Demographics inference through Wi-Fi network traffic analysis
暂无分享,去创建一个
Shuai Li | Di Ma | Haojin Zhu | Kai Xing | Huaxin Li | Zheyu Xu | Shuai Li | Haojin Zhu | Di Ma | Huaxin Li | Kai Xing | Zheyu Xu
[1] Andrzej Duda,et al. Markov chain fingerprinting to classify encrypted traffic , 2014, IEEE INFOCOM 2014 - IEEE Conference on Computer Communications.
[2] Aleksandar Kuzmanovic,et al. Mosaic: quantifying privacy leakage in mobile networks , 2013, SIGCOMM.
[3] Gaël Varoquaux,et al. Scikit-learn: Machine Learning in Python , 2011, J. Mach. Learn. Res..
[4] Wei Cheng,et al. Characterizing privacy leakage of public WiFi networks for users on travel , 2013, 2013 Proceedings IEEE INFOCOM.
[5] Erik Tews,et al. Practical attacks against WEP and WPA , 2009, WiSec '09.
[6] Parth H. Pathak,et al. Contextual localization through network traffic analysis , 2014, IEEE INFOCOM 2014 - IEEE Conference on Computer Communications.
[7] Mark Handley,et al. The final nail in WEP's coffin , 2006, 2006 IEEE Symposium on Security and Privacy (S&P'06).
[8] Haojin Zhu,et al. All your location are belong to us: breaking mobile social networks for automated user location tracking , 2013, MobiHoc '14.
[9] Samir I. Shaheen,et al. A New Security Mechanism to Perform Traffic Anonymity with Dummy Traffic Synthesis , 2009, 2009 International Conference on Computational Science and Engineering.
[10] Mohamed Ali Kâafar,et al. You are what you like! Information leakage through users' Interests , 2012, NDSS.
[11] Milad Shokouhi,et al. Inferring the demographics of search users: social data meets search queries , 2013, WWW.
[12] Prasant Mohapatra,et al. Your Installed Apps Reveal Your Gender and More! , 2015, MOCO.
[13] Margaret L. Kern,et al. Personality, Gender, and Age in the Language of Social Media: The Open-Vocabulary Approach , 2013, PloS one.
[14] Michael Hicks,et al. Deanonymizing mobility traces: using social network as a side-channel , 2012, CCS.
[15] Hua Li,et al. Demographic prediction based on user's browsing behavior , 2007, WWW '07.
[16] Shuai Li,et al. Location privacy preservation in collaborative spectrum sensing , 2012, 2012 Proceedings IEEE INFOCOM.
[17] Hayder Radha,et al. Who are you talking to? Breaching privacy in encrypted IM networks , 2013, 2013 21st IEEE International Conference on Network Protocols (ICNP).
[18] Leo Breiman,et al. Random Forests , 2001, Machine Learning.
[19] Michael Weber,et al. Device Names in the Wild: Investigating Privacy Risks of Zero Configuration Networking , 2013, 2013 IEEE 14th International Conference on Mobile Data Management.
[20] Xuemin Shen,et al. An Efficient Privacy-Preserving Scheme against Traffic Analysis Attacks in Network Coding , 2009, IEEE INFOCOM 2009.