-
1
-
-
84983342336
-
-
Pablo Valerio
-
Pablo Valerio, "WiFi Offloading To Skyrocket". http://www.networkcomputing.com/wireless-infrastructure/wifioffloading-to-skyrocket-/d/d-id/1321007
-
WiFi Offloading to Skyrocket".
-
-
-
2
-
-
84883060412
-
Characterizing privacy leakage of public WiFi networks for users on travel
-
IEEE
-
N. Cheng, X. Wang, W. Cheng, P. Mohapatra, and A. Seneviratne, "Characterizing privacy leakage of public WiFi networks for users on travel," In Proc. of INFOCOM'13, IEEE, 2013.
-
(2013)
Proc. of INFOCOM'13
-
-
Cheng, N.1
Wang, X.2
Cheng, W.3
Mohapatra, P.4
Seneviratne, A.5
-
3
-
-
84904439286
-
Contextual localization through network traffic analysis
-
IEEE
-
A. K. Das, P. H. Pathak, N. C. Chuah and P. Mohapatra, "Contextual localization through network traffic analysis," In Proc. of INFOCOM'14, IEEE, 2014.
-
(2014)
Proc. of INFOCOM'14
-
-
Das, A.K.1
Pathak, P.H.2
Chuah, N.C.3
Mohapatra, P.4
-
4
-
-
84891608723
-
Mosaic: Quantifying privacy leakage in mobile networks
-
N. Xia, H. H. Song, Y. Liao, M. Iliofotou, A. Nucci, Z. L. Zhang and A. Kuzmanovic "Mosaic: Quantifying privacy leakage in mobile networks," ACM SIGCOMM Computer Communication Review, 2013.
-
(2013)
ACM SIGCOMM Computer Communication Review
-
-
Xia, N.1
Song, H.H.2
Liao, Y.3
Iliofotou, M.4
Nucci, A.5
Zhang, Z.L.6
Kuzmanovic, A.7
-
5
-
-
84983266791
-
-
Wandera, "http://www.realwire.com/releases/Wandera-reveals-Q2-2015-mobile-security-and-data-usage-figures
-
-
-
-
6
-
-
84883532412
-
Device names in the wild: Investigating privacy risks of zero configuration networking
-
B. Konings, C. Bachmaier, F. Schaub, and M. Weber, "Device names in the wild: Investigating privacy risks of zero configuration networking," In Proc. of MDM'13, IEEE, 2013.
-
(2013)
Proc. of MDM'13, IEEE
-
-
Konings, B.1
Bachmaier, C.2
Schaub, F.3
Weber, M.4
-
7
-
-
70349682315
-
An efficient privacy-preserving scheme against traffic analysis attacks in network coding
-
Y. Fan, Y. Jiang, H. Zhu, and X. Shen, "An efficient privacy-preserving scheme against traffic analysis attacks in network coding," In Proc. of INFOCOM'09, IEEE, 2009.
-
(2009)
Proc. of INFOCOM'09, IEEE
-
-
Fan, Y.1
Jiang, Y.2
Zhu, H.3
Shen, X.4
-
8
-
-
84896791921
-
Who are you talking to? Breaching privacy in encrypted im networks
-
M. U. Ilyas, M. Z. Shafiq, A. X. Liu, and H. Radha, "Who are you talking to? Breaching privacy in encrypted IM networks," In Proc. of ICNP'13, IEEE, 2013.
-
(2013)
Proc. of ICNP'13, IEEE
-
-
Ilyas, M.U.1
Shafiq, M.Z.2
Liu, A.X.3
Radha, H.4
-
9
-
-
84904411030
-
Markov chain fingerprinting to classify encrypted traffic
-
M. Korczynski, and A. Duda, "Markov chain fingerprinting to classify encrypted traffic," In Proc. of INFOCOM'14, IEEE, 2014.
-
(2014)
Proc. of INFOCOM'14, IEEE
-
-
Korczynski, M.1
Duda, A.2
-
10
-
-
35348815641
-
Demographic prediction based on user's browsing behavior
-
J. Hu, H. J. Zeng, H. Li, C. Niu and Z. Chen, "Demographic prediction based on user's browsing behavior," In Proc. of WWW'07, ACM, 2007.
-
(2007)
Proc. of WWW'07, ACM
-
-
Hu, J.1
Zeng, H.J.2
Li, H.3
Niu, C.4
Chen, Z.5
-
12
-
-
84884541833
-
Personality, gender, and age in the language of social media: The open-vocabulary approach
-
Schwartz, H. Andrew, et al. "Personality, gender, and age in the language of social media: The open-vocabulary approach," PloS one 8.9 (2013): e73791.
-
(2013)
PloS One
, vol.8
, Issue.9
, pp. e73791
-
-
Andrew, S.H.1
-
13
-
-
84893122023
-
Inferring the demographics of search users: Social data meets search queries
-
B. Bi, M. Shokouhi, M. Kosinski, T. Graepel, "Inferring the demographics of search users: Social data meets search queries," In Proc. of WWW'13, ACM, 2013.
-
(2013)
Proc. of WWW'13, ACM
-
-
Bi, B.1
Shokouhi, M.2
Kosinski, M.3
Graepel, T.4
-
14
-
-
85141046573
-
You are what you like! information leakage through users' interests
-
A. Chaabane, G. Acs, M. A. Kaafar, "You Are What You Like! Information Leakage Through Users' Interests," In NDSS'12, 2012.
-
(2012)
NDSS'12
-
-
Chaabane, A.1
Acs, G.2
Kaafar, M.A.3
-
18
-
-
0035478854
-
Random forests
-
L. Breiman, "Random forests," Machine learning 45.1 (2001): 5-32.
-
(2001)
Machine Learning
, vol.45
, Issue.1
, pp. 5-32
-
-
Breiman, L.1
-
19
-
-
84869476246
-
Deanonymizing mobility traces: Using social network as a side-channel
-
M. Srivatsa and M. Hicks. Deanonymizing mobility traces: Using social network as a side-channel. In CCS'12, ACM, 2012.
-
(2012)
CCS'12, ACM
-
-
Srivatsa, M.1
Hicks, M.2
-
20
-
-
84861631795
-
Location privacy preservation in collaborative spectrum sensing
-
S. Li, H. Zhu, Z. Gao, X. Guan, K. Xing and S. Shen. "Location Privacy Preservation in Collaborative Spectrum Sensing," In Proc. of INFOCOM'12, IEEE, 2012.
-
(2012)
Proc. of INFOCOM'12, IEEE
-
-
Li, S.1
Zhu, H.2
Gao, Z.3
Guan, X.4
Xing, K.5
Shen, S.6
-
21
-
-
84943646932
-
All your location are belong to us: Breaking mobile social networks for automated user location tracking
-
M. Li, H. Zhu, Z. Gao, S. Chen, K. Ren, L. Yu, and S. Hu. "All Your Location are Belong to Us: Breaking Mobile Social Networks for Automated User Location Tracking," In MobiHoc'14, ACM, 2014.
-
(2014)
MobiHoc'14, ACM
-
-
Li, M.1
Zhu, H.2
Gao, Z.3
Chen, S.4
Ren, K.5
Yu, L.6
Hu, S.7
-
23
-
-
84983237571
-
A new security mechanism to perform traffic anonymity with dummy traffic synthesis
-
W. M. Shbair, A. R. Bashandy, and S. I. Shaheen. "A New Security Mechanism to Perform Traffic Anonymity with Dummy Traffic Synthesis," In CSE'09, IEEE, 2009.
-
(2009)
CSE'09, IEEE
-
-
Shbair, W.M.1
Bashandy, A.R.2
Shaheen, S.I.3
|