PROBABILISTIC ASPECT RANKING ALGORITHM FOR PRODUCT ASPECT RANKING AND ITS APPLICATIONS

Product aspect ranking is beneficial to a wide range of real-world applications. The important product aspects are identified based on two observations: 1) the important aspects are usually commented on by a large number of consumers and 2) consumer opinions on the important aspects greatly influence their overall opinions on …

Continue reading

LEVERAGING THE TAIL TIME FOR BATCHING AND PREFETCHING TO REDUCE ENERGY CONSUMPTION IN CELLULAR NETWORKS

In cellular networks, inactivity timers are used to control the release of radio resources. However, considerable radio resources and battery energy are wasted in the tail time. In this abstract, we proposed TailTheft, which leverages the tail time for batching and pre fetching. Our work is the first to consider …

Continue reading

LOCX: A NOVEL APPROACH FOR PRESERVING LOCATION PRIVACY IN GEOSOCIAL APPLICATIONS

In this abstract, we propose LocX (short for location to index mapping), a novel approach to achieving user privacy while maintaining full accuracy in location-based social applications (LBSAs from here on-ward). Our insight is that many services do not need to resolve distance-based queries between arbitrary pairs of users, but …

Continue reading

LOCATION PRIVACY PRESERVING IN GEOSOCIAL APPLICATIONS

In this abstract, we introduce LocX, a novel alternative that provides significantly improved location privacy without adding uncertainty into query results or relying on strong assumptions about server security. Our key insight is to apply secure user-specific, distance-preserving coordinate transformations to all location data shared with the server. The friends …

Continue reading

LOCX: A NOVEL APPROACH FOR PRESERVING LOCATION PRIVACY IN GEOSOCIAL APPLICATIONS

In this abstract, we propose LocX (short for location to index mapping), a novel approach to achieving user privacy while maintaining full accuracy in location-based social applications (LBSAs from here on-ward). Our insight is that many services do not need to resolve distance-based queries between arbitrary pairs of users, but …

Continue reading

TAILTHEFT SCHEME FOR REDUCE ENERGY CONSUMPTION IN CELLULAR NETWORKS

Inactivity timers in cellular networks are used to balance the trade-offs between resource efficiency for enhanced user experience and low management overhead. However, considerable radio resources and battery energy are wasted in the tail time. In this abstract, we proposed TailTheft, which leverages the tail time for batching and pre …

Continue reading

PUBLIC SENTIMENT VARIATIONS ANALYZING ON TWITTER

Twitter has become a social site where millions of users can exchange their opinion. Sentiment analysis on Twitter data has provided an economical and effective way to expose public opinion timely, which is critical for decision making in various domains. In this work, we move one step further to interpret …

Continue reading

HARD AI PROBLEMS BASED CAPTCHA AS GRAPHICAL PASSWORDS SECURITY PRIMITIVE

In this abstract, we introduce a new security primitive based on hard AI problems, namely, a novel family of graphical pass-word systems integrating Captcha technology, which we call CaRP (Captcha as gRaphical Passwords). CaRP is click-based graphical passwords, where a sequence of clicks on an image is used to derive …

Continue reading

TRACKING AND ANALYZING THE PUBLIC SENTIMENT VARIATIONS ON TWITTER

In this abstract, we analyze public sentiment variations on Twitter and mine possible reasons behind such variations. To track public sentiment, we combine two state-of-the-art sentiment analysis tools to obtain sentiment information towards interested targets (e.g., “Obama”) in each tweet. Based on the sentiment label obtained for each tweet, we …

Continue reading

CARP SCHEME FOR SECURITY PRIMITIVE BASED ON HARD AI PROBLEMS

Using hard AI (Artificial Intelligence) problems for security is an exciting new paradigm. Under this paradigm, the most notable primitive invented is Captcha, which distinguishes human users from computers by presenting a challenge, i.e., a puzzle, beyond the capability of computers but easy for humans. Captcha is now a standard …

Continue reading