{"id":"https://openalex.org/W3040646395","doi":"https://doi.org/10.1587/transinf.2019icp0008","title":"Detecting and Understanding Online Advertising Fraud in the Wild","display_name":"Detecting and Understanding Online Advertising Fraud in the Wild","publication_year":2020,"publication_date":"2020-06-30","ids":{"openalex":"https://openalex.org/W3040646395","doi":"https://doi.org/10.1587/transinf.2019icp0008","mag":"3040646395"},"language":"en","primary_location":{"id":"doi:10.1587/transinf.2019icp0008","is_oa":true,"landing_page_url":"https://doi.org/10.1587/transinf.2019icp0008","pdf_url":"https://www.jstage.jst.go.jp/article/transinf/E103.D/7/E103.D_2019ICP0008/_pdf","source":{"id":"https://openalex.org/S2486202937","display_name":"IEICE Transactions on Information and Systems","issn_l":"0916-8532","issn":["0916-8532","1745-1361"],"is_oa":true,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4320800604","host_organization_name":"Institute of Electronics, Information and Communication Engineers","host_organization_lineage":["https://openalex.org/P4320800604"],"host_organization_lineage_names":["Institute of Electronics, Information and Communication Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEICE Transactions on Information and Systems","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"diamond","oa_url":"https://www.jstage.jst.go.jp/article/transinf/E103.D/7/E103.D_2019ICP0008/_pdf","any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5016083227","display_name":"Fumihiro Kanei","orcid":"https://orcid.org/0000-0002-5212-9274"},"institutions":[{"id":"https://openalex.org/I180203408","display_name":"Yokohama National University","ror":"https://ror.org/03zyp6p76","country_code":"JP","type":"education","lineage":["https://openalex.org/I180203408"]}],"countries":["JP"],"is_corresponding":true,"raw_author_name":"Fumihiro KANEI","raw_affiliation_strings":["NTT Secure Platform Laboratories","Yokohama National University"],"affiliations":[{"raw_affiliation_string":"NTT Secure Platform Laboratories","institution_ids":[]},{"raw_affiliation_string":"Yokohama National University","institution_ids":["https://openalex.org/I180203408"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5053184316","display_name":"Daiki Chiba","orcid":"https://orcid.org/0000-0002-7532-6633"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Daiki CHIBA","raw_affiliation_strings":["NTT Secure Platform Laboratories"],"affiliations":[{"raw_affiliation_string":"NTT Secure Platform Laboratories","institution_ids":[]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5053350614","display_name":"Kunio Hato","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Kunio HATO","raw_affiliation_strings":["NTT Secure Platform Laboratories"],"affiliations":[{"raw_affiliation_string":"NTT Secure Platform Laboratories","institution_ids":[]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5028367744","display_name":"Katsunari Yoshioka","orcid":"https://orcid.org/0000-0003-0964-8631"},"institutions":[{"id":"https://openalex.org/I180203408","display_name":"Yokohama National University","ror":"https://ror.org/03zyp6p76","country_code":"JP","type":"education","lineage":["https://openalex.org/I180203408"]}],"countries":["JP"],"is_corresponding":false,"raw_author_name":"Katsunari YOSHIOKA","raw_affiliation_strings":["Yokohama National University"],"affiliations":[{"raw_affiliation_string":"Yokohama National University","institution_ids":["https://openalex.org/I180203408"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5108109302","display_name":"Tsutomu Matsumoto","orcid":null},"institutions":[{"id":"https://openalex.org/I180203408","display_name":"Yokohama National University","ror":"https://ror.org/03zyp6p76","country_code":"JP","type":"education","lineage":["https://openalex.org/I180203408"]}],"countries":["JP"],"is_corresponding":false,"raw_author_name":"Tsutomu MATSUMOTO","raw_affiliation_strings":["Yokohama National University"],"affiliations":[{"raw_affiliation_string":"Yokohama National University","institution_ids":["https://openalex.org/I180203408"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5012291537","display_name":"Mitsuaki Akiyama","orcid":"https://orcid.org/0000-0001-7052-8562"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Mitsuaki AKIYAMA","raw_affiliation_strings":["NTT Secure Platform Laboratories"],"affiliations":[{"raw_affiliation_string":"NTT Secure Platform Laboratories","institution_ids":[]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":6,"corresponding_author_ids":["https://openalex.org/A5016083227"],"corresponding_institution_ids":["https://openalex.org/I180203408"],"apc_list":null,"apc_paid":null,"fwci":1.3345,"has_fulltext":true,"cited_by_count":8,"citation_normalized_percentile":{"value":0.85943811,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":97},"biblio":{"volume":"E103.D","issue":"7","first_page":"1512","last_page":"1523"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11644","display_name":"Spam and Phishing Detection","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11644","display_name":"Spam and Phishing Detection","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9994999766349792,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.891472339630127},{"id":"https://openalex.org/keywords/burstiness","display_name":"Burstiness","score":0.8635772466659546},{"id":"https://openalex.org/keywords/false-positive-paradox","display_name":"False positive paradox","score":0.5308680534362793},{"id":"https://openalex.org/keywords/popularity","display_name":"Popularity","score":0.503292977809906},{"id":"https://openalex.org/keywords/unavailability","display_name":"Unavailability","score":0.4624254107475281},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.45287051796913147},{"id":"https://openalex.org/keywords/outlier","display_name":"Outlier","score":0.42030981183052063},{"id":"https://openalex.org/keywords/server","display_name":"Server","score":0.415568083524704},{"id":"https://openalex.org/keywords/machine-learning","display_name":"Machine learning","score":0.33370018005371094},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.3249523639678955},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.20242643356323242},{"id":"https://openalex.org/keywords/network-packet","display_name":"Network packet","score":0.18614143133163452}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.891472339630127},{"id":"https://openalex.org/C2781023610","wikidata":"https://www.wikidata.org/wiki/Q17006304","display_name":"Burstiness","level":3,"score":0.8635772466659546},{"id":"https://openalex.org/C64869954","wikidata":"https://www.wikidata.org/wiki/Q1859747","display_name":"False positive paradox","level":2,"score":0.5308680534362793},{"id":"https://openalex.org/C2780586970","wikidata":"https://www.wikidata.org/wiki/Q1357284","display_name":"Popularity","level":2,"score":0.503292977809906},{"id":"https://openalex.org/C2780505938","wikidata":"https://www.wikidata.org/wiki/Q17093282","display_name":"Unavailability","level":2,"score":0.4624254107475281},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.45287051796913147},{"id":"https://openalex.org/C79337645","wikidata":"https://www.wikidata.org/wiki/Q779824","display_name":"Outlier","level":2,"score":0.42030981183052063},{"id":"https://openalex.org/C93996380","wikidata":"https://www.wikidata.org/wiki/Q44127","display_name":"Server","level":2,"score":0.415568083524704},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.33370018005371094},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.3249523639678955},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.20242643356323242},{"id":"https://openalex.org/C158379750","wikidata":"https://www.wikidata.org/wiki/Q214111","display_name":"Network packet","level":2,"score":0.18614143133163452},{"id":"https://openalex.org/C200601418","wikidata":"https://www.wikidata.org/wiki/Q2193887","display_name":"Reliability engineering","level":1,"score":0.0},{"id":"https://openalex.org/C77805123","wikidata":"https://www.wikidata.org/wiki/Q161272","display_name":"Social psychology","level":1,"score":0.0},{"id":"https://openalex.org/C15744967","wikidata":"https://www.wikidata.org/wiki/Q9418","display_name":"Psychology","level":0,"score":0.0},{"id":"https://openalex.org/C127413603","wikidata":"https://www.wikidata.org/wiki/Q11023","display_name":"Engineering","level":0,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1587/transinf.2019icp0008","is_oa":true,"landing_page_url":"https://doi.org/10.1587/transinf.2019icp0008","pdf_url":"https://www.jstage.jst.go.jp/article/transinf/E103.D/7/E103.D_2019ICP0008/_pdf","source":{"id":"https://openalex.org/S2486202937","display_name":"IEICE Transactions on Information and Systems","issn_l":"0916-8532","issn":["0916-8532","1745-1361"],"is_oa":true,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4320800604","host_organization_name":"Institute of Electronics, Information and Communication Engineers","host_organization_lineage":["https://openalex.org/P4320800604"],"host_organization_lineage_names":["Institute of Electronics, Information and Communication Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEICE Transactions on Information and Systems","raw_type":"journal-article"}],"best_oa_location":{"id":"doi:10.1587/transinf.2019icp0008","is_oa":true,"landing_page_url":"https://doi.org/10.1587/transinf.2019icp0008","pdf_url":"https://www.jstage.jst.go.jp/article/transinf/E103.D/7/E103.D_2019ICP0008/_pdf","source":{"id":"https://openalex.org/S2486202937","display_name":"IEICE Transactions on Information and Systems","issn_l":"0916-8532","issn":["0916-8532","1745-1361"],"is_oa":true,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4320800604","host_organization_name":"Institute of Electronics, Information and Communication Engineers","host_organization_lineage":["https://openalex.org/P4320800604"],"host_organization_lineage_names":["Institute of Electronics, Information and Communication Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEICE Transactions on Information and Systems","raw_type":"journal-article"},"sustainable_development_goals":[{"display_name":"Peace, Justice and strong institutions","id":"https://metadata.un.org/sdg/16","score":0.8100000023841858}],"awards":[],"funders":[],"has_content":{"pdf":true,"grobid_xml":true},"content_urls":{"pdf":"https://content.openalex.org/works/W3040646395.pdf","grobid_xml":"https://content.openalex.org/works/W3040646395.grobid-xml"},"referenced_works_count":22,"referenced_works":["https://openalex.org/W91931328","https://openalex.org/W123401891","https://openalex.org/W1480813933","https://openalex.org/W2080330461","https://openalex.org/W2096273775","https://openalex.org/W2096697338","https://openalex.org/W2097470225","https://openalex.org/W2099194763","https://openalex.org/W2099937944","https://openalex.org/W2110691314","https://openalex.org/W2144768538","https://openalex.org/W2155841152","https://openalex.org/W2157286909","https://openalex.org/W2160967519","https://openalex.org/W2165613200","https://openalex.org/W2189652372","https://openalex.org/W2235660311","https://openalex.org/W2258082031","https://openalex.org/W2477506845","https://openalex.org/W2621053197","https://openalex.org/W2911964244","https://openalex.org/W2956275924"],"related_works":["https://openalex.org/W1843717240","https://openalex.org/W2340440348","https://openalex.org/W2083756677","https://openalex.org/W2737070158","https://openalex.org/W2508200300","https://openalex.org/W4237235066","https://openalex.org/W4297850514","https://openalex.org/W2138256111","https://openalex.org/W207884067","https://openalex.org/W1574103160"],"abstract_inverted_index":{"While":[0],"the":[1,8,14,66,69,89,95,160,179,196,226,231],"online":[2],"advertisement":[3],"is":[4,199,242],"widely":[5],"used":[6,126],"on":[7,11,36,65,178,217],"web":[9],"and":[10,94,111,165,221],"mobile":[12],"applications,":[13],"monetary":[15],"damages":[16],"by":[17,142,163,186],"advertising":[18],"frauds":[19,30,229],"(ad":[20],"frauds)":[21],"have":[22],"become":[23],"a":[24,78,129,213,235],"severe":[25],"problem.":[26],"Countermeasures":[27],"against":[28,58,201],"ad":[29,42,74,82,117,135,150,182,219,228,240],"are":[31,125],"evaded":[32],"since":[33],"they":[34],"rely":[35],"noticeable":[37],"features":[38,57,64,113,124,158,176],"(e.g.,":[39],"burstiness":[40,180],"of":[41,68,81,91,97,106,181,225,238],"requests)":[43],"that":[44,54,102,112,155,195],"attackers":[45,103],"can":[46],"easily":[47],"change.":[48],"We":[49,61,100,137],"propose":[50],"an":[51,73,148,218],"ad-fraud-detection":[52],"method":[53,141,198,211],"leverages":[55],"robust":[56,200],"attacker":[59],"evasion.":[60],"designed":[62,157],"novel":[63],"basis":[67],"statistics":[70,110],"observed":[71,146],"in":[72,230],"network":[75,220],"calculated":[76],"from":[77,84,115,244],"large":[79,214,236],"amount":[80,237],"requests":[83,118,241],"legitimate":[85],"users,":[86],"such":[87],"as":[88],"popularity":[90],"publisher":[92],"websites":[93],"tendencies":[96],"client":[98],"environments.":[99],"assume":[101],"cannot":[104],"know":[105],"or":[107],"manipulate":[108],"these":[109],"extracted":[114],"fraudulent":[116,134,239],"tend":[119],"to":[120,127,212],"be":[121],"outliers.":[122],"These":[123],"construct":[128],"machine-learning":[130],"model":[131],"for":[132,233],"detecting":[133],"requests.":[136,183],"evaluated":[138],"our":[139,156,209],"proposed":[140,197,210],"using":[143],"ad-request":[144],"logs":[145],"within":[147],"actual":[149],"network.":[151],"The":[152],"results":[153],"revealed":[154],"improved":[159],"recall":[161],"rate":[162],"10%":[164],"had":[166],"about":[167],"100,000-160,000":[168],"fewer":[169],"false":[170],"negatives":[171],"per":[172],"day":[173],"than":[174],"conventional":[175],"based":[177],"In":[184],"addition,":[185],"evaluating":[187],"detection":[188],"performance":[189,202],"with":[190],"long-term":[191],"dataset,":[192],"we":[193,207],"confirmed":[194],"degradation":[203],"over":[204],"time.":[205],"Finally,":[206],"applied":[208],"dataset":[215],"constructed":[216],"found":[222],"several":[223],"characteristics":[224],"latest":[227],"wild,":[232],"example,":[234],"sent":[243],"cloud":[245],"servers.":[246]},"counts_by_year":[{"year":2025,"cited_by_count":2},{"year":2024,"cited_by_count":1},{"year":2023,"cited_by_count":1},{"year":2022,"cited_by_count":3},{"year":2021,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
