{"id":"https://openalex.org/W4404392058","doi":"https://doi.org/10.1145/3719027.3765191","title":"Automatically Detecting Online Deceptive Patterns","display_name":"Automatically Detecting Online Deceptive Patterns","publication_year":2025,"publication_date":"2025-11-19","ids":{"openalex":"https://openalex.org/W4404392058","doi":"https://doi.org/10.1145/3719027.3765191"},"language":"en","primary_location":{"id":"doi:10.1145/3719027.3765191","is_oa":true,"landing_page_url":"https://doi.org/10.1145/3719027.3765191","pdf_url":"https://dl.acm.org/doi/pdf/10.1145/3719027.3765191","source":null,"license":"cc-by-nc","license_id":"https://openalex.org/licenses/cc-by-nc","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 2025 ACM SIGSAC Conference on Computer and Communications Security","raw_type":"proceedings-article"},"type":"preprint","indexed_in":["arxiv","crossref","datacite"],"open_access":{"is_oa":true,"oa_status":"gold","oa_url":"https://dl.acm.org/doi/pdf/10.1145/3719027.3765191","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5079194336","display_name":"Asmit Nayak","orcid":"https://orcid.org/0009-0005-7143-2892"},"institutions":[{"id":"https://openalex.org/I135310074","display_name":"University of Wisconsin\u2013Madison","ror":"https://ror.org/01y2jtd41","country_code":"US","type":"education","lineage":["https://openalex.org/I135310074"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Asmit Nayak","raw_affiliation_strings":["University of Wisconsin-Madison, Madison, USA"],"affiliations":[{"raw_affiliation_string":"University of Wisconsin-Madison, Madison, USA","institution_ids":["https://openalex.org/I135310074"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5084372968","display_name":"Yash Wani","orcid":"https://orcid.org/0000-0003-0827-9598"},"institutions":[{"id":"https://openalex.org/I135310074","display_name":"University of Wisconsin\u2013Madison","ror":"https://ror.org/01y2jtd41","country_code":"US","type":"education","lineage":["https://openalex.org/I135310074"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Yash Wani","raw_affiliation_strings":["University of Wisconsin-Madison, Madison, USA"],"affiliations":[{"raw_affiliation_string":"University of Wisconsin-Madison, Madison, USA","institution_ids":["https://openalex.org/I135310074"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5024402721","display_name":"Shirley Zhang","orcid":"https://orcid.org/0009-0000-5810-1347"},"institutions":[{"id":"https://openalex.org/I135310074","display_name":"University of Wisconsin\u2013Madison","ror":"https://ror.org/01y2jtd41","country_code":"US","type":"education","lineage":["https://openalex.org/I135310074"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Shirley Zhang","raw_affiliation_strings":["University of Wisconsin-Madison, Madison, USA"],"affiliations":[{"raw_affiliation_string":"University of Wisconsin-Madison, Madison, USA","institution_ids":["https://openalex.org/I135310074"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5103085010","display_name":"Rishabh Khandelwal","orcid":"https://orcid.org/0000-0003-3276-5764"},"institutions":[{"id":"https://openalex.org/I135310074","display_name":"University of Wisconsin\u2013Madison","ror":"https://ror.org/01y2jtd41","country_code":"US","type":"education","lineage":["https://openalex.org/I135310074"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Rishabh Khandelwal","raw_affiliation_strings":["University of Wisconsin - Madison, Madison, USA"],"affiliations":[{"raw_affiliation_string":"University of Wisconsin - Madison, Madison, USA","institution_ids":["https://openalex.org/I135310074"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5042450214","display_name":"Kassem Fawaz","orcid":"https://orcid.org/0000-0002-4609-7691"},"institutions":[{"id":"https://openalex.org/I135310074","display_name":"University of Wisconsin\u2013Madison","ror":"https://ror.org/01y2jtd41","country_code":"US","type":"education","lineage":["https://openalex.org/I135310074"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Kassem Fawaz","raw_affiliation_strings":["University of Wisconsin-Madison, Madison, USA"],"affiliations":[{"raw_affiliation_string":"University of Wisconsin-Madison, Madison, USA","institution_ids":["https://openalex.org/I135310074"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":5,"corresponding_author_ids":["https://openalex.org/A5079194336"],"corresponding_institution_ids":["https://openalex.org/I135310074"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":true,"cited_by_count":0,"citation_normalized_percentile":{"value":0.00113408,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":null,"issue":null,"first_page":"96","last_page":"110"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9958000183105469,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9958000183105469,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9797000288963318,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11689","display_name":"Adversarial Robustness in Machine Learning","score":0.9485999941825867,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.5997857451438904}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.5997857451438904}],"mesh":[],"locations_count":3,"locations":[{"id":"doi:10.1145/3719027.3765191","is_oa":true,"landing_page_url":"https://doi.org/10.1145/3719027.3765191","pdf_url":"https://dl.acm.org/doi/pdf/10.1145/3719027.3765191","source":null,"license":"cc-by-nc","license_id":"https://openalex.org/licenses/cc-by-nc","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 2025 ACM SIGSAC Conference on Computer and Communications Security","raw_type":"proceedings-article"},{"id":"pmh:oai:arXiv.org:2411.07441","is_oa":true,"landing_page_url":"http://arxiv.org/abs/2411.07441","pdf_url":"https://arxiv.org/pdf/2411.07441","source":{"id":"https://openalex.org/S4306400194","display_name":"arXiv (Cornell University)","issn_l":null,"issn":null,"is_oa":true,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I205783295","host_organization_name":"Cornell University","host_organization_lineage":["https://openalex.org/I205783295"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":null,"raw_type":"text"},{"id":"doi:10.48550/arxiv.2411.07441","is_oa":true,"landing_page_url":"https://doi.org/10.48550/arxiv.2411.07441","pdf_url":null,"source":{"id":"https://openalex.org/S4306400194","display_name":"arXiv (Cornell University)","issn_l":null,"issn":null,"is_oa":true,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I205783295","host_organization_name":"Cornell University","host_organization_lineage":["https://openalex.org/I205783295"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":null,"is_accepted":false,"is_published":null,"raw_source_name":null,"raw_type":"article"}],"best_oa_location":{"id":"doi:10.1145/3719027.3765191","is_oa":true,"landing_page_url":"https://doi.org/10.1145/3719027.3765191","pdf_url":"https://dl.acm.org/doi/pdf/10.1145/3719027.3765191","source":null,"license":"cc-by-nc","license_id":"https://openalex.org/licenses/cc-by-nc","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 2025 ACM SIGSAC Conference on Computer and Communications Security","raw_type":"proceedings-article"},"sustainable_development_goals":[],"awards":[{"id":"https://openalex.org/G1186937663","display_name":null,"funder_award_id":"194201","funder_id":"https://openalex.org/F4320306076","funder_display_name":"National Science Foundation"},{"id":"https://openalex.org/G4236254374","display_name":"CAREER: Presentation and Mitigation of Privacy Risks for Online Users","funder_award_id":"1942014","funder_id":"https://openalex.org/F4320306076","funder_display_name":"National Science Foundation"},{"id":"https://openalex.org/G6755165505","display_name":null,"funder_award_id":"award","funder_id":"https://openalex.org/F4320306076","funder_display_name":"National Science Foundation"},{"id":"https://openalex.org/G848032724","display_name":null,"funder_award_id":"Science","funder_id":"https://openalex.org/F4320306076","funder_display_name":"National Science Foundation"},{"id":"https://openalex.org/G875600971","display_name":"SaTC: CORE: Medium: Designing Privacy-Aware Social Companion Robots","funder_award_id":"2247381","funder_id":"https://openalex.org/F4320306076","funder_display_name":"National Science Foundation"}],"funders":[{"id":"https://openalex.org/F4320306076","display_name":"National Science Foundation","ror":"https://ror.org/021nxhr62"}],"has_content":{"pdf":true,"grobid_xml":true},"content_urls":{"pdf":"https://content.openalex.org/works/W4404392058.pdf","grobid_xml":"https://content.openalex.org/works/W4404392058.grobid-xml"},"referenced_works_count":0,"referenced_works":[],"related_works":["https://openalex.org/W4391375266","https://openalex.org/W2899084033","https://openalex.org/W2748952813","https://openalex.org/W2390279801","https://openalex.org/W4391913857","https://openalex.org/W2358668433","https://openalex.org/W4396701345","https://openalex.org/W2376932109","https://openalex.org/W2001405890","https://openalex.org/W4396696052"],"abstract_inverted_index":{"Deceptive":[0],"patterns":[1,18,31,74,161],"in":[2,43,158,170],"digital":[3,24],"interfaces":[4],"manipulate":[5],"users":[6],"into":[7],"making":[8],"unintended":[9],"decisions,":[10],"exploiting":[11],"cognitive":[12],"biases":[13],"and":[14,36,46,58,63,71,108],"psychological":[15],"vulnerabilities.":[16],"These":[17],"have":[19,32],"become":[20],"ubiquitous":[21],"on":[22,83,162],"various":[23],"platforms.":[25],"While":[26],"efforts":[27],"to":[28,54,101,125,136,141,147],"mitigate":[29,64],"deceptive":[30,66,73,130,160,183],"emerged":[33],"from":[34,75,144],"legal":[35],"technical":[37],"perspectives,":[38],"a":[39,76,79,90,114,138],"significant":[40],"gap":[41,57],"remains":[42],"creating":[44],"usable":[45],"scalable":[47],"solutions.":[48],"We":[49,132],"introduce":[50],"our":[51],"AutoBot":[52,68,88,118],"framework":[53],"address":[55],"this":[56,171],"help":[59],"web":[60],"stakeholders":[61],"navigate":[62],"online":[65,182],"patterns.":[67,131,184],"accurately":[69],"identifies":[70],"localizes":[72],"screenshot":[77],"of":[78,97,129,168],"website":[80,103],"without":[81],"relying":[82],"the":[84,95,120,127,163],"underlying":[85],"HTML":[86],"code.":[87],"employs":[89],"two-stage":[91],"pipeline":[92],"that":[93],"leverages":[94],"capabilities":[96],"specialized":[98],"vision":[99],"models":[100],"analyze":[102],"screenshots,":[104],"identify":[105],"interactive":[106],"elements,":[107],"extract":[109],"textual":[110],"features.":[111],"Next,":[112],"using":[113],"large":[115],"language":[116,149],"model,":[117],"understands":[119],"context":[121],"surrounding":[122],"these":[123],"elements":[124],"determine":[126],"presence":[128],"also":[133],"use":[134],"AutoBot,":[135],"create":[137],"synthetic":[139],"dataset":[140],"distill":[142],"knowledge":[143],"'teacher'":[145],"LLMs":[146],"smaller":[148],"models.":[150],"Through":[151],"extensive":[152],"evaluation,":[153],"we":[154],"demonstrate":[155],"AutoBot's":[156],"effectiveness":[157],"detecting":[159],"web,":[164],"achieving":[165],"an":[166,177],"F1-score":[167],"0.93":[169],"task,":[172],"underscoring":[173],"its":[174],"potential":[175],"as":[176],"essential":[178],"tool":[179],"for":[180],"mitigating":[181]},"counts_by_year":[],"updated_date":"2026-04-02T15:55:50.835912","created_date":"2024-11-15T00:00:00"}
