Computer Science ›› 2018, Vol. 45 ›› Issue (8): 7-12.doi: 10.11896/j.issn.1002-137X.2018.08.002
Special Issue: Network and communication
• ChinaMM 2017 • Previous Articles Next Articles
HAN Xiu-ping1, WANG Zhi1, PEI Dan2
CLC Number:
[1]DAI Z,DINO A,MACAULAY S A.Attacking Automatic Wireless Network Selection[C]∥Proceedings of the Sixth Annual IEEE SMC Information Assurance Workshop.IEEE,2005:365-372. [2]FREUDIGER J.How Talkative is Your Mobile Device?:An Experimental Study of Wi-Fi Probe Requests[C]∥Proceedings of the 8th ACM Conference on Security and Privacy in Wireless and Mobile Networks.ACM,2015. [3]CHERNYSHEV M,VALLI C,HANNAY P.On 802.11 Access Point Locatability and Named Entity Recognition in Service Set Identifiers[J].IEEE Transactions on Information Forensics and Security,2016,11(3):584-593. [4]FAN Y C,CHEN Y C,TUNG K C,et al.A Framework forEna-bling User Preference Profiling Through Wi-Fi Logs[J].IEEE Transactions on Knowledge and Data Engineering,2016,28(3):592-603. [5]XU Q,ZHENG R,SAAD W,et al.Device Fingerprinting inWireless Networks:Challenges and Opportunities[J].IEEE Communications Surveys and Tutorials,2016,18 (1):94-104. [6]CUNCHE M,KAAFAR M A,BORELI R.Linking Wireless Devices Using Information Contained in Wi-Fi Probe Requests[J].Pervasive and Mobile Computing,2014,11(4):56-69. [7]BONNE B,QUAX P,LAMOTTE W.Raising Awareness onSmartphone Privacy Issues with SASQUATCH,and Solving Them with PrivacyPolice∥Proceedings of the 11th International Conference on Mobile and Ubiquitous Systems:Computing,Networking and Services.2014:379-381. [8]LINDQVIST J,AURA T,DANEZIS G,et al.Privacy-preser-ving 802.11 Access-point Discovery[C]∥Proceedings of the Second ACM Conference on Wireless Network Security.ACM,2009:123-130. [9]KIM Y S,TIAN T,NGUYEN L T,et al.Lapwin:Location-aided Probing for Protecting User Privacy in Wi-Fi Networks[C]∥Proceedings of IEEE Conference on Communications and Network Security.2014:427-435. [10]PANG J,GREENSTEIN B,GUMMADI R,et al.802.11 User Fingerprinting[C]∥Proceedings of the 13th Annual ACM International Conference on Mobile Computing and Networking.ACM,2007:99-110. [11]DESMOND L C C,YUAN C C,PHENG T C,et al.Identifying Unique Devices Through Wireless Fingerprinting[C]∥Procee-dings of the First ACM Conference on Wireless Network Security.ACM,2008:46-55. [12]CHENG N,MOHAPATRA P,CUNCHE M,et al.InferringUser Relationship from Hidden Information in Wlans[C]∥Mi-litary Communications Conference.IEEE,2012:1-6. [13]BARBERA M V,EPASTO A,MEI A,et al.Signals from The Crowd:Uncovering Social Relationships through Smartphone Probes[C]∥Proceedings of the 2013 Conference on Internet Measurement Conference.ACM,2013:265-276. [14]LUZIO A D,MEI A,STEFA J.Mind Your Probes:De-anonymization of Large Crowds through Smartphone Wi-Fi Probe Requests[C]∥Proceedings of the 35th Annual IEEE International Conference on Computer Communications.IEEE,2016:1-9. [15]SONG Y,YANG C,GU G.Who is Peeping at Your Passwords at Starbucks?-To Catch An Evil Twin Access Point[C]∥Proceedings of IEEE/IFIP International Conference on Dependable Systems and Networks.IEEE,2010:323-332. [16]CALLEGATI F,CERRONI W,RAMILLI M.Man-in-the-Middle Attack to the Https Protocol[J].IEEE Security and Privacy,2009,7(1):78-81. [17]SKINNER K,NOVAK J.Privacy and Your App[C]∥Apple Worldwide Dev.Conf.(WWDC).America,2015. [18]Android 6.0 Changes[EB/OL].https://developer.android.com/about/versions/ marshmallow/android-6.0-changes.html. [19]WANG W.Wireless Networking in Windows 10[C]∥Windows Hardware Engineering Community Conference (WinHEC).2015. [20]VANHOEF M,MATTE C,CUNCHE M,et al.Why Mac Address Randomization is not Enough:An Analysis of Wi-Fi Network Discovery Mechanisms∥Proceedings of the 11th ACM on Asia Conference on Computer and Communications Security.ACM,2016:413-424. [21]VANHOEF M,MATTE C,CUNCHE M,et al.Why Mac Address Randomization is not Enough:An Analysis of Wi-Fi Network Discovery Mechanisms[C]∥Proceedings of the 11th ACM on Asia Conference on Computer and Communications Security.ACM,2016:413-424. [22]ZANG H,BOLOT J.Anonymization of Location Data does not Work:A Large-scale Measurement Study[C]∥Proceedings of the 17th Annual International Conference on Mobile Computing and Networking.ACM,2011:145-156. [23]XU C,TENG J,JIA W.Enabling Faster and Smoother Handoffs in Ap-dense 802.11 Wireless Networks[J].Computer Communications,2010,33(15):1795-1803. [24]TERVEEN L,HILL W.Beyond Recommender Systems:He-lping People Help Each Other[C]∥HCI in the New Millen-nium.2001:487-509. |
[1] | LU Chen-yang, DENG Su, MA Wu-bin, WU Ya-hui, ZHOU Hao-hao. Federated Learning Based on Stratified Sampling Optimization for Heterogeneous Clients [J]. Computer Science, 2022, 49(9): 183-193. |
[2] | CHEN Yong-quan, JIANG Ying. Analysis Method of APP User Behavior Based on Convolutional Neural Network [J]. Computer Science, 2022, 49(8): 78-85. |
[3] | WANG Jian. Back-propagation Neural Network Learning Algorithm Based on Privacy Preserving [J]. Computer Science, 2022, 49(6A): 575-580. |
[4] | MAO Dian-hui, HUANG Hui-yu, ZHAO Shuang. Study on Automatic Synthetic News Detection Method Complying with Regulatory Compliance [J]. Computer Science, 2022, 49(6A): 523-530. |
[5] | WEI Peng, MA Yu-liang, YUAN Ye, WU An-biao. Study on Temporal Influence Maximization Driven by User Behavior [J]. Computer Science, 2022, 49(6): 119-126. |
[6] | SUN Xuan, WANG Huan-xiao. Capability Building for Government Big Data Safety Protection:Discussions from Technologicaland Management Perspectives [J]. Computer Science, 2022, 49(4): 67-73. |
[7] | SONG Tao, LI Xiu-hua, LI Hui, WEN Jun-hao, XIONG Qing-yu, CHEN Jie. Overview of Research on Security Encryption Authentication Technology of IoV in Big Data Era [J]. Computer Science, 2022, 49(4): 340-353. |
[8] | WANG Mei-shan, YAO Lan, GAO Fu-xiang, XU Jun-can. Study on Differential Privacy Protection for Medical Set-Valued Data [J]. Computer Science, 2022, 49(4): 362-368. |
[9] | ZHAO Luo-cheng, QU Zhi-hao, XIE Zai-peng. Study on Communication Optimization of Federated Learning in Multi-layer Wireless Edge Environment [J]. Computer Science, 2022, 49(3): 39-45. |
[10] | GENG Hai-jun, WANG Wei, YIN Xia. Single Node Failure Routing Protection Algorithm Based on Hybrid Software Defined Networks [J]. Computer Science, 2022, 49(2): 329-335. |
[11] | JIN Hua, ZHU Jing-yu, WANG Chang-da. Review on Video Privacy Protection [J]. Computer Science, 2022, 49(1): 306-313. |
[12] | LEI Yu-xiao , DUAN Yu-cong. AI Governance Oriented Legal to Technology Bridging Framework for Cross-modal Privacy Protection [J]. Computer Science, 2021, 48(9): 9-20. |
[13] | TAN Qi, ZHANG Feng-li, WANG Ting, WANG Rui-jin, ZHOU Shi-jie. Social Network User Influence Evaluation Algorithm Integrating Structure Centrality [J]. Computer Science, 2021, 48(7): 124-129. |
[14] | GUO Yi-shan, LIU Man-dan. Anomaly Detection Based on Spatial-temporal Trajectory Data [J]. Computer Science, 2021, 48(6A): 213-219. |
[15] | HE Quan-qi, YU Fei-hong. Review of Low Power Architecture for Wireless Network Cameras [J]. Computer Science, 2021, 48(6A): 369-373. |
|