-
1
-
-
84969925426
-
Electronic Communications Privacy Act, 18 U.S.
-
Electronic Communications Privacy Act, 18 U.S. Code Sect. 2510(8) (2012).
-
(2012)
Code Sect.
, vol.2510
, Issue.8
-
-
-
2
-
-
78650820738
-
-
512 F.3d 500, 9th Cir. (July 6)
-
United States v. Forrester, 512 F.3d 500, 9th Cir. (July 6, 2007).
-
(2007)
United States V. Forrester
-
-
-
3
-
-
84969908832
-
Stored Communications Act
-
Stored Communications Act, 18 U.S. Code Sect. 2703(c)(2) (2012).
-
(2012)
18 U.S. Code Sect.
, vol.2703
, Issue.2
-
-
-
4
-
-
84969960117
-
USA PATRIOT Act
-
USA PATRIOT Act, 50 U.S. Code Sect. 1861 (2012).
-
(2012)
50 U.S. Code Sect.
, vol.1861
-
-
-
5
-
-
84969960115
-
-
In re FBI Application, No. BR 13-109, FISA Ct. (August 29, 2013)
-
In re FBI Application, No. BR 13-109, FISA Ct. (August 29, 2013).
-
-
-
-
6
-
-
84970048032
-
-
Pub. L. No. 114-23, 129 Stat. 268 ( June 2
-
USA FREEDOM Act, Pub. L. No. 114-23, 129 Stat. 268 (June 2, 2015).
-
(2015)
USA FREEDOM Act
-
-
-
7
-
-
84902286041
-
-
December 12, (President's Review Group on Intelligence and Communications Technologies, Washington, DC). Accessed April 2016
-
December 12, 2013) Liberty and Security in a Changing World (President's Review Group on Intelligence and Communications Technologies, Washington, DC). Available at www.whitehouse.gov/sites/default/files/docs/2013-12-12-rg-final-report.pdf. Accessed April 2016.
-
(2013)
Liberty and Security in A Changing World
-
-
-
9
-
-
84969913164
-
Privacy and Civil Liberties Oversight Board
-
Privacy and Civil Liberties Oversight Board, Washington, DC)
-
Privacy and Civil Liberties Oversight Board (2015) Recommendations Assessment Report (Privacy and Civil Liberties Oversight Board, Washington, DC).
-
(2015)
Recommendations Assessment Report
-
-
-
11
-
-
0032482432
-
Collective dynamics of small-world networks
-
Watts DJ, Strogatz SH (1998) Collective dynamics of 'small-world' networks. Nature 393(6684):440-442.
-
(1998)
Nature
, vol.393
, Issue.6684
, pp. 440-442
-
-
Watts, D.J.1
Strogatz, S.H.2
-
12
-
-
0037565721
-
On maximum clique problems in very large graphs. External Memory Algorithms
-
May 20-22 1998, DIMACS Series in Discrete Mathematics and Theoretical Computer Science, eds Abello JM, Vitter JS ( American Mathematical Society, Providence, RI)
-
Abello J, Pardalos PM, Resende MGC (1998) On maximum clique problems in very large graphs. External Memory Algorithms. DIMACS Workshop: External Algorithms and Visualization, May 20-22 1998, DIMACS Series in Discrete Mathematics and Theoretical Computer Science, eds Abello JM, Vitter JS (American Mathematical Society, Providence, RI), pp 119-130.
-
(1998)
DIMACS Workshop: External Algorithms and Visualization
, pp. 119-130
-
-
Abello, J.1
Pardalos, P.M.2
Resende, M.G.C.3
-
13
-
-
84937390683
-
Massive quasi-clique detection. LATIN 2002: Theoretical Informatics, 5th Latin American Symposium, Cancun, Mexico April 2002
-
Ed Rajsbaum (Springer, Berlin)
-
Abello J, Resende MG, Sudarsky S (2002) Massive quasi-clique detection. LATIN 2002: Theoretical Informatics, 5th Latin American Symposium, Cancun, Mexico April 2002 Proceedings, Lecture Notes in Computer Science, ed Rajsbaum S (Springer, Berlin), Vol 2286, pp 598-612.
-
(2002)
Proceedings, Lecture Notes in Computer Science
, vol.2286
, pp. 598-612
-
-
Abello, J.1
Resende, M.G.2
Sudarsky, S.3
-
14
-
-
0035627527
-
A random graph model for power law graphs
-
Aiello W, Chung F, Lu L (2001) A random graph model for power law graphs. Expo Math 10(1):53-66.
-
(2001)
Expo Math
, vol.10
, Issue.1
, pp. 53-66
-
-
Aiello, W.1
Chung, F.2
Lu, L.3
-
15
-
-
34547622829
-
On the structural properties of massive telecom call graphs: Findings and implications
-
CIKM '06, November 5-11, 2006, Arlington, VA (Association for Computing Machinery, New York)
-
Nanavati AA, et al. (2006) On the structural properties of massive telecom call graphs: findings and implications, Conference on Information and Knowledge Management, CIKM '06, November 5-11, 2006, Arlington, VA (Association for Computing Machinery, New York), pp 435-444.
-
(2006)
Conference on Information and Knowledge Management
, pp. 435-444
-
-
Nanavati, A.A.1
-
16
-
-
34250628484
-
Structure and tie strengths in mobile communication networks
-
Onnela JP, et al. (2007) Structure and tie strengths in mobile communication networks. Proc Natl Acad Sci USA 104(18):7332-7336.
-
(2007)
Proc Natl Acad Sci USA
, vol.104
, Issue.18
, pp. 7332-7336
-
-
Onnela, J.P.1
-
18
-
-
65449186691
-
Mobile call graphs: Beyond power-law and lognormal distributions
-
KDD '08, August 24-27, 2008, Las Vegas (Association for Computing Machinery, New York)
-
Seshadri M, et al. (2008) Mobile call graphs: beyond power-law and lognormal distributions, The 14th ACM SIGKDD International Conference on Knowledge, KDD '08, August 24-27, 2008, Las Vegas (Association for Computing Machinery, New York), pp 596-604.
-
(2008)
The 14th ACM SIGKDD International Conference on Knowledge
, pp. 596-604
-
-
Seshadri, M.1
-
19
-
-
66349131932
-
Understanding the spreading patterns of mobile phone viruses
-
Wang P, González MC, Hidalgo CA, Barabási AL (2009) Understanding the spreading patterns of mobile phone viruses. Science 324(5930):1071-1076.
-
(2009)
Science
, vol.324
, Issue.5930
, pp. 1071-1076
-
-
Wang, P.1
González, M.C.2
Hidalgo, C.A.3
Barabási, A.L.4
-
20
-
-
84970048081
-
California Online Privacy Protection Act
-
California Online Privacy Protection Act, Cal. Bus. and Prof. Code Sect. 22577 (2012).
-
(2012)
Cal. Bus. and Prof. Code Sect. 22577
-
-
-
21
-
-
0036811662
-
K-anonymity: A model for protecting privacy
-
Sweeney L (2002) k-anonymity: a model for protecting privacy. Int J Uncertain Fuzziness Knowl Based Syst 10(5):557-570.
-
(2002)
Int J Uncertain Fuzziness Knowl Based Syst
, vol.10
, Issue.5
, pp. 557-570
-
-
Sweeney, L.1
-
22
-
-
84889059821
-
Identifying participants in the personal genome project by name
-
Harvard Univ Data Privacy Lab, Cambridge, MA
-
Sweeney L, Abu A, Winn J (2013) Identifying Participants in the Personal Genome Project by Name, Technical Report 1021-1 (Harvard Univ Data Privacy Lab, Cambridge, MA).
-
(2013)
Technical Report 1021-1
-
-
Sweeney, L.1
Abu, A.2
Winn, J.3
-
26
-
-
77957594024
-
Broken promises of privacy
-
Ohm P (2010) Broken promises of privacy. UCLA Law Rev 57:1701-1777.
-
(2010)
UCLA Law Rev
, vol.57
, pp. 1701-1777
-
-
Ohm, P.1
-
27
-
-
84969972048
-
Privacy leakage vs. Protection measures: The growing disconnect
-
Krishnamurthy B, Naryshkin K, Wills C (2011) Privacy leakage vs. Protection measures: The growing disconnect. IEEE Secur Priv 11(3):14-20.
-
(2011)
IEEE Secur Priv
, vol.11
, Issue.3
, pp. 14-20
-
-
Krishnamurthy, B.1
Naryshkin, K.2
Wills, C.3
-
28
-
-
84878371061
-
Third-party web tracking: Policy and technology
-
May, 20-23, 2012, San Francisco (IEEE, New York)
-
Mayer JR, Mitchell JC (2012) Third-party web tracking: Policy and technology. 2012 IEEE Symposium on Security and Privacy (SP), May, 20-23, 2012, San Francisco (IEEE, New York), pp 413-427.
-
(2012)
2012 IEEE Symposium on Security and Privacy (SP)
, pp. 413-427
-
-
Mayer, J.R.1
Mitchell, J.C.2
-
29
-
-
84992238873
-
Cookies that give you away: The surveillance implications of Web tracking
-
Association for Computing Machinery, New York
-
Englehardt S, et al. (2015) Cookies that give you away: The surveillance implications of Web tracking. Proceedings of the 24th International Conference on World Wide Web, WWW '15 (Association for Computing Machinery, New York), pp 289-299.
-
(2015)
Proceedings of the 24th International Conference on World Wide Web, WWW '15
, pp. 289-299
-
-
Englehardt, S.1
-
30
-
-
50249142450
-
Robust de-anonymization of large sparse datasets
-
IEEE Computer Society, Washington, DC
-
Narayanan A, Shmatikov V (2008) Robust de-anonymization of large sparse datasets. Proceedings of the 2008 IEEE Symposium on Security and Privacy, SP '08 (IEEE Computer Society, Washington, DC), pp 111-125.
-
(2008)
Proceedings of the 2008 IEEE Symposium on Security and Privacy, SP '08
, pp. 111-125
-
-
Narayanan, A.1
Shmatikov, V.2
-
31
-
-
35348848696
-
Wherefore art thou R3579X? Anonymized social networks, hidden patterns, and structural steganography
-
Association for Computing Machinery, New York
-
Backstrom L, Dwork C, Kleinberg J (2007) Wherefore art thou R3579X? Anonymized social networks, hidden patterns, and structural steganography. Proceedings of the 16th International Conference on World Wide Web, WWW '07 (Association for Computing Machinery, New York), pp 181-190.
-
(2007)
Proceedings of the 16th International Conference on World Wide Web, WWW '07
, pp. 181-190
-
-
Backstrom, L.1
Dwork, C.2
Kleinberg, J.3
-
33
-
-
59249083364
-
Understanding mobility based on GPS data
-
Association for Computing Machinery, New York
-
Zheng Y, Li Q, Chen Y, Xie X, Ma WY (2008) Understanding mobility based on GPS data. Proceedings of the 10th International Conference on Ubiquitous Computing, UbiComp '08 (Association for Computing Machinery, New York), pp 312-321.
-
(2008)
Proceedings of the 10th International Conference on Ubiquitous Computing, UbiComp '08
, pp. 312-321
-
-
Zheng, Y.1
Li, Q.2
Chen, Y.3
Xie, X.4
Ma, W.Y.5
-
34
-
-
84865656232
-
Mining interesting locations and travel sequences from GPS trajectories
-
Association for Computing Machinery, New York
-
Zheng Y, Zhang L, Xie X, Ma WY (2009) Mining interesting locations and travel sequences from GPS trajectories. Proceedings of the 18th International Conference on World Wide Web, WWW '09 (Association for Computing Machinery, New York), pp 791-800.
-
(2009)
Proceedings of the 18th International Conference on World Wide Web, WWW '09
, pp. 791-800
-
-
Zheng, Y.1
Zhang, L.2
Xie, X.3
Ma, W.Y.4
-
36
-
-
45749146270
-
A density-based algorithm for discovering clusters in large spatial databases with noise
-
Ester M, Kriegel HP, Sander J, Xu X (1996) A density-based algorithm for discovering clusters in large spatial databases with noise. Data Mining and Knowledge Discovery 2(2):169-194.
-
(1996)
Data Mining and Knowledge Discovery
, vol.2
, Issue.2
, pp. 169-194
-
-
Ester, M.1
Kriegel, H.P.2
Sander, J.3
Xu, X.4
-
37
-
-
84889087227
-
User demographics prediction based on mobile data
-
Zhong E, Tan B, Mo K, Yang Q (2013) User demographics prediction based on mobile data. Pervasive and Mobile Computing 9(6):823-837.
-
(2013)
Pervasive and Mobile Computing
, vol.9
, Issue.6
, pp. 823-837
-
-
Zhong, E.1
Tan, B.2
Mo, K.3
Yang, Q.4
-
39
-
-
84969911569
-
-
Klayman v. Obama, 957 F. Supp. 2d 1, Dist. Ct. DC (December 16, 2013)
-
Klayman v. Obama, 957 F. Supp. 2d 1, Dist. Ct. DC (December 16, 2013).
-
-
-
-
40
-
-
84969960156
-
-
ACLU v. Clapper, No. 13-cv-03994, Southern Dist. Ct. NY ( August 26
-
Declaration of Professor Edward W. Felten, ACLU v. Clapper, No. 13-cv-03994, Southern Dist. Ct. NY (August 26, 2013).
-
(2013)
Declaration of Professor Edward W. Felten
-
-
-
41
-
-
84969913206
-
-
ACLU v. Clapper, 959 F. Supp. 2d 724, Southern Dist. Ct. NY (December 27, 2013)
-
ACLU v. Clapper, 959 F. Supp. 2d 724, Southern Dist. Ct. NY (December 27, 2013).
-
-
-
-
42
-
-
84881509020
-
Making sense from Snowden
-
Landau S (2013) Making sense from Snowden. IEEE Secur Priv 11(4):54-63.
-
(2013)
IEEE Secur Priv
, vol.11
, Issue.4
, pp. 54-63
-
-
Landau, S.1
-
43
-
-
84969913200
-
Phew, NSA is just collecting metadata
-
June 19
-
Blaze M (June 19, 2013) Phew, NSA is just collecting metadata. Wired. Available at www.wired.com/2013/06/phew-it-was-just-metadata-not-think-again.
-
(2013)
Wired
-
-
Blaze, M.1
-
45
-
-
84874800284
-
Predicting personality using novel mobile phone-based metrics
-
Springer, Berlin
-
De Montjoye YA, Quoidbach J, Robic F, Pentland A (2013) Predicting Personality Using Novel Mobile Phone-Based Metrics. Social Computing, Behavioral-Cultural Modeling and Prediction,Lecture Notes in Computer Science (Springer, Berlin) Vol 7812, pp 48-55.
-
(2013)
Social Computing, Behavioral-Cultural Modeling and Prediction,Lecture Notes in Computer Science
, vol.7812
, pp. 48-55
-
-
De Montjoye, Y.A.1
Quoidbach, J.2
Robic, F.3
Pentland, A.4
-
47
-
-
84969911580
-
-
NetMob 2015, April 7-10, 2015, Cambridge, MA, eds Moro E, de Montjoye Y-A, Blondel V, Pentland A
-
Jahani E, et al. (2015) Predicting gender from mobile phone metadata, NetMob 2015, April 7-10, 2015, Cambridge, MA, eds Moro E, de Montjoye Y-A, Blondel V, Pentland A, pp 110-113.
-
(2015)
Predicting Gender from Mobile Phone Metadata
, pp. 110-113
-
-
Jahani, E.1
-
48
-
-
84930689729
-
Tracking employment shocks using mobile phone data
-
pii: 20150185
-
Toole JL, et al. (2015) Tracking employment shocks using mobile phone data. J R Soc Interface 12(107):pii: 20150185.
-
(2015)
J R Soc Interface
, vol.12
, Issue.107
-
-
Toole, J.L.1
-
51
-
-
70349313631
-
Inferring friendship network structure by using mobile phone data
-
Eagle N, Pentland AS, Lazer D (2009) Inferring friendship network structure by using mobile phone data. Proc Natl Acad Sci USA 106(36):15274-15278.
-
(2009)
Proc Natl Acad Sci USA
, vol.106
, Issue.36
, pp. 15274-15278
-
-
Eagle, N.1
Pentland, A.S.2
Lazer, D.3
-
52
-
-
84913555056
-
Daily stress recognition from mobile phone data, weather conditions and individual traits
-
Association for Computing Machinery, New York)
-
Bogomolov A, Lepri B, Ferron M, Pianesi F, Pentland A (2014) Daily stress recognition from mobile phone data, weather conditions and individual traits. Proceedings of the 22nd ACM International Conference on Multimedia, MM'14 (Association for Computing Machinery, New York), pp 477-486.
-
(2014)
Proceedings of the 22nd ACM International Conference on Multimedia, MM'14
, pp. 477-486
-
-
Bogomolov, A.1
Lepri, B.2
Ferron, M.3
Pianesi, F.4
Pentland, A.5
-
53
-
-
84889096994
-
From big smartphone data to worldwide research: The mobile data challenge
-
Laurila JK, et al. (2013) From big smartphone data to worldwide research: The mobile data challenge. Pervasive and Mobile Computing 9(6):752-771.
-
(2013)
Pervasive and Mobile Computing
, vol.9
, Issue.6
, pp. 752-771
-
-
Laurila, J.K.1
-
54
-
-
84994708913
-
-
Apple, Cupertino, CA). Accessed April 2015
-
Apple (2015) ResearchKit Technical Overview (Apple, Cupertino, CA). Available at researchkit.org/docs/docs/Overview/GuideOverview.html. Accessed April 2015.
-
(2015)
ResearchKit Technical Overview
-
-
Apple1
-
55
-
-
77950414066
-
-
Presidential Policy Directive/PP-28 (The White House, Washington, DC)
-
The White House Office of the Press Secretary (2014) Presidential Policy Directive/PP-28 (The White House, Washington, DC).
-
(2014)
The White House Office of the Press Secretary
-
-
-
56
-
-
33746335051
-
Differential privacy
-
ICALP 2006, Venice, Italy, July 10-14, 2006, Proceedings, Part II, Lecture Notes in Computer Science (Springer, Berlin)
-
Dwork C (2006) Differential privacy. Automata, Languages and Programming: 33rd International Colloquium, ICALP 2006, Venice, Italy, July 10-14, 2006, Proceedings, Part II, Lecture Notes in Computer Science (Springer, Berlin), Vol 4052, pp 1-12.
-
(2006)
Automata, Languages and Programming: 33rd International Colloquium
, vol.4052
, pp. 1-12
-
-
Dwork, C.1
-
58
-
-
84940376959
-
-
Pew Research Center, Washington, DC), Accessed April 2015
-
Pew Research Center (2015) The Smartphone Difference (Pew Research Center, Washington, DC), Available at www.pewinternet.org/2015/04/01/us-smartphone-usein-2015. Accessed April 2015.
-
(2015)
The Smartphone Difference
-
-
Pew Research Center1
-
60
-
-
80555140075
-
Scikit-learn: Machine learning in Python
-
Pedregosa F, et al. (2011) Scikit-learn: Machine learning in Python. J Mach Learn Res 12:2825-2830.
-
(2011)
J Mach Learn Res
, vol.12
, pp. 2825-2830
-
-
Pedregosa, F.1
|