{"id":"https://openalex.org/W7139118289","doi":"https://doi.org/10.1609/aaai.v40i42.40874","title":"Mind the Third Eye! Benchmarking Privacy Awareness in MLLM-powered Smartphone Agents","display_name":"Mind the Third Eye! Benchmarking Privacy Awareness in MLLM-powered Smartphone Agents","publication_year":2026,"publication_date":"2026-03-14","ids":{"openalex":"https://openalex.org/W7139118289","doi":"https://doi.org/10.1609/aaai.v40i42.40874"},"language":null,"primary_location":{"id":"doi:10.1609/aaai.v40i42.40874","is_oa":true,"landing_page_url":"https://doi.org/10.1609/aaai.v40i42.40874","pdf_url":"https://ojs.aaai.org/index.php/AAAI/article/download/40874/44835","source":{"id":"https://openalex.org/S4210191458","display_name":"Proceedings of the AAAI Conference on Artificial Intelligence","issn_l":"2159-5399","issn":["2159-5399","2374-3468"],"is_oa":true,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/P4310320058","host_organization_name":"Association for the Advancement of Artificial Intelligence","host_organization_lineage":["https://openalex.org/P4310320058"],"host_organization_lineage_names":["Association for the Advancement of Artificial Intelligence"],"type":"conference"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the AAAI Conference on Artificial Intelligence","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"diamond","oa_url":"https://ojs.aaai.org/index.php/AAAI/article/download/40874/44835","any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5126647678","display_name":"Zhixin Lin","orcid":null},"institutions":[{"id":"https://openalex.org/I154099455","display_name":"Shandong University","ror":"https://ror.org/0207yh398","country_code":"CN","type":"education","lineage":["https://openalex.org/I154099455"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Zhixin Lin","raw_affiliation_strings":["Shandong University"],"affiliations":[{"raw_affiliation_string":"Shandong University","institution_ids":["https://openalex.org/I154099455"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5125160117","display_name":"Jungang Li","orcid":null},"institutions":[{"id":"https://openalex.org/I200769079","display_name":"Hong Kong University of Science and Technology","ror":"https://ror.org/00q4vv597","country_code":"HK","type":"education","lineage":["https://openalex.org/I200769079"]}],"countries":["HK"],"is_corresponding":false,"raw_author_name":"Jungang Li","raw_affiliation_strings":["Hong Kong University of Science and Technology (Guangzhou)\nHong Kong University of Science and Technology"],"affiliations":[{"raw_affiliation_string":"Hong Kong University of Science and Technology (Guangzhou)\nHong Kong University of Science and Technology","institution_ids":["https://openalex.org/I200769079"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5101137791","display_name":"Shidong Pan","orcid":"https://orcid.org/0000-0002-2162-0407"},"institutions":[{"id":"https://openalex.org/I78577930","display_name":"Columbia University","ror":"https://ror.org/00hj8s172","country_code":"US","type":"education","lineage":["https://openalex.org/I78577930"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Shidong Pan","raw_affiliation_strings":["Columbia University"],"affiliations":[{"raw_affiliation_string":"Columbia University","institution_ids":["https://openalex.org/I78577930"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5130040233","display_name":"Yibo Shi","orcid":null},"institutions":[{"id":"https://openalex.org/I87445476","display_name":"Xi'an Jiaotong University","ror":"https://ror.org/017zhmm22","country_code":"CN","type":"education","lineage":["https://openalex.org/I87445476"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Yibo Shi","raw_affiliation_strings":["Xi'an Jiaotong University"],"affiliations":[{"raw_affiliation_string":"Xi'an Jiaotong University","institution_ids":["https://openalex.org/I87445476"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5102602619","display_name":"Yue Yao","orcid":null},"institutions":[{"id":"https://openalex.org/I154099455","display_name":"Shandong University","ror":"https://ror.org/0207yh398","country_code":"CN","type":"education","lineage":["https://openalex.org/I154099455"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Yue Yao","raw_affiliation_strings":["Shandong University"],"affiliations":[{"raw_affiliation_string":"Shandong University","institution_ids":["https://openalex.org/I154099455"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5100341934","display_name":"Dongliang Xu","orcid":"https://orcid.org/0000-0002-6908-253X"},"institutions":[{"id":"https://openalex.org/I154099455","display_name":"Shandong University","ror":"https://ror.org/0207yh398","country_code":"CN","type":"education","lineage":["https://openalex.org/I154099455"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Dongliang Xu","raw_affiliation_strings":["Shandong University"],"affiliations":[{"raw_affiliation_string":"Shandong University","institution_ids":["https://openalex.org/I154099455"]}]}],"institutions":[],"countries_distinct_count":3,"institutions_distinct_count":6,"corresponding_author_ids":["https://openalex.org/A5126647678"],"corresponding_institution_ids":["https://openalex.org/I154099455"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":true,"cited_by_count":0,"citation_normalized_percentile":{"value":0.96629213,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":null,"biblio":{"volume":"40","issue":"42","first_page":"35626","last_page":"35634"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.25850000977516174,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.25850000977516174,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11045","display_name":"Privacy, Security, and Data Protection","score":0.13650000095367432,"subfield":{"id":"https://openalex.org/subfields/3312","display_name":"Sociology and Political Science"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},{"id":"https://openalex.org/T14347","display_name":"Big Data and Digital Economy","score":0.06210000067949295,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/benchmarking","display_name":"Benchmarking","score":0.8341000080108643},{"id":"https://openalex.org/keywords/benchmark","display_name":"Benchmark (surveying)","score":0.6657000184059143},{"id":"https://openalex.org/keywords/context","display_name":"Context (archaeology)","score":0.6226999759674072},{"id":"https://openalex.org/keywords/personally-identifiable-information","display_name":"Personally identifiable information","score":0.5608000159263611},{"id":"https://openalex.org/keywords/mainstream","display_name":"Mainstream","score":0.5126000046730042},{"id":"https://openalex.org/keywords/information-sensitivity","display_name":"Information sensitivity","score":0.4620000123977661},{"id":"https://openalex.org/keywords/information-privacy","display_name":"Information privacy","score":0.44620001316070557}],"concepts":[{"id":"https://openalex.org/C86251818","wikidata":"https://www.wikidata.org/wiki/Q816754","display_name":"Benchmarking","level":2,"score":0.8341000080108643},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.729200005531311},{"id":"https://openalex.org/C108827166","wikidata":"https://www.wikidata.org/wiki/Q175975","display_name":"Internet privacy","level":1,"score":0.675599992275238},{"id":"https://openalex.org/C185798385","wikidata":"https://www.wikidata.org/wiki/Q1161707","display_name":"Benchmark (surveying)","level":2,"score":0.6657000184059143},{"id":"https://openalex.org/C2779343474","wikidata":"https://www.wikidata.org/wiki/Q3109175","display_name":"Context (archaeology)","level":2,"score":0.6226999759674072},{"id":"https://openalex.org/C169093310","wikidata":"https://www.wikidata.org/wiki/Q3702971","display_name":"Personally identifiable information","level":2,"score":0.5608000159263611},{"id":"https://openalex.org/C2777617010","wikidata":"https://www.wikidata.org/wiki/Q18957","display_name":"Mainstream","level":2,"score":0.5126000046730042},{"id":"https://openalex.org/C137822555","wikidata":"https://www.wikidata.org/wiki/Q2587068","display_name":"Information sensitivity","level":2,"score":0.4620000123977661},{"id":"https://openalex.org/C123201435","wikidata":"https://www.wikidata.org/wiki/Q456632","display_name":"Information privacy","level":2,"score":0.44620001316070557},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.4345000088214874},{"id":"https://openalex.org/C3017619522","wikidata":"https://www.wikidata.org/wiki/Q620615","display_name":"Smartphone app","level":2,"score":0.4284999966621399},{"id":"https://openalex.org/C21200559","wikidata":"https://www.wikidata.org/wiki/Q7451068","display_name":"Sensitivity (control systems)","level":2,"score":0.37619999051094055},{"id":"https://openalex.org/C107457646","wikidata":"https://www.wikidata.org/wiki/Q207434","display_name":"Human\u2013computer interaction","level":1,"score":0.35749998688697815},{"id":"https://openalex.org/C3020250448","wikidata":"https://www.wikidata.org/wiki/Q620615","display_name":"Smartphone application","level":2,"score":0.3163999915122986},{"id":"https://openalex.org/C2781368080","wikidata":"https://www.wikidata.org/wiki/Q501688","display_name":"Context awareness","level":3,"score":0.31189998984336853},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.28380000591278076},{"id":"https://openalex.org/C3017597292","wikidata":"https://www.wikidata.org/wiki/Q25052250","display_name":"Privacy protection","level":2,"score":0.2800999879837036},{"id":"https://openalex.org/C509729295","wikidata":"https://www.wikidata.org/wiki/Q7246032","display_name":"Privacy software","level":3,"score":0.26820001006126404},{"id":"https://openalex.org/C136197465","wikidata":"https://www.wikidata.org/wiki/Q1729295","display_name":"Variety (cybernetics)","level":2,"score":0.2671000063419342},{"id":"https://openalex.org/C2522767166","wikidata":"https://www.wikidata.org/wiki/Q2374463","display_name":"Data science","level":1,"score":0.26489999890327454}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1609/aaai.v40i42.40874","is_oa":true,"landing_page_url":"https://doi.org/10.1609/aaai.v40i42.40874","pdf_url":"https://ojs.aaai.org/index.php/AAAI/article/download/40874/44835","source":{"id":"https://openalex.org/S4210191458","display_name":"Proceedings of the AAAI Conference on Artificial Intelligence","issn_l":"2159-5399","issn":["2159-5399","2374-3468"],"is_oa":true,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/P4310320058","host_organization_name":"Association for the Advancement of Artificial Intelligence","host_organization_lineage":["https://openalex.org/P4310320058"],"host_organization_lineage_names":["Association for the Advancement of Artificial Intelligence"],"type":"conference"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the AAAI Conference on Artificial Intelligence","raw_type":"journal-article"}],"best_oa_location":{"id":"doi:10.1609/aaai.v40i42.40874","is_oa":true,"landing_page_url":"https://doi.org/10.1609/aaai.v40i42.40874","pdf_url":"https://ojs.aaai.org/index.php/AAAI/article/download/40874/44835","source":{"id":"https://openalex.org/S4210191458","display_name":"Proceedings of the AAAI Conference on Artificial Intelligence","issn_l":"2159-5399","issn":["2159-5399","2374-3468"],"is_oa":true,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/P4310320058","host_organization_name":"Association for the Advancement of Artificial Intelligence","host_organization_lineage":["https://openalex.org/P4310320058"],"host_organization_lineage_names":["Association for the Advancement of Artificial Intelligence"],"type":"conference"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the AAAI Conference on Artificial Intelligence","raw_type":"journal-article"},"sustainable_development_goals":[],"awards":[],"funders":[{"id":"https://openalex.org/F4320333596","display_name":"Key Technology Research and Development Program of Shandong","ror":null}],"has_content":{"grobid_xml":true,"pdf":true},"content_urls":{"pdf":"https://content.openalex.org/works/W7139118289.pdf","grobid_xml":"https://content.openalex.org/works/W7139118289.grobid-xml"},"referenced_works_count":0,"referenced_works":[],"related_works":[],"abstract_inverted_index":{"Smartphones":[0],"bring":[1],"significant":[2],"convenience":[3],"to":[4,10,46,75,163,187],"users":[5],"but":[6],"also":[7,152],"enable":[8],"devices":[9],"extensively":[11],"record":[12],"various":[13],"types":[14],"of":[15,59,63,78,149],"personal":[16,49],"information.":[17],"Existing":[18],"smartphone":[19,106,194],"agents":[20,41,115,132],"powered":[21],"by":[22],"Multimodal":[23],"Large":[24],"Language":[25],"Models":[26],"(MLLMs)":[27],"have":[28],"achieved":[29],"remarkable":[30],"performance":[31,122],"in":[32,86],"automating":[33],"different":[34],"tasks.":[35],"However,":[36],"as":[37],"the":[38,60,68,76,144,155,168,181,184,189],"cost,":[39],"these":[40,64],"are":[42],"granted":[43],"substantial":[44],"access":[45],"sensitive":[47],"users'":[48],"information":[50],"during":[51],"this":[52],"operation.":[53],"To":[54],"gain":[55],"a":[56,171],"thorough":[57],"understanding":[58],"privacy":[61,84,118,135,157],"awareness":[62,119],"agents,":[65],"we":[66,88],"present":[67],"first":[69],"large-scale":[70],"benchmark":[71,102],"encompassing":[72],"7,138":[73],"scenarios":[74],"best":[77],"our":[79],"knowledge.":[80],"In":[81],"addition,":[82],"for":[83],"context":[85],"scenarios,":[87],"annotate":[89],"its":[90],"type":[91],"(e.g.,":[92],"Account":[93],"Credentials),":[94],"sensitivity":[95,165,173],"level,":[96,166],"and":[97,140],"location.":[98],"We":[99,151,179],"then":[100],"carefully":[101],"seven":[103],"available":[104],"mainstream":[105],"agents.":[107,195],"Our":[108],"results":[109],"demonstrate":[110],"that":[111,154],"almost":[112],"all":[113],"benchmarked":[114],"show":[116,133],"unsatisfying":[117],"(RA),":[120],"with":[121,127,170],"remaining":[123],"below":[124],"60%":[125],"even":[126],"explicit":[128],"hints.":[129],"Overall,":[130],"closed-source":[131],"better":[134],"ability":[136],"than":[137],"open-source":[138],"ones,":[139],"Gemini":[141],"2.0-flash":[142],"achieves":[143],"best,":[145],"achieving":[146],"an":[147],"RA":[148],"67%.":[150],"find":[153],"agents\u2019":[156],"detection":[158],"capability":[159],"is":[160,175],"highly":[161],"related":[162],"scenario":[164,169],"i.e.,":[167],"higher":[172],"level":[174],"typically":[176],"more":[177],"identifiable.":[178],"hope":[180],"findings":[182],"enlighten":[183],"research":[185],"community":[186],"rethink":[188],"unbalanced":[190],"utility-privacy":[191],"tradeoff":[192],"about":[193]},"counts_by_year":[],"updated_date":"2026-04-03T22:45:19.894376","created_date":"2026-03-20T00:00:00"}
