Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
Filters








81,142 Hits in 8.2 sec

Where You Are Is Who You Are: User Identification by Matching Statistics

Farid M. Naini, Jayakrishnan Unnikrishnan, Patrick Thiran, Martin Vetterli
2016 IEEE Transactions on Information Forensics and Security  
In recent works, the optimal algorithm for this user identification task is introduced.  ...  We study the task of identifying the users by matching the histograms of their data in the first dataset with the histograms from the second dataset.  ...  Where You Are Is Who You Are: User Identification by Matching Statistics Farid M. Naini, Jayakrishnan Unnikrishnan, Member, IEEE, Patrick Thiran, Fellow, IEEE, and Martin Vetterli, Fellow, IEEE I.  ... 
doi:10.1109/tifs.2015.2498131 fatcat:25pko2ydyfgm3lcohx7aur7gsu

You are what you say

Dan Frankowski, Dan Cosley, Shilad Sen, Loren Terveen, John Riedl
2006 Proceedings of the 29th annual international ACM SIGIR conference on Research and development in information retrieval - SIGIR '06  
by only a few users) allow reidentification.  ...  However, it may be possible to link these separate identities, because the movies, journal articles, or authors you mention are from a sparse relation space whose properties (e.g., many items related to  ...  ACKNOWLEDGEMENTS This work was supported by grants IIS 03-24851 and IIS 05-34420 from the National Science Foundation. Thanks also to Sean McNee, Tony Lam, and the rest of GroupLens.  ... 
doi:10.1145/1148170.1148267 dblp:conf/sigir/FrankowskiCSTR06 fatcat:bmulhelnhbbzngsjrstzd4vrtm

I know where you are and what you are sharing

Stevens Le Blond, Chao Zhang, Arnaud Legout, Keith Ross, Walid Dabbous
2011 Proceedings of the 2011 ACM SIGCOMM conference on Internet measurement conference - IMC '11  
We devise a scheme based on the identification field of the IP datagrams to verify with high accuracy whether the identified user is participating in specific torrents.  ...  We illustrate this threat by combining Skype and BitTorrent to show that it is possible to determine the filesharing usage of identified users.  ...  This research was partially supported by the NSF grant CNS-0917767. Comments to Authors: Nice paper to read. Here are some comments:  ... 
doi:10.1145/2068816.2068822 dblp:conf/imc/Le-BlondZLRD11 fatcat:v2qu5sj2urefja5crd6b6oknpm

Algorithms are not neutral

Catherine Stinson
2022 AI and Ethics  
While these are typically described as statistical biases rather than biases of moral import; in this paper we show that these statistical biases can lead directly to discriminatory outcomes.  ...  There has been a tendency to focus on examples, where the data set used to train the AI is biased, and denial on the part of some researchers that algorithms can also be biased.  ...  Likewise, if the user is looking for citation information for a specific article, an exact match is more desirable than the most cited match in that neighborhood.  ... 
doi:10.1007/s43681-022-00136-w pmid:35128540 pmcid:PMC8802245 fatcat:lfhaw2upffcvhnaylmeaokjbly

Who Are You Now? Fading to Multiple Personas

Sven Dietrich, Michael Brenner, Katharina Krombholz
2016 Symposium On Usable Privacy and Security  
As users often do not Copyright is held by the author/owner. Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee. Who are you?!  ...  A disadvantage of this approach is that roles are not discrete variables. There are cases where roles may overlap or intersect.  ... 
dblp:conf/soups/DietrichBK16 fatcat:ji34yfk2cnhofdluh3gq4prhce

RAISING AWARENESS: ARE WE SHARING TOO MUCH PRIVATE INFORMATION?

2013 Issues in Information Systems  
The oversharing of information and how it is collected and who collects it is the source of power. As users of these communication devices, we need to be aware of how this information is used.  ...  As users of the convenient and ubiquitous electronic devices that connect to our world and beyond, we often unwittingly and unintentionally share personal information with those we do not know.  ...  Do you use your cell phone or smart phone to take photos? 2. Are you aware that many cameras embed the location of where the photo was taken in the form of GPS coordinates? 3.  ... 
doi:10.48009/2_iis_2013_375-381 fatcat:j6ii4wyoyneg3j7vztwfyxdvde

If you are not paying for it, you are the product

Panagiotis Papadopoulos, Pablo Rodriguez Rodriguez, Nicolas Kourtellis, Nikolaos Laoutaris
2017 Proceedings of the 2017 Internet Measurement Conference on - IMC '17  
Online advertising is progressively moving towards a programmatic model in which ads are matched to actual interests of individuals collected as they browse the web.  ...  Our main technical contribution is a method for tallying winning bids even when they are encrypted.  ...  The answer is in the advertising ecosystem, where advertisers are purchasing audiences to deliver their adimpressions.  ... 
doi:10.1145/3131365.3131397 dblp:conf/imc/PapadopoulosRKL17 fatcat:3lxpmdl3vnac5mr57fkhay3iqq

You Are Where You Go

Yuan Zhong, Nicholas Jing Yuan, Wen Zhong, Fuzheng Zhang, Xing Xie
2015 Proceedings of the Eighth ACM International Conference on Web Search and Data Mining - WSDM '15  
User profiling is crucial to many online services.  ...  More specifically, we extract rich semantics of users' check-ins in terms of spatiality, temporality, and location knowledge, where the location knowledge is enriched with semantics mined from heterogeneous  ...  Within the users who provide gender attributes, 45.81% are males, and 54.19% are females.  ... 
doi:10.1145/2684822.2685287 dblp:conf/wsdm/ZhongYZZX15 fatcat:kgze2uokrjhorldjieraaopueq

Tell Me What You Like and I'll Tell You What You Are: Discriminating Visual Preferences on Flickr Data [chapter]

Pietro Lovato, Alessandro Perina, Nicu Sebe, Omar Zandonà, Alessio Montagnini, Manuele Bicego, Marco Cristani
2013 Lecture Notes in Computer Science  
We then perform multi-class classification, where a test sample is a set of preferred pictures of an unknown user, and the classes are all the users.  ...  The results are surprising: given only 1 image as test, we can match the user preferences definitely more than the chance, and with 20 images we reach an nAUC of 91%, considering the cumulative matching  ...  Or maybe he is more fascinated by a sunset on the ocean or by a flat landscape, where horizontal edges are in abundance.  ... 
doi:10.1007/978-3-642-37331-2_4 fatcat:ckyokikhxrbkrpnw2knfvt7bdq

Who are you? - real-time person identification

N. Apostoloff, A. Zisserman
2007 Procedings of the British Machine Vision Conference 2007  
When sufficient samples are collected, identification is performed using a random-ferns classifier by marginalising over the facial features.  ...  This paper presents a system for person identification that uses concise statistical models of facial features in a real-time realisation of the cast identification system of Everingham et al. [7] .  ...  This work was supported by an EPSRC Platform grant. References [1] Y. Amit and D. Geman. Shape quantization and recognition with randomized trees. Neural Computation, 9:1545-1588, 1997.  ... 
doi:10.5244/c.21.48 dblp:conf/bmvc/ApostolofZ07 fatcat:ihjeqlqzhnd5raukycwykxkdaa

Who do you sync you are?

Tim Stöber, Mario Frank, Jens Schmitt, Ivan Martinovic
2013 Proceedings of the sixth ACM conference on Security and privacy in wireless and mobile networks - WiSec '13  
In addition to the traffic generated by the user, most applications generate characteristic traffic from their background activities, such as periodic update requests or server synchronisation.  ...  The overall network traffic patterns generated by today's smartphones result from the typically large and diverse set of installed applications.  ...  Acknowledgments This research was partially supported by the Swiss National Science Foundation and by Intel through the ISTC for Secure Computing.  ... 
doi:10.1145/2462096.2462099 dblp:conf/wisec/StoberFSM13 fatcat:dtziokgsq5dllagifwben6wklu

How SEO and Analytics are Connected

Deepak Bansal -
2024 International Journal For Multidisciplinary Research  
Understanding website user behaviour is a key component of search engine optimisation.  ...  Content must closely match search intent to optimize SEO potential. This study explores the ways analytics can uncover search terms that direct users to a website.  ...  match changing user search habits.  ... 
doi:10.36948/ijfmr.2024.v06i02.15000 fatcat:65ypexq3wnartgg7jyebivdzxe

I Know Where You are and What You are Sharing: Exploiting P2P Communications to Invade Users' Privacy [article]

Stevens Le Blond , Arnaud Legout, Keith W. Ross, Walid Dabbous (INRIA Sophia Antipolis / INRIA Grenoble Rhône-Alpes)
2011 arXiv   pre-print
We devise a scheme based on the identification field of the IP datagrams to verify with high accuracy whether the identified user is participating in specific torrents.  ...  We illustrate this threat by combining Skype and BitTorrent to show that it is possible to determine the file-sharing usage of identified users.  ...  This research was partially supported by the NSF grant CNS-0917767.  ... 
arXiv:1109.4039v3 fatcat:l7xanqr2erhjxfen5bpbis347a

Why IP-based Subject Access Requests Are Denied? [article]

Supriya Adhatarao, Cédric Lauradoux, Cristiana Santos
2021 arXiv   pre-print
One maybe tempted to say that IP addresses are not personal data. We make several proposals to improve this situation by modifying how IP addresses are allocated to a user.  ...  This situation is rather frustrating for any user wanting to exercise his/her rights: IP addresses are personal data on (legal) papers, but there are no means to exercise the rights thereto.  ...  No reply from the website No, we have nothing about you 30 websites (7 private and 23 public) answered they do not have any data matching our request.  ... 
arXiv:2103.01019v2 fatcat:xeinku745rhfjcyz725wf6ds7m

"Are You Sure?"

Katherine V. Wild, Nora Mattek, Daniel Austin, Jeffrey A. Kaye
2015 Journal of Applied Gerontology  
Where comparisons were possible, agreement between self-reported and sensor-based activity was achieved by a minority of participants.  ...  Of the 95 participants who completed the two-hour activity log, nearly one quarter did not complete the task in a way that could potentially be compared with sensor data.  ...  Acknowledgments We are grateful to all the participants and research staff involved in this project.  ... 
doi:10.1177/0733464815570667 pmid:25669877 pmcid:PMC4530089 fatcat:qor7tp75gfhrjde5ef4gpnqvxq
« Previous Showing results 1 — 15 out of 81,142 results