正在加载图片...
REFERENCES [27]B.Kramer,"Classification of generic places:Explorations with impli- cations for evaluation,"Journal of Environmental Psychology,vol.15, [I]"Municipal wireless network,"https://en.wikipedia.org/wiki/Munici- n0.1,pp.3-22,1995. pal wireless network,2016. [28]"Google places api,"https://developers.google.com/places,2016. [2]"The global public wi-fi network grows to 50 million worldwide wi- [29]"The google maps geolocation api."https://develop- fi hotspots,"https://www.ipass.com/press-releases/the-global-public-wi- ers.google.com/maps/documentation/geolocation/intro,2016. fi-network-grows-to-50-million-worldwide-wi-fi-hotspots/,2015. [30]"Unwired labs location api,"https://unwiredlabs.com/,2016. [3]"Google maps apis,"https://developers.google.com/maps/,2016. [31]"United states department of agriculture economic research service," [4]N.Cheng,X.Wang,W.Cheng,P.Mohapatra,and A.Seneviratne, http://www.ers.usda.gov/data-products/.aspx,2016. "Characterizing privacy leakage of public wifi networks for users on [32]"Charts:How american men and women spend their time," travel."in IEEE INFOCOM,2013,pp.2769-2777. http://www.usnews.com/news/articles/2013/06/24/charts-how-american- [5]H.Li,Z.Xu,H.Zhu,D.Ma,S.Li.and K.Xing."Demographics men-and-women-spend-their-time,2016. inference through wi-fi network traffic analysis,"in /EEE INFOCOM 2016. [6]V.Sekara and S.Lehmann,"The strength of friendship ties in proximity sensor data,"PLoS ONE,vol.9,pp.1-8,2014. [7]N.Cheng.P.Mohapatra,M.Cunche,M.A.Kaafar,R.Boreli,and S.Krishnamurthy,"Inferring user relationship from hidden information in wlans,"in IEEE MILCOM,2012,pp.1-6. [8]R.B.Braga,A.Tahir,M.Bertolotto,and H.Martin,"Clustering user trajectories to find patterns for social interaction applications."in WGIS 2012,pp.82-97. [9]"Wifimanager,"https://developer.android.com/reference/android/net/wifi/ WifiManager.html.2016. [10]"Understanding wireless scanning,"http://www.juniper.net/document ation/en US/network-director1.5/topics/concept/wireless-scanning.html, 2013. [11]P.Sapiezynski,A.Stopczynski,R.Gatej,and S.Lehmann,"Tracking human mobility using wifi signals,"PLOS ONE,vol.10,pp.1-11,2015 [12]J.H.Kang.W.Welbourne,B.Stewart,and G.Borriello,"Extracting places from traces of locations,"in 4CM WMASH.2004,pp.110-118. [13]D.H.Kim,Y.Kim,D.Estrin,and M.B.Srivastava,"Sensloc:sensing everyday places and paths using less energy,"in A4CM Sensys,2010,pp. 43-56. [14]Z.Chen,S.Wang,Y.Chen,Z.Zhao,and M.Lin,"Inferloc:calibration free based location inference for temporal and spatial fine-granularity magnitude,"in /EEE CSE,2012,pp.453-460. [15]A.K.Das,P.H.Pathak,C.-N.Chuah,and P.Mohapatra,"Contextual localization through network traffic analysis,"in /EEE INFOCOM,2014. pp.925-933. [16]J.Wiese,J.I.Hong,and J.Zimmerman,"Challenges and opportunities in data mining contact lists for inferring relationships,"in 4CM Ubi Comp,2014,pp.643-647. [17]M.Cunche,M.-A.Kaafar,and R.Boreli,"Linking wireless devices using information contained in wi-fi probe requests,"Pervasive and Mobile Computing,vol.11,pp.56-69,2014. [18]B.Han,J.Li,and A.Srinivasan,"Your friends have more friends than you do:Identifying influential mobile users through random-walk sampling,"IEEE/ACM Transactions on Networking,vol.22,pp.1389- 1400.2014. [19]S.Seneviratne,A.Seneviratne,P.Mohapatra,and A.Mahanti,"Pre- dicting user traits from a snapshot of apps installed on a smartphone," SIGMOBILE Mob.Comput.Commun.Rev.,vol.18,pp.1-8,2014. [20]Y.Wang,Y.Chen,F.Ye,J.Yang,and H.Liu,"Towards understanding the advertiser's perspective of smartphone user privacy,"in Proceedings of the 35th IEEE International Conference on Distributed Computing s1 ems (ICDCS9,2015,pp.288-297. [21]D.Seamon,"A way of seeing people and place:Phenomenol- ogy in environment-behavior research."Theoretical Perspectives in Environment-Behavior Research,pp.157-78,2000. [22]X.Lu and E.I.Pas,"Socio-demographics,activity participation and travel behavior,"Transportation Research Part A:Policy and Practice. vol.33,no.1,Pp.1-18,1999 [23]J.Shi,L.Meng,A.Striegel,C.Qiao,D.Koutsonikolas,and G.Challen, "A walk on the client side:Monitoring enterprise wifi networks using smartphone channel scans,"in Proceedings of the IEEE International Conference on Computer Communications (IEEE INFOCOM),2016. [24]"Wifi scanning every 5 seconds,"http://androidforums.com/threads/wifi- scanning-every-5-seconds.631388/,2012. [25]"American Time Use Survey: Vork and employment,” http://www.bls.gov/TUS/CHARTS/WORK.HTM.2014. [26“American Time Use Survey:Students,.” http://www.bls.gov/ TUS/CHARTS/STUDENTS.HTM.2014.REFERENCES [1] “Municipal wireless network,” https://en.wikipedia.org/wiki/ Munici￾pal_wireless_network, 2016. [2] “The global public wi-fi network grows to 50 million worldwide wi- fi hotspots,” https://www.ipass.com/press-releases/the-global-public-wi- fi-network-grows-to-50-million-worldwide-wi-fi-hotspots/, 2015. [3] “Google maps apis,” https://developers.google.com/maps/, 2016. [4] N. Cheng, X. Wang, W. Cheng, P. Mohapatra, and A. Seneviratne, “Characterizing privacy leakage of public wifi networks for users on travel,” in IEEE INFOCOM, 2013, pp. 2769–2777. [5] H. Li, Z. Xu, H. Zhu, D. Ma, S. Li, and K. Xing, “Demographics inference through wi-fi network traffic analysis,” in IEEE INFOCOM, 2016. [6] V. Sekara and S. Lehmann, “The strength of friendship ties in proximity sensor data,” PLoS ONE, vol. 9, pp. 1–8, 2014. [7] N. Cheng, P. Mohapatra, M. Cunche, M. A. Kaafar, R. Boreli, and S. Krishnamurthy, “Inferring user relationship from hidden information in wlans,” in IEEE MILCOM, 2012, pp. 1–6. [8] R. B. Braga, A. Tahir, M. Bertolotto, and H. Martin, “Clustering user trajectories to find patterns for social interaction applications,” in W2GIS, 2012, pp. 82–97. [9] “Wifimanager,” https://developer.android.com/reference/android/net/wifi/ WifiManager.html, 2016. [10] “Understanding wireless scanning,” http://www.juniper.net/document ation/en_US/network-director1.5/topics/concept/wireless-scanning.html, 2013. [11] P. Sapiezynski, A. Stopczynski, R. Gatej, and S. Lehmann, “Tracking human mobility using wifi signals,” PLOS ONE, vol. 10, pp. 1–11, 2015. [12] J. H. Kang, W. Welbourne, B. Stewart, and G. Borriello, “Extracting places from traces of locations,” in ACM WMASH, 2004, pp. 110–118. [13] D. H. Kim, Y. Kim, D. Estrin, and M. B. Srivastava, “Sensloc: sensing everyday places and paths using less energy,” in ACM Sensys, 2010, pp. 43–56. [14] Z. Chen, S. Wang, Y. Chen, Z. Zhao, and M. Lin, “Inferloc: calibration free based location inference for temporal and spatial fine-granularity magnitude,” in IEEE CSE, 2012, pp. 453–460. [15] A. K. Das, P. H. Pathak, C.-N. Chuah, and P. Mohapatra, “Contextual localization through network traffic analysis,” in IEEE INFOCOM, 2014, pp. 925–933. [16] J. Wiese, J. I. Hong, and J. Zimmerman, “Challenges and opportunities in data mining contact lists for inferring relationships,” in ACM Ubi￾Comp, 2014, pp. 643–647. [17] M. Cunche, M.-A. Kaafar, and R. Boreli, “Linking wireless devices using information contained in wi-fi probe requests,” Pervasive and Mobile Computing, vol. 11, pp. 56–69, 2014. [18] B. Han, J. Li, and A. Srinivasan, “Your friends have more friends than you do: Identifying influential mobile users through random-walk sampling,” IEEE/ACM Transactions on Networking, vol. 22, pp. 1389– 1400, 2014. [19] S. Seneviratne, A. Seneviratne, P. Mohapatra, and A. Mahanti, “Pre￾dicting user traits from a snapshot of apps installed on a smartphone,” SIGMOBILE Mob. Comput. Commun. Rev., vol. 18, pp. 1–8, 2014. [20] Y. Wang, Y. Chen, F. Ye, J. Yang, and H. Liu, “Towards understanding the advertiser’s perspective of smartphone user privacy,” in Proceedings of the 35th IEEE International Conference on Distributed Computing Systems (ICDCS), 2015, pp. 288–297. [21] D. Seamon, “A way of seeing people and place: Phenomenol￾ogy in environment-behavior research,” Theoretical Perspectives in Environment-Behavior Research, pp. 157–78, 2000. [22] X. Lu and E. I. Pas, “Socio-demographics, activity participation and travel behavior,” Transportation Research Part A: Policy and Practice, vol. 33, no. 1, pp. 1 – 18, 1999. [23] J. Shi, L. Meng, A. Striegel, C. Qiao, D. Koutsonikolas, and G. Challen, “A walk on the client side: Monitoring enterprise wifi networks using smartphone channel scans,” in Proceedings of the IEEE International Conference on Computer Communications (IEEE INFOCOM), 2016. [24] “Wifi scanning every 5 seconds,” http://androidforums.com/threads/wifi- scanning-every-5-seconds.631388/, 2012. [25] “American Time Use Survey: Work and employment,” http://www.bls.gov/TUS/CHARTS/WORK.HTM, 2014. [26] “American Time Use Survey: Students,” http://www.bls.gov/ TUS/CHARTS/STUDENTS.HTM, 2014. [27] B. Krämer, “Classification of generic places: Explorations with impli￾cations for evaluation,” Journal of Environmental Psychology, vol. 15, no. 1, pp. 3 – 22, 1995. [28] “Google places api,” https://developers.google.com/places, 2016. [29] “The google maps geolocation api,” https:// develop￾ers.google.com/maps/documentation/geolocation/intro, 2016. [30] “Unwired labs location api,” https://unwiredlabs.com/, 2016. [31] “United states department of agriculture economic research service,” http://www.ers.usda.gov/data-products/.aspx, 2016. [32] “Charts: How american men and women spend their time,” http://www.usnews.com/news/articles/2013/06/24/charts-how-american￾men-and-women-spend-their-time, 2016
<<向上翻页
©2008-现在 cucdc.com 高等教育资讯网 版权所有