Incentive techniques for the internet of things: a survey

PKR Maddikunta, QV Pham, DC Nguyen… - Journal of Network and …, 2022 - Elsevier
Abstract The Internet of Things (IoT) has remarkably evolved over the last few years to
realize a wide range of newly emerging services and applications empowered by the …

Recon: Revealing and controlling pii leaks in mobile network traffic

J Ren, A Rao, M Lindorfer, A Legout… - Proceedings of the 14th …, 2016 - dl.acm.org
It is well known that apps running on mobile devices extensively track and leak users'
personally identifiable information (PII); however, these users have little visibility into PII …

When CSI meets public WiFi: Inferring your mobile phone password via WiFi signals

M Li, Y Meng, J Liu, H Zhu, X Liang, Y Liu… - Proceedings of the 2016 …, 2016 - dl.acm.org
In this study, we present WindTalker, a novel and practical keystroke inference framework
that allows an attacker to infer the sensitive keystrokes on a mobile device through WiFi …

Watching you watch: The tracking ecosystem of over-the-top tv streaming devices

H Mohajeri Moghaddam, G Acar, B Burgess… - Proceedings of the …, 2019 - dl.acm.org
The number of Internet-connected TV devices has grown significantly in recent years,
especially Over-the-Top (" OTT") streaming devices, such as Roku TV and Amazon Fire TV …

Panoptispy: Characterizing audio and video exfiltration from android applications

E Pan, J Ren, M Lindorfer, C Wilson… - … on Privacy Enhancing …, 2018 - petsymposium.org
The high-fidelity sensors and ubiquitous internet connectivity offered by mobile devices have
facilitated an explosion in mobile apps that rely on multimedia features. However, these …

Privacy and quality preserving multimedia data aggregation for participatory sensing systems

F Qiu, F Wu, G Chen - IEEE Transactions on Mobile Computing, 2014 - ieeexplore.ieee.org
With the popularity of mobile wireless devices equipped with various kinds of sensing
abilities, a new service paradigm named participatory sensing has emerged to provide users …

Revealing your mobile password via WiFi signals: Attacks and countermeasures

Y Meng, J Li, H Zhu, X Liang, Y Liu… - IEEE Transactions on …, 2019 - ieeexplore.ieee.org
In this study, we present WindTalker, a novel and practical keystroke inference framework
that can be used to infer the sensitive keystrokes on a mobile device through WiFi-based …

Demographics inference through Wi-Fi network traffic analysis

H Li, Z Xu, H Zhu, D Ma, S Li… - IEEE INFOCOM 2016-The …, 2016 - ieeexplore.ieee.org
Although privacy leaking through content analysis of Wi-Fi traffic has received an increased
attention, privacy inference through meta-data (eg IP, Host) analysis of Wi-Fi traffic …

Demographic information inference through meta-data analysis of Wi-Fi traffic

H Li, H Zhu, D Ma - IEEE Transactions on Mobile Computing, 2017 - ieeexplore.ieee.org
Privacy inference through meta-data (eg, IP, Host) analysis of Wi-Fi traffic poses a potentially
more serious threat to user privacy. First, it provides a more efficient and scalable approach …

Snatch: Online Streaming Analytics at the Network Edge

Y **ao, Y Zhao, S Lin, A Kuzmanovic - Proceedings of the Nineteenth …, 2024 - dl.acm.org
In recent years, we have witnessed a growing trend of content hyper-giants deploying server
infrastructure and services close to end-users, in" eyeball" networks. Still, one of the services …