Proceeding of the 11th Annual International Conference on Mobile Systems, Applications, and Services 2013
DOI: 10.1145/2462456.2464457
|View full text |Cite
|
Sign up to set email alerts
|

Leveraging graphical models to improve accuracy and reduce privacy risks of mobile sensing

Abstract: The proliferation of sensors on mobile phones and wearables has led to a plethora of context classifiers designed to sense the individual's context. We argue that a key missing piece in mobile inference is a layer that fuses the outputs of several classifiers to learn deeper insights into an individual's habitual patterns and associated correlations between contexts, thereby enabling new systems optimizations and opportunities. In this paper, we design CQue, a dynamic bayesian network that operates over classi… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
14
0

Year Published

2014
2014
2019
2019

Publication Types

Select...
3
3
2

Relationship

0
8

Authors

Journals

citations
Cited by 23 publications
(14 citation statements)
references
References 14 publications
0
14
0
Order By: Relevance
“…Examples: Toftkjaer et al [50] present methods to improve QoS for indoor positioning by fusing input from inertial sensors, GPS sensors, and building models using particle filters. Parate et al [34] present CQue fusing output of individual classifiers and sensors to derive an individual's habitual patterns and associated correlations with context.…”
Section: Methodsmentioning
confidence: 99%
See 1 more Smart Citation
“…Examples: Toftkjaer et al [50] present methods to improve QoS for indoor positioning by fusing input from inertial sensors, GPS sensors, and building models using particle filters. Parate et al [34] present CQue fusing output of individual classifiers and sensors to derive an individual's habitual patterns and associated correlations with context.…”
Section: Methodsmentioning
confidence: 99%
“…For testing, [35] presents debugging tools for energy-related bugs, and [25] describes a testing framework, which allows for automatically replicating heterogeneous sensor data. Finally, [34] addresses security by means for privacy protection. However, further detailing scenarios and tactics for these attributes in the context of mobile sensing is subject to future work.…”
Section: Further Qualities For Mobile Sensingmentioning
confidence: 99%
“…Many algorithms [32], [33] for protecting location data and attributes of users other than previously mentioned research studies have been proposed, but they have not considered the location error.…”
Section: Related Workmentioning
confidence: 99%
“…Specifically, smartphone users usually transit between different contexts (e.g., a user goes to a particular hospital after eating at a coffee shop), whose sensitivities are different to the users. Moreover, the contexts are usually correlated, which has already been studied for different goals [8]- [10]. Thus, the adversaries can learn the connections between contexts by exploiting the temporal correlations, and then use such correlations to infer user's sensitive contexts based on their observations on nonsensitive contexts.…”
Section: Introductionmentioning
confidence: 99%
“…On the one hand, the untrusted application extracts the user's context using certain context recognition approaches (e.g. [8], [10]). On the other hand, the untrusted application leak the modified sensing data to an adversary.…”
Section: Introductionmentioning
confidence: 99%