{"id":"https://openalex.org/W3000122187","doi":"https://doi.org/10.1145/3374664.3375730","title":"Understanding Privacy Awareness in Android App Descriptions Using Deep Learning","display_name":"Understanding Privacy Awareness in Android App Descriptions Using Deep Learning","publication_year":2020,"publication_date":"2020-03-13","ids":{"openalex":"https://openalex.org/W3000122187","doi":"https://doi.org/10.1145/3374664.3375730","mag":"3000122187"},"language":"en","primary_location":{"id":"doi:10.1145/3374664.3375730","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3374664.3375730","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the Tenth ACM Conference on Data and Application Security and Privacy","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"gold","oa_url":"http://openlib.tugraz.at/5fbe176730cb3","any_repository_has_fulltext":null},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5019809742","display_name":"Johannes Feichtner","orcid":null},"institutions":[{"id":"https://openalex.org/I4092182","display_name":"Graz University of Technology","ror":"https://ror.org/00d7xrm67","country_code":"AT","type":"education","lineage":["https://openalex.org/I4092182"]}],"countries":["AT"],"is_corresponding":true,"raw_author_name":"Johannes Feichtner","raw_affiliation_strings":["Graz University of Technology &amp; Secure Information Technology Center - Austria, Graz, Austria"],"affiliations":[{"raw_affiliation_string":"Graz University of Technology &amp; Secure Information Technology Center - Austria, Graz, Austria","institution_ids":["https://openalex.org/I4092182"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5034450757","display_name":"Stefan Gruber","orcid":"https://orcid.org/0000-0002-3459-421X"},"institutions":[{"id":"https://openalex.org/I4092182","display_name":"Graz University of Technology","ror":"https://ror.org/00d7xrm67","country_code":"AT","type":"education","lineage":["https://openalex.org/I4092182"]}],"countries":["AT"],"is_corresponding":false,"raw_author_name":"Stefan Gruber","raw_affiliation_strings":["Graz University of Technology, Graz, Austria"],"affiliations":[{"raw_affiliation_string":"Graz University of Technology, Graz, Austria","institution_ids":["https://openalex.org/I4092182"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5019809742"],"corresponding_institution_ids":["https://openalex.org/I4092182"],"apc_list":null,"apc_paid":null,"fwci":1.5209,"has_fulltext":false,"cited_by_count":24,"citation_normalized_percentile":{"value":0.82528511,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":99},"biblio":{"volume":null,"issue":null,"first_page":"203","last_page":"214"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12034","display_name":"Digital and Cyber Forensics","score":0.9972000122070312,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11045","display_name":"Privacy, Security, and Data Protection","score":0.9941999912261963,"subfield":{"id":"https://openalex.org/subfields/3312","display_name":"Sociology and Political Science"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8650978207588196},{"id":"https://openalex.org/keywords/permission","display_name":"Permission","score":0.7273209095001221},{"id":"https://openalex.org/keywords/android","display_name":"Android (operating system)","score":0.6854376792907715},{"id":"https://openalex.org/keywords/convolutional-neural-network","display_name":"Convolutional neural network","score":0.5314112305641174},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.48407092690467834},{"id":"https://openalex.org/keywords/world-wide-web","display_name":"World Wide Web","score":0.4741002023220062},{"id":"https://openalex.org/keywords/information-privacy","display_name":"Information privacy","score":0.43851161003112793},{"id":"https://openalex.org/keywords/relevance","display_name":"Relevance (law)","score":0.41950511932373047},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.38745152950286865},{"id":"https://openalex.org/keywords/machine-learning","display_name":"Machine learning","score":0.3571844696998596}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8650978207588196},{"id":"https://openalex.org/C2779089604","wikidata":"https://www.wikidata.org/wiki/Q7169333","display_name":"Permission","level":2,"score":0.7273209095001221},{"id":"https://openalex.org/C557433098","wikidata":"https://www.wikidata.org/wiki/Q94","display_name":"Android (operating system)","level":2,"score":0.6854376792907715},{"id":"https://openalex.org/C81363708","wikidata":"https://www.wikidata.org/wiki/Q17084460","display_name":"Convolutional neural network","level":2,"score":0.5314112305641174},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.48407092690467834},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.4741002023220062},{"id":"https://openalex.org/C123201435","wikidata":"https://www.wikidata.org/wiki/Q456632","display_name":"Information privacy","level":2,"score":0.43851161003112793},{"id":"https://openalex.org/C158154518","wikidata":"https://www.wikidata.org/wiki/Q7310970","display_name":"Relevance (law)","level":2,"score":0.41950511932373047},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.38745152950286865},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.3571844696998596},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.0},{"id":"https://openalex.org/C199539241","wikidata":"https://www.wikidata.org/wiki/Q7748","display_name":"Law","level":1,"score":0.0},{"id":"https://openalex.org/C17744445","wikidata":"https://www.wikidata.org/wiki/Q36442","display_name":"Political science","level":0,"score":0.0}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1145/3374664.3375730","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3374664.3375730","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the Tenth ACM Conference on Data and Application Security and Privacy","raw_type":"proceedings-article"},{"id":"pmh:http://openlib.tugraz.at/5fbe176730cb3","is_oa":true,"landing_page_url":"http://openlib.tugraz.at/5fbe176730cb3","pdf_url":null,"source":null,"license":"other-oa","license_id":"https://openalex.org/licenses/other-oa","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":null,"raw_type":null}],"best_oa_location":{"id":"pmh:http://openlib.tugraz.at/5fbe176730cb3","is_oa":true,"landing_page_url":"http://openlib.tugraz.at/5fbe176730cb3","pdf_url":null,"source":null,"license":"other-oa","license_id":"https://openalex.org/licenses/other-oa","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":null,"raw_type":null},"sustainable_development_goals":[{"score":0.5400000214576721,"display_name":"Peace, Justice and strong institutions","id":"https://metadata.un.org/sdg/16"}],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":30,"referenced_works":["https://openalex.org/W79696261","https://openalex.org/W1832693441","https://openalex.org/W1998862130","https://openalex.org/W2019798206","https://openalex.org/W2024722495","https://openalex.org/W2068894463","https://openalex.org/W2141554582","https://openalex.org/W2147800946","https://openalex.org/W2168649891","https://openalex.org/W2177471439","https://openalex.org/W2250539671","https://openalex.org/W2282821441","https://openalex.org/W2734721836","https://openalex.org/W2767148376","https://openalex.org/W2798069878","https://openalex.org/W2798553277","https://openalex.org/W2884525360","https://openalex.org/W2891118559","https://openalex.org/W2919115771","https://openalex.org/W2923317037","https://openalex.org/W2950133940","https://openalex.org/W2959939328","https://openalex.org/W2962790223","https://openalex.org/W2962830343","https://openalex.org/W2962862931","https://openalex.org/W2963012544","https://openalex.org/W2963401022","https://openalex.org/W2999585024","https://openalex.org/W3136699861","https://openalex.org/W4285719527"],"related_works":["https://openalex.org/W2056388267","https://openalex.org/W2249350383","https://openalex.org/W3003485427","https://openalex.org/W2755037920","https://openalex.org/W4210309948","https://openalex.org/W2072937473","https://openalex.org/W3211901564","https://openalex.org/W2786416059","https://openalex.org/W609672658","https://openalex.org/W3137508356"],"abstract_inverted_index":{"Permissions":[0],"are":[1],"a":[2,58,69,98,178,195],"key":[3],"factor":[4],"in":[5,24,88,114,117,141],"Android":[6],"to":[7,32,50,73,119,146,217],"protect":[8],"users'":[9],"privacy.":[10],"As":[11],"it":[12],"is":[13,37,47,153],"often":[14],"not":[15,155],"obvious":[16],"why":[17],"applications":[18],"require":[19],"certain":[20,134],"permissions,":[21],"developer-provided":[22],"descriptions":[23,43,116,140,165],"Google":[25],"Play":[26],"and":[27,57,81,93,112,136,150,166,182,191,199,214,219],"third-party":[28],"markets":[29],"should":[30],"explain":[31],"users":[33],"how":[34],"sensitive":[35,147],"data":[36,149],"processed.":[38],"Reliably":[39],"recognizing":[40],"whether":[41],"app":[42,79,115,132,164,212],"cover":[44],"permission":[45,82],"usage":[46,121],"challenging":[48],"due":[49],"the":[51,108,120,128,143,186,207],"lack":[52],"of":[53,60,110,122,174,188],"enforced":[54],"quality":[55],"standards":[56],"variety":[59],"ways":[61],"developers":[62],"can":[63,137,170,204],"express":[64],"privacy-related":[65],"facts.":[66],"We":[67,157],"introduce":[68],"machine":[70],"learning-based":[71],"approach":[72],"identify":[74,171],"critical":[75],"discrepancies":[76],"between":[77,180,210],"developer-described":[78],"behavior":[80],"usage.":[83],"By":[84],"combining":[85],"state-of-the-art":[86],"techniques":[87],"natural":[89],"language":[90],"processing":[91],"(NLP)":[92],"deep":[94],"learning,":[95],"we":[96,169,193],"design":[97],"convolutional":[99],"neural":[100],"network":[101],"(CNN)":[102],"for":[103],"text":[104],"classification":[105],"that":[106,130,168,201],"captures":[107],"relevance":[109],"words":[111,190],"phrases":[113],"relation":[118],"dangerous":[123,175],"permissions.":[124],"Our":[125],"system":[126,151],"predicts":[127],"likelihood":[129],"an":[131],"requires":[133],"permissions":[135,176],"warn":[138],"about":[139],"which":[142],"requested":[144],"access":[145,216],"user":[148],"features":[152],"textually":[154],"represented.":[156],"evaluate":[158],"our":[159,202],"solution":[160],"on":[161],"77,000":[162],"real-world":[163],"find":[167],"individual":[172,189],"groups":[173],"with":[177],"precision":[179],"71%":[181],"93%.":[183],"To":[184],"highlight":[185],"impact":[187],"phrases,":[192],"employ":[194],"model":[196],"explanation":[197],"algorithm":[198],"demonstrate":[200],"technique":[203],"successfully":[205],"bridge":[206],"semantic":[208],"gap":[209],"described":[211],"functionality":[213],"its":[215],"security-":[218],"privacy-sensitive":[220],"resources.":[221]},"counts_by_year":[{"year":2026,"cited_by_count":1},{"year":2025,"cited_by_count":9},{"year":2024,"cited_by_count":4},{"year":2023,"cited_by_count":3},{"year":2022,"cited_by_count":5},{"year":2021,"cited_by_count":1},{"year":2020,"cited_by_count":1}],"updated_date":"2026-04-04T16:13:02.066488","created_date":"2025-10-10T00:00:00"}
