Learn More
Introduction 2 • Smartphones feature numerous sensors • Many users concerned about GPS sensors leaking location privacy • Mobile OS companies were reported to collect GPS location information of their customers • Other sensors (e.g., accelerometers) considered benign • Should we consider acceleration data (accelerometer) to be privacy sensitive? Yes, we(More)
A variety of real-life mobile sensing applications are becoming available , especially in the life-logging, fitness tracking and health monitoring domains. These applications use mobile sensors embedded in smart phones to recognize human activities in order to get a better understanding of human behavior. While progress has been made, human activity(More)
Activity recognition (AR) systems are typically built to recognize a predefined set of common activities. However, these systems need to be able to learn new activities to adapt to a user's needs. Learning new activities is especially challenging in practical scenarios when a user provides only a few annotations for training an AR model. In this work, we(More)
Activity recognition (AR) has become an essential component of many applications present in our everyday lives such as life-logging, fitness tracking, health and wellbeing monitoring. To build an AR system, one needs to first identify a set of activities of interest and collect labeled training data for these activities. However, activities of interest are(More)
Activity recognition (AR) systems are typically built and evaluated on a predefined set of activities. AR systems work best if the test data contains and only contains these predefined activities. In real world applications, AR systems trained in this manner generate serious false positives, for example if "smoking" is one of the activities in the training(More)
—Knowledge of working professionals gained through years of experience is invaluable for any organization. Extracting this knowledge allows an organization to optimize internal processes and facilitate training of new hires. Therefore, there has been a significant research effort in developing techniques for automated knowledge mining at workplaces.(More)
Mobile devices have become people's indispensable companion, since they allow each individual to be constantly connected with the outside world. In order to keep connected, the devices periodically send out data, which reveal some information about the device owner. Data sent by these devices can be captured by any external observer. Since the observer can(More)
—Efficient Wi-Fi probing has been demonstrated to leak sensitive user information. During the probing process, Wi-Fi clients transmit the names of previously known Wi-Fi access points (APs) in plaintext. An eavesdropper can easily collect the information leaked by this Wi-Fi probing process to mount numerous attacks, such as fake AP or revealing hidden APs,(More)