. Wigle, Wireless Geographic Logging Engine

J. R. Blum, D. G. Greencorn, and J. R. Cooperstock, Smartphone Sensor Reliability for Augmented Reality Applications, Mobile and Ubiquitous Systems: Computing, Networking, and Services, pp.127-138, 2013.
DOI : 10.1111/j.1467-9671.2009.01152.x

T. Book, A. Pridgen, and D. S. Wallach, Longitudinal analysis of android ad library permissions, 2013.

Y. Cheng, Y. Chawathe, A. Lamarca, and J. Krumm, Accuracy characterization for metropolitan-scale Wi-Fi localization, Proceedings of the 3rd international conference on Mobile systems, applications, and services , MobiSys '05, pp.233-245, 2005.
DOI : 10.1145/1067170.1067195

J. Cowie and W. Lehnert, Information extraction, Communications of the ACM, vol.39, issue.1, pp.80-91, 1996.
DOI : 10.1145/234173.234209

M. Cunche, M. Kaafar, and R. Boreli, Linking wireless devices using information contained in Wi-Fi probe requests, Pervasive and Mobile Computing, vol.11, issue.0, 2013.
DOI : 10.1016/j.pmcj.2013.04.001

URL : https://hal.archives-ouvertes.fr/hal-00816374

C. Daniel and W. Glenn, Snoopy: Distributed tracking and profiling framework, 2012.

A. P. Felt, E. Chin, S. Hanna, D. Song, and D. Wagner, Android permissions demystified, Proceedings of the 18th ACM conference on Computer and communications security, CCS '11, pp.627-638, 2011.
DOI : 10.1145/2046707.2046779

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.228.3160

A. P. Felt, E. Ha, S. Egelman, A. Haney, E. Chin et al., Android permissions, Proceedings of the Eighth Symposium on Usable Privacy and Security, SOUPS '12, pp.1-3, 2012.
DOI : 10.1145/2335356.2335360

B. Greenstein, R. Gummadi, J. Pang, M. Y. Chen, T. Kohno et al., Can Ferris Bueller still have his day off? protecting privacy in the wireless era, Proceedings of the 11th USENIX workshop on Hot topics in operating systems, pp.1-10, 2007.

]. A. Lamarca, Y. Chawathe, S. Consolvo, J. Hightower, I. Smith et al., Place Lab: Device Positioning Using Radio Beacons in the Wild, Pervasive computing, pp.116-133, 2005.
DOI : 10.1007/11428572_8

J. Lindqvist, T. Aura, G. Danezis, T. Koponen, A. Myllyniemi et al., Privacy-preserving 802.11 access-point discovery, Proceedings of the second ACM conference on Wireless network security, WiSec '09, pp.123-130, 2009.
DOI : 10.1145/1514274.1514293

X. Liu, S. Zhang, F. Wei, and M. Zhou, Recognizing named entities in tweets, Proceedings of the 49th Annual Meeting of the Association for Computational Linguistics: Human Language Technologies, pp.359-367, 2011.

A. B. Musa and J. Eriksson, Tracking unmodified smartphones using wi-fi monitors, Proceedings of the 10th ACM Conference on Embedded Network Sensor Systems, SenSys '12, pp.281-294
DOI : 10.1145/2426656.2426685

H. Taylor, Most people are 'privacy pragmatists' who, while concerned about privacy, will sometimes trade it off for other benefits. The Harris Poll, p.44, 2003.

X. Zhou, S. Demetriou, D. He, M. Naveed, X. Pan et al., Identity, location, disease and more, Proceedings of the 2013 ACM SIGSAC conference on Computer & communications security, CCS '13, pp.1017-1028, 2013.
DOI : 10.1145/2508859.2516661