{Shokri14} Reza Shokri, George Theodorakopoulos, Panos Papadimitratos, Ehsan Kazemi, Jean-Pierre Hubaux. Hiding in the Mobile Crowd: Location Privacy through Collaboration. IEEE Transactions on Dependable and Secure Computing (TDSC), 2014. MobiCrowd: users only contact the LBS server if they cannot find the sought information among their peers, i.e., other nearby reachable user devices
{Li17} Huayi Li, Geli Fei, Shuai Wang, Bing Liu, Weixiang Shao, Arjun Mukherjee and Jidong Shao. Bimodal Distribution and Co-Bursting in Review Spam Detection. Proc. of WWW, 2017. propose a co-bursting network based on co-bursting relations, which helps detect groups of spammers more effectively than existing approaches
{Surbatovich17} Milijana Surbatovich, Jassim Aljuraidan, Lujo Bauer, Anupam Das and Limin Jia. Some Recipes Can Do More Than Spoil Your Appetite: Analyzing the Security and Privacy Risks of IFTTT Recipes. Proc. of WWW, 2017.
{Papadopoulos17} Elias Papadopoulos, Michalis Diamantaris, Panagiotis Papadopoulos, Thanasis Petsas, Sotiris Ioannidis and Evangelos Markatos. The Long-Standing Privacy Debate: Mobile Websites Vs Mobile Apps. Proc. of WWW, 2017. apps leak more information than web browsers
{Zhang20} Xueling Zhang, Xiaoyin Wang, Rocky Slavin, Travis Breaux, Jianwei Niu. How Does Misconfiguration of Analytic Services Compromise Mobile Privacy? Proc. of ICSE, 2020.
{Wang20} Zhibo Wang, Hengchang Guo, Zhifei Zhang, Mengkai Song, Siyan Zheng, Qian Wang, and Ben Niu. Towards compression-resistant privacy-preserving photo sharing on social networks. Proc. of ACM Mobihoc, 2020.
{Huang21} Long Huang and Chen Wang. Notification privacy protection via unobtrusive gripping hand verification using media sounds. Proc. of ACM MobiCom, 2021. address the mobile notification security issues by introducing a low-effort in-situ user authentication system based on notification tone
{Wenger21} Emily Wenger, Max Bronckers, Christian Cianfarani, Jenna Cryan, Angela Sha, Haitao Zheng, and Ben Y. Zhao. "Hello, It's Me": Deep Learning-based Speech Synthesis Attacks in the Real World. Proc. of ACM CCS, 2021.
{Talebi21} Seyed Mohammadjavad Seyed Talebi, Ardalan Amiri Sani, Stefan Saroiu, and Alec Wolman. MegaMind: a platform for security & privacy extensions for voice assistants. Proc. of ACM MobiSys, 2021. MegaMind, a novel extensible platform that lets a user deploy security and privacy extensions locally on their voice assistant
{Abedi22} Ali Abedi, Deepak Vasisht. Non-Cooperative Wi-Fi Localization & its Privacy Implications. Proc. of ACM MobiCom, 2022. a drone flying over a house can estimate the location of Wi-Fi devices across multiple floors to meter-level accuracy
{Kumar22} Abhishek Kumar, Lik-Hang Lee, Jagmohan Chauhan, Xiang Su, Mohammad A. Hoque, Susanna Pirttikangas, Sasu Tarkoma, and Pan Hui. PassWalk: Spatial Authentication Leveraging Lateral Shift and Gaze on Mobile Headsets. Proc. of ACM MM, 2022.
{Sharp22} Jonathan Sharp, Chuxiong Wu, Qiang Zeng. Authentication for Drone Delivery Through a Novel Way of Using Face Biometrics. Proc. of ACM MobiCom, 2022.
{Zhang22} Jiaquan Zhang, Hui Chen, Xiaoming Yao, Xiaoming Fu. CPFinder: Finding an unknown caller's profession from anonymized mobile phone data. Digital Communications and Networks, 2022, 8(3):324-332. CPFinder —- a system that exploits privacy-preserving mobile data to automatically identify callers who are divided into four categories of users: taxi drivers, delivery and takeouts staffs, telemarketers and fraudsters, and normal users (other professions)
{Yang23} Zhuolin Yang, Yuxin Chen, Zain Sarwar, Hadleigh Schwartz, Ben Y. Zhao, Haitao Zheng. Towards a General Video-based Keystroke Inference Attack. Proc. of USENIX Security, 2023. describes experiences developing and evaluating a general, video-based keystroke inference attack that operates in common public settings using a single commodity camera phone, with no pretraining, no keyboard knowledge, no local sensors, and no side-channels