{"id":"https://openalex.org/W3214188458","doi":"https://doi.org/10.1145/3460120.3484547","title":"Understanding and Detecting Mobile Ad Fraud Through the Lens of Invalid Traffic","display_name":"Understanding and Detecting Mobile Ad Fraud Through the Lens of Invalid Traffic","publication_year":2021,"publication_date":"2021-11-12","ids":{"openalex":"https://openalex.org/W3214188458","doi":"https://doi.org/10.1145/3460120.3484547","mag":"3214188458"},"language":"en","primary_location":{"id":"doi:10.1145/3460120.3484547","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3460120.3484547","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 2021 ACM SIGSAC Conference on Computer and Communications Security","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5013433550","display_name":"Suibin Sun","orcid":null},"institutions":[{"id":"https://openalex.org/I183067930","display_name":"Shanghai Jiao Tong University","ror":"https://ror.org/0220qvk04","country_code":"CN","type":"education","lineage":["https://openalex.org/I183067930"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Suibin Sun","raw_affiliation_strings":["Shanghai Jiao Tong University, Shanghai, China"],"affiliations":[{"raw_affiliation_string":"Shanghai Jiao Tong University, Shanghai, China","institution_ids":["https://openalex.org/I183067930"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100513240","display_name":"Le Yu","orcid":"https://orcid.org/0009-0004-2673-9281"},"institutions":[{"id":"https://openalex.org/I183067930","display_name":"Shanghai Jiao Tong University","ror":"https://ror.org/0220qvk04","country_code":"CN","type":"education","lineage":["https://openalex.org/I183067930"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Le Yu","raw_affiliation_strings":["Shanghai Jiao Tong University, Shanghai, China"],"affiliations":[{"raw_affiliation_string":"Shanghai Jiao Tong University, Shanghai, China","institution_ids":["https://openalex.org/I183067930"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5071738824","display_name":"Xiaokuan Zhang","orcid":"https://orcid.org/0000-0002-4646-7146"},"institutions":[{"id":"https://openalex.org/I52357470","display_name":"The Ohio State University","ror":"https://ror.org/00rs6vg23","country_code":"US","type":"education","lineage":["https://openalex.org/I52357470"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Xiaokuan Zhang","raw_affiliation_strings":["The Ohio State University, Columbus, OH, USA"],"affiliations":[{"raw_affiliation_string":"The Ohio State University, Columbus, OH, USA","institution_ids":["https://openalex.org/I52357470"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5009850797","display_name":"Minhui Xue","orcid":"https://orcid.org/0000-0002-9172-4252"},"institutions":[{"id":"https://openalex.org/I5681781","display_name":"University of Adelaide","ror":"https://ror.org/00892tw58","country_code":"AU","type":"education","lineage":["https://openalex.org/I5681781"]}],"countries":["AU"],"is_corresponding":false,"raw_author_name":"Minhui Xue","raw_affiliation_strings":["The University of Adelaide, Adelaide, SA, Australia"],"affiliations":[{"raw_affiliation_string":"The University of Adelaide, Adelaide, SA, Australia","institution_ids":["https://openalex.org/I5681781"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5113520657","display_name":"Ren Zhou","orcid":null},"institutions":[{"id":"https://openalex.org/I183067930","display_name":"Shanghai Jiao Tong University","ror":"https://ror.org/0220qvk04","country_code":"CN","type":"education","lineage":["https://openalex.org/I183067930"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Ren Zhou","raw_affiliation_strings":["Shanghai Jiao Tong University, Shanghai, China"],"affiliations":[{"raw_affiliation_string":"Shanghai Jiao Tong University, Shanghai, China","institution_ids":["https://openalex.org/I183067930"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5039106671","display_name":"Haojin Zhu","orcid":"https://orcid.org/0000-0001-5079-4556"},"institutions":[{"id":"https://openalex.org/I183067930","display_name":"Shanghai Jiao Tong University","ror":"https://ror.org/0220qvk04","country_code":"CN","type":"education","lineage":["https://openalex.org/I183067930"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Haojin Zhu","raw_affiliation_strings":["Shanghai Jiao Tong University, Shanghai, China"],"affiliations":[{"raw_affiliation_string":"Shanghai Jiao Tong University, Shanghai, China","institution_ids":["https://openalex.org/I183067930"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5027549447","display_name":"Shuang Hao","orcid":"https://orcid.org/0000-0003-2756-6015"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Shuang Hao","raw_affiliation_strings":["University of Texas at Dallas, Dallas, TX, USA"],"affiliations":[{"raw_affiliation_string":"University of Texas at Dallas, Dallas, TX, USA","institution_ids":[]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5083787204","display_name":"Xiaodong Lin","orcid":"https://orcid.org/0000-0001-8916-6645"},"institutions":[{"id":"https://openalex.org/I79817857","display_name":"University of Guelph","ror":"https://ror.org/01r7awg59","country_code":"CA","type":"education","lineage":["https://openalex.org/I79817857"]}],"countries":["CA"],"is_corresponding":false,"raw_author_name":"Xiaodong Lin","raw_affiliation_strings":["University of Guelph, Guelph, Canada"],"affiliations":[{"raw_affiliation_string":"University of Guelph, Guelph, Canada","institution_ids":["https://openalex.org/I79817857"]}]}],"institutions":[],"countries_distinct_count":4,"institutions_distinct_count":8,"corresponding_author_ids":["https://openalex.org/A5013433550"],"corresponding_institution_ids":["https://openalex.org/I183067930"],"apc_list":null,"apc_paid":null,"fwci":3.3049,"has_fulltext":false,"cited_by_count":22,"citation_normalized_percentile":{"value":0.93179708,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":89,"max":99},"biblio":{"volume":null,"issue":null,"first_page":"287","last_page":"303"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11644","display_name":"Spam and Phishing Detection","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11644","display_name":"Spam and Phishing Detection","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9994999766349792,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11598","display_name":"Internet Traffic Analysis and Secure E-voting","score":0.9988999962806702,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8129395246505737},{"id":"https://openalex.org/keywords/cluster-analysis","display_name":"Cluster analysis","score":0.606963574886322},{"id":"https://openalex.org/keywords/mobile-device","display_name":"Mobile device","score":0.5637363791465759},{"id":"https://openalex.org/keywords/popularity","display_name":"Popularity","score":0.5085185766220093},{"id":"https://openalex.org/keywords/cheating","display_name":"Cheating","score":0.4959035813808441},{"id":"https://openalex.org/keywords/drone","display_name":"Drone","score":0.4611392915248871},{"id":"https://openalex.org/keywords/classifier","display_name":"Classifier (UML)","score":0.4594060480594635},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.4321518540382385},{"id":"https://openalex.org/keywords/bidding","display_name":"Bidding","score":0.4253411293029785},{"id":"https://openalex.org/keywords/world-wide-web","display_name":"World Wide Web","score":0.2827509641647339},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.2559981048107147}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8129395246505737},{"id":"https://openalex.org/C73555534","wikidata":"https://www.wikidata.org/wiki/Q622825","display_name":"Cluster analysis","level":2,"score":0.606963574886322},{"id":"https://openalex.org/C186967261","wikidata":"https://www.wikidata.org/wiki/Q5082128","display_name":"Mobile device","level":2,"score":0.5637363791465759},{"id":"https://openalex.org/C2780586970","wikidata":"https://www.wikidata.org/wiki/Q1357284","display_name":"Popularity","level":2,"score":0.5085185766220093},{"id":"https://openalex.org/C2778024590","wikidata":"https://www.wikidata.org/wiki/Q2357432","display_name":"Cheating","level":2,"score":0.4959035813808441},{"id":"https://openalex.org/C59519942","wikidata":"https://www.wikidata.org/wiki/Q650665","display_name":"Drone","level":2,"score":0.4611392915248871},{"id":"https://openalex.org/C95623464","wikidata":"https://www.wikidata.org/wiki/Q1096149","display_name":"Classifier (UML)","level":2,"score":0.4594060480594635},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.4321518540382385},{"id":"https://openalex.org/C9233905","wikidata":"https://www.wikidata.org/wiki/Q3276328","display_name":"Bidding","level":2,"score":0.4253411293029785},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.2827509641647339},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.2559981048107147},{"id":"https://openalex.org/C86803240","wikidata":"https://www.wikidata.org/wiki/Q420","display_name":"Biology","level":0,"score":0.0},{"id":"https://openalex.org/C77805123","wikidata":"https://www.wikidata.org/wiki/Q161272","display_name":"Social psychology","level":1,"score":0.0},{"id":"https://openalex.org/C54355233","wikidata":"https://www.wikidata.org/wiki/Q7162","display_name":"Genetics","level":1,"score":0.0},{"id":"https://openalex.org/C144133560","wikidata":"https://www.wikidata.org/wiki/Q4830453","display_name":"Business","level":0,"score":0.0},{"id":"https://openalex.org/C162853370","wikidata":"https://www.wikidata.org/wiki/Q39809","display_name":"Marketing","level":1,"score":0.0},{"id":"https://openalex.org/C15744967","wikidata":"https://www.wikidata.org/wiki/Q9418","display_name":"Psychology","level":0,"score":0.0}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1145/3460120.3484547","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3460120.3484547","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 2021 ACM SIGSAC Conference on Computer and Communications Security","raw_type":"proceedings-article"},{"id":"pmh:oai:digital.library.adelaide.edu.au:2440/135346","is_oa":false,"landing_page_url":"https://hdl.handle.net/2440/135346","pdf_url":null,"source":{"id":"https://openalex.org/S4306401835","display_name":"Adelaide Research & Scholarship (AR&S) (University of Adelaide)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I5681781","host_organization_name":"The University of Adelaide","host_organization_lineage":["https://openalex.org/I5681781"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"https://dl.acm.org/doi/proceedings/10.1145/3460120","raw_type":"Conference paper"}],"best_oa_location":null,"sustainable_development_goals":[{"display_name":"Partnerships for the goals","id":"https://metadata.un.org/sdg/17","score":0.41999998688697815}],"awards":[{"id":"https://openalex.org/G2245686519","display_name":null,"funder_award_id":"61972453?62132013","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G311853563","display_name":null,"funder_award_id":"DP210102670","funder_id":"https://openalex.org/F4320334704","funder_display_name":"Australian Research Council"}],"funders":[{"id":"https://openalex.org/F4320321001","display_name":"National Natural Science Foundation of China","ror":"https://ror.org/01h0zpd94"},{"id":"https://openalex.org/F4320334704","display_name":"Australian Research Council","ror":"https://ror.org/05mmh0f86"}],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":29,"referenced_works":["https://openalex.org/W369254515","https://openalex.org/W1501049730","https://openalex.org/W1539523973","https://openalex.org/W1835342030","https://openalex.org/W1943546595","https://openalex.org/W1987210879","https://openalex.org/W2025827699","https://openalex.org/W2096697338","https://openalex.org/W2097470225","https://openalex.org/W2097723548","https://openalex.org/W2099937944","https://openalex.org/W2131681506","https://openalex.org/W2153635508","https://openalex.org/W2165613200","https://openalex.org/W2230660382","https://openalex.org/W2235660311","https://openalex.org/W2768348081","https://openalex.org/W2885724541","https://openalex.org/W2903158431","https://openalex.org/W2912527185","https://openalex.org/W2930110112","https://openalex.org/W2949838346","https://openalex.org/W2951116536","https://openalex.org/W2962736666","https://openalex.org/W2966320414","https://openalex.org/W2997591727","https://openalex.org/W3003859677","https://openalex.org/W3025338395","https://openalex.org/W3099768174"],"related_works":["https://openalex.org/W2012288173","https://openalex.org/W1968538666","https://openalex.org/W2097662580","https://openalex.org/W4229448053","https://openalex.org/W3199302685","https://openalex.org/W2344072770","https://openalex.org/W2389163612","https://openalex.org/W2065650938","https://openalex.org/W4247925126","https://openalex.org/W2365256465"],"abstract_inverted_index":{"Along":[0],"with":[1,63,107,197],"gaining":[2],"popularity":[3],"of":[4,32,53,79,179],"Real-Time":[5],"Bidding":[6],"(RTB)":[7],"based":[8,14,57,130],"programmatic":[9],"advertising,":[10],"the":[11,33,48,54,67,82,86,177,186],"click":[12,55,160],"farm":[13,56],"invalid":[15,58],"traffic,":[16],"which":[17,75],"leverages":[18],"massive":[19],"real":[20],"smartphones":[21],"to":[22,121,184,203],"carry":[23],"out":[24],"large-scale":[25,51],"ad":[26,103,200],"fraud":[27],"campaigns,":[28],"is":[29],"becoming":[30],"one":[31],"major":[34],"threats":[35],"against":[36],"online":[37],"advertisement.":[38],"In":[39],"this":[40],"study,":[41],"we":[42,93,162],"take":[43],"an":[44],"initial":[45],"step":[46],"towards":[47],"detection":[49],"and":[50,124,135,148,181],"measurement":[52,65],"traffic.":[59],"Our":[60],"study":[61],"begins":[62],"a":[64,71,77,96,108,119,152,158,190,198],"on":[66,90,110,131,151],"device's":[68],"features":[69,80],"using":[70],"real-world":[72,153,191],"labeled":[73,154],"dataset,":[74],"reveals":[76],"series":[78],"distinguishing":[81],"fraudulent":[83,100,112,123,172],"devices":[84,101,129,138],"from":[85],"benign":[87,125],"ones.":[88],"Based":[89],"these":[91],"features,":[92],"develop":[94],"EvilHunter,":[95],"system":[97],"for":[98],"detecting":[99],"through":[102,141],"bid":[104],"request":[105],"logs":[106],"focus":[109],"clustering":[111,128],"devices.":[113],"EvilHunter":[114,144,180,188,205],"functions":[115],"by":[116,171],"1)":[117],"building":[118],"classifier":[120],"distinguish":[122],"devices;":[126],"2)":[127],"app":[132],"usage":[133],"patterns;":[134],"3)":[136],"relabeling":[137],"in":[139,189,195],"clusters":[140],"majority":[142],"voting.":[143],"demonstrates":[145],"97%":[146],"precision":[147],"95%":[149],"recall":[150],"dataset.":[155],"By":[156],"investigating":[157],"super":[159],"farm,":[161],"reveal":[163],"several":[164],"cheating":[165],"strategies":[166],"that":[167],"are":[168,194],"commonly":[169],"adopted":[170],"clusters.":[173],"We":[174,193],"further":[175],"reduce":[176],"overhead":[178],"discuss":[182],"how":[183],"deploy":[185],"optimized":[187],"system.":[192],"partnership":[196],"leading":[199],"verification":[201],"company":[202],"integrate":[204],"into":[206],"their":[207],"industrial":[208],"platform.":[209]},"counts_by_year":[{"year":2025,"cited_by_count":10},{"year":2024,"cited_by_count":5},{"year":2023,"cited_by_count":2},{"year":2022,"cited_by_count":4},{"year":2021,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
