[17] |
ZIMMECK S , BELLOVIN S . Privee:an architecture for automatically analyzing web privacy policies[C]// Proceedings of the 23rd USENIX Security Symposium. 2014: 1-16.
|
[18] |
HARKOUS H , FAWAZ K , LEBRET R ,et al. Automated analysis and presentation of privacy policies using deep learning[C]// Proceedings of the 27th USENIX Security Symposium. 2018: 531-548.
|
[19] |
AYALA-RIVERA V , PASQUALE L . The grace period has ended:An approach to operationalize GDPR requirements[C]// Proceedings of the 2018 IEEE 26th International Requirements Engineering Conference. 2018: 136-146.
|
[20] |
DEGELING M , UTZ C , LENTZSCH C ,et al. We value your privacy now take some cookies:measuring the GDPR’s impact on web privacy[C]// Proceedings of the 2019 Network and Distributed Systems Security Symposium. 2018: 1-14.
|
[21] |
LINDEN T , KHANDELWAL R , HARKOUS H ,et al. The privacy policy landscape after the GDPR[C]// Proceedings on Privacy Enhancing Technologies, 2020(1): 47-64.
|
[22] |
ABHIJITHG , SHOMIR W , NORMAN S . Supervised and unsupervised methods for robust separation of section titles and prose text in web documents[C]// Proceedings of the 2018 Conference on Empirical Methods in Natural Language Processing. 2018: 850-855.
|
[23] |
WILLIAMS B , HALLOIN C , LOBEL W ,et al. Data-driven model development for cardiomyocyte production experimental failure prediction[C]// Proceedings of 30th European Symposium on Computer Aided Process Engineering. 2020: 1639-1644.
|
[24] |
MOFUERZA J , MUNOZ A . Support vector machines with applications[J]. Statistical Science, 2006,21(3): 322-336.
|
[25] |
GEURTS P , ERNST D , WEHENKEL L . Extremely randomized trees[J]. Machine Learning, 2006,63: 3-42.
|
[26] |
CHEN T , GUESTRIN C . XGBoost:a scalable tree boosting system[R]. 2016.
|
[27] |
COHEN J . A coefficient of agreement for nominal scales[J]. Educational and Psychological Measurement, 1960,20(1): 37-46.
|
[1] |
MCDONALD A , CRANOR L . The cost of reading privacy policies[J]. Journal of Law and Policy for the Information Society, 2008,4: 543-568.
|
[2] |
LI H X , ZHU H J , DU S G ,et al. Privacy leakage of location sharing in mobile social networks:attacks and defense[J]. IEEE Transactions on Dependable and Secure Computing, 2016,15(4): 646-660.
|
[3] |
TUCKER S . Google fined $57m by data protection watchdog over GDPR violations[EB].
|
[4] |
TOM J , SING E , MATULEVICIUS R . Conceptual representation of the GDPR:model and application directions[C]// Proceedings of 17th International Conference on Perspectives in Business Informatics Research(BIR). 2018: 18-28.
|
[5] |
LIPPI M , PALKA P , CONTISSA G ,et al. CLAUDETTE:an automated detector of potentially unfair clauses in online terms of service[J]. Artificial Intelligence and Law, 2019,27(2): 117-139.
|
[6] |
TORRE D , ABUALHAIJA S , SABETZADEH M ,et al. An AI-assisted approach for checking the completeness of privacy policies against GDPR[C]// Proceedings of the 2020 IEEE 28th International Requirements Engineering Conference. 2020: 136-146.
|
[7] |
AMARAL O , ABUALHAIJA O , ABUALHAIJA S ,et al. AI-enabled automation for completeness checking of privacy policies[J]. IEEE Transactions on Software Engineering, 2021,(N/A): 1-21.
|
[8] |
WILSON S , SCHAUB F , DARA A ,et al. The creation and analysis of a website privacy policy corpus[C]// Proceedings of the 54th Annual Meeting of the Association for Computational Linguistics(ACL). 2016: 1330-1340.
|
[9] |
SATHYENDRA K , WILSON S , SCHAUB F ,et al. Identifying the provision of choices in privacy policy text[C]// Proceedings of the 2017 Conference on Empirical Methods in Natural Language Processing. 2017: 2774-2779.
|
[10] |
ZIMMECK S , STORY P , SMULLEN D ,et al. MAPS:scaling privacy compliance analysis to a million apps[C]// Proceedings of the Conference on Privacy Enhancing Technologies. 2019: 66-86.
|
[11] |
SRINATH M , WILSON S , GILES C . Privacy at scale:introducing the PrivaSeer corpus of Web privacy policies[J]. arXiv preprint arXiv:2020.11131.
|
[28] |
SALTON G , BUCKLEY C . Term weighting approaches in automatic text retrieval[J]. Information Processing & Management, 1988,24(5): 513-523.
|
[29] |
PENNINGTON J , SOCHER R , MANNING C . GloVe:global vectors for word representation[C]// Proceedings of the 2014 Conference on Empirical Methods in Natural Language Processing. 2014: 1532-1543.
|
[30] |
BOJANOWSKI P , GRAVE E , JOULIN A ,et al. Enriching word vectors with subword information[J]. Transactions of the Association for Computational Linguistics, 2017,5: 135-146.
|
[31] |
MIKOLOV T , CHEN K , CORRADO G ,et al. Efficient estimation of word representations in vector space[J]. Computer Science, 2013,5: 324-352.
|
[32] |
JACOB D , CHANG M W , KENTON L ,et al. BERT:pre-training of deep bidirectional transformers for language understanding[R]. 2018.
|
[12] |
KUZNETSOV M , NOVIKOVA E , KOTENKO I ,et al. Privacy policies of IoT devices:collection and analysis[J]. Sensors, 2022,22(5): 1-23.
|
[13] |
TESFAY W , HOFMANN P , NAKAMURA T ,et al. Privacy guide:towards an implementation of the EU GDPR on internet privacy policy evaluation[C]// Proceedings of the 4th ACM International Workshop on Security and Privacy Analytics. 2018: 15-21.
|
[14] |
NEJAD N , SCERRI S , LEHMANN J . KnIGHT:mapping privacy policies to GDPR[C]// Proceedings of 21st International Conference on Knowledge Engineering and Knowledge Management(EKAW 2018). 2018: 258-272.
|
[15] |
TORRE D , SOLTANA G , SABETZADEH M ,et al. Using models to enable compliance checking against the GDPR:an experience report[C]// Proceedings of the 2019 ACM/IEEE 22nd International Conference on Model Driven Engineering Languages and Systems. 2019: 10-20.
|
[16] |
HAMDANI R , MUSTAPHA M , AMARILES D ,et al. A combined rule-based and machine learning approach for automated GDPR compliance checking[C]// Proceedings of the 18th International Conference on Artificial Intelligence and Law. 2021: 40-49.
|