The Internet of People (IoP): A new wave in pervasive mobile computing

M Conti, A Passarella, SK Das - Pervasive and Mobile Computing, 2017 - Elsevier
Cyber–Physical convergence, the fast expansion of the Internet at its edge, and tighter
interactions between human users and their personal mobile devices push towardan …

Location privacy and its applications: A systematic study

B Liu, W Zhou, T Zhu, L Gao, Y **ang - IEEE access, 2018 - ieeexplore.ieee.org
This paper surveys the current research status of location privacy issues in mobile
applications. The survey spans five aspects of study: the definition of location privacy …

The human in emotion recognition on social media: Attitudes, outcomes, risks

N Andalibi, J Buss - Proceedings of the 2020 CHI Conference on Human …, 2020 - dl.acm.org
Emotion recognition algorithms recognize, infer, and harvest emotions using data sources
such as social media behavior, streaming service use, voice, facial expressions, and …

Privacy and security in online social networks: A survey

I Kayes, A Iamnitchi - Online Social Networks and Media, 2017 - Elsevier
Online social networks (OSN) are a permanent presence in today's personal and
professional lives of a huge segment of the population, with direct consequences to offline …

Smarper: Context-aware and automatic runtime-permissions for mobile devices

K Olejnik, I Dacosta, JS Machado… - … IEEE Symposium on …, 2017 - ieeexplore.ieee.org
Permission systems are the main defense that mobile platforms, such as Android and iOS,
offer to users to protect their private data from prying apps. However, due to the tension …

Spatio–temporal edge service placement: A bandit learning approach

L Chen, J Xu, S Ren, P Zhou - IEEE Transactions on Wireless …, 2018 - ieeexplore.ieee.org
Shared edge computing platforms deployed at the radio access network are expected to
significantly improve the quality-of-service delivered by application service providers (ASPs) …

Privacy preference modeling and prediction in a simulated campuswide IoT environment

H Lee, A Kobsa - 2017 IEEE International Conference on …, 2017 - ieeexplore.ieee.org
With the advent of the Internet of Things (IoT), users are more likely to have privacy concerns
since their personal information could be collected, analyzed, and utilized without notice by …

A cryptography and machine learning based authentication for secure data-sharing in federated cloud services environment

AK Singh, D Saxena - Journal of Applied Security Research, 2022 - Taylor & Francis
Secure mutual authentication is an indispensable requirement to share organizational
invaluable data among collaborating entities in federated cloud environment. This work …

The Internet of People: A human and data-centric paradigm for the Next Generation Internet

M Conti, A Passarella - Computer Communications, 2018 - Elsevier
The cyber-physical convergence, the fast expansion of the Internet at its edge, and tighter
interactions between human users and their personal mobile devices push towards a data …

Image privacy prediction using deep neural networks

A Tonge, C Caragea - ACM Transactions on the Web (TWEB), 2020 - dl.acm.org
Images today are increasingly shared online on social networking sites such as Facebook,
Flickr, and Instagram. Image sharing occurs not only within a group of friends but also more …