메뉴 건너뛰기




Volumn 2016-July, Issue , 2016, Pages

Demographics inference through Wi-Fi network traffic analysis

Author keywords

[No Author keywords available]

Indexed keywords

ARTIFICIAL INTELLIGENCE; HTTP; LEARNING SYSTEMS; METADATA; POPULATION STATISTICS; WI-FI;

EID: 84983261924     PISSN: 0743166X     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/INFOCOM.2016.7524528     Document Type: Conference Paper
Times cited : (42)

References (23)
  • 1
    • 84983342336 scopus 로고    scopus 로고
    • Pablo Valerio
    • Pablo Valerio, "WiFi Offloading To Skyrocket". http://www.networkcomputing.com/wireless-infrastructure/wifioffloading-to-skyrocket-/d/d-id/1321007
    • WiFi Offloading to Skyrocket".
  • 5
    • 84983266791 scopus 로고    scopus 로고
    • Wandera, "http://www.realwire.com/releases/Wandera-reveals-Q2-2015-mobile-security-and-data-usage-figures
  • 6
    • 84883532412 scopus 로고    scopus 로고
    • Device names in the wild: Investigating privacy risks of zero configuration networking
    • B. Konings, C. Bachmaier, F. Schaub, and M. Weber, "Device names in the wild: Investigating privacy risks of zero configuration networking," In Proc. of MDM'13, IEEE, 2013.
    • (2013) Proc. of MDM'13, IEEE
    • Konings, B.1    Bachmaier, C.2    Schaub, F.3    Weber, M.4
  • 7
    • 70349682315 scopus 로고    scopus 로고
    • An efficient privacy-preserving scheme against traffic analysis attacks in network coding
    • Y. Fan, Y. Jiang, H. Zhu, and X. Shen, "An efficient privacy-preserving scheme against traffic analysis attacks in network coding," In Proc. of INFOCOM'09, IEEE, 2009.
    • (2009) Proc. of INFOCOM'09, IEEE
    • Fan, Y.1    Jiang, Y.2    Zhu, H.3    Shen, X.4
  • 9
    • 84904411030 scopus 로고    scopus 로고
    • Markov chain fingerprinting to classify encrypted traffic
    • M. Korczynski, and A. Duda, "Markov chain fingerprinting to classify encrypted traffic," In Proc. of INFOCOM'14, IEEE, 2014.
    • (2014) Proc. of INFOCOM'14, IEEE
    • Korczynski, M.1    Duda, A.2
  • 12
    • 84884541833 scopus 로고    scopus 로고
    • Personality, gender, and age in the language of social media: The open-vocabulary approach
    • Schwartz, H. Andrew, et al. "Personality, gender, and age in the language of social media: The open-vocabulary approach," PloS one 8.9 (2013): e73791.
    • (2013) PloS One , vol.8 , Issue.9 , pp. e73791
    • Andrew, S.H.1
  • 13
    • 84893122023 scopus 로고    scopus 로고
    • Inferring the demographics of search users: Social data meets search queries
    • B. Bi, M. Shokouhi, M. Kosinski, T. Graepel, "Inferring the demographics of search users: Social data meets search queries," In Proc. of WWW'13, ACM, 2013.
    • (2013) Proc. of WWW'13, ACM
    • Bi, B.1    Shokouhi, M.2    Kosinski, M.3    Graepel, T.4
  • 14
    • 85141046573 scopus 로고    scopus 로고
    • You are what you like! information leakage through users' interests
    • A. Chaabane, G. Acs, M. A. Kaafar, "You Are What You Like! Information Leakage Through Users' Interests," In NDSS'12, 2012.
    • (2012) NDSS'12
    • Chaabane, A.1    Acs, G.2    Kaafar, M.A.3
  • 17
  • 18
    • 0035478854 scopus 로고    scopus 로고
    • Random forests
    • L. Breiman, "Random forests," Machine learning 45.1 (2001): 5-32.
    • (2001) Machine Learning , vol.45 , Issue.1 , pp. 5-32
    • Breiman, L.1
  • 19
    • 84869476246 scopus 로고    scopus 로고
    • Deanonymizing mobility traces: Using social network as a side-channel
    • M. Srivatsa and M. Hicks. Deanonymizing mobility traces: Using social network as a side-channel. In CCS'12, ACM, 2012.
    • (2012) CCS'12, ACM
    • Srivatsa, M.1    Hicks, M.2
  • 21
    • 84943646932 scopus 로고    scopus 로고
    • All your location are belong to us: Breaking mobile social networks for automated user location tracking
    • M. Li, H. Zhu, Z. Gao, S. Chen, K. Ren, L. Yu, and S. Hu. "All Your Location are Belong to Us: Breaking Mobile Social Networks for Automated User Location Tracking," In MobiHoc'14, ACM, 2014.
    • (2014) MobiHoc'14, ACM
    • Li, M.1    Zhu, H.2    Gao, Z.3    Chen, S.4    Ren, K.5    Yu, L.6    Hu, S.7
  • 23
    • 84983237571 scopus 로고    scopus 로고
    • A new security mechanism to perform traffic anonymity with dummy traffic synthesis
    • W. M. Shbair, A. R. Bashandy, and S. I. Shaheen. "A New Security Mechanism to Perform Traffic Anonymity with Dummy Traffic Synthesis," In CSE'09, IEEE, 2009.
    • (2009) CSE'09, IEEE
    • Shbair, W.M.1    Bashandy, A.R.2    Shaheen, S.I.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.