PrivacyGuard: Enhancing Smart Home User Privacy
暂无分享,去创建一个
Shiqiang Wang | Keyang Yu | Dong Chen | Qi Li | Mohammad Rahman | Shiqiang Wang | M. Rahman | Keyang Yu | Dong Chen | Qi Li
[1] Prashant Shenoy,et al. RepEL: A Utility-Preserving Privacy System for IoT-Based Energy Meters , 2020, 2020 IEEE/ACM Fifth International Conference on Internet-of-Things Design and Implementation (IoTDI).
[2] Vijay Sivaraman,et al. Classifying IoT Devices in Smart Environments Using Network Traffic Characteristics , 2019, IEEE Transactions on Mobile Computing.
[3] Vasanthan Raghavan,et al. Modeling Temporal Activity Patterns in Dynamic Social Networks , 2013, IEEE Transactions on Computational Social Systems.
[4] Thomas Ristenpart,et al. Peek-a-Boo, I Still See You: Why Efficient Traffic Analysis Countermeasures Fail , 2012, 2012 IEEE Symposium on Security and Privacy.
[5] Sungyoung Lee,et al. A Reconfigurable HMM for Activity Recognition , 2008, 2008 10th International Conference on Advanced Communication Technology.
[6] Hongxin Hu,et al. On the Safety of IoT Device Physical Interaction Control , 2018, CCS.
[7] Sang Hyuk Son,et al. Energy-Efficient Privacy Protection for Smart Home Environments Using Behavioral Semantics , 2014, Sensors.
[8] Nikhil Ketkar,et al. Introduction to Keras , 2017 .
[9] Tao Wang,et al. A Systematic Approach to Developing and Evaluating Website Fingerprinting Defenses , 2014, CCS.
[10] Annelie Heuser,et al. The Curse of Class Imbalance and Conflicting Metrics with Machine Learning for Side-channel Evaluations , 2018, IACR Cryptol. ePrint Arch..
[11] Andrew Zisserman,et al. Very Deep Convolutional Networks for Large-Scale Image Recognition , 2014, ICLR.
[12] Wei Wang,et al. Dependent link padding algorithms for low latency anonymity systems , 2008, CCS.
[13] Karsten Rothmeier,et al. Prediction of Player Churn and Disengagement Based on User Activity Data of a Freemium Online Strategy Game , 2020, IEEE Transactions on Games.
[14] Soumith Chintala,et al. Unsupervised Representation Learning with Deep Convolutional Generative Adversarial Networks , 2015, ICLR.
[15] Jinyang Li,et al. Your Privilege Gives Your Privacy Away: An Analysis of a Home Security Camera Service , 2020, IEEE INFOCOM 2020 - IEEE Conference on Computer Communications.
[16] Yuan Yu,et al. TensorFlow: A system for large-scale machine learning , 2016, OSDI.
[17] Tao Wang,et al. On Realistically Attacking Tor with Website Fingerprinting , 2016, Proc. Priv. Enhancing Technol..
[18] Vasanthan Raghavan,et al. Coupled hidden markov models for user activity in social networks , 2013, 2013 IEEE International Conference on Multimedia and Expo Workshops (ICMEW).
[19] A. Culyer. Spearman’s rank correlation coefficient , 2014, BMJ : British Medical Journal.
[20] Xiang Cai,et al. Glove: A Bespoke Website Fingerprinting Defense , 2014, WPES.
[21] Vitaly Shmatikov,et al. Timing Analysis in Low-Latency Mix Networks: Attacks and Defenses , 2006, ESORICS.
[22] Nick Feamster,et al. Keeping the Smart Home Private with Smart(er) IoT Traffic Shaping , 2018, Proc. Priv. Enhancing Technol..
[23] Nick Feamster,et al. A Developer-Friendly Library for Smart Home IoT Privacy-Preserving Traffic Obfuscation , 2018, IoT S&P@SIGCOMM.
[24] Prashant J. Shenoy,et al. Combined heat and privacy: Preventing occupancy detection from smart meters , 2014, 2014 IEEE International Conference on Pervasive Computing and Communications (PerCom).
[25] Josephine Sarpong Akosa,et al. Predictive Accuracy : A Misleading Performance Measure for Highly Imbalanced Data , 2017 .