Wireless Geographic Logging Engine ,
Smartphone Sensor Reliability for Augmented Reality Applications, Mobile and Ubiquitous Systems: Computing, Networking, and Services, pp.127-138, 2013. ,
DOI : 10.1111/j.1467-9671.2009.01152.x
Longitudinal analysis of android ad library permissions, 2013. ,
Accuracy characterization for metropolitan-scale Wi-Fi localization, Proceedings of the 3rd international conference on Mobile systems, applications, and services , MobiSys '05, pp.233-245, 2005. ,
DOI : 10.1145/1067170.1067195
Information extraction, Communications of the ACM, vol.39, issue.1, pp.80-91, 1996. ,
DOI : 10.1145/234173.234209
Linking wireless devices using information contained in Wi-Fi probe requests, Pervasive and Mobile Computing, vol.11, issue.0, 2013. ,
DOI : 10.1016/j.pmcj.2013.04.001
URL : https://hal.archives-ouvertes.fr/hal-00816374
Snoopy: Distributed tracking and profiling framework, 2012. ,
Android permissions demystified, Proceedings of the 18th ACM conference on Computer and communications security, CCS '11, pp.627-638, 2011. ,
DOI : 10.1145/2046707.2046779
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.228.3160
Android permissions, Proceedings of the Eighth Symposium on Usable Privacy and Security, SOUPS '12, pp.1-3, 2012. ,
DOI : 10.1145/2335356.2335360
Can Ferris Bueller still have his day off? protecting privacy in the wireless era, Proceedings of the 11th USENIX workshop on Hot topics in operating systems, pp.1-10, 2007. ,
Place Lab: Device Positioning Using Radio Beacons in the Wild, Pervasive computing, pp.116-133, 2005. ,
DOI : 10.1007/11428572_8
Privacy-preserving 802.11 access-point discovery, Proceedings of the second ACM conference on Wireless network security, WiSec '09, pp.123-130, 2009. ,
DOI : 10.1145/1514274.1514293
Recognizing named entities in tweets, Proceedings of the 49th Annual Meeting of the Association for Computational Linguistics: Human Language Technologies, pp.359-367, 2011. ,
Tracking unmodified smartphones using wi-fi monitors, Proceedings of the 10th ACM Conference on Embedded Network Sensor Systems, SenSys '12, pp.281-294 ,
DOI : 10.1145/2426656.2426685
Most people are 'privacy pragmatists' who, while concerned about privacy, will sometimes trade it off for other benefits. The Harris Poll, p.44, 2003. ,
Identity, location, disease and more, Proceedings of the 2013 ACM SIGSAC conference on Computer & communications security, CCS '13, pp.1017-1028, 2013. ,
DOI : 10.1145/2508859.2516661