2018 17th IEEE International Conference on Trust, Security and Privacy in Computing and Communications/ 12th IEEE International 2018
DOI: 10.1109/trustcom/bigdatase.2018.00146
|View full text |Cite
|
Sign up to set email alerts
|

Do You Like What I Like? Similarity Estimation in Proximity-Based Mobile Social Networks

Abstract: While existing social networking services tend to connect people who know each other, people show a desire to also connect to yet unknown people in physical proximity. Existing research shows that people tend to connect to similar people. Utilizing technology in order to stimulate human interaction between strangers, we consider the scenario of two strangers meeting. On the example of similarity in musical taste, we develop a solution for the problem of similarity estimation in proximitybased mobile social net… Show more

Help me understand this report
View preprint versions

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
18
0

Year Published

2018
2018
2021
2021

Publication Types

Select...
3
2
2

Relationship

3
4

Authors

Journals

citations
Cited by 11 publications
(18 citation statements)
references
References 20 publications
0
18
0
Order By: Relevance
“…Similarity data gets propagated to nearby peers and therefore has to be privacy-preserving. Privacy-preserving similarity comparison can among others be performed on item vectors [4] as well as texting data [15]. • Context Data: Data that characterizes the encounter such as location, time, weather, or peer activity (running, eating, commuting) that can be sensed (for example via sensors) or retrieved (for example from the web) [6,30].…”
Section: Similarity Data Peer Preference List and Neighborhood Prefmentioning
confidence: 99%
“…Similarity data gets propagated to nearby peers and therefore has to be privacy-preserving. Privacy-preserving similarity comparison can among others be performed on item vectors [4] as well as texting data [15]. • Context Data: Data that characterizes the encounter such as location, time, weather, or peer activity (running, eating, commuting) that can be sensed (for example via sensors) or retrieved (for example from the web) [6,30].…”
Section: Similarity Data Peer Preference List and Neighborhood Prefmentioning
confidence: 99%
“…After updating the global DF vector, a truncated DF vector corresponding to the words submitted by the user, and the total number of users is returned to the smartphone. The user can now calculate tf−idf features for all of his/her used words according to Equation (1), which are then added to his/her BoW vector. The WMD calculates distances between two (word vectors, word weights) pairs, which are commonly referred to as signature.…”
Section: B Latent Feature Pre-calculationmentioning
confidence: 99%
“…6 Techniques from differential privacy can be used to add jitter to the true word vectors to obfuscate knowledge on the hidden word embedding model. of the vocabulary word v in R. The user DF vector can then be formalized as DF user (A) = [1] v∈V . The user DF vector is sent to the backend, where it updates the global DF vector…”
Section: Example: Signature Calculationmentioning
confidence: 99%
See 2 more Smart Citations