{"id":"https://openalex.org/W3164055163","doi":"https://doi.org/10.1145/3460120.3484546","title":"Dissecting Click Fraud Autonomy in the Wild","display_name":"Dissecting Click Fraud Autonomy in the Wild","publication_year":2021,"publication_date":"2021-11-12","ids":{"openalex":"https://openalex.org/W3164055163","doi":"https://doi.org/10.1145/3460120.3484546","mag":"3164055163"},"language":"en","primary_location":{"is_oa":false,"landing_page_url":"https://doi.org/10.1145/3460120.3484546","pdf_url":null,"source":{"id":"https://openalex.org/S4363608815","display_name":"Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_indexed_in_scopus":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"conference"},"license":null,"license_id":null,"version":null,"is_accepted":false,"is_published":false},"type":"article","type_crossref":"proceedings-article","indexed_in":["arxiv","crossref","datacite"],"open_access":{"is_oa":true,"oa_status":"green","oa_url":"https://arxiv.org/pdf/2105.11103","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5113739553","display_name":"Tong Zhu","orcid":null},"institutions":[{"id":"https://openalex.org/I183067930","display_name":"Shanghai Jiao Tong University","ror":"https://ror.org/0220qvk04","country_code":"CN","type":"funder","lineage":["https://openalex.org/I183067930"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Tong Zhu","raw_affiliation_strings":["Shanghai Jiao Tong University, Shanghai, China"],"affiliations":[{"raw_affiliation_string":"Shanghai Jiao Tong University, Shanghai, China","institution_ids":["https://openalex.org/I183067930"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5076583947","display_name":"Yan Meng","orcid":"https://orcid.org/0000-0001-5445-0347"},"institutions":[{"id":"https://openalex.org/I183067930","display_name":"Shanghai Jiao Tong University","ror":"https://ror.org/0220qvk04","country_code":"CN","type":"funder","lineage":["https://openalex.org/I183067930"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Yan Meng","raw_affiliation_strings":["Shanghai Jiao Tong University, Shanghai, China"],"affiliations":[{"raw_affiliation_string":"Shanghai Jiao Tong University, Shanghai, China","institution_ids":["https://openalex.org/I183067930"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5009839672","display_name":"Haotian Hu","orcid":"https://orcid.org/0000-0002-4112-8719"},"institutions":[{"id":"https://openalex.org/I183067930","display_name":"Shanghai Jiao Tong University","ror":"https://ror.org/0220qvk04","country_code":"CN","type":"funder","lineage":["https://openalex.org/I183067930"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Haotian Hu","raw_affiliation_strings":["Shanghai Jiao Tong University, Shanghai, China"],"affiliations":[{"raw_affiliation_string":"Shanghai Jiao Tong University, Shanghai, China","institution_ids":["https://openalex.org/I183067930"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5071738824","display_name":"Xiaokuan Zhang","orcid":"https://orcid.org/0000-0002-4646-7146"},"institutions":[{"id":"https://openalex.org/I52357470","display_name":"The Ohio State University","ror":"https://ror.org/00rs6vg23","country_code":"US","type":"funder","lineage":["https://openalex.org/I52357470"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Xiaokuan Zhang","raw_affiliation_strings":["The Ohio State University, Columbus, OH, USA"],"affiliations":[{"raw_affiliation_string":"The Ohio State University, Columbus, OH, USA","institution_ids":["https://openalex.org/I52357470"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5009850797","display_name":"Minhui Xue","orcid":"https://orcid.org/0000-0002-9172-4252"},"institutions":[{"id":"https://openalex.org/I5681781","display_name":"The University of Adelaide","ror":"https://ror.org/00892tw58","country_code":"AU","type":"funder","lineage":["https://openalex.org/I5681781"]}],"countries":["AU"],"is_corresponding":false,"raw_author_name":"Minhui Xue","raw_affiliation_strings":["The University of Adelaide, Adelaide, Australia"],"affiliations":[{"raw_affiliation_string":"The University of Adelaide, Adelaide, Australia","institution_ids":["https://openalex.org/I5681781"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5039106671","display_name":"Haojin Zhu","orcid":"https://orcid.org/0000-0001-5079-4556"},"institutions":[{"id":"https://openalex.org/I183067930","display_name":"Shanghai Jiao Tong University","ror":"https://ror.org/0220qvk04","country_code":"CN","type":"funder","lineage":["https://openalex.org/I183067930"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Haojin Zhu","raw_affiliation_strings":["Shanghai Jiao Tong University, Shanghai, China"],"affiliations":[{"raw_affiliation_string":"Shanghai Jiao Tong University, Shanghai, China","institution_ids":["https://openalex.org/I183067930"]}]}],"institution_assertions":[],"countries_distinct_count":3,"institutions_distinct_count":3,"corresponding_author_ids":[],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":1.2,"has_fulltext":true,"fulltext_origin":"pdf","cited_by_count":9,"citation_normalized_percentile":{"value":0.657005,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":85,"max":86},"biblio":{"volume":null,"issue":null,"first_page":null,"last_page":null},"is_retracted":false,"is_paratext":false,"primary_topic":{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9999,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9999,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11644","display_name":"Spam and Phishing Detection","score":0.9835,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9589,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/leverage","display_name":"Leverage (statistics)","score":0.5593624},{"id":"https://openalex.org/keywords/autoencoder","display_name":"Autoencoder","score":0.5264412},{"id":"https://openalex.org/keywords/click-through-rate","display_name":"Click-through rate","score":0.49310204}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.78746885},{"id":"https://openalex.org/C557433098","wikidata":"https://www.wikidata.org/wiki/Q94","display_name":"Android (operating system)","level":2,"score":0.62918115},{"id":"https://openalex.org/C60692881","wikidata":"https://www.wikidata.org/wiki/Q584529","display_name":"Humanoid robot","level":3,"score":0.6143757},{"id":"https://openalex.org/C153083717","wikidata":"https://www.wikidata.org/wiki/Q6535263","display_name":"Leverage (statistics)","level":2,"score":0.5593624},{"id":"https://openalex.org/C101738243","wikidata":"https://www.wikidata.org/wiki/Q786435","display_name":"Autoencoder","level":3,"score":0.5264412},{"id":"https://openalex.org/C115174607","wikidata":"https://www.wikidata.org/wiki/Q1100934","display_name":"Click-through rate","level":2,"score":0.49310204},{"id":"https://openalex.org/C109297577","wikidata":"https://www.wikidata.org/wiki/Q161157","display_name":"Password","level":2,"score":0.48036608},{"id":"https://openalex.org/C2779913896","wikidata":"https://www.wikidata.org/wiki/Q7063001","display_name":"Notice","level":2,"score":0.42039186},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.42023963},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.35649502},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.30395633},{"id":"https://openalex.org/C50644808","wikidata":"https://www.wikidata.org/wiki/Q192776","display_name":"Artificial neural network","level":2,"score":0.14880684},{"id":"https://openalex.org/C17744445","wikidata":"https://www.wikidata.org/wiki/Q36442","display_name":"Political science","level":0,"score":0.0},{"id":"https://openalex.org/C199539241","wikidata":"https://www.wikidata.org/wiki/Q7748","display_name":"Law","level":1,"score":0.0},{"id":"https://openalex.org/C90509273","wikidata":"https://www.wikidata.org/wiki/Q11012","display_name":"Robot","level":2,"score":0.0},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.0}],"mesh":[],"locations_count":3,"locations":[{"is_oa":false,"landing_page_url":"https://doi.org/10.1145/3460120.3484546","pdf_url":null,"source":{"id":"https://openalex.org/S4363608815","display_name":"Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_indexed_in_scopus":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"conference"},"license":null,"license_id":null,"version":null,"is_accepted":false,"is_published":false},{"is_oa":true,"landing_page_url":"https://arxiv.org/abs/2105.11103","pdf_url":"https://arxiv.org/pdf/2105.11103","source":{"id":"https://openalex.org/S4306400194","display_name":"arXiv (Cornell University)","issn_l":null,"issn":null,"is_oa":true,"is_in_doaj":false,"is_indexed_in_scopus":false,"is_core":false,"host_organization":"https://openalex.org/I205783295","host_organization_name":"Cornell University","host_organization_lineage":["https://openalex.org/I205783295"],"host_organization_lineage_names":["Cornell University"],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false},{"is_oa":false,"landing_page_url":"https://api.datacite.org/dois/10.48550/arxiv.2105.11103","pdf_url":null,"source":{"id":"https://openalex.org/S4393179698","display_name":"DataCite API","issn_l":null,"issn":null,"is_oa":true,"is_in_doaj":false,"is_indexed_in_scopus":false,"is_core":false,"host_organization":"https://openalex.org/I4210145204","host_organization_name":"DataCite","host_organization_lineage":["https://openalex.org/I4210145204"],"host_organization_lineage_names":["DataCite"],"type":"metadata"},"license":null,"license_id":null,"version":null}],"best_oa_location":{"is_oa":true,"landing_page_url":"https://arxiv.org/abs/2105.11103","pdf_url":"https://arxiv.org/pdf/2105.11103","source":{"id":"https://openalex.org/S4306400194","display_name":"arXiv (Cornell University)","issn_l":null,"issn":null,"is_oa":true,"is_in_doaj":false,"is_indexed_in_scopus":false,"is_core":false,"host_organization":"https://openalex.org/I205783295","host_organization_name":"Cornell University","host_organization_lineage":["https://openalex.org/I205783295"],"host_organization_lineage_names":["Cornell University"],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false},"sustainable_development_goals":[{"score":0.75,"display_name":"Peace, justice, and strong institutions","id":"https://metadata.un.org/sdg/16"}],"grants":[{"funder":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China","award_id":"62132013, 61972453"},{"funder":"https://openalex.org/F4320334704","funder_display_name":"Australian Research Council","award_id":"DP210102670"}],"datasets":[],"versions":["https://openalex.org/W3164055163","https://openalex.org/W3212703303"],"referenced_works_count":40,"referenced_works":["https://openalex.org/W1568244855","https://openalex.org/W1781642226","https://openalex.org/W187285683","https://openalex.org/W1943546595","https://openalex.org/W2025827699","https://openalex.org/W2080696000","https://openalex.org/W2087804676","https://openalex.org/W2097470225","https://openalex.org/W2099937944","https://openalex.org/W2150957322","https://openalex.org/W2152065333","https://openalex.org/W2155841152","https://openalex.org/W2157286909","https://openalex.org/W2166743230","https://openalex.org/W2286924183","https://openalex.org/W2293863768","https://openalex.org/W2400269587","https://openalex.org/W2407313496","https://openalex.org/W2478047135","https://openalex.org/W2518060702","https://openalex.org/W2532717356","https://openalex.org/W2613948935","https://openalex.org/W2618014206","https://openalex.org/W2751855490","https://openalex.org/W2808617203","https://openalex.org/W2913135383","https://openalex.org/W2913950235","https://openalex.org/W2919990070","https://openalex.org/W2962736666","https://openalex.org/W2980720901","https://openalex.org/W2999900776","https://openalex.org/W3011869339","https://openalex.org/W3029868457","https://openalex.org/W3045496722","https://openalex.org/W3138613405","https://openalex.org/W369254515","https://openalex.org/W4236990373","https://openalex.org/W4244726870","https://openalex.org/W4288482434","https://openalex.org/W59191864"],"related_works":["https://openalex.org/W4297051394","https://openalex.org/W3131327266","https://openalex.org/W3013693939","https://openalex.org/W2909431601","https://openalex.org/W2803255133","https://openalex.org/W2752972570","https://openalex.org/W2734887215","https://openalex.org/W2566616303","https://openalex.org/W2159052453","https://openalex.org/W2145836866"],"abstract_inverted_index":{"Although":[0],"the":[1,7,10,68,99,105,143],"use":[2],"of":[3,9,90,101,146],"pay-per-click":[4],"mechanisms":[5],"stimulates":[6],"prosperity":[8],"mobile":[11],"advertisement":[12],"network,":[13],"fraudulent":[14,58,91],"ad":[15],"clicks":[16,59],"result":[17],"in":[18,38,104],"huge":[19],"financial":[20],"losses":[21],"for":[22],"advertisers.":[23],"Extensive":[24],"studies":[25],"identify":[26,42],"click":[27,45],"fraud":[28],"according":[29],"to":[30,63,72,97,120,141],"click/traffic":[31],"patterns":[32,62,100],"based":[33,79,116],"on":[34,76,80,117,138],"dynamic":[35],"analysis.":[36],"However,":[37],"this":[39],"study,":[40],"we":[41],"a":[43,111,127,133],"novel":[44,95],"fraud,":[46],"named":[47],"humanoid":[48,74,102,147],"attack,":[49],"which":[50],"can":[51],"circumvent":[52],"existing":[53],"detection":[54],"schemes":[55],"by":[56],"generating":[57],"with":[60,87],"similar":[61],"normal":[64],"clicks.":[65],"We":[66,93,130],"implement":[67],"first":[69],"tool":[70],"ClickScanner":[71,109],"detect":[73],"attacks":[75,103],"Android":[77],"apps":[78],"static":[81,118],"analysis":[82,119],"and":[83,125],"variational":[84],"AutoEncoders":[85],"(VAEs)":[86],"limited":[88,144],"knowledge":[89,145],"examples.":[92],"define":[94],"features":[96,124],"characterize":[98],"apps'":[106],"bytecode":[107],"level.":[108],"builds":[110],"data":[112],"dependency":[113],"graph":[114],"(DDG)":[115],"extract":[121],"these":[122],"key":[123],"form":[126],"feature":[128],"vector.":[129],"then":[131],"propose":[132],"classification":[134],"model":[135],"only":[136],"trained":[137],"benign":[139],"datasets":[140],"overcome":[142],"attacks.":[148]},"abstract_inverted_index_v3":null,"cited_by_api_url":"https://api.openalex.org/works?filter=cites:W3164055163","counts_by_year":[{"year":2024,"cited_by_count":3},{"year":2023,"cited_by_count":3},{"year":2022,"cited_by_count":3}],"updated_date":"2025-04-03T08:07:47.506421","created_date":"2021-06-07"}