When machine learning meets privacy in 6G: A survey

Y Sun, J Liu, J Wang, Y Cao… - … Surveys & Tutorials, 2020 - ieeexplore.ieee.org
The rapid-develo** Artificial Intelligence (AI) technology, fast-growing network traffic, and
emerging intelligent applications (eg, autonomous driving, virtual reality, etc.) urgently …

Anticipatory mobile computing: A survey of the state of the art and research challenges

V Pejovic, M Musolesi - ACM Computing Surveys (CSUR), 2015 - dl.acm.org
Today's mobile phones are far from the mere communication devices they were 10 years
ago. Equipped with sophisticated sensors and advanced computing hardware, phones can …

Enforcing position-based confidentiality with machine learning paradigm through mobile edge computing in real-time industrial informatics

AK Sangaiah, DV Medhane, T Han… - IEEE Transactions …, 2019 - ieeexplore.ieee.org
Position-based services (PBSs) that deliver networked amenities based on roaming user's
positions have become progressively popular with the propagation of smart mobile devices …

Transportation mode detection using mobile phones and GIS information

L Stenneth, O Wolfson, PS Yu, B Xu - Proceedings of the 19th ACM …, 2011 - dl.acm.org
The transportation mode such as walking, cycling or on a train denotes an important
characteristic of the mobile user's context. In this paper, we propose an approach to inferring …

Building the internet of things using RFID: the RFID ecosystem experience

E Welbourne, L Battle, G Cole, K Gould… - IEEE Internet …, 2009 - ieeexplore.ieee.org
At the University of Washington, the RFID Ecosystem creates a microcosm for the Internet of
Things. The authors developed a suite of Web-based, user-level tools and applications …

A survey of computational location privacy

J Krumm - Personal and Ubiquitous Computing, 2009 - Springer
This is a literature survey of computational location privacy, meaning computation-based
privacy mechanisms that treat location data as geometric information. This definition …

Inference attacks on location tracks

J Krumm - International Conference on Pervasive Computing, 2007 - Springer
Although the privacy threats and countermeasures associated with location data are well
known, there has not been a thorough experiment to assess the effectiveness of either. We …

Sail: Single access point-based indoor localization

AT Mariakakis, S Sen, J Lee, KH Kim - Proceedings of the 12th annual …, 2014 - dl.acm.org
This paper presents SAIL, a Single Access Point Based Indoor Localization system.
Although there have been advances in WiFi-based positioning techniques, we find that …

Identifying important places in people's lives from cellular network data

S Isaacman, R Becker, R Cáceres, S Kobourov… - … , Pervasive 2011, San …, 2011 - Springer
People spend most of their time at a few key locations, such as home and work. Being able
to identify how the movements of people cluster around these “important places” is crucial …

Indoor localization without infrastructure using the acoustic background spectrum

SP Tarzia, PA Dinda, RP Dick, G Memik - Proceedings of the 9th …, 2011 - dl.acm.org
We introduce a new technique for determining a mobile phone's indoor location even when
Wi-Fi infrastructure is unavailable or sparse. Our technique is based on a new ambient …