Contact discovery allows users of mobile messengers to conveniently connect with people in their address book. In this work, we demonstrate that severe privacy issues exist in …
X Zhou, W Wang, Q Jin - Multimedia Tools and Applications, 2015 - Springer
In this study, we concentrate on analyzing and building the dynamical user profiling to describe users' multi-dimensional features and properties, in order to assist the …
Contact discovery allows users of mobile messengers to conveniently connect with people in their address book. In this work, we demonstrate that severe privacy issues exist in …
Y He, Y Gu, P Su, K Sun, Y Zhou… - IEEE Transactions on …, 2022 - ieeexplore.ieee.org
Android allows apps to communicate with its system services via system service helpers so that these apps can use various functions provided by the system services. Meanwhile, the …
PN Klein, S Subramanian - 1993 - ieeexplore.ieee.org
We give an algorithm requiring polylog time and a linear number of processors to solve single-source shortest paths in directed planar graphs, bounded-genus graphs, and 2 …
M Sahin, A Francillon - Proceedings of the 2016 ACM SIGSAC …, 2016 - dl.acm.org
In this paper, we study the Over-The-Top (OTT) bypass fraud, a recent form of interconnect telecom fraud. In OTT bypass, a normal phone call is diverted over IP to a voice chat …
C Rottermanner, P Kieseberg, M Huber… - Proceedings of the 17th …, 2015 - dl.acm.org
Ever since the Snowden revelations regarding mass surveillance, the role of privacy protection in commodity communication software has gained increasing awareness in the …
Smartphones have fueled a shift in the way we communicate with each other via Instant Messaging. With the convergence of Internet and telephony, new Over-The-Top (OTT) …
Little research explores the activity of sharing mobile numbers on OSNs, in particular via public posts. In this work, we understand the characteristics and risks of mobile numbers …