Recent years have witnessed the emergence and rapid growth of pervasive computing technologies such as mobile ad hoc networks, radio frequency identification (RFID), Wi-Fi etc. Many researches are proposed to provide services while hiding the comp...
Businesses and organizations such as retail stores, airports, and hospitals have begun to leverage the recent advances in localization technology to provide quality location-based services to their customers. Beacons are one example of this techno...
Managing access control policies can be a daunting process, given the frequent policy decisions that need to be made, and the potentially large number of policy rules involved. Policy management includes, but is not limited to: policy optimization...
Managing access control policies can be a daunting process, given the frequent policy decisions that need to be made, and the potentially large number of policy rules involved. Policy management includes, but is not limited to: policy optimization...
Third-party mobile applications have become an essential component of modernecosystems such as Android and iOS. The number of these applications has growntremendously in recent years, for instance, the number of Android applications inthe market i...
Third-party mobile applications have become an essential component of modernecosystems such as Android and iOS. The number of these applications has growntremendously in recent years, for instance, the number of Android applications inthe market i...
Bluetooth Low Energy (BLE) beacons are widely adopted in a vast range of industries involving the Internet of things (IoT). BLE is primarily used for indoor location estimation. It is often utilized to provide contextual information with low energ...
Social networks are of significant importance in various application domains. Understanding the general properties of real social networks has gained much attention due to the proliferation of networked data. Many applications of networks such as ...
Social networks are of significant importance in various application domains. Understanding the general properties of real social networks has gained much attention due to the proliferation of networked data. Many applications of networks such as ...
This article presents two methods, REVAMPT and CARPe Posterum. REVAMPT, or Real-time Edge Video Analytics for Multi-person Privacy-aware Tracking, is an integrated system for privacy-built-in pedestrian re-identification. REVAMPT presents novel al...
The information visualization pipeline serves as a lossy communication channel for presentation of data on a screen-space of limited resolution. The lossy communication is not just a machine-only phenomenon due to information loss caused by transl...
"Interpersonal boundary regulation" is a way to optimize social interactions when sharing and connecting through Social Networking Sites (SNSs). The theoretical foundation of much of my research comes from Altman's work on privacy management in th...