A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2017; you can also visit the original URL.
The file type is application/pdf
.
Filters
Where You Are Is Who You Are: User Identification by Matching Statistics
2016
IEEE Transactions on Information Forensics and Security
In recent works, the optimal algorithm for this user identification task is introduced. ...
We study the task of identifying the users by matching the histograms of their data in the first dataset with the histograms from the second dataset. ...
Where You Are Is Who You Are: User Identification by Matching Statistics Farid M. Naini, Jayakrishnan Unnikrishnan, Member, IEEE, Patrick Thiran, Fellow, IEEE, and Martin Vetterli, Fellow, IEEE I. ...
doi:10.1109/tifs.2015.2498131
fatcat:25pko2ydyfgm3lcohx7aur7gsu
You are what you say
2006
Proceedings of the 29th annual international ACM SIGIR conference on Research and development in information retrieval - SIGIR '06
by only a few users) allow reidentification. ...
However, it may be possible to link these separate identities, because the movies, journal articles, or authors you mention are from a sparse relation space whose properties (e.g., many items related to ...
ACKNOWLEDGEMENTS This work was supported by grants IIS 03-24851 and IIS 05-34420 from the National Science Foundation. Thanks also to Sean McNee, Tony Lam, and the rest of GroupLens. ...
doi:10.1145/1148170.1148267
dblp:conf/sigir/FrankowskiCSTR06
fatcat:bmulhelnhbbzngsjrstzd4vrtm
I know where you are and what you are sharing
2011
Proceedings of the 2011 ACM SIGCOMM conference on Internet measurement conference - IMC '11
We devise a scheme based on the identification field of the IP datagrams to verify with high accuracy whether the identified user is participating in specific torrents. ...
We illustrate this threat by combining Skype and BitTorrent to show that it is possible to determine the filesharing usage of identified users. ...
This research was partially supported by the NSF grant CNS-0917767. Comments to Authors: Nice paper to read. Here are some comments: ...
doi:10.1145/2068816.2068822
dblp:conf/imc/Le-BlondZLRD11
fatcat:v2qu5sj2urefja5crd6b6oknpm
Algorithms are not neutral
2022
AI and Ethics
While these are typically described as statistical biases rather than biases of moral import; in this paper we show that these statistical biases can lead directly to discriminatory outcomes. ...
There has been a tendency to focus on examples, where the data set used to train the AI is biased, and denial on the part of some researchers that algorithms can also be biased. ...
Likewise, if the user is looking for citation information for a specific article, an exact match is more desirable than the most cited match in that neighborhood. ...
doi:10.1007/s43681-022-00136-w
pmid:35128540
pmcid:PMC8802245
fatcat:lfhaw2upffcvhnaylmeaokjbly
Who Are You Now? Fading to Multiple Personas
2016
Symposium On Usable Privacy and Security
As users often do not Copyright is held by the author/owner. Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee. Who are you?! ...
A disadvantage of this approach is that roles are not discrete variables. There are cases where roles may overlap or intersect. ...
dblp:conf/soups/DietrichBK16
fatcat:ji34yfk2cnhofdluh3gq4prhce
RAISING AWARENESS: ARE WE SHARING TOO MUCH PRIVATE INFORMATION?
2013
Issues in Information Systems
The oversharing of information and how it is collected and who collects it is the source of power. As users of these communication devices, we need to be aware of how this information is used. ...
As users of the convenient and ubiquitous electronic devices that connect to our world and beyond, we often unwittingly and unintentionally share personal information with those we do not know. ...
Do you use your cell phone or smart phone to take photos? 2. Are you aware that many cameras embed the location of where the photo was taken in the form of GPS coordinates? 3. ...
doi:10.48009/2_iis_2013_375-381
fatcat:j6ii4wyoyneg3j7vztwfyxdvde
If you are not paying for it, you are the product
2017
Proceedings of the 2017 Internet Measurement Conference on - IMC '17
Online advertising is progressively moving towards a programmatic model in which ads are matched to actual interests of individuals collected as they browse the web. ...
Our main technical contribution is a method for tallying winning bids even when they are encrypted. ...
The answer is in the advertising ecosystem, where advertisers are purchasing audiences to deliver their adimpressions. ...
doi:10.1145/3131365.3131397
dblp:conf/imc/PapadopoulosRKL17
fatcat:3lxpmdl3vnac5mr57fkhay3iqq
You Are Where You Go
2015
Proceedings of the Eighth ACM International Conference on Web Search and Data Mining - WSDM '15
User profiling is crucial to many online services. ...
More specifically, we extract rich semantics of users' check-ins in terms of spatiality, temporality, and location knowledge, where the location knowledge is enriched with semantics mined from heterogeneous ...
Within the users who provide gender attributes, 45.81% are males, and 54.19% are females. ...
doi:10.1145/2684822.2685287
dblp:conf/wsdm/ZhongYZZX15
fatcat:kgze2uokrjhorldjieraaopueq
Tell Me What You Like and I'll Tell You What You Are: Discriminating Visual Preferences on Flickr Data
[chapter]
2013
Lecture Notes in Computer Science
We then perform multi-class classification, where a test sample is a set of preferred pictures of an unknown user, and the classes are all the users. ...
The results are surprising: given only 1 image as test, we can match the user preferences definitely more than the chance, and with 20 images we reach an nAUC of 91%, considering the cumulative matching ...
Or maybe he is more fascinated by a sunset on the ocean or by a flat landscape, where horizontal edges are in abundance. ...
doi:10.1007/978-3-642-37331-2_4
fatcat:ckyokikhxrbkrpnw2knfvt7bdq
Who are you? - real-time person identification
2007
Procedings of the British Machine Vision Conference 2007
When sufficient samples are collected, identification is performed using a random-ferns classifier by marginalising over the facial features. ...
This paper presents a system for person identification that uses concise statistical models of facial features in a real-time realisation of the cast identification system of Everingham et al. [7] . ...
This work was supported by an EPSRC Platform grant.
References [1] Y. Amit and D. Geman. Shape quantization and recognition with randomized trees. Neural Computation, 9:1545-1588, 1997. ...
doi:10.5244/c.21.48
dblp:conf/bmvc/ApostolofZ07
fatcat:ihjeqlqzhnd5raukycwykxkdaa
Who do you sync you are?
2013
Proceedings of the sixth ACM conference on Security and privacy in wireless and mobile networks - WiSec '13
In addition to the traffic generated by the user, most applications generate characteristic traffic from their background activities, such as periodic update requests or server synchronisation. ...
The overall network traffic patterns generated by today's smartphones result from the typically large and diverse set of installed applications. ...
Acknowledgments This research was partially supported by the Swiss National Science Foundation and by Intel through the ISTC for Secure Computing. ...
doi:10.1145/2462096.2462099
dblp:conf/wisec/StoberFSM13
fatcat:dtziokgsq5dllagifwben6wklu
How SEO and Analytics are Connected
2024
International Journal For Multidisciplinary Research
Understanding website user behaviour is a key component of search engine optimisation. ...
Content must closely match search intent to optimize SEO potential. This study explores the ways analytics can uncover search terms that direct users to a website. ...
match changing user search habits. ...
doi:10.36948/ijfmr.2024.v06i02.15000
fatcat:65ypexq3wnartgg7jyebivdzxe
I Know Where You are and What You are Sharing: Exploiting P2P Communications to Invade Users' Privacy
[article]
2011
arXiv
pre-print
We devise a scheme based on the identification field of the IP datagrams to verify with high accuracy whether the identified user is participating in specific torrents. ...
We illustrate this threat by combining Skype and BitTorrent to show that it is possible to determine the file-sharing usage of identified users. ...
This research was partially supported by the NSF grant CNS-0917767. ...
arXiv:1109.4039v3
fatcat:l7xanqr2erhjxfen5bpbis347a
Why IP-based Subject Access Requests Are Denied?
[article]
2021
arXiv
pre-print
One maybe tempted to say that IP addresses are not personal data. We make several proposals to improve this situation by modifying how IP addresses are allocated to a user. ...
This situation is rather frustrating for any user wanting to exercise his/her rights: IP addresses are personal data on (legal) papers, but there are no means to exercise the rights thereto. ...
No reply from the website
No, we have nothing about you 30 websites (7 private and 23 public) answered they do not have any data matching our request. ...
arXiv:2103.01019v2
fatcat:xeinku745rhfjcyz725wf6ds7m
"Are You Sure?"
2015
Journal of Applied Gerontology
Where comparisons were possible, agreement between self-reported and sensor-based activity was achieved by a minority of participants. ...
Of the 95 participants who completed the two-hour activity log, nearly one quarter did not complete the task in a way that could potentially be compared with sensor data. ...
Acknowledgments We are grateful to all the participants and research staff involved in this project. ...
doi:10.1177/0733464815570667
pmid:25669877
pmcid:PMC4530089
fatcat:qor7tp75gfhrjde5ef4gpnqvxq
« Previous
Showing results 1 — 15 out of 81,142 results