We know how you live: exploring the spectrum of urban lifestyles

NJ Yuan, F Zhang, D Lian, K Zheng, S Yu… - Proceedings of the first …, 2013 - dl.acm.org
An incisive understanding of human lifestyles is not only essential to many scientific
disciplines, but also has a profound business impact for targeted marketing. In this paper, we …

Building Dissent Networks: Towards Effective Countermeasures against {Large-Scale} Communications Blackouts

S Hasan, Y Ben-David, G Fanti, E Brewer… - 3rd USENIX Workshop …, 2013 - usenix.org
Large-scale communications blackouts, such as those carried out by Egypt and Libya in
2011 and Syria in 2012 and 2013, have motivated a series of projects that aim to enable …

[PDF][PDF] Panning for gold: automatically analysing online social engineering

M Edwards, R Larson, B Green, A Rashid - Computers & Security, 2013 - cyberleninka.org
The process of social engineering targets people rather than IT infrastructure. Attackers use
deceptive ploys to create compelling behavioural and cosmetic hooks, which in turn lead a …

Nowhere to hide: Exploring user-verification across Flickr accounts

H Lei, J Choi, G Friedland - 2013 IEEE International …, 2013 - ieeexplore.ieee.org
This work presents improved audio-based user-verification analysis and results on Flickr
videos, using a subset of the MediaEval 2011 [1] data set. User-verification is a new task …

[图书][B] Avoiding Unintended Flows of Personally Identifiable Information: Enterprise Identity Management and Online Social Networks

S Labitzke - 2013 - books.google.com
This work addresses potentially occurring unintended flows of personally identifiable
information (PII) within two fields of research, ie, enterprise identity management and online …

[PDF][PDF] Designing Networks for Large-Scale Blackout Circumvention

S Hasan - 2013 - eecs.berkeley.edu
Large-scale communications blackouts, such as those carried out by Egypt and Libya in
2011 and Syria in 2012 and 2013, have motivated a series of projects that aim to enable …