Fuzzy TOPSIS-based privacy measurement in multiple online social networks

L Guo, Z Yao, M Lin, Z Xu - Complex & Intelligent Systems, 2023 - Springer
Abstract Information leakage has become an urgent problem in multiple Online Social
Networks (OSNs). The interactive communication of users has raised several privacy …

Hidden in plain sight: exploring encrypted channels in android apps

S Pourali, N Samarasinghe, M Mannan - Proceedings of the 2022 ACM …, 2022 - dl.acm.org
As privacy features in Android operating system improve, privacy-invasive apps may
gradually shift their focus to non-standard and covert channels for leaking private …

Conducting malicious cybersecurity experiments on crowdsourcing platforms

A Aljohani, J Jones - Proceedings of the 2021 3rd International …, 2021 - dl.acm.org
Evaluating the effectiveness of defense technologies mandates the inclusion of a human
element, specifically if these technologies target human cognition and emotions. One of the …

移动设备加密流量的用户信息探测研究展望

张腾飞, 余顺争 - 通信学报, 2021 - infocomm-journal.com
移动设备加密流量分析可以用主动或被动的方式获取多种类型的用户信息,
为网络安全管理和用户隐私保护提供保障. 重点分析, 归纳了用户信息探测所涉及的数据采集 …

[图书][B] Federated Learning for Mobile Data Privacy

E Bakopoulou - 2021 - search.proquest.com
Mobile devices have access to rich personal, potentially sensitive data, from online activity
and multiple sensors that include personally identifiable information (PII), such as user …

On Evaluating Cyber Defense by Humans and Reinforcement Learning Agents

A Aljohani - 2023 - search.proquest.com
A significant factor that drives the investment in/integration of a cyber defense technique is
its proven effectiveness, in terms of performance, usability, and security, against an intended …