Your clicks reveal your secrets: a novel user-device linking method through network and visual data
暂无分享,去创建一个
Ming Yang | Zhen Ling | Xinwen Fu | Junzhou Luo | Wenjia Wu | Naixuan Guo
[1] Wenbo He,et al. I know what you did on your smartphone: Inferring app usage over encrypted data traffic , 2015, 2015 IEEE Conference on Communications and Network Security (CNS).
[2] Claude Castelluccia,et al. Selling Off Privacy at Auction , 2014, NDSS 2014.
[3] Yichao Huang,et al. DeepFinger: A Cascade Convolutional Neuron Network Approach to Finger Key Point Detection in Egocentric Vision with Mobile Camera , 2015, 2015 IEEE International Conference on Systems, Man, and Cybernetics.
[4] Rajesh Kumar,et al. Beware, Your Hands Reveal Your Secrets! , 2014, CCS.
[5] Robert C. Bolles,et al. Random sample consensus: a paradigm for model fitting with applications to image analysis and automated cartography , 1981, CACM.
[6] Dawn Xiaodong Song,et al. NetworkProfiler: Towards automatic fingerprinting of Android apps , 2013, 2013 Proceedings IEEE INFOCOM.
[7] Yuan F. Zheng,et al. EV-Human: Human localization via visual estimation of body electronic interference , 2013, 2013 Proceedings IEEE INFOCOM.
[8] Leo Breiman,et al. Random Forests , 2001, Machine Learning.
[9] Gang Chen,et al. The knowing camera: recognizing places-of-interest in smartphone photos , 2013, SIGIR.
[10] David L. Mills,et al. Computer network time synchronization : the network time protocol on earth and in space , 2006 .
[11] Nino Vincenzo Verde,et al. Analyzing Android Encrypted Network Traffic to Identify User Actions , 2016, IEEE Transactions on Information Forensics and Security.
[12] John C. Mitchell,et al. Third-Party Web Tracking: Policy and Technology , 2012, 2012 IEEE Symposium on Security and Privacy.
[13] Zdenek Kalal,et al. Tracking-Learning-Detection , 2012, IEEE Transactions on Pattern Analysis and Machine Intelligence.
[14] Ivan Martinovic,et al. Who do you sync you are?: smartphone fingerprinting via application behaviour , 2013, WiSec '13.
[15] Mohan S. Kankanhalli,et al. Tweeting Cameras for Event Detection , 2015, WWW.
[16] Sung-Ho Yoon,et al. Behavior Signature for Fine-grained Traffic Identification , 2015 .
[17] Patrick Tague,et al. IdentityLink: user-device linking through visual and RF-signal cues , 2014, UbiComp.
[18] Hannes Federrath,et al. Behavior-based tracking: Exploiting characteristic patterns in DNS traffic , 2013, Comput. Secur..
[19] Fan Yang,et al. EV-Matching: Bridging Large Visual Data and Electronic Data for Efficient Surveillance , 2017, 2017 IEEE 37th International Conference on Distributed Computing Systems (ICDCS).
[20] Vashek Matyas,et al. User Profiling and Re-identification: Case of University-Wide Network Analysis , 2009, TrustBus.
[21] A. B. M. Musa,et al. Tracking unmodified smartphones using wi-fi monitors , 2012, SenSys '12.
[22] Trevor Darrell,et al. Rich Feature Hierarchies for Accurate Object Detection and Semantic Segmentation , 2013, 2014 IEEE Conference on Computer Vision and Pattern Recognition.
[23] Roman P. Pflugfelder,et al. Clustering of static-adaptive correspondences for deformable object tracking , 2015, 2015 IEEE Conference on Computer Vision and Pattern Recognition (CVPR).
[24] Roman P. Pflugfelder,et al. Consensus-based matching and tracking of keypoints for object tracking , 2014, IEEE Winter Conference on Applications of Computer Vision.
[25] Gang Chen,et al. The knowing camera 2: recognizing and annotating places-of-interest in smartphone photos , 2014, SIGIR.
[26] Roksana Boreli,et al. Linking wireless devices using information contained in Wi-Fi probe requests , 2014, Pervasive Mob. Comput..
[27] Yuan F. Zheng,et al. EV-Loc: Integrating Electronic and Visual Signals for Accurate Localization , 2014, IEEE/ACM Transactions on Networking.
[28] Zhen Ling,et al. Blind Recognition of Touched Keys on Mobile Devices , 2014, CCS.
[29] Kaiming He,et al. Faster R-CNN: Towards Real-Time Object Detection with Region Proposal Networks , 2015, IEEE Transactions on Pattern Analysis and Machine Intelligence.
[30] Mathieu Cunche,et al. Device-to-identity linking attack using targeted wi-fi geolocation spoofing , 2015, WISEC.
[31] Ross B. Girshick,et al. Fast R-CNN , 2015, 1504.08083.
[32] L. R. Rabiner,et al. A comparative study of several dynamic time-warping algorithms for connected-word recognition , 1981, The Bell System Technical Journal.
[33] Yuan F. Zheng,et al. E-V: Efficient visual surveillance with electronic footprints , 2012, 2012 Proceedings IEEE INFOCOM.
[34] Yichao Huang,et al. A Pointing Gesture Based Egocentric Interaction System: Dataset, Approach and Application , 2016, 2016 IEEE Conference on Computer Vision and Pattern Recognition Workshops (CVPRW).
[35] David A. McAllester,et al. A discriminatively trained, multiscale, deformable part model , 2008, 2008 IEEE Conference on Computer Vision and Pattern Recognition.