[[1] E. Zuckerman, “The internet’s original sin,” The Atlantic, vol. 14, August 2014. [Online]. Available: https://www.theatlantic.com/technology/archive/2014/08/advertising-is-the-internets-original-sin/376041/]Search in Google Scholar
[[2] N. Bielova, “Web tracking technologies and protection mechanisms,” in Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security, 2017.10.1145/3133956.3136067]Search in Google Scholar
[[3] G. Acar, C. Eubank, S. Englehardt, M. Juarez, A. Narayanan, and C. Diaz, “The web never forgets: Persistent tracking mechanisms in the wild,” in Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security, 2014.10.1145/2660267.2660347]Search in Google Scholar
[[4] J. R. Mayer and J. C. Mitchell, “Third-party web tracking: Policy and technology,” in 2012 IEEE Symposium on Security and Privacy, 2012.10.1109/SP.2012.47]Search in Google Scholar
[[5] N. F. Awad and M. S. Krishnan, “The personalization privacy paradox: An empirical evaluation of information transparency and the willingness to be profiled online for personalization,” MIS Quarterly, vol. 30, no. 1, pp. 13–28, March 2006.10.2307/25148715]Search in Google Scholar
[[6] M. Taddicken, “The ’privacy paradox’ in the social web: The impact of privacy concerns, individual characteristics, and the perceived social relevance on different forms of self-disclosure,” Journal of Computer-Mediated Communication, vol. 19, no. 2, p. 248–273, January 2014.10.1111/jcc4.12052]Search in Google Scholar
[[7] S. Fulton and J. Fulton, HTML5 Canvas. O’Reilly Media, Inc., 2011.]Search in Google Scholar
[[8] K. Mowery and H. Shacham, “Pixel perfect: Fingerprinting canvas in HTML5,” in Proceedings of W2SP, 2012.]Search in Google Scholar
[[9] S. Wu, S. Li, Y. Cao, and N. Wang, “Rendered private: Making GLSL execution uniform to prevent WebGL-based browser fingerprinting,” in 28th USENIX Security Symposium, 2019.]Search in Google Scholar
[[10] P. Laperdrix, N. Bielova, B. Baudry, and G. Avoine, “Browser fingerprinting: A survey,” ACM Transactions on the Web (TWEB), vol. 14, no. 2, pp. 1–33, 2020.10.1145/3386040]Search in Google Scholar
[[11] S. Luangmaneerote, E. Zaluska, and L. Carr, “Survey of existing fingerprint countermeasures,” in 2016 International Conference on Information Society (i-Society), 2016.10.1109/i-Society.2016.7854198]Search in Google Scholar
[[12] L. N. Smith, “A disciplined approach to neural network hyper-parameters: Part 1 – learning rate, batch size, momentum, and weight decay,” US Naval Research Laboratory, Technical Report 5510-026, 2018.]Search in Google Scholar
[[13] S. Haiduc, J. Aponte, L. Moreno, and A. Marcus, “On the use of automated text summarization techniques for summarizing source code,” in 2010 17th Working Conference on Reverse Engineering, 2010.10.1109/WCRE.2010.13]Search in Google Scholar
[[14] S. Clark, M. Blaze, and J. M. Smith, “Smearing fingerprints: Changing the game of web tracking with composite privacy,” in Cambridge International Workshop on Security Protocols, 2015.10.1007/978-3-319-26096-9_19]Search in Google Scholar
[[15] M. Ikram, H. J. Asghar, M. A. Kaafar, A. Mahanti, and B. Krishnamurthy, “Towards seamless tracking-free web: Improved detection of trackers via one-class learning,” Proceedings on Privacy Enhancing Technologies, vol. 2017, no. 1, pp. 79–99, 2017.]Search in Google Scholar
[[16] T. Bujlow, V. Carela-Español, J. Solé-Pareta, and P. Barlet-Ros, “A survey on web tracking: Mechanisms, implications, and defenses,” Proceedings of the IEEE, vol. 105, no. 8, pp. 1476–1510, August 2017.]Search in Google Scholar
[[17] Electronic Frontier Foundation, “Panopticlcick,” https://panopticlick.eff.org/.]Search in Google Scholar
[[18] R. Upathilake, Y. Li, and A. Matrawy, “A classification of web browser fingerprinting techniques,” in 2015 7th International Conference on New Technologies, Mobility and Security (NTMS), 2015.10.1109/NTMS.2015.7266460]Search in Google Scholar
[[19] L. I. Millett, B. Friedman, and E. Felten, “Cookies and web browser design: Toward realizing informed consent online,” in Proceedings of the SIGCHI conference on Human factors in computing systems, 2001.10.1145/365024.365034]Search in Google Scholar
[[20] O. Kulyk, A. Hilt, N. Gerber, and M. Volkamer, “‘this website uses cookies’: Users’ perceptions and reactions to the cookie disclaimer,” in European Workshop on Usable Security (EuroUSEC) 2018, April 2018.10.14722/eurousec.2018.23012]Search in Google Scholar
[[21] F. Marotta-Wurgler, “Does “notice and choice” disclosure regulation work? an empirical study of privacy policies,” in Michigan Law: Law and Economics Workshop, 2015. [Online]. Available: https://perma.cc/GYN4-3YFA]Search in Google Scholar
[[22] J. R. Reidenberg, N. C. Russell, A. Callen, S. Qasir, and T. Norton, “Privacy harms and the effectiveness of the notice and choice framework,” I/S: A Journal of Law and Policy for the Information Society, pp. 485–524, 2014.10.2139/ssrn.2418247]Search in Google Scholar
[[23] N. Richards and W. Hartzog, “The pathologies of digital consent,” Washington University Law Review, vol. 96, pp. 1461–1503, 2019.]Search in Google Scholar
[[24] S. Englehardt, D. Reisman, C. Eubank, P. Zimmerman, J. Mayer, A. Narayanan, and E. W. Felten, “Cookies that give you away: The surveillance implications of web tracking,” in Proceedings of the 24th International Conference on World Wide Web, 2015.10.1145/2736277.2741679]Search in Google Scholar
[[25] M. Perry, E. Clark, S. Murdoch, and G. Koppen, “The design and implementation of the Tor Browser [draft],” June 2018, https://2019.www.torproject.org/projects/torbrowser/design/.]Search in Google Scholar
[[26] Inform Action, “noscript,” https://noscript.net.]Search in Google Scholar
[[27] A. Macrina and E. Phetteplace, “The Tor Browser and intellectual freedom in the digital age,” Reference and User Services Quarterly, vol. 54, no. 4, pp. 17–20, 2015.10.5860/rusq.54n4.17]Search in Google Scholar
[[28] M. Piekarska, Y. Zhou, D. Strohmeier, and A. Raake, “Because we care: Privacy dashboard on FirefoxOS,” arXiv, 2015. [Online]. Available: https://arxiv.org/abs/1506.04105]Search in Google Scholar
[[29] C. E. Shannon, “A mathematical theory of communication,” Bell Syst. Tech., vol. 27, pp. 379–423, 1948. [Online]. Available: https://arxiv.org/abs/1506.0410510.1002/j.1538-7305.1948.tb01338.x]Search in Google Scholar
[[30] Y. Cao, S. Li, E. Wijmans et al., “(Cross-) browser finger-printing via OS and hardware level features.” in Proceedings of the 2017 Network and Distributed System Security Symposium, 2017.10.14722/ndss.2017.23152]Search in Google Scholar
[[31] Mozilla, “HTMLCanvasElement.toDataURL(),” https://developer.mozilla.org/en-US/docs/Web/API/HTMLCanvasElement/toDataURL.]Search in Google Scholar
[[32] N. Reitinger, “Faces and fingers: Authentication,” Journal of High Technology Law, vol. 20, no. 1, pp. 61–81, 2020.10.31228/osf.io/venxt]Search in Google Scholar
[[33] E. Bursztein, A. Malyshev, T. Pietraszek, and K. Thomas, “Picasso: Lightweight device class fingerprinting for web clients,” in Proceedings of the 6th Workshop on Security and Privacy in Smartphones and Mobile Devices, 2016.10.1145/2994459.2994467]Search in Google Scholar
[[34] fingerprintJS, “FPJS - Valve,” https://github.com/Valve/fingerprintjs2.]Search in Google Scholar
[[35] antoinevastel, “Picasso based canvas fingerprinting,” https://github.com/antoinevastel/picasso-like-canvas-fingerprinting.]Search in Google Scholar
[[36] S. Englehardt and A. Narayanan, “Online tracking: A 1-million-site measurement and analysis,” in Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, 2016.10.1145/2976749.2978313]Search in Google Scholar
[[37] Mozilla, “OpenWPM,” https://github.com/mozilla/OpenWPM.]Search in Google Scholar
[[38] P. Laperdrix, “Browser fingerprinting: Exploring device diversity to augment authentification and build client-side countermeasures,” Cryptography and Security [cs.CR]. INSA de Rennes, 2017. [Online]. Available: https://tel.archives-ouvertes.fr/tel-01729126/document]Search in Google Scholar
[[39] N. Bielova, F. Besson, and T. Jensen, “Using JavaScript monitoring to prevent device fingerprinting,” ERCIM News, vol. 106, July 2016. [Online]. Available: https://ercim-news.ercim.eu/images/stories/EN106/EN106-web.pdf]Search in Google Scholar
[[40] G. Merzdovnik, M. Huber, D. Buhov, N. Nikiforakis, S. Neuner, M. Schmiedecker, and E. Weippl, “Block me if you can: A large-scale study of tracker-blocking tools,” in 2017 IEEE Symposium on Security and Privacy, 2017.10.1109/EuroSP.2017.26]Search in Google Scholar
[[41] Appodrome, “CanvasFingerprintBlock,” https://chrome.google.com/webstore/detail/canvasfingerprintblock/ipmjngkmngdcdpmgmiebdmfbkcecdndc.]Search in Google Scholar
[[42] C. F. Torres, H. Jonker, and S. Mauw, “FP-Block: Usable web privacy by controlling browser fingerprinting,” in European Symposium on Research in Computer Security, 2015.10.1007/978-3-319-24177-7_1]Search in Google Scholar
[[43] N. Nikiforakis, W. Joosen, and B. Livshits, “Privaricator,” in Proceedings of the 24th International Conference on the World Wide Web, 2015.10.1145/2736277.2741090]Search in Google Scholar
[[44] A. ElBanna and N. Abdelbaki, “NONYM! ZER: Mitigation framework for browser fingerprinting,” in 2019 IEEE 19th International Conference on Software Quality, Reliability and Security Companion, 2019.10.1109/QRS-C.2019.00042]Search in Google Scholar
[[45] P. Baumann, S. Katzenbeisser, M. Stopczynski, and E. Tews, “Disguised Chromium browser: Robust browser, flash and canvas fingerprinting protection,” in Proceedings of the 2016 ACM on Workshop on Privacy in the Electronic Society, 2016.10.1145/2994620.2994621]Search in Google Scholar
[[46] P. Laperdrix, B. Baudry, and V. Mishra, “FPRandom: Randomizing core browser objects to break advanced device fingerprinting techniques,” in 9th International Symposium on Engineering Secure Software and Systems, 2017.10.1007/978-3-319-62105-0_7]Search in Google Scholar
[[47] P. Laperdrix, W. Rudametkin, and B. Baudry, “Mitigating browser fingerprint tracking: Multi-level reconfiguration and diversification,” in Proceedings of the IEEE/ACM 10th International Symposium on Software Engineering for Adaptive and Self-Managing Systems, 2015.10.1109/SEAMS.2015.18]Search in Google Scholar
[[48] A. Datta, J. Lu, and M. C. Tschantz, “Evaluating anti-fingerprinting privacy enhancing technologies,” in The Web Conference, 2019.10.1145/3308558.3313703]Search in Google Scholar
[[49] A. Vastel, P. Laperdrix, W. Rudametkin, and R. Rouvoy, “Fp-Scanner: The privacy implications of browser fingerprint inconsistencies,” in 27th USENIX Security Symposium, 2018.]Search in Google Scholar
[[50] The Tor Project, “Bug 6253: Add canvas image extraction prompt,” https://gitweb.torproject.org/torbrowser.git/commit/?h=tor-browser-52.5.2esr-7.0-2&id=196354d7951a48b4e6f5309d2a8e46962fff9d5f.]Search in Google Scholar
[[51] Disconnect, “Disconnect tracker protection,” https://github.com/disconnectme/disconnect-tracking-protection.]Search in Google Scholar
[[52] Wayback Machine, “ftc.gov, february 1, 2019,” https://web.archive.org/web/20190201065632/https://www.ftc.gov/ and https://web.archive.org/web/20190201050345js_/https://gateway.foresee.com/code/19.6.6/fs.utils.js.]Search in Google Scholar
[[53] N. Reitinger, “Strange bedfellows: Fingerprinting phenomena...or state.gov versus facebook.com,” https://medium.freecodecamp.org/strange-bedfellowsfingerprinting-phenomena-or-state-gov-versus-facebookcom-8d123866e7df.]Search in Google Scholar
[[54] A. Narayanan, January 2019, https://twitter.com/random_walker/status/1089897867458867200.]Search in Google Scholar
[[55] Disconnect, “services.json,” https://github.com/disconnectme/disconnect-tracking-protection/blob/master/services.json and https://perma.cc/C4GQ-XSUY.]Search in Google Scholar
[[56] A. FaizKhademi, M. Zulkernine, and K. Weldemariam, “FPGuard: Detection and prevention of browser fingerprinting,” in IFIP Annual Conference on Data and Applications Security and Privacy, 2015.10.1007/978-3-319-20810-7_21]Search in Google Scholar
[[57] WordPress.org, “#43264: WordPress emojis show up as browser fingerprinting and will be blocked in new versions of FireFox,” https://core.trac.wordpress.org/ticket/43264.]Search in Google Scholar
[[58] K. Boda, Á. M. Földes, G. G. Gulyás, and S. Imre, “User tracking on the web via cross-browser fingerprinting,” in Nordic Conference on Secure IT Systems, 2011.10.1007/978-3-642-29615-4_4]Search in Google Scholar
[[59] A. Gómez-Boix, D. Frey, Y.-D. Bromberg, and B. Baudry, “A collaborative strategy for mitigating tracking through browser fingerprinting,” in Proceedings of the 6th ACM Workshop on Moving Target Defense, 2019.10.1145/3338468.3356828]Search in Google Scholar
[[60] U. Iqbal, S. Englehardt, and Z. Shafiq, “Fingerprinting the fingerprinters: Learning to detect browser fingerprinting behaviors,” in 2021 IEEE Symposium on Security & Privacy, 2021.10.1109/SP40001.2021.00017]Search in Google Scholar
[[61] V. Rizzo, S. Traverso, and M. Mellia, “Unveiling web fingerprinting in the wild via code mining and machine learning,” Proceedings on Privacy Enhancing Technologies, vol. 1, pp. 43–63, 2021.10.2478/popets-2021-0004]Search in Google Scholar
[[62] S. Bird, V. Mishra, S. Englehardt, R. Willoughby, D. Zeber, W. Rudametkin, and M. Lopatka, “Actions speak louder than words: Semi-supervised learning for browser fingerprinting detection,” 2020, https://arxiv.org/pdf/2003.04463.pdf.]Search in Google Scholar
[[63] C.-H. Hsiao, M. Cafarella, and S. Narayanasamy, “Using web corpus statistics for program analysis,” in Proceedings of the 2014 ACM International Conference on Object Oriented Programming Systems Languages & Applications, 2014.10.1145/2660193.2660226]Search in Google Scholar
[[64] S. Robertson, “Understanding inverse document frequency: On theoretical arguments for IDF,” Journal of Documentation, vol. 60, no. 5, p. 503–520, 2004.10.1108/00220410410560582]Search in Google Scholar
[[65] W. S. Noble, “What is a support vector machine?” Nature Biotechnology, vol. 24, no. 12, p. 1565–1567, 2006.]Search in Google Scholar
[[66] D. E. Knuth, “Semantics of context-free languages. mathematical systems theory,” Mathematical systems theory, vol. 2, no. 2, pp. 127–145, 1968.10.1007/BF01692511]Search in Google Scholar
[[67] J. McCarthy, “A formal description of a subset of ALGOL,” Stanford University Department of Computer Science, Tech. Rep., 1964.10.21236/AD0785050]Search in Google Scholar
[[68] J. R. Quinlan, C4.5: Programs for Machine Learning. Morgan Kaufmann, 1994.]Search in Google Scholar
[[69] ——, “Induction of decision trees,” Machine learning, vol. 1, no. 1, pp. 81–106, 1986.10.1007/BF00116251]Search in Google Scholar
[[70] Selenium, “Selenium WebDriver,” https://www.selenium.dev.]Search in Google Scholar
[[71] Amazon Web Services, “Top sites in united states,” https://www.alexa.com/topsites/countries/US.]Search in Google Scholar
[[72] Mozilla, “webRequest,” https://developer.mozilla.org/en-US/docs/Mozilla/Add-ons/WebExtensions/API/webRequest.]Search in Google Scholar
[[73] MDN Web Docs, “webRequest.onBeforeRequest,” https://developer.mozilla.org/en-US/docs/Mozilla/Add-ons/WebExtensions/API/webRequest/onBeforeRequest.]Search in Google Scholar
[[74] PostgreSQL, “Postgresql: The world’s most advanced open source relational database,” https://www.postgresql.org.]Search in Google Scholar
[[75] Browserleaks.com, “HTML5 Canvas Fingerprinting,” https://browserleaks.com/canvas.]Search in Google Scholar
[[76] Wayback Machine, “justuno.com, october 31, 2018,” 2018, https://web.archive.org/web/20181031094820/cdn.justuno.com/mwgt_4.1.js?v=1.56.]Search in Google Scholar
[[77] tld, “tld 0.12.2,” https://pypi.org/project/tld/.]Search in Google Scholar
[[78] Google Cloud, “Natural language,” https://cloud.google.com/natural-language.]Search in Google Scholar
[[79] L. Luo, J. Ming, D. Wu, P. Liu, and S. Zhu, “Semantics-based obfuscation-resilient binary code similarity comparison with applications to software plagiarism detection,” in in Proceedings of the 22nd ACM SIGSOFT International Symposium on the Foundations of Software Engineering, 2014.10.1145/2635868.2635900]Search in Google Scholar
[[80] V. Raychev, M. Vechev, and A. Krause, “Predicting program properties from ‘Big Code’,” in Proceedings of the 42nd Annual ACM SIGPLAN-SIGACT Symposium on Principles of Programming Languages, 2015.10.1145/2676726.2677009]Search in Google Scholar
[[81] Requests, “Requests: HTTP for humans,” https://requests.readthedocs.io/en/master/.]Search in Google Scholar
[[82] brettlangdon, “Command line interface to http://jsnice.org,” https://github.com/brettlangdon/jsnice.]Search in Google Scholar
[[83] D. Koller and N. Friedman, Probabilistic Graphical Models: Principles and Techniques. MIT Press, 2009.]Search in Google Scholar
[[84] M. Chahal, “Information retrieval using Jaccard similarity coefficient,” International Journal of Computer Trends and Technology (IJCTT), vol. 36, no. 3, 2016.10.14445/22312803/IJCTT-V36P124]Search in Google Scholar
[[85] textdistance, “textdistance 4.2.0,” https://pypi.org/project/textdistance/.]Search in Google Scholar
[[86] W. Koehler, “Web page change and persistence—Ai’m not four-year longitudinal study,” Journal of the American Society for Information Science and Technology, vol. 53, no. 2, pp. 162–171, 2002.10.1002/asi.10018]Search in Google Scholar
[[87] P. Warren, C. Boldyreff, and M. Munro, “The evolution of websites,” in Proceedings of the Seventh International Workshop on Program Comprehension, 1999.]Search in Google Scholar
[[88] W. Koehler, “An analysis of web page and web site constancy and permanence,” Journal of the American Society for Information Science, vol. 50, no. 2, pp. 162–180, 1999.10.1002/(SICI)1097-4571(1999)50:2<162::AID-ASI7>3.0.CO;2-B]Search in Google Scholar
[[89] D. Herrmann, R. Wendolsky, and H. Federrath, “Website fingerprinting: Attacking popular privacy enhancing technologies with the multinomial naïve-Bayes classifier,” in Proceedings of the ACM Workshop on Cloud Computing Security, 2009.10.1145/1655008.1655013]Search in Google Scholar
[[90] N. Nikiforakis, L. Invernizzi, A. Kapravelos, S. V. Acker, W. Joosen, C. Kruegel, F. Piessens, and G. Vigna, “You are what you include,” in Proceedings of the 2012 ACM SIGSAC Conference on Computer and Communications Security, 2012.10.1145/2382196.2382274]Search in Google Scholar
[[91] J. Pennington, R. Socher, and C. D. Manning, “GloVe: Global vectors for word representation,” in Empirical Methods in Natural Language Processing, 2014.10.3115/v1/D14-1162]Search in Google Scholar
[[92] K. He, X. Zhang, S. Ren, and J. Sun, “Deep residual learning for image recognition,” in Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition, 2016.10.1109/CVPR.2016.90]Search in Google Scholar
[[93] Stanford Vision Lab, Stanford University, and Princeton University, “ImageNet,” http://www.image-net.org.]Search in Google Scholar
[[94] Alex Clark and Contributors, “Pillow,” https://pillow.readthedocs.io/en/stable/.]Search in Google Scholar
[[95] fastai, “Data augmentation in computer vision,” 2021, https://docs.fast.ai/vision.augment.html.]Search in Google Scholar
[[96] X. Jin, Y. Chen, J. Dong, J. Feng, and S. Yan, “Collaborative layer-wise discriminative learning in deep neural networks,” in European Conference on Computer Vision, 2016.10.1007/978-3-319-46478-7_45]Search in Google Scholar
[[97] E. G. Adagbasa, S. A. Adelabu, and T. W. Okello, “Application of deep learning with stratified k-fold for vegetation species discrimation in a protected mountainous region using sentinel-2 image,” Geocarto International, pp. 1–21, 2019.10.1080/10106049.2019.1704070]Search in Google Scholar
[[98] N. Ghamrawi and A. McCallum, “Collective multi-label classification,” in Proceedings of the 14th ACM International Conference on Information and Knowledge Management, 2005.10.1145/1099554.1099591]Search in Google Scholar
[[99] M. Jaggi, “An equivalence between the lasso and support vector machines,” in Regularization, Optimization, Kernels, and Support Vector Machines, J. A. Suykens, M. Signoretto, and A. Argyriou, Eds. CRC Press, 2014. [Online]. Available: https://arxiv.org/pdf/1303.1152.pdf]Search in Google Scholar
[[100] L. Wu, S. C. Hoi, and N. Yu, “Semantics-preserving bagof-words models and applications,” IEEE Transactions on Image Processing, vol. 19, no. 7, pp. 1908–1920, 2010.]Search in Google Scholar
[[101] D. P. Kingma and J. Ba, “Adam: A method for stochastic optimization,” in Proceedings of the 3rd International Conference on Learning Representations, 2014.]Search in Google Scholar
[[102] P.-T. de Boer, D. P. Kroese, S. Mannor, and R. Y. Rubinstein, “A tutorial on the cross-entropy method,” Annals of Operations Research, vol. 134, pp. 19–67, 2005.10.1007/s10479-005-5724-z]Search in Google Scholar
[[103] I. Goodfellow, Y. Bengio, and A. Courville, Deep Learning. MIT Press, 2016. [Online]. Available: http://www.deeplearningbook.org]Search in Google Scholar
[[104] X. Shi, Z. Chen, H. Wang, D.-Y. Yeung, W.-K. Wong, and W.-C. Woo, “Convolutional LSTM network: A machine learning approach for precipitation nowcasting,” in Advances in Neural Information Processing Systems, 2015.]Search in Google Scholar
[[105] N. V. Chawla, K. W. Bowyer, L. O. Hall, and W. P. Kegelmeyer, “Smote: Synthetic minority over-sampling technique,” Journal of Artificial Intelligence Research, vol. 16, pp. 321–357, 2002.10.1613/jair.953]Search in Google Scholar
[[106] P. Skolka, C.-A. Staicu, and M. Pradel, “Anything to hide? Studying minified and obfuscated code in the web,” in The Web Conference, 2019.10.1145/3308558.3313752]Search in Google Scholar
[[107] V. Le Pochat, T. Van Goethem, S. Tajalizadehkhoob, M. Korczynski, and W. Joosen, “Tranco: A research-oriented top sites ranking hardened against manipulation,” in Proceedings of the 2019 Network and Distributed System Security Symposium, 2019. [Online]. Available: http://tranco-list.eu10.14722/ndss.2019.23386]Search in Google Scholar
[[108] C. Baraniuk, “Where will the ad versus ad blocker arms race end?” Scientific American, May 2018. [Online]. Available: https://www.scientificamerican.com/article/where-will-thead-versus-ad-blocker-arms-race-end]Search in Google Scholar
[[109] JavaScript Obfuscator, https://obfuscator.io.]Search in Google Scholar
[[110] kangax, “HTML minifier,” https://kangax.github.io/htmlminifier/.]Search in Google Scholar
[[111] mankyd, “htmlmin,” https://htmlmin.readthedocs.io/en/latest/.]Search in Google Scholar
[[112] T. László and Ákos Kiss, “Obfuscating C++ programs via control flow flattening„” Annales Universitatis Scientarum Budapestinensis de Rolando Eötvös Nominatae, Sectio Computatorica, vol. 30, no. 1, pp. 3–19, 2009.]Search in Google Scholar
[[113] A. Das, N. Borisov, G. Acar, and A. Pradeep, “The web’s sixth sense: A study of scripts accessing smartphone sensors,” Proceedings of the ACM SIGSAC Conference on Computer and Communications Security, 2018.10.1145/3243734.3243860]Search in Google Scholar
[[114] R. Masood, B. Z. H. Zhao, H. J. Asghar, and M. A. Kaafar, “Touch and you’re trapp(ck)ed: Quantifying the uniqueness of touch gestures for tracking,” Proceedings on Privacy Enhancing Technologies, vol. 2018, no. 2, pp. 122–142, 2018.]Search in Google Scholar
[[115] R. Amos, G. Acar, E. Lucherini, M. Kshirsagar, A. Narayanan, and J. Mayer, “Privacy policies over time: Curation and analysis of a million-document dataset,” 2020, https://arxiv.org/pdf/2008.09159.pdf.10.1145/3442381.3450048]Search in Google Scholar
[[116] S. M. Bellovin, P. K. Dutta, and N. Reitinger, “Privacy and synthetic datasets,” Stanford Technology Law Review, vol. 22, no. 1, pp. 1–52, 2019.]Search in Google Scholar