Adaptive Information-Sharing for Privacy-Aware Mobile Social Network Igor Bilogrevic 1, Kévin Huguenin 1, Berker Agir 1, Murtuza Jadliwala 2 and Jean-Pierre.

Slides:



Advertisements
Similar presentations
Learning to Suggest: A Machine Learning Framework for Ranking Query Suggestions Date: 2013/02/18 Author: Umut Ozertem, Olivier Chapelle, Pinar Donmez,
Advertisements

Context-based object-class recognition and retrieval by generalized correlograms by J. Amores, N. Sebe and P. Radeva Discussion led by Qi An Duke University.
GAMIFYING HEALTH DATA COLLECTION Mariko Wakabayashi & RJ Kunde Department of Computer Science University of Illinois at Urbana-Champaign Collaborators:
What you want is not what you get: Predicting sharing policies for text-based content on Facebook Arunesh Sinha*, Yan Li †, Lujo Bauer* *Carnegie Mellon.
Herbert SHIU Joseph FONG Jeanne Lam.  Introduction  Facebook features  Facebook as an education platform  Case study  Conclusion.
Human Centred Design of a smart phone alert application for drivers Annie Pauzié, Ifsttar/LESCOT, France
Integrating a Gender Perspective into Time Use Statistics.
Social Media: New Marketing Tools. Social Media: “Social media is the use of web-based and mobile technologies to turn communication into interactive.
1 A Distortion-based Metric for Location Privacy Workshop on Privacy in the Electronic Society (WPES), Chicago, IL, USA - November 9, 2009 Reza Shokri.
University of Minho School of Engineering Algoritmi Centre Uma Escola a Reinventar o Futuro – Semana da Escola de Engenharia - 24 a 27 de Outubro de 2011.
Economic Perspectives in Test Automation: Balancing Automated and Manual Testing with Opportunity Cost Paper By – Rudolf Ramler and Klaus Wolfmaier Presented.
Dept. of Computer Science & Engineering, CUHK1 Trust- and Clustering-Based Authentication Services in Mobile Ad Hoc Networks Edith Ngai and Michael R.
An Authentication Service Against Dishonest Users in Mobile Ad Hoc Networks Edith Ngai, Michael R. Lyu, and Roland T. Chin IEEE Aerospace Conference, Big.
IT Learning Programme The Evaluations Tool Pilot Project 19 th July 2010.
Optimal Adaptation for Statistical Classifiers Xiao Li.
Preventing Spam For SIP-based Sessions and Instant Messages Kumar Srivastava Henning Schulzrinne June 10, 2004.
Distributed Computing Group Cluestr: Mobile Social Networking for Enhanced Group Communication Reto Grob (Swisscom) Michael Kuhn (ETH Zurich) Roger Wattenhofer.
Social Networks: An Introduction to Social Networking and Your Accessible Web Presence Patrick I Smith Webpage/database/Systems Administrator PEPNet-Northeast.
Who’s Viewed You? The Impact of Feedback in a Mobile Location-Sharing Application Date : 2011/09/06 Reporter : Lin Kelly.
Pattern Classification All materials in these slides were taken from Pattern Classification (2nd ed) by R. O. Duda, P. E. Hart and D. G. Stork, John Wiley.
Introduction to Machine Learning Approach Lecture 5.
Community Planning Training 1-1. Community Plan Implementation Training 1- Community Planning Training 1-3.
1 Efficient Management of Data Center Resources for Massively Multiplayer Online Games V. Nae, A. Iosup, S. Podlipnig, R. Prodan, D. Epema, T. Fahringer,
A Survey of Mobile Phone Sensing Michael Ruffing CS 495.
Evaluation of Math-Science Partnership Projects (or how to find out if you’re really getting your money’s worth)
Introduction to Standard 2: Partnering with consumers Advice Centre Network Meeting Nicola Dunbar October 2012.
Towards Appraising Online Stores SEPI Research Group, Department of Computer Science and AI University of Malta 1 CSAW 2004 Towards Appraising Online Stores.
BIG BIKE DATA: HOW GPS ROUTE DATA COLLECTED FROM SMARTPHONES CAN BENEFIT BICYCLE PLANNING MEYER, 2013 UNIVERSITY OF TEXAS AT AUSTIN 1.
Towards Ad-hoc Situation Determination Graham Thomson, Paddy Nixon and Sotirios Terzis.
HAPORI: CONTEXT-BASED LOCAL SEARCH FOR MOBILE PHONES USING COMMUNITY BEHAVIORAL MODELING AND SIMILARITY Presented By: Brandon Ochs Nicholas D. Lane, Dimitrios.
Integrated Social and Quality of Service Trust Management of Mobile Groups in Ad Hoc Networks Ing-Ray Chen, Jia Guo, Fenye Bao, Jin-Hee Cho Communications.
What’s cooking at Sponsorium Miami, February 10, 2015.
Saving lives, changing minds. RAMP Rapid Mobile Phone-based (RAMP) System and Data Management System Community health offsite meeting Geneva,
Boosting Neural Networks Published by Holger Schwenk and Yoshua Benggio Neural Computation, 12(8): , Presented by Yong Li.
1 Engineering & Public Policy The Privacy and Security Behaviors of Smartphone App Developers Rebecca Balebako, Abigail Marsh, Jialiu Lin, Jason Hong,
DETECTING SPAMMERS AND CONTENT PROMOTERS IN ONLINE VIDEO SOCIAL NETWORKS Fabrício Benevenuto ∗, Tiago Rodrigues, Virgílio Almeida, Jussara Almeida, and.
FACEBOOK PRIVACY CONCERNS Presenter: Anquin C. Cooper Based on the Article: Facebook In Privacy Breach By: Geoffrey A. Fowler.
Utilizing social context for providing personalized services to mobile users A EuroSSC 2010 presentation Athanasios Karapantelakis and Gerald Q. Maguire.
Privacy-Preserving Optimal Meeting Location Determination on Mobile Devices Igor Bilogrevic, Member, IEEE, Murtuza Jadliwala, Member, IEEE, Vishal Joneja,
1 Adaptable applications Towards Balancing Network and Terminal Resources to Improve Video Quality D. Jarnikov.
Introduction 1. Purpose of the Chapter 2. Institutional arrangements Country Practices 3. Legal framework Country Practices 4. Preliminary conclusions.
1 TC’s Data Requirements for General Aviation: Implications for Flight Schools Air Transport Association of Canada 2010 Annual General Meeting Vancouver,
BEHAVIORAL TARGETING IN ON-LINE ADVERTISING: AN EMPIRICAL STUDY AUTHORS: JOANNA JAWORSKA MARCIN SYDOW IN DEFENSE: XILING SUN & ARINDAM PAUL.
How Useful are Your Comments? Analyzing and Predicting YouTube Comments and Comment Ratings Stefan Siersdorfer, Sergiu Chelaru, Wolfgang Nejdl, Jose San.
1 © 2007 Nokia Masters Thesis Seminar.ppt / / CK Automated testing of congestion within the UMTS cellular network Masters’ Thesis Seminar Claes.
Information Security Audit Tool Presented by Bandar Almarashi Supervisor by Dr. Neville Williams.
Multiworld Testing Machine Learning for Contextual Decision-Making.
1 Service Sharing with Trust in Pervasive Environment: Now it’s Time to Break the Jinx Sheikh I. Ahamed, Munirul M. Haque and Nilothpal Talukder Ubicomp.
OCLC Online Computer Library Center 1 Making a Library Funding or Policy Request.
THE CHALLENGE TO BE ETHICAL IN EVALUATIONTHE CHALLENGE TO BE ETHICAL IN EVALUATION Dr John Donnelly | Dr Alana Hulme ChambersDr John Donnelly | Dr Alana.
PRIVATE INFORMATION EXPOSURE IN ONLINE SOCIAL NETWORKS WITH IOS, ANDROID AND SYMBIAN MOBILE DEVICES Security and Cooperation in Wireless Networks Laboratory.
Identifying “Best Bet” Web Search Results by Mining Past User Behavior Author: Eugene Agichtein, Zijian Zheng (Microsoft Research) Source: KDD2006 Reporter:
A Framework for Detection and Measurement of Phishing Attacks Reporter: Li, Fong Ruei National Taiwan University of Science and Technology 2/25/2016 Slide.
Don’t Follow me : Spam Detection in Twitter January 12, 2011 In-seok An SNU Internet Database Lab. Alex Hai Wang The Pensylvania State University International.
Nikolai Frederik Severin Grundtvig Transnational Projects Differences 1.Language 2.Education system and target groups 3.Culture /tradition.
Exploring Social Influence via Posterior Effect of Word-of-Mouth Recommendations Junming Huang, Xue-Qi Cheng, Hua-Wei Shen, Tao Zhou, Xiaolong Jin WSDM.
Workshop on Passenger Mobility Conclusions. EU data requirements – DG MOVE  Environmental, economic and social considerations require close monitoring.
Twitter as a Corpus for Sentiment Analysis and Opinion Mining
Vision: Sustainable development for Cambodia. 1.Member Satisfaction Survey Result 2.CCC Digital Platform 3.Practice of NGO database New Interface 4.Q&A.
Sarah Manuel Final Presentation MCO435-Social Media.
Digital Interventions for Sustainable Urban Mobility: A Pilot Study Silvia Gabrielli CREATE-NET Via Alla Cascata, 56/D Trento, Italy
1 Auditing Your Fusion Center Privacy Policy. 22 Recommendations to the program resulting in improvements Updates to privacy documentation Informal discussions.
고려대학교 산업경영공학과 IMEN 315 인간공학 1. INTRODUCTION. 고려대학교 산업경영공학과 IMEN 315 인간공학.
Presented By Siddartha Ailuri Graduate Student, EECS 04/07/17
Dieudo Mulamba November 2017
Martin Rajman, EPFL Switzerland & Martin Vesely, CERN Switzerland
An Improved Neural Network Algorithm for Classifying the Transmission Line Faults Slavko Vasilic Dr Mladen Kezunovic Texas A&M University.
Privacy Protection for Social Network Services
1. INTRODUCTION.
Kostas Kolomvatsos, Christos Anagnostopoulos
Presentation transcript:

Adaptive Information-Sharing for Privacy-Aware Mobile Social Network Igor Bilogrevic 1, Kévin Huguenin 1, Berker Agir 1, Murtuza Jadliwala 2 and Jean-Pierre Hubaux 1, EPFL-IC-LCA1 Switzerland 2, Wichita State University USA UbiComp 2013

Outline INTRODUCTION RELATED WORK THE SPISM INFORMATION-SHARING PLATFORM STUDY AND DATA COLLECTION ANALYSIS AND EVALUATION MACHINE LEARNING CONCLUSION AND FUTURE WORK

INTRODUCTION(1/2) The recurrent finding of contextual information-sharing in UbiComp studies: – Users are not particularly good at effectively articulating their information-sharing policies. – Sharing policies evolve over time Machine learning – Context, user-burden trade-off and privacy

INTRODUCTION(2/2) The contribution of this work: – Developing a novel information-sharing system(SPISM) – Conducting a personalized online study involving 70 participants – Evaluating SPISM with respect to the amount of training data

RELATED WORK(1/2) Contextual Information Sharing and Privacy – Increasing the flexibility of the decision making process – Evaluation – Optimizing automated information-sharing mechanisms

RELATED WORK(2/2) Machine Learning and Information Sharing – Feedback in the learning mechanism – Decision behavior can change over time – Extract social groups or communities

THE SPISM INFORMATION-SHARING PLATFORM(1/4) Two subscribers(users, third-party online services or mobile apps) to SPISM: – Requester, who wants to know something about other subscribers by sending information requests – Target, who receives requests for information The information – Contextual data – Time-schedule availability

THE SPISM INFORMATION-SHARING PLATFORM(2/4)

THE SPISM INFORMATION-SHARING PLATFORM(3/4) Decision making – In order to make the decision, several contextual features are taken into account by the target device(social ties, current location, activity…)

THE SPISM INFORMATION-SHARING PLATFORM(4/4)

STUDY AND DATA COLLECTION Participants – Between 18 and 80 – With an active Facebook with at least 50 friends – Using a smartphone Online survey – 19 fixed questions – 75 personalized questions

ANALYSIS AND EVALUATION(1/3) Results – Using descriptive statistics of the survey questionnaire – Comparing the performance of the SPISM automated decision-making process – Discussing the effects of the increase of user- involvement on the performance of SPISM

ANALYSIS AND EVALUATION(2/3)

ANALYSIS AND EVALUATION(3/3)

MACHINE LEARNING(1/2) use the survey data comprised of 75 scenarios for each of the 70 participants – match the user’s decision Training – Users make n decisions and classifier makes remaining decisions – Representing the burden of the user as she has to manually make the corresponding decisions

MACHINE LEARNING(2/2) Training + Learning – active learning can be used to improve the correctness of the sharing decisions while maintaining a significantly lower over-sharing rate

CONCLUSION AND FUTURE WORK SPISM significantly outperforms both individual and general user-defined sharing policies Slight bias towards incorrectly sharing the information Showing that the type of the requested information, in addition to the social ties of the requester, is an influential feature in the decision process.