Incentive techniques for the internet of things: a survey
Abstract The Internet of Things (IoT) has remarkably evolved over the last few years to
realize a wide range of newly emerging services and applications empowered by the …
realize a wide range of newly emerging services and applications empowered by the …
Recon: Revealing and controlling pii leaks in mobile network traffic
It is well known that apps running on mobile devices extensively track and leak users'
personally identifiable information (PII); however, these users have little visibility into PII …
personally identifiable information (PII); however, these users have little visibility into PII …
When CSI meets public WiFi: Inferring your mobile phone password via WiFi signals
In this study, we present WindTalker, a novel and practical keystroke inference framework
that allows an attacker to infer the sensitive keystrokes on a mobile device through WiFi …
that allows an attacker to infer the sensitive keystrokes on a mobile device through WiFi …
Watching you watch: The tracking ecosystem of over-the-top tv streaming devices
The number of Internet-connected TV devices has grown significantly in recent years,
especially Over-the-Top (" OTT") streaming devices, such as Roku TV and Amazon Fire TV …
especially Over-the-Top (" OTT") streaming devices, such as Roku TV and Amazon Fire TV …
Panoptispy: Characterizing audio and video exfiltration from android applications
The high-fidelity sensors and ubiquitous internet connectivity offered by mobile devices have
facilitated an explosion in mobile apps that rely on multimedia features. However, these …
facilitated an explosion in mobile apps that rely on multimedia features. However, these …
Privacy and quality preserving multimedia data aggregation for participatory sensing systems
With the popularity of mobile wireless devices equipped with various kinds of sensing
abilities, a new service paradigm named participatory sensing has emerged to provide users …
abilities, a new service paradigm named participatory sensing has emerged to provide users …
Revealing your mobile password via WiFi signals: Attacks and countermeasures
In this study, we present WindTalker, a novel and practical keystroke inference framework
that can be used to infer the sensitive keystrokes on a mobile device through WiFi-based …
that can be used to infer the sensitive keystrokes on a mobile device through WiFi-based …
Demographics inference through Wi-Fi network traffic analysis
Although privacy leaking through content analysis of Wi-Fi traffic has received an increased
attention, privacy inference through meta-data (eg IP, Host) analysis of Wi-Fi traffic …
attention, privacy inference through meta-data (eg IP, Host) analysis of Wi-Fi traffic …
Demographic information inference through meta-data analysis of Wi-Fi traffic
Privacy inference through meta-data (eg, IP, Host) analysis of Wi-Fi traffic poses a potentially
more serious threat to user privacy. First, it provides a more efficient and scalable approach …
more serious threat to user privacy. First, it provides a more efficient and scalable approach …
Snatch: Online Streaming Analytics at the Network Edge
In recent years, we have witnessed a growing trend of content hyper-giants deploying server
infrastructure and services close to end-users, in" eyeball" networks. Still, one of the services …
infrastructure and services close to end-users, in" eyeball" networks. Still, one of the services …