Author image not provided
 Jason Polakis

Authors:
Add personal information
  Affiliation history
Bibliometrics: publication history
Average citations per article0.20
Citation Count1
Publication count5
Publication years2016-2017
Available for download5
Average downloads per article73.40
Downloads (cumulative)367
Downloads (12 Months)324
Downloads (6 Weeks)41
SEARCH
ROLE
Arrow RightAuthor only


AUTHOR'S COLLEAGUES
See all colleagues of this author




BOOKMARK & SHARE


5 results found Export Results: bibtexendnoteacmrefcsv

Result 1 – 5 of 5
Sort by:

1 published by ACM
November 2017 AISec '17: Proceedings of the 10th ACM Workshop on Artificial Intelligence and Security
Publisher: ACM
Bibliometrics:
Citation Count: 0
Downloads (6 Weeks): 9,   Downloads (12 Months): 35,   Downloads (Overall): 35

Full text available: PDFPDF
Captchas have become almost ubiquitous as they are commonly deployed by websites as part of their defenses against fraudsters. However visual captchas pose a considerable obstacle to certain groups of users, such as the visually impaired, and that has necessitated the inclusion of more accessible captcha schemes. As a result, ...
Keywords: audio captchas, captcha solving, speech recognition

2 published by ACM
July 2017 ASONAM '17: Proceedings of the 2017 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining 2017
Publisher: ACM
Bibliometrics:
Citation Count: 0
Downloads (6 Weeks): 9,   Downloads (12 Months): 10,   Downloads (Overall): 10

Full text available: PDFPDF
Content selection in social networks is driven by numerous extraneous factors that can result in the loss of content of interest. In this paper we present Reveal, a fine-grained recommender system for social networks, designed to recommend media content posted by the user's friends. The intuition is to leverage the ...

3 published by ACM
June 2017 MobiSys '17: Proceedings of the 15th Annual International Conference on Mobile Systems, Applications, and Services
Publisher: ACM
Bibliometrics:
Citation Count: 1
Downloads (6 Weeks): 7,   Downloads (12 Months): 69,   Downloads (Overall): 69

Full text available: PDFPDF
The proliferation of mobile devices, equipped with numerous sensors and Internet connectivity, has laid the foundation for the emergence of a diverse set of crowdsourcing services. By leveraging the multitude, geographical dispersion, and technical abilities of smartphones, these services tackle challenging tasks by harnessing the power of the crowd . ...
Keywords: ble tags, user tracking, location privacy, location-based services, privacy-preserving protocol, crowd gps

4 published by ACM
February 2017 ACM Transactions on Privacy and Security (TOPS): Volume 19 Issue 4, February 2017
Publisher: ACM
Bibliometrics:
Citation Count: 0
Downloads (6 Weeks): 13,   Downloads (12 Months): 134,   Downloads (Overall): 134

Full text available: PDFPDF
Location-based services have become an integral part of everyday life. To address the privacy issues that emerge from the use and sharing of location information, social networks and smartphone applications have adopted location proximity schemes as a means of balancing user privacy with utility. Unfortunately, despite the extensive academic literature ...
Keywords: spatial cloaking, location proximity, Location-based services, location privacy, user discovery attacks

5 published by ACM
October 2016 WPES '16: Proceedings of the 2016 ACM on Workshop on Privacy in the Electronic Society
Publisher: ACM
Bibliometrics:
Citation Count: 0
Downloads (6 Weeks): 3,   Downloads (12 Months): 76,   Downloads (Overall): 119

Full text available: PDFPDF
Recent incidents have once again brought the topic of encryption to public discourse, while researchers continue to demonstrate attacks that highlight the difficulty of implementing encryption even without the presence of "backdoors". However, apart from the threat of implementation flaws in encryption libraries, another significant threat arises when web services ...
Keywords: HTTP strict transport security, HTTPs, privacy, web security, HTTPs everywhere, eavesdropping



The ACM Digital Library is published by the Association for Computing Machinery. Copyright © 2018 ACM, Inc.
Terms of Usage   Privacy Policy   Code of Ethics   Contact Us