-
12
-
-
85040308047
-
All your contacts are belong to us: Automated identity theft attacks on social networks
-
L. Bilge, T. Strufe, D. Balzarotti, and E. Kirda. All your contacts are belong to us: automated identity theft attacks on social networks. In ACM WWW 2009.
-
(2009)
Acm Www
-
-
Bilge, L.1
Strufe, T.2
Balzarotti, D.3
Kirda, E.4
-
14
-
-
84881225762
-
You are what you like! information leakage through users' interests
-
A. Chaabane, G. Acs, and M. Kaafar. You are what you like! information leakage through users' interests. In NDSS '12.
-
Ndss '12
-
-
Chaabane, A.1
Acs, G.2
Kaafar, M.3
-
16
-
-
84882952038
-
Approximation algorithms for the discrete piercing set problem for unit disks
-
M. De, G. K. Das, and S. C. Nandy. Approximation algorithms for the discrete piercing set problem for unit disks. In CCCG, 2011.
-
(2011)
Cccg
-
-
De, M.1
Das, G.K.2
Nandy, S.C.3
-
17
-
-
85133722862
-
Location privacy protection for smartphone users
-
K. Fawaz and K. G. Shin. Location privacy protection for smartphone users. CCS '14'.
-
Ccs '14'
-
-
Fawaz, K.1
Shin, K.G.2
-
19
-
-
85018204196
-
Anonymous usage of location-based services through spatial and temporal cloaking
-
M. Gruteser and D. Grunwald. Anonymous usage of location-based services through spatial and temporal cloaking. In MobiSys, 2003.
-
(2003)
MobiSys
-
-
Gruteser, M.1
Grunwald, D.2
-
20
-
-
84881219827
-
Countering overlapping rectangle privacy attack for moving knn queries
-
T. Hashem, L. Kulik, and R. Zhang. Countering overlapping rectangle privacy attack for moving knn queries. Inf. Syst., 38(3).
-
Inf. Syst
, vol.38
, Issue.3
-
-
Hashem, T.1
Kulik, L.2
Zhang, R.3
-
22
-
-
84906538823
-
Trilateration-based localization algorithm using the lemoine point formulation
-
M.-S. Huang and R. M. Narayanan. Trilateration-based localization algorithm using the lemoine point formulation. IETE Journal of Research, 60(1):60-73, 2014.
-
(2014)
Iete Journal of Research
, vol.60
, Issue.1
, pp. 60-73
-
-
Huang, M.-S.1
Narayanan, R.M.2
-
23
-
-
84954537920
-
I know where you've been: Geo-inference attacks via the browser cache
-
Y. Jia, X. Dong, Z. Liang, and P. Saxena. I know where you've been: Geo-inference attacks via the browser cache. In W2SP 2014.
-
(2014)
W2SP
-
-
Jia, Y.1
Dong, X.2
Liang, Z.3
Saxena, P.4
-
24
-
-
84943646932
-
All your location are belong to us: Breaking mobile social networks for automated user location tracking
-
August
-
M. Li, H. Zhu, Z. Gao, S. Chen, L. Yu, S. Hu, and K. Ren. All your location are belong to us: Breaking mobile social networks for automated user location tracking. In MobiHoc, August 2014.
-
(2014)
MobiHoc
-
-
Li, M.1
Zhu, H.2
Gao, Z.3
Chen, S.4
Yu, L.5
Hu, S.6
Ren, K.7
-
26
-
-
85025286367
-
Simple heuristics for unit disk graphs
-
M. Marathe, H. Breu, H. B. Hunt, S. S. Ravi, and D. J. Rosenkrantz. Simple heuristics for unit disk graphs. NETWORKS, 25, 1995.
-
(1995)
Networks
, vol.25
-
-
Marathe, M.1
Breu, H.2
Hunt, H.B.3
Ravi, S.S.4
Rosenkrantz, D.J.5
-
28
-
-
0000169232
-
An algorithm for least-squares estimation of nonlinear parameters
-
D. W. Marquardt. An algorithm for least-squares estimation of nonlinear parameters. SIAM Journal of Applied Mathematics, 11(2):431-441, 1963.
-
(1963)
Siam Journal of Applied Mathematics
, vol.11
, Issue.2
, pp. 431-441
-
-
Marquardt, D.W.1
-
29
-
-
84883508137
-
A practical location privacy attack in proximity services
-
S. Mascetti, L. Bertolaja, and C. Bettini. A practical location privacy attack in proximity services. In MDM, 2013.
-
(2013)
Mdm
-
-
Mascetti, S.1
Bertolaja, L.2
Bettini, C.3
-
30
-
-
70349513937
-
Privacy-aware proximity based services
-
S. Mascetti, C. Bettini, D. Freni, X. S. Wang, and S. Jajodia. Privacy-aware proximity based services. In MDM, 2009.
-
(2009)
Mdm
-
-
Mascetti, S.1
Bettini, C.2
Freni, D.3
Wang, X.S.4
Jajodia, S.5
-
32
-
-
85133685910
-
Protecting location privacy against inference attacks
-
K. Minami and N. Borisov. Protecting location privacy against inference attacks. WPES '10.
-
Wpes '10
-
-
Minami, K.1
Borisov, N.2
-
34
-
-
33745825718
-
A PTAS for the Minimum Dominating Set Problem in Unit Disk Graphs
-
T. Nieberg and J. Hurink. A PTAS for the Minimum Dominating Set Problem in Unit Disk Graphs. In WAOA, 2006.
-
(2006)
Waoa
-
-
Nieberg, T.1
Hurink, J.2
-
35
-
-
85093396786
-
-
Technical Report CUCS-012-15, Dept. of Computer Science, Columbia University
-
I. Polakis, G. Argyros, T. Petsios, S. Sivakorn, and A. D. Keromytis. Where's Wally? Precise User Discovery Attacks in Location Proximity Services. Technical Report CUCS-012-15, Dept. of Computer Science, Columbia University.
-
Where's Wally? Precise User Discovery Attacks in Location Proximity Services
-
-
Polakis, I.1
Argyros, G.2
Petsios, T.3
Sivakorn, S.4
Keromytis, A.D.5
-
37
-
-
85133649132
-
Preserving privacy in location-based mobile social applications
-
K. P. N. Puttaswamy and B. Y. Zhao. Preserving privacy in location-based mobile social applications. HotMobile '10.
-
HotMobile '10
-
-
Puttaswamy, K.P.N.1
Zhao, B.Y.2
-
43
-
-
33746638764
-
Eficient deployment algorithms for ensuring coverage and connectivity of wireless sensor networks
-
Y.-C. Wang, C.-C. Hu, and Y.-C. Tseng. Eficient deployment algorithms for ensuring coverage and connectivity of wireless sensor networks. In Wireless Internet, 2005.
-
(2005)
Wireless Internet
-
-
Wang, Y.-C.1
Hu, C.-C.2
Tseng, Y.-C.3
-
44
-
-
85057714144
-
Human mobility enhances global positioning accuracy for mobile phone localization
-
Z. Yang, Y. Zhao, Y. Liu, and Y. Xu. Human mobility enhances global positioning accuracy for mobile phone localization. IEEE TPDS, 99:1, 2014.
-
(2014)
Ieee Tpds
, vol.99
, pp. 1
-
-
Yang, Z.1
Zhao, Y.2
Liu, Y.3
Xu, Y.4
-
45
-
-
84883092889
-
Checking in without worries: Location privacy in location based social networks
-
X. Zhao, L. Li, and G. Xue. Checking in without worries: Location privacy in location based social networks. In INFOCOM '13.
-
Infocom '13
-
-
Zhao, X.1
Li, L.2
Xue, G.3
-
46
-
-
77951287826
-
Louis, lester and pierre: Three protocols for location privacy
-
G. Zhong, I. Goldberg, and U. Hengartner. Louis, lester and pierre: Three protocols for location privacy. In PETS '07.
-
Pets '07
-
-
Zhong, G.1
Goldberg, I.2
Hengartner, U.3
|