Location privacy-preserving mechanisms in location-based services: A comprehensive survey
Location-based services (LBSs) provide enhanced functionality and convenience of
ubiquitous computing, but they open up new vulnerabilities that can be utilized to violate the …
ubiquitous computing, but they open up new vulnerabilities that can be utilized to violate the …
Wearable activity trackers: A survey on utility, privacy, and security
Over the past decade, wearable activity trackers (WATs) have become increasingly popular.
However, despite many research studies in different fields (eg psychology, health, and …
However, despite many research studies in different fields (eg psychology, health, and …
What you do not expect when you are expecting: Privacy analysis of Femtech
In this article, we focus on femtech, a category of software, diagnostics, and products that
serve female health needs. While acknowledging the unprecedented growth and potential of …
serve female health needs. While acknowledging the unprecedented growth and potential of …
SoK: Managing risks of linkage attacks on data privacy
Novel attacks on dataset privacy are usually met with the same range of responses: surprise
that a route to information gain exists from information previously thought to be safe; …
that a route to information gain exists from information previously thought to be safe; …
On (the lack of) location privacy in crowdsourcing applications
Crowdsourcing enables application developers to benefit from large and diverse datasets at
a low cost. Specifically, mobile crowdsourcing (MCS) leverages users' devices as sensors to …
a low cost. Specifically, mobile crowdsourcing (MCS) leverages users' devices as sensors to …
A Run a Day Won't Keep the Hacker Away: Inference Attacks on Endpoint Privacy Zones in Fitness Tracking Social Networks
Fitness tracking social networks such as Strava allow users to record sports activities and
share them publicly. Sharing encourages peer interaction but also constitutes a risk …
share them publicly. Sharing encourages peer interaction but also constitutes a risk …
A Complete and Comprehensive Semantic Perception of Mobile Travelling for Mobile Communication Services
The novel IoT-based data sensing and service mode promotes the booming development of
crowdsensing-based mobile communication services (MCSs). MCS facilitates people's daily …
crowdsensing-based mobile communication services (MCSs). MCS facilitates people's daily …
Differentiated Location Privacy Protection in Mobile Communication Services: A Survey from the Semantic Perception Perspective
Mobile communication services raise user privacy concerns in sharing the traveling
trajectories while facilitating people's daily lives. According to these shared trajectories …
trajectories while facilitating people's daily lives. According to these shared trajectories …
Watch your watch: Inferring personality traits from wearable activity trackers
Wearable devices, such as wearable activity trackers (WATs), are increasing in popularity.
Although they can help to improve one's quality of life, they also raise serious privacy issues …
Although they can help to improve one's quality of life, they also raise serious privacy issues …
Automated AI research on cyber attack prediction and security design
R Madala, N Vijayakumar, N Nandini… - … and Informatics (IC3I …, 2023 - ieeexplore.ieee.org
A fast expanding topic of study on automated AI is focused on the prediction and prevention
of cyber-attacks using machine learning algorithms. In this study, we examined the research …
of cyber-attacks using machine learning algorithms. In this study, we examined the research …