Mind your probes: De-anonymization of large crowds through smartphone WiFi probe requests

A Di Luzio, A Mei, J Stefa - IEEE INFOCOM 2016-The 35th …, 2016 - ieeexplore.ieee.org
Whenever our smartphones have their WiFi radio interface on, they periodically try to
connect to known wireless APs (networks the user has connected to in the past). This is …

MAC address de-randomization for WiFi device counting: Combining temporal-and content-based fingerprints

M Uras, E Ferrara, R Cossu, A Liotta, L Atzori - Computer Networks, 2022 - Elsevier
To preserve people privacy and prevent device (and people) tracking, WiFi MAC address
randomization is been introduced by an ever increasing number of operating systems …

Identifying movements in noisy crowd analytics data

C Chilipirea, C Dobre, M Baratchi… - 2018 19th IEEE …, 2018 - ieeexplore.ieee.org
Privacy-preserved tracking of WiFi-enabled devices such as smartphones offers a highly
scalable solution for large-scale crowd movement studies. However, extracting knowledge …

Localising crowds through Wi-Fi probes

F Potortì, A Crivello, M Girolami, P Barsocchi… - Ad Hoc Networks, 2018 - Elsevier
Most of us carry mobile devices that routinely disseminate radio messages, as is the case
with Wi-Fi scanning and Bluetooth beaconing. We investigate whether it is possible to …

Deanonymizing mobility traces: Using social network as a side-channel

M Srivatsa, M Hicks - Proceedings of the 2012 ACM conference on …, 2012 - dl.acm.org
Location-based services, which employ data from smartphones, vehicles, etc., are growing
in popularity. To reduce the threat that shared location data poses to a user's privacy, some …

Non-intrusive privacy-preserving approach for presence monitoring based on WiFi probe requests

A Simončič, M Mohorčič, M Mohorčič, A Hrovat - Sensors, 2023 - mdpi.com
Monitoring the presence and movements of individuals or crowds in a given area can
provide valuable insight into actual behavior patterns and hidden trends. Therefore, it is …

Privacy-preserving wi-fi analytics

M Alaggan, M Cunche, S Gambs - Proceedings on Privacy …, 2018 - petsymposium.org
As communications-enabled devices are becoming more ubiquitous, it becomes easier to
track the movements of individuals through the radio signals broadcasted by their devices …

Hiding mobile traffic fingerprints with glove

M Gramaglia, M Fiore - Proceedings of the 11th ACM Conference on …, 2015 - dl.acm.org
Preservation of user privacy is paramount in the publication of datasets that contain fine-
grained information about individuals. The problem is especially critical in the case of mobile …

Presumably simple: monitoring crowds using WiFi

C Chilipirea, AC Petre, C Dobre… - 2016 17th IEEE …, 2016 - ieeexplore.ieee.org
Crowd Monitoring is receiving much attention. An increasingly popular technique is to scan
for mobile devices, notably smartphones. We take a look at scanning for such devices by …

Re-identification and information fusion between anonymized CDR and social network data

A Cecaj, M Mamei, F Zambonelli - Journal of Ambient Intelligence and …, 2016 - Springer
The analysis of multiple datasets on users' behaviors opens interesting information fusion
possibilities and, at the same time, creates a potential for re-identification and de …