{"id":"https://openalex.org/W3135006341","doi":"https://doi.org/10.1109/access.2021.3063814","title":"Privacy Model: Detect Privacy Leakage for Chinese Browser Extensions","display_name":"Privacy Model: Detect Privacy Leakage for Chinese Browser Extensions","publication_year":2021,"publication_date":"2021-01-01","ids":{"openalex":"https://openalex.org/W3135006341","doi":"https://doi.org/10.1109/access.2021.3063814","mag":"3135006341"},"language":"en","primary_location":{"is_oa":true,"landing_page_url":"https://doi.org/10.1109/access.2021.3063814","pdf_url":"https://ieeexplore.ieee.org/ielx7/6287639/9312710/09369313.pdf","source":{"id":"https://openalex.org/S2485537415","display_name":"IEEE Access","issn_l":"2169-3536","issn":["2169-3536"],"is_oa":true,"is_in_doaj":true,"is_indexed_in_scopus":true,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true},"type":"article","type_crossref":"journal-article","indexed_in":["crossref","doaj"],"open_access":{"is_oa":true,"oa_status":"gold","oa_url":"https://ieeexplore.ieee.org/ielx7/6287639/9312710/09369313.pdf","any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5026054483","display_name":"Yufei Zhao","orcid":"https://orcid.org/0000-0002-9647-3827"},"institutions":[{"id":"https://openalex.org/I82880672","display_name":"Beihang University","ror":"https://ror.org/00wk2mp56","country_code":"CN","type":"funder","lineage":["https://openalex.org/I82880672"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Yufei Zhao","raw_affiliation_strings":["State Key Laboratory of Software Development Environment, Beihang University, Beijing, China"],"affiliations":[{"raw_affiliation_string":"State Key Laboratory of Software Development Environment, Beihang University, Beijing, China","institution_ids":["https://openalex.org/I82880672"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5101750528","display_name":"Liqun Yang","orcid":"https://orcid.org/0000-0002-5498-3474"},"institutions":[{"id":"https://openalex.org/I82880672","display_name":"Beihang University","ror":"https://ror.org/00wk2mp56","country_code":"CN","type":"funder","lineage":["https://openalex.org/I82880672"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Liqun Yang","raw_affiliation_strings":["State Key Laboratory of Software Development Environment, Beihang University, Beijing, China"],"affiliations":[{"raw_affiliation_string":"State Key Laboratory of Software Development Environment, Beihang University, Beijing, China","institution_ids":["https://openalex.org/I82880672"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5036786337","display_name":"Zhoujun Li","orcid":"https://orcid.org/0000-0002-9603-9713"},"institutions":[{"id":"https://openalex.org/I82880672","display_name":"Beihang University","ror":"https://ror.org/00wk2mp56","country_code":"CN","type":"funder","lineage":["https://openalex.org/I82880672"]},{"id":"https://openalex.org/I180726961","display_name":"Shenzhen University","ror":"https://ror.org/01vy4gh70","country_code":"CN","type":"funder","lineage":["https://openalex.org/I180726961"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Zhoujun Li","raw_affiliation_strings":["College of Computer Science and Software Engineering, Shenzhen University, Shenzhen, China","State Key Laboratory of Software Development Environment, Beihang University, Beijing, China"],"affiliations":[{"raw_affiliation_string":"State Key Laboratory of Software Development Environment, Beihang University, Beijing, China","institution_ids":["https://openalex.org/I82880672"]},{"raw_affiliation_string":"College of Computer Science and Software Engineering, Shenzhen University, Shenzhen, China","institution_ids":["https://openalex.org/I180726961"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5083944036","display_name":"Longtao He","orcid":"https://orcid.org/0000-0001-7072-7457"},"institutions":[{"id":"https://openalex.org/I4210087772","display_name":"National Computer Network Emergency Response Technical Team/Coordination Center of Chinar","ror":"https://ror.org/00247dh76","country_code":"CN","type":"nonprofit","lineage":["https://openalex.org/I4210087772"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Longtao He","raw_affiliation_strings":["National Computer Network Emergency Response Technical Team/Coordination Center of China, Beijing, China"],"affiliations":[{"raw_affiliation_string":"National Computer Network Emergency Response Technical Team/Coordination Center of China, Beijing, China","institution_ids":["https://openalex.org/I4210087772"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5100730687","display_name":"Yipeng Zhang","orcid":"https://orcid.org/0000-0003-0664-5101"},"institutions":[{"id":"https://openalex.org/I82880672","display_name":"Beihang University","ror":"https://ror.org/00wk2mp56","country_code":"CN","type":"funder","lineage":["https://openalex.org/I82880672"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Yipeng Zhang","raw_affiliation_strings":["State Key Laboratory of Software Development Environment, Beihang University, Beijing, China"],"affiliations":[{"raw_affiliation_string":"State Key Laboratory of Software Development Environment, Beihang University, Beijing, China","institution_ids":["https://openalex.org/I82880672"]}]}],"institution_assertions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":[],"corresponding_institution_ids":[],"apc_list":{"value":1850,"currency":"USD","value_usd":1850},"apc_paid":{"value":1850,"currency":"USD","value_usd":1850},"fwci":0.532,"has_fulltext":false,"cited_by_count":4,"citation_normalized_percentile":{"value":0.661674,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":75,"max":78},"biblio":{"volume":"9","issue":null,"first_page":"44502","last_page":"44513"},"is_retracted":false,"is_paratext":false,"primary_topic":{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9998,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9998,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12479","display_name":"Web Application Security Vulnerabilities","score":0.9985,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11424","display_name":"Security and Verification in Computing","score":0.9974,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/leakage","display_name":"Leakage (economics)","score":0.62049025},{"id":"https://openalex.org/keywords/information-leakage","display_name":"Information leakage","score":0.61267024},{"id":"https://openalex.org/keywords/privacy-protection","display_name":"Privacy Protection","score":0.50783736},{"id":"https://openalex.org/keywords/private-information-retrieval","display_name":"Private information retrieval","score":0.46696287},{"id":"https://openalex.org/keywords/information-sensitivity","display_name":"Information sensitivity","score":0.43394727},{"id":"https://openalex.org/keywords/privacy-software","display_name":"Privacy software","score":0.42748985}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.79480195},{"id":"https://openalex.org/C2777042071","wikidata":"https://www.wikidata.org/wiki/Q6509304","display_name":"Leakage (economics)","level":2,"score":0.62049025},{"id":"https://openalex.org/C2779201187","wikidata":"https://www.wikidata.org/wiki/Q2775060","display_name":"Information leakage","level":2,"score":0.61267024},{"id":"https://openalex.org/C93996380","wikidata":"https://www.wikidata.org/wiki/Q44127","display_name":"Server","level":2,"score":0.59457564},{"id":"https://openalex.org/C123201435","wikidata":"https://www.wikidata.org/wiki/Q456632","display_name":"Information privacy","level":2,"score":0.5801985},{"id":"https://openalex.org/C3017597292","wikidata":"https://www.wikidata.org/wiki/Q25052250","display_name":"Privacy protection","level":2,"score":0.50783736},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.48557252},{"id":"https://openalex.org/C99221444","wikidata":"https://www.wikidata.org/wiki/Q1532069","display_name":"Private information retrieval","level":2,"score":0.46696287},{"id":"https://openalex.org/C137822555","wikidata":"https://www.wikidata.org/wiki/Q2587068","display_name":"Information sensitivity","level":2,"score":0.43394727},{"id":"https://openalex.org/C509729295","wikidata":"https://www.wikidata.org/wiki/Q7246032","display_name":"Privacy software","level":3,"score":0.42748985},{"id":"https://openalex.org/C169093310","wikidata":"https://www.wikidata.org/wiki/Q3702971","display_name":"Personally identifiable information","level":2,"score":0.4223678},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.22466987},{"id":"https://openalex.org/C162324750","wikidata":"https://www.wikidata.org/wiki/Q8134","display_name":"Economics","level":0,"score":0.0},{"id":"https://openalex.org/C139719470","wikidata":"https://www.wikidata.org/wiki/Q39680","display_name":"Macroeconomics","level":1,"score":0.0}],"mesh":[],"locations_count":2,"locations":[{"is_oa":true,"landing_page_url":"https://doi.org/10.1109/access.2021.3063814","pdf_url":"https://ieeexplore.ieee.org/ielx7/6287639/9312710/09369313.pdf","source":{"id":"https://openalex.org/S2485537415","display_name":"IEEE Access","issn_l":"2169-3536","issn":["2169-3536"],"is_oa":true,"is_in_doaj":true,"is_indexed_in_scopus":true,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true},{"is_oa":false,"landing_page_url":"https://doaj.org/article/e07e4677e09a4a6ab69c877616573544","pdf_url":null,"source":{"id":"https://openalex.org/S4306401280","display_name":"DOAJ (DOAJ: Directory of Open Access Journals)","issn_l":null,"issn":null,"is_oa":true,"is_in_doaj":false,"is_indexed_in_scopus":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":null,"is_accepted":false,"is_published":false}],"best_oa_location":{"is_oa":true,"landing_page_url":"https://doi.org/10.1109/access.2021.3063814","pdf_url":"https://ieeexplore.ieee.org/ielx7/6287639/9312710/09369313.pdf","source":{"id":"https://openalex.org/S2485537415","display_name":"IEEE Access","issn_l":"2169-3536","issn":["2169-3536"],"is_oa":true,"is_in_doaj":true,"is_indexed_in_scopus":true,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true},"sustainable_development_goals":[{"score":0.62,"display_name":"Peace, justice, and strong institutions","id":"https://metadata.un.org/sdg/16"}],"grants":[{"funder":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China","award_id":"61370126"},{"funder":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China","award_id":"U1636211"},{"funder":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China","award_id":"61672081"},{"funder":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China","award_id":"61906075"},{"funder":"https://openalex.org/F4320321921","funder_display_name":"Natural Science Foundation of Guangdong Province","award_id":"2019A1515011920"},{"funder":"https://openalex.org/F4320326978","funder_display_name":"State Key Laboratory of Software Development Environment","award_id":"SKLSDE-2019ZX-17"},{"funder":"https://openalex.org/F4320333617","funder_display_name":"Beijing Advanced Innovation Center for Imaging Technology","award_id":"BAICIT-2016001"}],"datasets":[],"versions":[],"referenced_works_count":28,"referenced_works":["https://openalex.org/W1598325486","https://openalex.org/W1688725932","https://openalex.org/W1852822942","https://openalex.org/W1992455053","https://openalex.org/W2051590127","https://openalex.org/W2067488563","https://openalex.org/W2099474262","https://openalex.org/W2169771430","https://openalex.org/W2189652372","https://openalex.org/W2258082031","https://openalex.org/W2566957828","https://openalex.org/W2578355414","https://openalex.org/W2590472464","https://openalex.org/W2593990469","https://openalex.org/W2604188240","https://openalex.org/W2723746209","https://openalex.org/W2750799145","https://openalex.org/W2758927433","https://openalex.org/W2766514849","https://openalex.org/W2771281827","https://openalex.org/W2891060526","https://openalex.org/W2944306435","https://openalex.org/W2963619203","https://openalex.org/W2982878693","https://openalex.org/W2991190335","https://openalex.org/W3008279942","https://openalex.org/W3015392158","https://openalex.org/W3028660219"],"related_works":["https://openalex.org/W4396982325","https://openalex.org/W4288075818","https://openalex.org/W3177396334","https://openalex.org/W3122800147","https://openalex.org/W3080908196","https://openalex.org/W3022534164","https://openalex.org/W2950284593","https://openalex.org/W2784486299","https://openalex.org/W2379795947","https://openalex.org/W2363419651"],"abstract_inverted_index":{"The":[0,11],"wide":[1],"use":[2],"of":[3,83,164,177,192,219],"browser":[4,91],"extensions":[5,102,144,166],"brings":[6],"the":[7,27,34,39,64,81,84,113,120,129,178,182,196,204,210,216],"privacy":[8,20,40,57,93,99,122,169],"leakage":[9,21,114,123],"problem.":[10],"previous":[12],"works":[13],"detected":[14],"private":[15],"data":[16,41],"transmission":[17,35,45],"to":[18,31,68,74,79,119,157],"find":[19],"in":[22,44,133,152],"Chrome":[23],"or":[24],"Firefox,":[25],"but":[26],"real":[28,135],"challenge":[29],"is":[30,36,140,161],"determine":[32],"whether":[33],"reasonable":[37],"because":[38],"that":[42,167,208],"existed":[43],"does":[46],"not":[47],"absolutely":[48],"mean":[49],"leaking.":[50],"To":[51],"this":[52,127],"end,":[53],"we":[54,87],"establish":[55],"a":[56,89,134,162,174],"model":[58],"for":[59,101,189],"each":[60,190],"extension,":[61],"which":[62,145],"contains":[63],"sensitive":[65],"information":[66,197],"permitted":[67],"be":[69],"used":[70],"and":[71,103,137,186,194,203],"servers":[72],"authorized":[73],"communicate":[75],"with.":[76],"In":[77,126],"order":[78],"evaluate":[80],"effectiveness":[82],"proposed":[85],"method,":[86],"develop":[88],"dynamic":[90],"extension":[92,201],"detection":[94,220],"framework.":[95],"It":[96],"first":[97],"builds":[98],"models":[100],"records":[104],"all":[105],"network":[106],"traffic":[107],"when":[108],"accessing":[109],"test":[110],"pages.":[111],"Then,":[112],"results":[115,179,217],"are":[116,131,146],"presented":[117],"according":[118],"strict":[121],"judgment":[124],"rules.":[125],"paper,":[128],"experiments":[130],"conducted":[132],"environment,":[136],"our":[138],"work":[139],"verified":[141],"by":[142,199],"34,095":[143],"collected":[147],"from":[148,154],"3":[149],"mainstream":[150],"browsers":[151],"China":[153],"November":[155],"2019":[156],"August":[158],"2020.":[159],"There":[160],"total":[163],"2,983":[165],"exist":[168],"leakage.":[170],"We":[171],"further":[172],"conduct":[173],"comprehensive":[175],"analysis":[176],"including":[180],"calculating":[181],"precision,":[183],"recall,":[184],"accuracy,":[185],"F1":[187],"score":[188],"type":[191],"leakage,":[193],"show":[195],"leaked":[198],"different":[200],"categories":[202],"malicious":[205],"domain":[206],"name":[207],"collecting":[209],"users'":[211],"privacy,":[212],"as":[213,215],"well":[214],"changing":[218],"over":[221],"time.":[222]},"abstract_inverted_index_v3":null,"cited_by_api_url":"https://api.openalex.org/works?filter=cites:W3135006341","counts_by_year":[{"year":2023,"cited_by_count":1},{"year":2022,"cited_by_count":2},{"year":2021,"cited_by_count":1}],"updated_date":"2025-05-04T06:17:26.321050","created_date":"2021-03-15"}