{"id":"https://openalex.org/W3183606941","doi":"https://doi.org/10.1109/infocomwkshps51825.2021.9484639","title":"Using Dynamic Analysis to Automatically Detect Anti-Adblocker on the Web","display_name":"Using Dynamic Analysis to Automatically Detect Anti-Adblocker on the Web","publication_year":2021,"publication_date":"2021-05-10","ids":{"openalex":"https://openalex.org/W3183606941","doi":"https://doi.org/10.1109/infocomwkshps51825.2021.9484639","mag":"3183606941"},"language":"en","primary_location":{"id":"doi:10.1109/infocomwkshps51825.2021.9484639","is_oa":false,"landing_page_url":"https://doi.org/10.1109/infocomwkshps51825.2021.9484639","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE INFOCOM 2021 - IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5063979683","display_name":"Jingxue Sun","orcid":null},"institutions":[{"id":"https://openalex.org/I149594827","display_name":"Xidian University","ror":"https://ror.org/05s92vm98","country_code":"CN","type":"education","lineage":["https://openalex.org/I149594827"]},{"id":"https://openalex.org/I4210108629","display_name":"Computer Network Information Center","ror":"https://ror.org/01s0wyf50","country_code":"CN","type":"facility","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210108629"]},{"id":"https://openalex.org/I4210165038","display_name":"University of Chinese Academy of Sciences","ror":"https://ror.org/05qbk4x57","country_code":"CN","type":"education","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210165038"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Jingxue Sun","raw_affiliation_strings":["Xidian University,School of Cyber Engineering,Xi&#x2019;an,China","School of Cyber Engineering, Xidian University, Xi'an, China","National Computer Network Intrusion Protection Center, University of Chinese Academy of Sciences, Beijing, China"],"affiliations":[{"raw_affiliation_string":"Xidian University,School of Cyber Engineering,Xi&#x2019;an,China","institution_ids":["https://openalex.org/I149594827"]},{"raw_affiliation_string":"School of Cyber Engineering, Xidian University, Xi'an, China","institution_ids":["https://openalex.org/I149594827"]},{"raw_affiliation_string":"National Computer Network Intrusion Protection Center, University of Chinese Academy of Sciences, Beijing, China","institution_ids":["https://openalex.org/I4210108629","https://openalex.org/I4210165038"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5101473869","display_name":"Ting Yang","orcid":null},"institutions":[{"id":"https://openalex.org/I4210108629","display_name":"Computer Network Information Center","ror":"https://ror.org/01s0wyf50","country_code":"CN","type":"facility","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210108629"]},{"id":"https://openalex.org/I4210165038","display_name":"University of Chinese Academy of Sciences","ror":"https://ror.org/05qbk4x57","country_code":"CN","type":"education","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210165038"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Ting Yang","raw_affiliation_strings":["University of Chinese Academy of Sciences,National Computer Network Intrusion Protection Center,Beijing,China","National Computer Network Intrusion Protection Center, University of Chinese Academy of Sciences, Beijing, China"],"affiliations":[{"raw_affiliation_string":"University of Chinese Academy of Sciences,National Computer Network Intrusion Protection Center,Beijing,China","institution_ids":["https://openalex.org/I4210108629","https://openalex.org/I4210165038"]},{"raw_affiliation_string":"National Computer Network Intrusion Protection Center, University of Chinese Academy of Sciences, Beijing, China","institution_ids":["https://openalex.org/I4210108629","https://openalex.org/I4210165038"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5025184050","display_name":"Zhiqiu Huang","orcid":null},"institutions":[{"id":"https://openalex.org/I4210108629","display_name":"Computer Network Information Center","ror":"https://ror.org/01s0wyf50","country_code":"CN","type":"facility","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210108629"]},{"id":"https://openalex.org/I4210165038","display_name":"University of Chinese Academy of Sciences","ror":"https://ror.org/05qbk4x57","country_code":"CN","type":"education","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210165038"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Zhiqiu Huang","raw_affiliation_strings":["University of Chinese Academy of Sciences,National Computer Network Intrusion Protection Center,Beijing,China","National Computer Network Intrusion Protection Center, University of Chinese Academy of Sciences, Beijing, China"],"affiliations":[{"raw_affiliation_string":"University of Chinese Academy of Sciences,National Computer Network Intrusion Protection Center,Beijing,China","institution_ids":["https://openalex.org/I4210108629","https://openalex.org/I4210165038"]},{"raw_affiliation_string":"National Computer Network Intrusion Protection Center, University of Chinese Academy of Sciences, Beijing, China","institution_ids":["https://openalex.org/I4210108629","https://openalex.org/I4210165038"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5079084953","display_name":"Wengjie Wang","orcid":null},"institutions":[{"id":"https://openalex.org/I4210108629","display_name":"Computer Network Information Center","ror":"https://ror.org/01s0wyf50","country_code":"CN","type":"facility","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210108629"]},{"id":"https://openalex.org/I4210165038","display_name":"University of Chinese Academy of Sciences","ror":"https://ror.org/05qbk4x57","country_code":"CN","type":"education","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210165038"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Wengjie Wang","raw_affiliation_strings":["University of Chinese Academy of Sciences,National Computer Network Intrusion Protection Center,Beijing,China","National Computer Network Intrusion Protection Center, University of Chinese Academy of Sciences, Beijing, China"],"affiliations":[{"raw_affiliation_string":"University of Chinese Academy of Sciences,National Computer Network Intrusion Protection Center,Beijing,China","institution_ids":["https://openalex.org/I4210108629","https://openalex.org/I4210165038"]},{"raw_affiliation_string":"National Computer Network Intrusion Protection Center, University of Chinese Academy of Sciences, Beijing, China","institution_ids":["https://openalex.org/I4210108629","https://openalex.org/I4210165038"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5100401884","display_name":"Yuqing Zhang","orcid":null},"institutions":[{"id":"https://openalex.org/I149594827","display_name":"Xidian University","ror":"https://ror.org/05s92vm98","country_code":"CN","type":"education","lineage":["https://openalex.org/I149594827"]},{"id":"https://openalex.org/I20942203","display_name":"Hainan University","ror":"https://ror.org/03q648j11","country_code":"CN","type":"education","lineage":["https://openalex.org/I20942203"]},{"id":"https://openalex.org/I4210108629","display_name":"Computer Network Information Center","ror":"https://ror.org/01s0wyf50","country_code":"CN","type":"facility","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210108629"]},{"id":"https://openalex.org/I4210165038","display_name":"University of Chinese Academy of Sciences","ror":"https://ror.org/05qbk4x57","country_code":"CN","type":"education","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210165038"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Yuqing Zhang","raw_affiliation_strings":["Xidian University,School of Cyber Engineering,Xi&#x2019;an,China","National Computer Network Intrusion Protection Center, University of Chinese Academy of Sciences, Beijing, China","School of Computer Science and Cyberspace Security, Hainan University, Haikou, China","School of Cyber Engineering, Xidian University, Xi'an, China"],"affiliations":[{"raw_affiliation_string":"Xidian University,School of Cyber Engineering,Xi&#x2019;an,China","institution_ids":["https://openalex.org/I149594827"]},{"raw_affiliation_string":"National Computer Network Intrusion Protection Center, University of Chinese Academy of Sciences, Beijing, China","institution_ids":["https://openalex.org/I4210108629","https://openalex.org/I4210165038"]},{"raw_affiliation_string":"School of Computer Science and Cyberspace Security, Hainan University, Haikou, China","institution_ids":["https://openalex.org/I20942203"]},{"raw_affiliation_string":"School of Cyber Engineering, Xidian University, Xi'an, China","institution_ids":["https://openalex.org/I149594827"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":5,"corresponding_author_ids":["https://openalex.org/A5063979683"],"corresponding_institution_ids":["https://openalex.org/I149594827","https://openalex.org/I4210108629","https://openalex.org/I4210165038"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.13559264,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":null,"issue":null,"first_page":"1","last_page":"6"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11644","display_name":"Spam and Phishing Detection","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11644","display_name":"Spam and Phishing Detection","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9997000098228455,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11598","display_name":"Internet Traffic Analysis and Secure E-voting","score":0.9993000030517578,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/blacklist","display_name":"Blacklist","score":0.9249298572540283},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7872532606124878},{"id":"https://openalex.org/keywords/javascript","display_name":"JavaScript","score":0.6440519690513611},{"id":"https://openalex.org/keywords/counterattack","display_name":"Counterattack","score":0.5719865560531616},{"id":"https://openalex.org/keywords/static-analysis","display_name":"Static analysis","score":0.5613343119621277},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.46575528383255005},{"id":"https://openalex.org/keywords/web-application","display_name":"Web application","score":0.4633057713508606},{"id":"https://openalex.org/keywords/the-internet","display_name":"The Internet","score":0.44246217608451843},{"id":"https://openalex.org/keywords/information-leakage","display_name":"Information leakage","score":0.43473243713378906},{"id":"https://openalex.org/keywords/workload","display_name":"Workload","score":0.43284493684768677},{"id":"https://openalex.org/keywords/false-positive-paradox","display_name":"False positive paradox","score":0.41566142439842224},{"id":"https://openalex.org/keywords/dynamic-program-analysis","display_name":"Dynamic program analysis","score":0.4100706875324249},{"id":"https://openalex.org/keywords/world-wide-web","display_name":"World Wide Web","score":0.375897079706192},{"id":"https://openalex.org/keywords/machine-learning","display_name":"Machine learning","score":0.29794108867645264},{"id":"https://openalex.org/keywords/program-analysis","display_name":"Program analysis","score":0.2488659918308258},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.19152653217315674}],"concepts":[{"id":"https://openalex.org/C2781345505","wikidata":"https://www.wikidata.org/wiki/Q2535979","display_name":"Blacklist","level":2,"score":0.9249298572540283},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7872532606124878},{"id":"https://openalex.org/C544833334","wikidata":"https://www.wikidata.org/wiki/Q2005","display_name":"JavaScript","level":2,"score":0.6440519690513611},{"id":"https://openalex.org/C2776617961","wikidata":"https://www.wikidata.org/wiki/Q2329143","display_name":"Counterattack","level":2,"score":0.5719865560531616},{"id":"https://openalex.org/C97686452","wikidata":"https://www.wikidata.org/wiki/Q7604153","display_name":"Static analysis","level":2,"score":0.5613343119621277},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.46575528383255005},{"id":"https://openalex.org/C118643609","wikidata":"https://www.wikidata.org/wiki/Q189210","display_name":"Web application","level":2,"score":0.4633057713508606},{"id":"https://openalex.org/C110875604","wikidata":"https://www.wikidata.org/wiki/Q75","display_name":"The Internet","level":2,"score":0.44246217608451843},{"id":"https://openalex.org/C2779201187","wikidata":"https://www.wikidata.org/wiki/Q2775060","display_name":"Information leakage","level":2,"score":0.43473243713378906},{"id":"https://openalex.org/C2778476105","wikidata":"https://www.wikidata.org/wiki/Q628539","display_name":"Workload","level":2,"score":0.43284493684768677},{"id":"https://openalex.org/C64869954","wikidata":"https://www.wikidata.org/wiki/Q1859747","display_name":"False positive paradox","level":2,"score":0.41566142439842224},{"id":"https://openalex.org/C140006998","wikidata":"https://www.wikidata.org/wiki/Q2499307","display_name":"Dynamic program analysis","level":3,"score":0.4100706875324249},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.375897079706192},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.29794108867645264},{"id":"https://openalex.org/C98183937","wikidata":"https://www.wikidata.org/wiki/Q2112188","display_name":"Program analysis","level":2,"score":0.2488659918308258},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.19152653217315674},{"id":"https://openalex.org/C199539241","wikidata":"https://www.wikidata.org/wiki/Q7748","display_name":"Law","level":1,"score":0.0},{"id":"https://openalex.org/C17744445","wikidata":"https://www.wikidata.org/wiki/Q36442","display_name":"Political science","level":0,"score":0.0},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/infocomwkshps51825.2021.9484639","is_oa":false,"landing_page_url":"https://doi.org/10.1109/infocomwkshps51825.2021.9484639","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE INFOCOM 2021 - IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"score":0.550000011920929,"display_name":"Peace, Justice and strong institutions","id":"https://metadata.un.org/sdg/16"}],"awards":[],"funders":[{"id":"https://openalex.org/F4320321001","display_name":"National Natural Science Foundation of China","ror":"https://ror.org/01h0zpd94"}],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":31,"referenced_works":["https://openalex.org/W1543320899","https://openalex.org/W1861683694","https://openalex.org/W1992470436","https://openalex.org/W2000137535","https://openalex.org/W2019821286","https://openalex.org/W2021408682","https://openalex.org/W2072909393","https://openalex.org/W2124436456","https://openalex.org/W2146707221","https://openalex.org/W2159764755","https://openalex.org/W2245045651","https://openalex.org/W2403346161","https://openalex.org/W2467763829","https://openalex.org/W2520877058","https://openalex.org/W2550217406","https://openalex.org/W2618707398","https://openalex.org/W2733782703","https://openalex.org/W2771031712","https://openalex.org/W2790562154","https://openalex.org/W2804550199","https://openalex.org/W2899284053","https://openalex.org/W2963591761","https://openalex.org/W4241402623","https://openalex.org/W4293399345","https://openalex.org/W4295115786","https://openalex.org/W6632659584","https://openalex.org/W6681435262","https://openalex.org/W6712472116","https://openalex.org/W6713263478","https://openalex.org/W6738314117","https://openalex.org/W6752244527"],"related_works":["https://openalex.org/W2104654077","https://openalex.org/W2064747932","https://openalex.org/W2022689150","https://openalex.org/W4235336797","https://openalex.org/W1557280686","https://openalex.org/W3111646971","https://openalex.org/W2969365378","https://openalex.org/W2049461947","https://openalex.org/W1558363615","https://openalex.org/W3183606941"],"abstract_inverted_index":{"With":[0],"the":[1,14,27,50,78,87,100,130,144,148,169,196,210],"continuous":[2],"development":[3],"of":[4,18,29,45,52,80,86,104,138,150,177,207],"Internet":[5],"technology,":[6],"there":[7],"are":[8,34],"more":[9,11],"and":[10,16,22,55,61,72,102,113,153,184],"advertisements":[12,39,47],"on":[13,40,70,209],"website":[15],"some":[17],"them":[19],"can":[20,134,200],"track":[21],"monitor":[23],"users.":[24],"To":[25],"avoid":[26,202],"leakage":[28],"privacy":[30],"information,":[31],"many":[32],"people":[33],"using":[35,179],"adblockers":[36],"to":[37,59,75,91,95,115,173,189],"remove":[38],"web":[41],"pages.":[42],"This":[43,117,140],"behavior":[44,157],"filtering":[46,73],"seriously":[48],"threatens":[49],"benefits":[51],"online":[53,81],"publishers,":[54],"they":[56,162],"have":[57],"begun":[58],"detect":[60],"counterattack":[62],"users":[63],"who":[64],"use":[65,185],"adblockers.":[66],"Previous":[67],"work":[68],"focused":[69],"detecting":[71],"anti-adblockers":[74,93,178],"fight":[76],"against":[77],"counterattacks":[79],"publishers.":[82],"So":[83],"far,":[84],"one":[85],"most":[88],"effective":[89],"ways":[90],"prevent":[92],"is":[94,111,129,213],"create":[96],"a":[97,120,175],"blacklist.":[98],"However,":[99],"generation":[101],"maintenance":[103],"blacklists":[105,137],"involve":[106],"considerable":[107],"manual":[108,145],"work,":[109],"which":[110,128],"inefficient":[112],"difficult":[114],"maintain.":[116],"paper":[118],"proposes":[119],"machine":[121],"learning":[122],"anti-adblocker":[123],"detection":[124,156],"system":[125,132,141],"called":[126],"ABDetector,":[127],"first":[131,170],"that":[133,161],"automatically":[135],"generate":[136],"anti-adblockers.":[139],"greatly":[142],"reduces":[143],"workload.":[146],"Since":[147],"difference":[149],"code":[151,203],"with":[152],"without":[154],"anti-adblocking":[155],"mainly":[158],"lies":[159],"in":[160],"call":[163],"different":[164],"APIs,":[165],"thus,":[166],"we":[167],"for":[168],"time":[171],"tried":[172],"build":[174],"classifier":[176],"JavaScript":[180],"APIs":[181],"as":[182],"features":[183],"dynamic":[186,197],"analysis":[187,194,198],"method":[188,199],"extract":[190],"features.":[191],"Unlike":[192],"static":[193],"method,":[195],"effectively":[201],"obfuscation.":[204],"The":[205],"accuracy":[206],"ABDetector":[208],"test":[211],"set":[212],"81.46%.":[214]},"counts_by_year":[],"updated_date":"2026-01-28T23:14:49.684275","created_date":"2025-10-10T00:00:00"}
