HCFContext: Smartphone Context Inference via Sequential History-based Collaborative Filtering
暂无分享,去创建一个
[1] Saman A. Zonouz,et al. Don't Just BYOD, Bring-Your-Own-App Too! Protection via Virtual Micro Security Perimeters , 2016, 2016 46th Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN).
[2] Hui Xiong,et al. An unsupervised approach to modeling personalized contexts of mobile users , 2010, 2010 IEEE International Conference on Data Mining.
[3] Matthew Roughan,et al. Multi-Observer Privacy-Preserving Hidden Markov Models , 2012, IEEE Transactions on Signal Processing.
[4] Nasser M. Nasrabadi,et al. Pattern Recognition and Machine Learning , 2006, Technometrics.
[5] Bhiksha Raj,et al. Privacy preserving probabilistic inference with Hidden Markov Models , 2011, 2011 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP).
[6] Parimal Parag,et al. Minimizing latency for secure distributed computing , 2017, 2017 IEEE International Symposium on Information Theory (ISIT).
[7] Angelo M. Sabatini,et al. Machine Learning Methods for Classifying Human Physical Activity from On-Body Accelerometers , 2010, Sensors.
[8] Daniel Gatica-Perez,et al. A probabilistic approach to mining mobile phone data sequences , 2013, Personal and Ubiquitous Computing.
[9] Zhigang Liu,et al. Darwin phones: the evolution of sensing and inference on mobile phones , 2010, MobiSys '10.
[10] Hojung Cha,et al. Mobility prediction-based smartphone energy optimization for everyday location monitoring , 2011, SenSys.
[11] Luís A. Castro,et al. Collaborative opportunistic sensing with mobile phones , 2014, UbiComp Adjunct.
[12] Hiroaki Kikuchi,et al. Privacy-Preserving Collaborative Filtering Schemes , 2009, 2009 International Conference on Availability, Reliability and Security.
[13] Aakanksha Chopra. Comparative Analysis of Key Exchange Algorithms in Cryptography and its Implementation , 2015 .
[14] Sheng Zhong,et al. A Privacy Preserving Markov Model for Sequence Classification , 2013, BCB.
[15] Gregor Heinrich. Parameter estimation for text analysis , 2009 .
[16] Johan Himberg,et al. Collaborative context recognition for handheld devices , 2003, Proceedings of the First IEEE International Conference on Pervasive Computing and Communications, 2003. (PerCom 2003)..
[17] Vijay Srinivasan,et al. Adding intelligence to your mobile device via on-device sequential pattern mining , 2014, UbiComp Adjunct.
[18] Wenliang Du,et al. Privacy-preserving collaborative filtering using randomized perturbation techniques , 2003, Third IEEE International Conference on Data Mining.
[19] Huseyin Polat,et al. Providing predictions on distributed HMMs with privacy , 2009, Artificial Intelligence Review.
[20] Pascal Paillier,et al. Public-Key Cryptosystems Based on Composite Degree Residuosity Classes , 1999, EUROCRYPT.
[21] Dario Pompili,et al. CollabLoc: Privacy-Preserving Multi-Modal Localization via Collaborative Information Fusion , 2017, 2017 26th International Conference on Computer Communication and Networks (ICCCN).
[22] Mirco Musolesi,et al. Anticipatory Mobile Computing , 2013, ACM Comput. Surv..
[23] Douglas M. Blough,et al. Privacy Preserving Collaborative Filtering Using Data Obfuscation , 2007, 2007 IEEE International Conference on Granular Computing (GRC 2007).
[24] Srdjan Capkun,et al. On the requirements for successful GPS spoofing attacks , 2011, CCS '11.
[25] D. Kulić,et al. Automatic Human Motion Segmentation and Identification using Feature Guided HMM for Physical Rehabilitation Exercises , 2011 .
[26] Stephanie Vogelgesang,et al. Pokémon GO , 2016, Informatik-Spektrum.
[27] Douglas M. Blough,et al. Privacy Preserving Collaborative Filtering Using Data Obfuscation , 2007 .
[28] S. Eddy. Hidden Markov models. , 1996, Current opinion in structural biology.
[29] Saeed Moghaddam,et al. MobileMiner: mining your frequent patterns on your phone , 2014, UbiComp.