-
2
-
-
78649999089
-
Rethinking location sharing: Exploring the implications of socialdriven versus purpose-driven location sharing
-
K. P. Tang, J. Lin, J. I. Hong, D. P. Siewiorek, and N. Sadeh, "Rethinking location sharing: Exploring the implications of socialdriven versus purpose-driven location sharing, " in Proc. 12th ACM Int. Conf. Ubiquitous Comput., 2010, pp. 85-94.
-
(2010)
Proc. 12th ACM Int. Conf. Ubiquitous Comput.
, pp. 85-94
-
-
Tang, K.P.1
Lin, J.2
Hong, J.I.3
Siewiorek, D.P.4
Sadeh, N.5
-
3
-
-
85050381844
-
-
T. Xiang. (2014). [Online]. Available: http://technode. com
-
(2014)
-
-
Xiang, T.1
-
4
-
-
85050381470
-
Skout 3. 4. 3 apk meet, chat, friend
-
Apk Apps, "Skout 3. 4. 3 Apk Meet, Chat, Friend, " (2014). [Online]. Available: http://www. apk4. net/applications/social-applications/ skout-3-4-3-apk-meet-chat-friend
-
(2014)
Apk Apps
-
-
-
5
-
-
84910676082
-
POSTER: Positioning attack on proximity-based people discovery
-
H. Feng and K. G. Shin, "POSTER: Positioning attack on proximity-based people discovery, " in Proc. ACM SIGSAC Conf. Comput. Commun. Secur., 2014, pp. 1427-1429.
-
(2014)
Proc. ACM SIGSAC Conf. Comput. Commun. Secur.
, pp. 1427-1429
-
-
Feng, H.1
Shin, K.G.2
-
6
-
-
84937572548
-
Stalking Beijing from Timbuktu: A generic measurement approach for exploiting location-based social discovery
-
Y. Ding, S. T. Peddinti, and K. W. Ross, "Stalking Beijing from Timbuktu: A generic measurement approach for exploiting location-based social discovery, " in Proc. 4th ACM Workshop Secur. Privacy Smartphones Mobile Devices, 2015, pp. 75-80.
-
(2015)
Proc. 4th ACM Workshop Secur. Privacy Smartphones Mobile Devices
, pp. 75-80
-
-
Ding, Y.1
Peddinti, S.T.2
Ross, K.W.3
-
7
-
-
84943646932
-
All your location are belong to us: Breaking mobile social networks for automated user location tracking
-
M. Li, et al., "All your location are belong to us: Breaking mobile social networks for automated user location tracking, " in Proc. 15th ACM Int. Symp. Mobile Ad Hoc Netw. Comput., 2014, pp. 43-52.
-
(2014)
Proc. 15th ACM Int. Symp. Mobile Ad Hoc Netw. Comput.
, pp. 43-52
-
-
Li, M.1
-
8
-
-
85082947529
-
Where's wally?: Precise user discovery attacks in location proximity services
-
I. Polakis, G. Argyros, T. Petsios, S. Sivakorn, and A. D. Keromytis, "Where's wally?: Precise user discovery attacks in location proximity services, " in Proc. 22nd ACM SIGSAC Conf. Comput. Commun. Secur., 2015, pp. 817-828.
-
(2015)
Proc. 22nd ACM SIGSAC Conf. Comput. Commun. Secur.
, pp. 817-828
-
-
Polakis, I.1
Argyros, G.2
Petsios, T.3
Sivakorn, S.4
Keromytis, A.D.5
-
9
-
-
84962579256
-
MixGroup: Accumulative pseudonym exchanging for location privacy enhancement in vehicular social networks
-
Jan. / Feb.
-
R. Yu, J. Kang, X. Huang, S. Xie, Y. Zhang, and S. Gjessing, "MixGroup: Accumulative pseudonym exchanging for location privacy enhancement in vehicular social networks, " IEEE Trans. Depend. Sec. Comput., vol. 13, no. 1, pp. 93-105, Jan. /Feb. 2016.
-
(2016)
IEEE Trans. Depend. Sec. Comput.
, vol.13
, Issue.1
, pp. 93-105
-
-
Yu, R.1
Kang, J.2
Huang, X.3
Xie, S.4
Zhang, Y.5
Gjessing, S.6
-
10
-
-
84861631795
-
Location privacy preservation in collaborative spectrum sensing
-
S. Li, H. Zhu, Z. Gao, X. Guan, K. Xing, and X. Shen, "Location privacy preservation in collaborative spectrum sensing, " in Proc. IEEE INFOCOM, 2012, pp. 729-737.
-
(2012)
Proc. IEEE INFOCOM
, pp. 729-737
-
-
Li, S.1
Zhu, H.2
Gao, Z.3
Guan, X.4
Xing, K.5
Shen, X.6
-
11
-
-
84869476246
-
Deanonymizing mobility traces: Using social network as a side-channel
-
M. Srivatsa and M. Hicks, "Deanonymizing mobility traces: Using social network as a side-channel, " in Proc. ACM Conf. Comput. Commun. Secur., 2012, pp. 628-637.
-
(2012)
Proc. ACM Conf. Comput. Commun. Secur.
, pp. 628-637
-
-
Srivatsa, M.1
Hicks, M.2
-
12
-
-
84899629080
-
Context-centric security
-
M. Tiwari, P. Mohan, A. Osheroff, and H. Alkaff, "Context-centric security, " in Proc. 7th USENIX Conf. Hot Topics Secur., 2012, p. 9.
-
(2012)
Proc. 7th USENIX Conf. Hot Topics Secur.
, pp. 9
-
-
Tiwari, M.1
Mohan, P.2
Osheroff, A.3
Alkaff, H.4
-
13
-
-
84921923317
-
Control use of data to protect privacy
-
S. Landau, "Control use of data to protect privacy, " Science, vol. 347, no. 6221, pp. 504-406, 2015.
-
(2015)
Science
, vol.347
, Issue.6221
, pp. 406-504
-
-
Landau, S.1
-
14
-
-
84921898213
-
Privacy and human behavior in the age of information
-
A. Acquisti, L. Brandimarte, and G. Loewenstein, "Privacy and human behavior in the age of information, " Science, vol. 347, no. 6621, pp. 509-514, 2015.
-
(2015)
Science
, vol.347
, Issue.6621
, pp. 509-514
-
-
Acquisti, A.1
Brandimarte, L.2
Loewenstein, G.3
-
16
-
-
80051968910
-
Quantifying location privacy
-
R. Shokri, G. Theodorakopoulos, J. Le Boudec, and J. Hubaux, "Quantifying location privacy, " in Proc. IEEE Symp. Secur. Privacy, 2011, pp. 247-262.
-
(2011)
Proc. IEEE Symp. Secur. Privacy
, pp. 247-262
-
-
Shokri, R.1
Theodorakopoulos, G.2
Le Boudec, J.3
Hubaux, J.4
-
17
-
-
84877954564
-
Constructing and comparing user mobility profiles for location-based services
-
X. Chen, J. Pang, and R. Xue, "Constructing and comparing user mobility profiles for location-based services, " in Proc. 28th Annu. ACM Symp. Appl. Comput., 2013, pp. 261-266.
-
(2013)
Proc. 28th Annu. ACM Symp. Appl. Comput.
, pp. 261-266
-
-
Chen, X.1
Pang, J.2
Xue, R.3
-
18
-
-
70349337434
-
Identification via location-profiling in GSM networks
-
Y. De Mulder, G. Danezis, L. Batina, and B. Preneel, "Identification via location-profiling in GSM networks, " in Proc. 7th ACM Workshop Privacy Electron. Soc., 2008, pp. 23-32.
-
(2008)
Proc. 7th ACM Workshop Privacy Electron. Soc.
, pp. 23-32
-
-
De Mulder, Y.1
Danezis, G.2
Batina, L.3
Preneel, B.4
-
19
-
-
80053584816
-
Anonymization of location data does not work: A large-scale measurement study
-
H. Zang and J. Bolot, "Anonymization of location data does not work: A large-scale measurement study, " in Proc. 17th Annu. Int. Conf. Mobile Comput. Netw., 2011, pp. 145-156.
-
(2011)
Proc. 17th Annu. Int. Conf. Mobile Comput. Netw.
, pp. 145-156
-
-
Zang, H.1
Bolot, J.2
-
21
-
-
77149139158
-
Limits of predictability in human mobility
-
C. Song, Z. Qu, N. Blumm, and A.-L. Barabasi, "Limits of predictability in human mobility, " Science, vol. 327, no. 5968, pp. 1018-1021, 2010.
-
(2010)
Science
, vol.327
, Issue.5968
, pp. 1018-1021
-
-
Song, C.1
Qu, Z.2
Blumm, N.3
Barabasi, A.-L.4
-
22
-
-
80052649964
-
On the semantic annotation of places in location-based social networks
-
M. Ye, D. Shou, W.-C. Lee, P. Yin, and K. Janowicz, "On the semantic annotation of places in location-based social networks, " in Proc. 17th ACM SIGKDD Int. Conf. Knowl. Discovery Data Mining, 2011, pp. 520-528.
-
(2011)
Proc. 17th ACM SIGKDD Int. Conf. Knowl. Discovery Data Mining
, pp. 520-528
-
-
Ye, M.1
Shou, D.2
Lee, W.-C.3
Yin, P.4
Janowicz, K.5
-
23
-
-
84867449261
-
Automatically characterizing places with opportunistic crowdsensing using smartphones
-
Y. Chon, N. D. Lane, F. Li, H. Cha, and F. Zhao, "Automatically characterizing places with opportunistic crowdsensing using smartphones, " in Proc. ACM Conf. Ubiquitous Comput., 2012, pp. 481-490.
-
(2012)
Proc. ACM Conf. Ubiquitous Comput.
, pp. 481-490
-
-
Chon, Y.1
Lane, N.D.2
Li, F.3
Cha, H.4
Zhao, F.5
-
25
-
-
70449715854
-
Mining user similarity based on location history
-
Q. Li, Y. Zheng, X. Xie, Y. Chen, W. Liu, and W. Ma, "Mining user similarity based on location history, " in Proc. 16th ACM SIGSPATIAL Int. Conf. Advances Geographic Inf. Syst., 2008, Art. no. 34.
-
(2008)
Proc. 16th ACM SIGSPATIAL Int. Conf. Advances Geographic Inf. Syst.
-
-
Li, Q.1
Zheng, Y.2
Xie, X.3
Chen, Y.4
Liu, W.5
Ma, W.6
-
29
-
-
78649342447
-
An obfuscation-based approach for protecting location privacy
-
Jan. / Feb.
-
C. A. Ardagna, M. Cremonini, S. De Capitani di Vimercati, and P. Samarati, "An obfuscation-based approach for protecting location privacy, " IEEE Trans. Depend. Sec. Comput., vol. 8, no. 1, pp. 13-27, Jan. /Feb. 2011.
-
(2011)
IEEE Trans. Depend. Sec. Comput.
, vol.8
, Issue.1
, pp. 13-27
-
-
Ardagna, C.A.1
Cremonini, M.2
De Vimercati Di Capitani, S.3
Samarati, P.4
-
30
-
-
84910607722
-
Optimal geo-indistinguishable mechanisms for location privacy
-
N. E. Bordenabe, K. Chatzikokolakis, and C. Palamidessi, "Optimal geo-indistinguishable mechanisms for location privacy, " in Proc. ACM SIGSAC Conf. Comput. Commun. Secur., 2014, pp. 251-262.
-
(2014)
Proc. ACM SIGSAC Conf. Comput. Commun. Secur.
, pp. 251-262
-
-
Bordenabe, N.E.1
Chatzikokolakis, K.2
Palamidessi, C.3
-
31
-
-
85012142824
-
Location privacy attack and defense in cloud-enabled internet of vehicles
-
J. Kang, R. Yu, X. Huang, H. Bogucka, S. Gjessing, and Y. Zhang, "Location privacy attack and defense in cloud-enabled internet of vehicles, " IEEE Wireless Commun. Mag., 2016.
-
(2016)
IEEE Wireless Commun. Mag.
-
-
Kang, J.1
Yu, R.2
Huang, X.3
Bogucka, H.4
Gjessing, S.5
Zhang, Y.6
-
32
-
-
85038216780
-
Learning-based jamming attack against low-duty-cycle networks
-
Nov.
-
Z. Yang, P. Cheng, and J. Chen, "Learning-based jamming attack against low-duty-cycle networks, " IEEE Trans. Depend. Sec. Comput., vol. PP, no. 99, p. 1, Nov. 2015, Doi: 10. 1109/TDSC. 2015. 2501288.
-
(2015)
IEEE Trans. Depend. Sec. Comput.
, vol.PP
, Issue.99
, pp. 1
-
-
Yang, Z.1
Cheng, P.2
Chen, J.3
-
33
-
-
84940705050
-
Optimal DoS attack scheduling in wireless networked control system
-
May
-
H. Zhang, P. Cheng, L. Shi, and J. Chen, "Optimal DoS attack scheduling in wireless networked control system, " IEEE Trans. Control Syst. Technol., vol. 24, no. 3, pp. 843-852, May 2016.
-
(2016)
IEEE Trans. Control Syst. Technol.
, vol.24
, Issue.3
, pp. 843-852
-
-
Zhang, H.1
Cheng, P.2
Shi, L.3
Chen, J.4
-
34
-
-
84903591823
-
Enhancing spectral-energy efficiency for LTE-advanced heterogeneous networks: A users social pattern perspective
-
Apr.
-
X. Zhang, Y. Zhang, R. Yu, W. Wang, and M. Guizani, "Enhancing spectral-energy efficiency for LTE-advanced heterogeneous networks: A users social pattern perspective, " IEEE Wireless Commun., vol. 21, no. 2, pp. 10-17, Apr. 2014.
-
(2014)
IEEE Wireless Commun.
, vol.21
, Issue.2
, pp. 10-17
-
-
Zhang, X.1
Zhang, Y.2
Yu, R.3
Wang, W.4
Guizani, M.5
-
35
-
-
84905015149
-
Distributed resource allocation in cloud-based wireless multimedia social networks
-
Jul. / Aug.
-
G. Nan, et al., "Distributed resource allocation in cloud-based wireless multimedia social networks, " IEEE Netw. Mag., vol. 28, no. 4, pp. 74-80, Jul. /Aug. 2014.
-
(2014)
IEEE Netw. Mag.
, vol.28
, Issue.4
, pp. 74-80
-
-
Nan, G.1
-
36
-
-
84897583900
-
Stackelberg game for bandwidth allocation in cloud-based wireless live-streaming social networks
-
Mar.
-
G. Nan, Z. Mao, M. Yu, M. Li, H. Wang, and Y. Zhang, "Stackelberg game for bandwidth allocation in cloud-based wireless live-streaming social networks, " IEEE Syst. J., vol. 8, no. 1, pp. 256-267, Mar. 2014.
-
(2014)
IEEE Syst. J.
, vol.8
, Issue.1
, pp. 256-267
-
-
Nan, G.1
Mao, Z.2
Yu, M.3
Li, M.4
Wang, H.5
Zhang, Y.6
-
37
-
-
84966800500
-
De-anonymizing social networks: Using user interest as a side-channel
-
S. Lai, H. Li, H. Zhu, and N. Ruan, "De-anonymizing social networks: Using user interest as a side-channel, " in Proc. IEEE/CIC Int. Conf. Commun. China, 2015, pp. 1-5.
-
(2015)
Proc. IEEE/CIC Int. Conf. Commun. China
, pp. 1-5
-
-
Lai, S.1
Li, H.2
Zhu, H.3
Ruan, N.4
-
38
-
-
84940533844
-
Exploiting mobile social behaviors for Sybil detection
-
K. Zhang, X. Liang, R. Lu, K. Yang, and X. Shen, "Exploiting mobile social behaviors for Sybil detection, " in Proc. IEEE Conf. Comput. Commun., 2015, pp. 271-279.
-
(2015)
Proc. IEEE Conf. Comput. Commun.
, pp. 271-279
-
-
Zhang, K.1
Liang, X.2
Lu, R.3
Yang, K.4
Shen, X.5
-
39
-
-
84896982446
-
Exploiting multimedia services in mobile social networks from security and privacy perspectives
-
Mar.
-
K. Zhang, X. Liang, X. Shen, and R. Lu, "Exploiting multimedia services in mobile social networks from security and privacy perspectives, " IEEE Commun. Mag., vol. 52, no. 3, pp. 58-65, Mar. 2014.
-
(2014)
IEEE Commun. Mag.
, vol.52
, Issue.3
, pp. 58-65
-
-
Zhang, K.1
Liang, X.2
Shen, X.3
Lu, R.4
-
40
-
-
84983261924
-
Demographics inference through Wi-Fi network traffic analysis
-
H. Li, Z. Xu, H. Zhu, D. Ma, S. Li, and K. Xing, "Demographics inference through Wi-Fi network traffic analysis, " in Proc. 35th Annu. IEEE Int. Conf. Comput. Commun., 2016, pp. 1-9.
-
(2016)
Proc. 35th Annu. IEEE Int. Conf. Comput. Commun.
, pp. 1-9
-
-
Li, H.1
Xu, Z.2
Zhu, H.3
Ma, D.4
Li, S.5
Xing, K.6
-
41
-
-
85150485002
-
Location privacy via private proximity testing
-
A. Narayanan, N. Thiagarajan, M. Hamburg, M. Lakhani, and D. Boneh, "Location privacy via private proximity testing, " in Proc. 18th Annu. Netw. Distrib. Syst. Secur. Symp., 2011.
-
(2011)
Proc. 18th Annu. Netw. Distrib. Syst. Secur. Symp.
-
-
Narayanan, A.1
Thiagarajan, N.2
Hamburg, M.3
Lakhani, M.4
Boneh, D.5
-
42
-
-
84869465300
-
Protecting location privacy: Optimal strategy against localization attacks
-
R. Shokri, G. Theodorakopoulos, C. Troncoso, J.-P. Hubaux, and J.-Y. Le Boudec, "Protecting location privacy: Optimal strategy against localization attacks, " in Proc. ACM Conf. Comput. Commun. Secur., 2012, pp. 617-627.
-
(2012)
Proc. ACM Conf. Comput. Commun. Secur.
, pp. 617-627
-
-
Shokri, R.1
Theodorakopoulos, G.2
Troncoso, C.3
Hubaux, J.-P.4
Le Boudec, J.-Y.5
-
43
-
-
84907405443
-
Practical privacypreserving location-sharing based services with aggregate statistics
-
M. Herrmann, A. Rial, C. Diaz, and B. Preneel, "Practical privacypreserving location-sharing based services with aggregate statistics, " in Proc. ACM Conf. Secur. Privacy Wireless Mobile Netw., 2014, pp. 87-98.
-
(2014)
Proc. ACM Conf. Secur. Privacy Wireless Mobile Netw.
, pp. 87-98
-
-
Herrmann, M.1
Rial, A.2
Diaz, C.3
Preneel, B.4
-
44
-
-
84910633256
-
POSTER: LocMask: A location privacy protection framework in android system
-
Q. Xiao, et al., "POSTER: LocMask: A location privacy protection framework in android system, " in Proc. ACM Conf. Comput. Commun. Secur., 2014, pp. 1526-1528.
-
(2014)
Proc. ACM Conf. Comput. Commun. Secur.
, pp. 1526-1528
-
-
Xiao, Q.1
-
45
-
-
85018204196
-
Anonymous usage of locationbased services through spatial and temporal cloaking
-
M. Gruteser and D. Grunwald, "Anonymous usage of locationbased services through spatial and temporal cloaking, " in Proc. 1st Int. Conf. Mobile Syst. Appl. Services, 2003, pp. 31-42.
-
(2003)
Proc. 1st Int. Conf. Mobile Syst. Appl. Services
, pp. 31-42
-
-
Gruteser, M.1
Grunwald, D.2
-
46
-
-
57349108972
-
Preserving privacy in GPS traces via uncertainty-aware path cloaking
-
B. Hoh, M. Gruteser, H. Xiong, and A. Alrabady, "Preserving privacy in GPS traces via uncertainty-aware path cloaking, " in Proc. 14th ACM Conf. Comput. Commun. Secur., 2007, pp. 161-171.
-
(2007)
Proc. 14th ACM Conf. Comput. Commun. Secur.
, pp. 161-171
-
-
Hoh, B.1
Gruteser, M.2
Xiong, H.3
Alrabady, A.4
-
47
-
-
84860764042
-
MockDroid: Trading privacy for application functionality on smartphones
-
A. R. Beresford, A. Rice, N. Skehin, and R. Sohan, "MockDroid: Trading privacy for application functionality on smartphones, " in Proc. 12th Workshop Mobile Comput. Syst. Appl., 2011, pp. 49-54.
-
(2011)
Proc. 12th Workshop Mobile Comput. Syst. Appl.
, pp. 49-54
-
-
Beresford, A.R.1
Rice, A.2
Skehin, N.3
Sohan, R.4
-
50
-
-
85180549733
-
DeepDroid: Dynamically enforcing enterprise policy on android devices
-
X. Wang, K. Sun, Y. Wang, and J. Jing, "DeepDroid: Dynamically enforcing enterprise policy on android devices, " in Proc. Annu. Netw. Distrib. Syst. Secur. Symp., 2015.
-
(2015)
Proc. Annu. Netw. Distrib. Syst. Secur. Symp.
-
-
Wang, X.1
Sun, K.2
Wang, Y.3
Jing, J.4
|