

L. Lu, Z. Li, Z. Wu, W. Lee, and G. Jiang, CHEX, Proceedings of the 2012 ACM conference on Computer and communications security, CCS '12, 2012.
DOI : 10.1145/2382196.2382223

A. Machanavajjhala, D. Kifer, J. Gehrke, and M. Venkitasubramaniam, -diversity, ACM Transactions on Knowledge Discovery from Data, vol.1, issue.1, 2007.
DOI : 10.1145/1217299.1217302

B. Magnini and G. Cavaglià, Integrating subject field codes into wordnet, Proc. Lang. Resource, Evaluation (LREC), pp.1413-1418, 2000.

C. D. Manning and H. Schütze, Foundations of Statistical Natural Language Processing, 1999.

D. Marti, Targeted Advertising Considered Harmful, pp.2016-2018

G. Marvin, Consumers now notice retargeted ads, pp.2015-2023, 2013.

C. Matte, J. Prasad-achara, and M. Cunche, Device-to-identity linking attack using targeted wi-fi geolocation spoofing, Proceedings of the 8th ACM Conference on Security & Privacy in Wireless and Mobile Networks, WiSec '15, p.2015
DOI : 10.1145/2348543.2348578

URL : https://hal.archives-ouvertes.fr/hal-01176842

J. R. Mayer and . Other, Third-Party Web Tracking: Policy and Technology, 2012 IEEE Symposium on Security and Privacy, p.12, 2012.
DOI : 10.1109/SP.2012.47

URL : http://doi.org/10.1109/sp.2012.47

A. W. Rosenbluth, M. N. Rosenbluth, A. H. Teller, and E. Teller, Equation of state calculations by fast computing machines, The Journal of Chemical Physics, issue.6, pp.1087-1092

G. A. Miller, WordNet: a lexical database for English, Communications of the ACM, vol.38, issue.11, pp.39-41, 1995.
DOI : 10.1145/219717.219748

T. Morey, T. Forbath, and A. Schoop, Customer data: Designing for transparency and trust, pp.2014-2016, 2015.

K. Mowery and H. Shacham, Pixel perfect: Fingerprinting canvas in HTML5, Proc. IEEE Web 2.0 Workshop Secur., Priv. (W2SP), 2012.

A. B. Musa and J. Eriksson, Tracking unmodified smartphones using wi-fi monitors, Proceedings of the 10th ACM Conference on Embedded Network Sensor Systems, SenSys '12, 2012.
DOI : 10.1145/2426656.2426685

URL : http://www.cs.uic.edu/~jakob/papers/musa-sensys12.pdf

J. Naughton, The rise of ad-blocking could herald the end of the free internet, pp.2015-2025, 2015.

T. Nguyen, Robust Estimation, Regression and Ranking with Applications in Portfolio Optimization, 2009.

L. Olejnik, Measuring the Privacy Risks and Value of Web Tracking, Nat. Inst. Res. Comput. Sci., Contr. (INRIA), 2015.

L. Olejnik, T. Minh-dung, and C. Castelluccia, Selling off Privacy at Auction, Proceedings 2014 Network and Distributed System Security Symposium, 2014.
DOI : 10.14722/ndss.2014.23270

URL : https://hal.archives-ouvertes.fr/hal-00915249

L. Olejnik, Report on sensors apis: privacy and transparency perspective, 2016.

L. Olejnik, G. Acar, C. Castelluccia, and C. Diaz, The Leaking Battery, 2016.
DOI : 10.1109/SP.2013.43

L. Olejnik, C. Castelluccia, and A. Janc, On the uniqueness of Web browsing history patterns, annals of telecommunications - annales des t??l??communications, vol.1, issue.1-2, 2014.
DOI : 10.1504/IJBM.2008.018665

URL : https://hal.archives-ouvertes.fr/hal-00917042

L. Olejnik, T. Minh-dung, and C. Castelluccia, Selling off Privacy at Auction, Proceedings 2014 Network and Distributed System Security Symposium, 2013.
DOI : 10.14722/ndss.2014.23270

URL : https://hal.archives-ouvertes.fr/hal-00915249

A. J. Oliner and A. P. Iyer, Ion Stoica, Eemil Lagerspetz, and Sasu Tarkoma. Carat: Collaborative energy diagnosis for mobile devices, ACM SenSys, 2013.

. Pagefaire, The cost of ad blocking. https://downloads.pagefair.com/wp- content/uploads, pp.2016-2023, 2015.

S. Pandey, M. Aly, A. Bagherjeiran, A. Hatch, P. Ciccolo et al., Learning to target, Proceedings of the 20th ACM international conference on Information and knowledge management, CIKM '11, pp.1805-1814, 2011.
DOI : 10.1145/2063576.2063837

J. Parra-arnau, D. Rebollo-monedero, and J. Forné, Measuring the privacy of user profiles in personalized information systems, Future Generation Computer Systems, vol.33, pp.53-63, 2014.
DOI : 10.1016/j.future.2013.01.001

J. Parra-arnau, J. Prasad-achara, and C. Castelluccia, MyAd- Choices: Bringing Transparency and Control to Online Advertising, 2016.

S. Puglisi, D. Rebollo-monedero, and J. Forné, You Never Surf Alone. Ubiquitous Tracking of Users??? Browsing Habits, Proc. Int. Workshop Data Priv. Manage. (DPM), Lecture Notes Comput. Sci. (LNCS), 2015.
DOI : 10.1007/978-3-642-54568-9_24

K. Purcell, J. Brenner, and L. Rainie, Search engine use 2012, Res. rep., Pew Internet, Amer. Life Project, 2012.

A. Razaghpanah, N. Vallina-rodriguez, S. Sundaresan, C. Kreibich, P. Gill et al., Haystack: In situ mobile traffic analysis in user space, 2015.

D. Rebollo-monedero, J. Parra-arnau, and J. Forné, An Information-Theoretic Privacy Criterion for Query Forgery in Information Retrieval, Proc. Int. Conf. Secur. Technol.(SecTech), pp.146-154, 2011.
DOI : 10.1109/TIT.1978.1055892

N. Robinson and J. Bonneau, Cognitive disconnect, Proceedings of the second edition of the ACM conference on Online social networks, COSN '14, 2014.
DOI : 10.1145/2660460.2660471

F. Roesner and . Other, Detecting and defending against third-party tracking on the web

D. Rogers, How business can gain consumers' trust around data

G. Salton, A. Wong, and C. S. Yang, A vector space model for automatic indexing, Communications of the ACM, vol.18, issue.11, pp.613-620, 1975.
DOI : 10.1145/361219.361220

URL : http://ecommons.cornell.edu/bitstream/1813/6057/1/74-218.pdf

G. Sarwar and . Other, On the effectiveness of dynamic taint analysis for protecting against private information leaks on android-based devices, 10th International Conference on Security and Cryptography (SECRYPT), 2013.

P. Sayer, Adblock extension begins whitelisting " acceptable ads, 2015.

M. J. Schervish, Theory of Statistics, 1995.
DOI : 10.1007/978-1-4612-4250-5

N. Security, Path and hipster iphone apps leak sensitive data without notification . https://nakedsecurity.sophos.com/2012/02/08/apple-mobile-apps- path-and-hipster-and-leak-sensitive-data-without-notification, pp.2012-2016

S. Seneviratne, A. Seneviratne, P. Mohapatra, and A. Mahanti, Predicting user traits from a snapshot of apps installed on a smartphone. SIGMO- BILE Mob, Comput. Commun. Rev, 2014.

M. Smith, Targeted: How Technology Is Revolutionizing Advertising and the Way Companies Reach Consumers, 2014.

A. Soltani, S. Canty, Q. Mayo, L. Thomas, and C. J. Hoofnagle, Flash Cookies and Privacy, Proc. AAAI Spring Symp, 2010.
DOI : 10.2139/ssrn.1446862

URL : http://www.aaai.org/ocs/index.php/SSS/SSS10/paper/download/1070/1505/

O. Starov, J. Dahse, T. Syed-sharique-ahmad, N. Holz, and . Nikiforakis, No Honor Among Thieves, Proceedings of the 25th International Conference on World Wide Web, WWW '16, pp.1021-1032
DOI : 10.1145/2382196.2382274

L. Sweeney, Simple demographics often identify people uniquely, 2000.

L. Sweeney, Computational Disclosure Control: A Primer on Data Privacy Protection, 2001.

S. Thielman, Rise of ad-blockers shows advertising does not understand mobile, say experts, pp.2015-2025, 2015.

N. Tlc, Tlc trip record data

V. Toubiana, A. Narayanan, D. Boneh, H. Nissenbaum, and S. Barocas, Adnostic: Privacy preserving targeted advertising, Proc. IEEE Symp, pp.1-21, 2010.

H. T. , T. Truong, E. Lagerspetz, P. Nurmi, A. J. Oliner et al., The company you keep: Mobile malware infection rates and inexpensive risk indicators, WWW, 2014.

M. M. Tsang, S. C. Ho, and T. P. Liang, Consumer attitudes toward mobile advertising: An empirical study, Int. J. Electron. Commer, vol.8, issue.3, pp.65-78, 2004.

J. Turow, J. King, C. J. Hoofnagle, A. Bleakley, and M. Hennessy, Americans Reject Tailored Advertising and Three Activities that Enable It, SSRN Electronic Journal, 2009.
DOI : 10.2139/ssrn.1478214

URL : https://repository.upenn.edu/cgi/viewcontent.cgi?article=1138&context=asc_papers

A. Wächter and L. T. Biegler, On the implementation of an interior-point filter line-search algorithm for large-scale nonlinear programming, Mathematical Programming, vol.10, issue.1, pp.25-57, 2006.
DOI : 10.1007/BFb0120945

V. Woollaston, Facebook slammed after advertising funeral directors to a cancer patient, 2015.

J. Yan, N. Liu, G. Wang, W. Zhang, Y. Jiang et al., How much can behavioral targeting help online advertising?, Proceedings of the 18th international conference on World wide web, WWW '09, pp.261-270, 2009.
DOI : 10.1145/1526709.1526745

K. Yang, Y. Wu, J. Huang, X. Wang, and S. Verdu, Distributed Robust Optimization for Communication Networks, IEEE INFOCOM 2008, The 27th Conference on Computer Communications, 2008.
DOI : 10.1109/INFOCOM.2008.171

URL : http://www.princeton.edu/~verdu/reprints/YanWuHuaWanVer.ICC2008.pdf

Z. Yang, M. Yang, Y. Zhang, G. Gu, P. Ning et al., AppIntent, Proceedings of the 2013 ACM SIGSAC conference on Computer & communications security, CCS '13
DOI : 10.1145/2508859.2516676

S. Yuan, A. Z. Abidin, M. Sloan, and J. Wang, Internet advertising: An interplay among advertisers, online publishers, ad exchanges and web users. arXiv: 1206.1754, 2012. arXiv preprint. 141 [207] ZDNet. Twitter uploads contact list data without consent; retains for 18 months. http://www.zdnet.com/article/twitter-uploads-contact-list-data- without-consent-retains-for-18-months, pp.2012-2016

X. Zhou, S. Demetriou, D. He, M. Naveed, X. Pan et al., Identity, location, disease and more, Proceedings of the 2013 ACM SIGSAC conference on Computer & communications security, CCS '13
DOI : 10.1145/2508859.2516661

C. Zhu, R. H. Byrd, and J. Nocedal, Algorithm 778: L-BFGS-B: Fortran subroutines for large-scale bound-constrained optimization, ACM Transactions on Mathematical Software, vol.23, issue.4, pp.550-560, 2007.
DOI : 10.1145/279232.279236

A. M. Zoubir, V. Koivunen, Y. Chakhchoukh, and M. Muma, Robust Estimation in Signal Processing: A Tutorial-Style Treatment of Fundamental Concepts, IEEE Signal Processing Magazine, vol.29, issue.4, pp.61-80, 2012.
DOI : 10.1109/MSP.2012.2183773