
[47] KEJELA, G., AND RO NG, C. Cross-device consumer
identification. In IEEE International Conference on
Data Mining Workshop (ICDMW) (2015), pp. 1687–
1689.
[48] KI M, M. S., LI U, J., WANG, X., AND YANG, W.
Connecting devices to cookies via filtering, feature en-
gineering, and boosting. In IEEE International Con-
ference on Data Mining Workshop (ICDMW) (2015),
pp. 1690–1694.
[49] KOROL OVA, A., AND SHAR MA , V. Cross-app track-
ing via nearby bluetooth low energy devices. In Pro-
ceedings of the 8th ACM Conference on Data and
Application Security and Privacy (CODASPY) (2018),
pp. 43–52.
[50] LA ND RY, M., CHO NG, R., E T AL. Multi-layer clas-
sification: Icdm 2015 drawbridge cross-device connec-
tions competition. In IEEE International Conference
on Data Mining Workshop (ICDMW) (2015), pp. 1695–
1698.
[51] L ´
EC UY ER , M., DUC OFFE, G., LA N, F., PAPANCEA,
A., PE TSIOS , T., SPAHN, R., CHAINTREAU, A., AND
GEAMBASU, R . Xray: Enhancing the webs trans-
parency with differential correlation. In 23rd USENIX
Security Symposium (2014), pp. 49–64.
[52] LE CU YER, M., SPA HN , R. , SPILIOPOLOUS, Y.,
CHAINTREAU, A., GEA MBAS U, R., AN D HSU , D.
Sunlight: Fine-grained targeting detection at scale with
statistical confidence. In Proceedings of the 22Nd ACM
SIGSAC Conference on Computer and Communica-
tions Security (CCS) (2015).
[53] LE RN ER, A., SIMPSON, A. K., KO HN O, T., AND
ROE SN ER , F. Internet jones and the raiders of the lost
trackers: An archaeological study of web tracking from
1996 to 2016. In 25th USENIX Security Symposium
(2016).
[54] LEWIS, R. A., RAO, J. M., AND REIL EY, D. H. Here,
there, and everywhere: correlated online behaviors can
lead to overestimates of the effects of advertising. In
Proceedings of the 20th ACM International Conference
on World Wide Web (2011), pp. 157–166.
[55] LI U, B., SHET H, A ., WEINSBERG, U., CHAN-
DRASHEKAR, J., AN D GOVIN DAN, R. Adreveal: im-
proving transparency into online targeted advertising.
In Proceedings of the 12th ACM Workshop on Hot Top-
ics in Networks (2013), p. 12.
[56] LOTAME. Cross-Device ID Graph Accuracy: Method-
ology. https://www.lotame.com/cross-device-
id-graph-accuracy-methodology/, 2016.
[57] LOTAME. Cross-device.bridging the gap between
screens. https://www.lotame.com/products/
cross-device/, 2018.
[58] MAVRO UD IS, V., HAO , S., FRATAN TO NI O, Y.,
MAGG I, F., KRUE GE L, C ., AN D VIG NA , G. On the
privacy and security of the ultrasound ecosystem. Pro-
ceedings on Privacy Enhancing Technologies (2017).
[59] MAYE R, J. R., AND MITCHELL, J . C. Third-party
web tracking: Policy and technology. In Proceedings
of the 2012 IEEE Symposium on Security and Privacy,
SP ’12.
[60] MCAF EE. Customer URL Ticketing System. https:
//www.trustedsource.org/, 2018.
[61] MCNAIR, C. Global Ad Spending Update.
https://www.emarketer.com/content/global-
ad-spending-update, 2018.
[62] ME NG , W., DING, R., CH UNG, S. P., HAN , S., AND
LEE , W. The price of free: Privacy leakage in person-
alized mobile in-apps ads. In NDSS (2016).
[63] NIKIFORAKIS, N., JOOSEN , W., AN D LIVSHITS, B.
Privaricator: Deceiving fingerprinters with little white
lies. In Proceedings of the 24th International Confer-
ence on World Wide Web, WWW ’15.
[64] NIKIFORAKIS, N., KAPRAVELOS , A. , JOO SE N, W.,
KRUE GEL, C., PIESSENS, F., AN D VIG NA , G. Cook-
ieless monster: Exploring the ecosystem of web-based
device fingerprinting. In Proceedings of the 2013 IEEE
Symposium on Security and Privacy, SP ’13.
[65] OLEJNIK, L., MINH-DUNG , T., A ND CA ST ELL UC -
CIA, C. Selling off privacy at auction. In Network
and Distributed System Security Symposium (NDSS)
(2014).
[66] PACHILAKIS, M., PAPADOPOULOS, P., MAR KATO S,
E. P., AND KO URT ELL IS , N. No more chasing water-
falls: A measurement study of the header bidding ad-
ecosystem. In 19th ACM Internet Measurement Con-
ference (2019).
[67] PANC HENKO, A., LA NZ E, F., PENNEKAMP, J., E N-
GE L, T., ZINNEN, A., HENZE, M., A ND WEH RL E,
K. Website fingerprinting at internet scale. In NDSS
(2016).
[68] PAPADOPOULOS, E. P., DIAMANTARIS, M., PA-
PADOPOULOS, P., PET SA S, T., IOANNIDIS, S., A ND
MAR KATO S, E. P. The long-standing privacy debate:
Mobile websites vs mobile apps. In Proceedings of
the 26th ACM International Conference on World Wide
Web (2017), pp. 153–162.
16