General graph data de-anonymization: From mobility traces to social networks

S Ji, W Li, M Srivatsa, JS He, R Beyah - ACM Transactions on …, 2016 - dl.acm.org
When people utilize social applications and services, their privacy suffers a potential serious
threat. In this article, we present a novel, robust, and effective de-anonymization attack to …

Impact of social-aware forwarding on traffic distribution in social opportunistic networks

B Soelistijanto - 2016 IEEE Region 10 Symposium (TENSYMP), 2016 - ieeexplore.ieee.org
Social opportunistic networks (SONs) are delay-tolerant MANETs that exploit human mobility
to enable message delivery in the networks. Humans tend to move in a way that is …

Evaluating the impact of network loads and message size on mobile opportunistic networks in challenged environments

S Pal - Journal of Network and Computer Applications, 2017 - Elsevier
The use of mobile opportunistic networks may help users to gain access to an available
network connection for communication in challenged environments. For instance, areas that …

The efficiency-fairness trade-off of social-rank-based forwarding in social opportunistic networks

B Soelistijanto - 2016 IEEE Asia Pacific Conference on …, 2016 - ieeexplore.ieee.org
Social-rank-based forwarding algorithms favour the most popular nodes as the most likely
relay nodes to deliver messages to the destinations. When these strategies are able to …

Improving node popularity calculation using kalman filter in opportunistic mobile social networks

B Soelistijanto - 2018 6th International Conference on …, 2018 - ieeexplore.ieee.org
Opportunistic mobile social networks (OMSNs) exploit human mobility to physically carry
messages to the destinations. Routing algorithms in these networks typically favour the most …

[PDF][PDF] General Co-Chair

A Adiwijaya, A Rafi, A Azman, AM Barmawi… - people.usd.ac.id
Homepage Page 1 ICoICT 2018 ICoICT 2018 Logo ICoICT 2018 Banner IEEE Home Program
TPC Committees Authors Other reviewers Homepage ICoICT 2018 is jointly-organized by …

Trace generator for Opportunistic Networks routing protocols through heuristic techniques

AH Chamorro, M Amin - 2020 - ddd.uab.cat
Aquest informe tracta sobre l'execució d'un projecte que construeixi un algorisme capaç de
generar Scenarios pel simulador The One, per poder testejar protocols d'encaminament per …

[图书][B] Traffic Distribution Fairness and Congestion in Social Opportunistic Networks

B Soelistijanto - 2014 - search.proquest.com
Social opportunistic networks (SONs) are intermittently-connected networks that exploit
unpredictable contacts between users' mobile devices. The connectivity of SONs exhibits a …