-
1
-
-
84889037772
-
Geo-indistinguishability: Differential privacy for location-based systems
-
M. E. Andrés, N. E. Bordenabe, K. Chatzikokolakis, and C. Palamidessi, “Geo-indistinguishability: Differential privacy for location-based systems, ” in CCS'13: Proc. of the 20th ACM Conf. on Computer and Communications Security, 2013, pp. 901-914.
-
(2013)
CCS'13: Proc. of the 20th ACM Conf. on Computer and Communications Security
, pp. 901-914
-
-
Andrés, M. E.1
Bordenabe, N. E.2
Chatzikokolakis, K.3
Palamidessi, C.4
-
2
-
-
84885219379
-
Adaptive information-sharing for privacy-aware mobile social networks
-
I. Bilogrevic, K. Huguenin, B. Agir, M. Jadliwala, and J.-P. Hubaux, “Adaptive information-sharing for privacy-aware mobile social networks, ” in UbiComp'13: Proc. of the 2013 ACM Int'l joint Conf. on Pervasive and Ubiquitous Computing, 2013, pp. 657-666.
-
(2013)
UbiComp'13: Proc. of the 2013 ACM Int'l joint Conf. on Pervasive and Ubiquitous Computing
, pp. 657-666
-
-
Bilogrevic, I.1
Huguenin, K.2
Agir, B.3
Jadliwala, M.4
Hubaux, J.-P.5
-
3
-
-
78650014112
-
Exploring end user preferences for location obfuscation, location-based services, and the value of location
-
A. Brush, J. Krumm, and J. Scott, “Exploring end user preferences for location obfuscation, location-based services, and the value of location, ” in UbiComp'10: Proc. of the 12th ACM Int'l Conf. on Ubiquitous Computing, 2010, pp. 95-104.
-
(2010)
UbiComp'10: Proc. of the 12th ACM Int'l Conf. on Ubiquitous Computing
, pp. 95-104
-
-
Brush, A.1
Krumm, J.2
Scott, J.3
-
4
-
-
74049115383
-
Faking contextual data for fun, profit, and privacy
-
R. Chow and P. Golle, “Faking contextual data for fun, profit, and privacy, ” in WPES'09: Proc. of the 8th ACM Workshop on Privacy in the Electronic Society, 2009, pp. 105-108.
-
(2009)
WPES'09: Proc. of the 8th ACM Workshop on Privacy in the Electronic Society
, pp. 105-108
-
-
Chow, R.1
Golle, P.2
-
5
-
-
80054837809
-
Performing a check-in: Emerging practices, norms and'conflicts' in location-sharing using foursquare
-
H. Cramer, M. Rost, and L. E. Holmquist, “Performing a check-in: Emerging practices, norms and'conflicts' in location-sharing using foursquare, ” in MobileHCI'11: Proc. of the 13th Int'l Conf. on Human Computer Interaction with Mobile Devices and Services, 2011, pp. 57-66.
-
(2011)
MobileHCI'11: Proc. of the 13th Int'l Conf. on Human Computer Interaction with Mobile Devices and Services
, pp. 57-66
-
-
Cramer, H.1
Rost, M.2
Holmquist, L. E.3
-
6
-
-
80053291743
-
Enhanced sentiment learning using twitter hashtags and smileys
-
D. Davidov, O. Tsur, and A. Rappoport, “Enhanced sentiment learning using twitter hashtags and smileys, ” in COLING'10: Proc. of the 23rd Int'l Conf. on Computational Linguistics: Posters, 2010, pp. 241-249.
-
(2010)
COLING'10: Proc. of the 23rd Int'l Conf. on Computational Linguistics: Posters
, pp. 241-249
-
-
Davidov, D.1
Tsur, O.2
Rappoport, A.3
-
7
-
-
70349337434
-
Identification via location-profiling in GSM networks
-
Y. De Mulder, G. Danezis, L. Batina, and B. Preneel, “Identification via location-profiling in GSM networks, ” in WPES'08: Proc. of the 7th ACM Workshop on Privacy in the Electronic Society, 2008, pp. 23-32.
-
(2008)
WPES'08: Proc. of the 7th ACM Workshop on Privacy in the Electronic Society
, pp. 23-32
-
-
De Mulder, Y.1
Danezis, G.2
Batina, L.3
Preneel, B.4
-
10
-
-
84879743544
-
-
Stanford University, CS224N Project Report
-
A. Go, R. Bhayani, and L. Huang, “Twitter sentiment analysis, ” Stanford University, CS224N Project Report, 2009, http://www-nlp.stanford.edu/courses/cs224n/2009/fp/3.pdf.
-
(2009)
Twitter sentiment analysis
-
-
Go, A.1
Bhayani, R.2
Huang, L.3
-
13
-
-
76749092270
-
The WEKA data mining software: an update
-
M. Hall, E. Frank, G. Holmes, B. Pfahringer, P. Reutemann, and I. H. Witten, “The WEKA data mining software: an update, ” ACM SIGKDD explorations newsletter, vol. 11, no. 1, pp. 10-18, 2009.
-
(2009)
ACM SIGKDD explorations newsletter
, vol.11
, Issue.1
, pp. 10-18
-
-
Hall, M.1
Frank, E.2
Holmes, G.3
Pfahringer, B.4
Reutemann, P.5
Witten, I. H.6
-
14
-
-
84884993776
-
Selective cloaking: Need-to-know for location-based apps
-
B. Henne, C. Kater, M. Smith, and M. Brenner, “Selective cloaking: Need-to-know for location-based apps, ” in PST'13: Proc. of the 11th Annual Int'l Conf. on Privacy, Security and Trust, 2013, pp. 19-26.
-
(2013)
PST'13: Proc. of the 11th Annual Int'l Conf. on Privacy, Security and Trust
, pp. 19-26
-
-
Henne, B.1
Kater, C.2
Smith, M.3
Brenner, M.4
-
15
-
-
57349108972
-
Preserving privacy in GPS traces via uncertainty-aware path cloaking
-
B. Hoh, M. Gruteser, H. Xiong, and A. Alrabady, “Preserving privacy in GPS traces via uncertainty-aware path cloaking, ” in CCS'07: Proc. of the 14th ACM Conf. on Computer and Communications Security, 2007, pp. 161-171.
-
(2007)
CCS'07: Proc. of the 14th ACM Conf. on Computer and Communications Security
, pp. 161-171
-
-
Hoh, B.1
Gruteser, M.2
Xiong, H.3
Alrabady, A.4
-
16
-
-
83055184650
-
Target-dependent twitter sentiment classification
-
L. Jiang, M. Yu, M. Zhou, X. Liu, and T. Zhao, “Target-dependent twitter sentiment classification.” in Association for Computational Linguistics, 2011, pp. 151-160.
-
(2011)
Association for Computational Linguistics
, pp. 151-160
-
-
Jiang, L.1
Yu, M.2
Zhou, M.3
Liu, X.4
Zhao, T.5
-
17
-
-
35449007284
-
Preserving location privacy in wireless LANs
-
T. Jiang, H. J. Wang, and Y.-C. Hu, “Preserving location privacy in wireless LANs, ” in MobiSys'07: Proc. of the 5th Int'l Conf. on Mobile Systems, Applications and Services, 2007, pp. 246-257.
-
(2007)
MobiSys'07: Proc. of the 5th Int'l Conf. on Mobile Systems, Applications and Services
, pp. 246-257
-
-
Jiang, T.1
Wang, H. J.2
Hu, Y.-C.3
-
18
-
-
85030408665
-
The persuasive effect of privacy recommendations
-
B. Knijnenburg and H. Jin, “The persuasive effect of privacy recommendations, ” in SIGCHI Proceedings, 2013, p. 16.
-
(2013)
SIGCHI Proceedings
, pp. 16
-
-
Knijnenburg, B.1
Jin, H.2
-
20
-
-
0001116877
-
Binary codes capable of correcting deletions, insertions and reversals
-
V. I. Levenshtein, “Binary codes capable of correcting deletions, insertions and reversals, ” in Soviet physics doklady, vol. 10, 1966, p. 707.
-
(1966)
Soviet physics doklady
, vol.10
, pp. 707
-
-
Levenshtein, V. I.1
-
21
-
-
79958162705
-
I'm the mayor of my house: Examining why people use foursquare - a social-driven location sharing application
-
J. Lindqvist, J. Cranshaw, J. Wiese, J. Hong, and J. Zimmerman, “I'm the mayor of my house: Examining why people use foursquare - a social-driven location sharing application, ” in CHI'11: Proc. of the 21st ACM Conf. on Human Factors in Computing Systems, 2011, pp. 2409-2418.
-
(2011)
CHI'11: Proc. of the 21st ACM Conf. on Human Factors in Computing Systems
, pp. 2409-2418
-
-
Lindqvist, J.1
Cranshaw, J.2
Wiese, J.3
Hong, J.4
Zimmerman, J.5
-
22
-
-
82655180226
-
Conducting behavioral research on amazons mechanical turk
-
W. Mason and S. Suri, “Conducting behavioral research on amazons mechanical turk, ” Behavior research methods, vol. 44, no. 1, pp. 1-23, 2012.
-
(2012)
Behavior research methods
, vol.44
, Issue.1
, pp. 1-23
-
-
Mason, W.1
Suri, S.2
-
24
-
-
58149430734
-
The serial position effect of free recall
-
J. Murdock and B. Bennet, “The serial position effect of free recall, ” Journal of experimental psychology, vol. 64, no. 5, p. 482, 1962.
-
(1962)
Journal of experimental psychology
, vol.64
, Issue.5
, pp. 482
-
-
Murdock, J.1
Bennet, B.2
-
26
-
-
84868374539
-
My privacy policy: exploring end-user specification of free-form location access rules
-
S. Patil, Y. Le Gall, A. J. Lee, and A. Kapadia, “My privacy policy: exploring end-user specification of free-form location access rules, ” in USEC'12: Proc. of the 2012 Workshop on Usable Security, 2012, pp. 86-97.
-
(2012)
USEC'12: Proc. of the 2012 Workshop on Usable Security
, pp. 86-97
-
-
Patil, S.1
Le Gall, Y.2
Lee, A. J.3
Kapadia, A.4
-
27
-
-
84864974894
-
Reasons, rewards, regrets: Privacy considerations in location sharing as an interactive practice
-
S. Patil, G. Norcie, A. Kapadia, and A. J. Lee, “Reasons, rewards, regrets: Privacy considerations in location sharing as an interactive practice, ” in SOUPS'12: Proc. of the 8th Symp. on Usable Privacy and Security, 2012, pp. 5:1-5:15.
-
(2012)
SOUPS'12: Proc. of the 8th Symp. on Usable Privacy and Security
, pp. 5:1-5:15
-
-
Patil, S.1
Norcie, G.2
Kapadia, A.3
Lee, A. J.4
-
28
-
-
85081878213
-
Check out where i am!: location-sharing motivations, preferences, and practices
-
S. Patil, G. Norcie, A. Kapadia, and A. Lee, “Check out where i am!: location-sharing motivations, preferences, and practices, ” in CHI'12: Proc. of the 22nd ACM Conf. on Human Factors in Computing Systems (Extended Abstracts), 2012, pp. 1997-2002.
-
(2012)
CHI'12: Proc. of the 22nd ACM Conf. on Human Factors in Computing Systems (Extended Abstracts)
, pp. 1997-2002
-
-
Patil, S.1
Norcie, G.2
Kapadia, A.3
Lee, A.4
-
29
-
-
85180557416
-
-
last visited: Mar
-
Sentiment 140, http://help.sentiment140.com/for-students, last visited: Mar. 2014.
-
(2014)
Sentiment
, vol.140
-
-
-
30
-
-
80051968910
-
Quantifying location privacy
-
R. Shokri, G. Theodorakopoulos, J.-Y. Le Boudec, and J.-P. Hubaux, “Quantifying location privacy, ” in SP'11: Proc. of the 2011 IEEE Symp. on Security and Privacy, 2011, pp. 247-262.
-
(2011)
SP'11: Proc. of the 2011 IEEE Symp. on Security and Privacy
, pp. 247-262
-
-
Shokri, R.1
Theodorakopoulos, G.2
Le Boudec, J.-Y.3
Hubaux, J.-P.4
-
31
-
-
84869465300
-
Protecting location privacy: Optimal strategy against localization attacks
-
R. Shokri, G. Theodorakopoulos, C. Troncoso, J.-P. Hubaux, and J.Y. Le Boudec, “Protecting location privacy: Optimal strategy against localization attacks, ” in CCS'12: Proc. of the 19th ACM Conf. on Computer and Communications Security, 2012, pp. 617-627.
-
(2012)
CCS'12: Proc. of the 19th ACM Conf. on Computer and Communications Security
, pp. 617-627
-
-
Shokri, R.1
Theodorakopoulos, G.2
Troncoso, C.3
Hubaux, J.-P.4
Le Boudec, J.Y.5
-
33
-
-
84873692278
-
Harnessing twitter” big data” for automatic emotion identification
-
W. Wang, L. Chen, K. Thirunarayan, and A. P. Sheth, “Harnessing twitter” big data” for automatic emotion identification, ” in PASSAT'12: Proc. of the Int'l Conf. on Privacy, Security, Risk and Trust, 2012, pp. 587-592.
-
(2012)
PASSAT'12: Proc. of the Int'l Conf. on Privacy, Security, Risk and Trust
, pp. 587-592
-
-
Wang, W.1
Chen, L.2
Thirunarayan, K.3
Sheth, A. P.4
-
36
-
-
2942691458
-
Location-based services
-
Last visited: Jan. 2014
-
K. Zickuhr, “Location-based services, ” Pew Research. 2013. http://www.pewinternet.org/files/old-media/Files/Reports/2013/PIP_Location-based%20services%202013.pdf. Last visited: Jan. 2014.
-
(2013)
Pew Research
-
-
Zickuhr, K.1
|