Table of Contents Author Guidelines Submit a Manuscript
Mobile Information Systems
Volume 2016 (2016), Article ID 6804379, 10 pages
http://dx.doi.org/10.1155/2016/6804379
Research Article

How Dangerous Are Your Smartphones? App Usage Recommendation with Privacy Preserving

1School of Information and Communication Engineering, Beijing University of Posts and Telecommunications, Beijing 100876, China
2Dipartimento di Elettronica e Informazione, Politecnico di Milano, 20133 Milano, Italy

Received 30 December 2015; Revised 31 March 2016; Accepted 24 May 2016

Academic Editor: Mea Wang

Copyright © 2016 Konglin Zhu et al. This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

Linked References

  1. B. Yan and G. Chen, “AppJoy: personalized mobile application discovery,” in Proceedings of the 9th International Conference on Mobile Systems, Applications, and Services (MobiSys '11), pp. 113–126, ACM, Washington, DC, USA, July 2011. View at Publisher · View at Google Scholar · View at Scopus
  2. K. Yu, B. Zhang, H. Zhu, H. Cao, and J. Tian, “Towards personalized context-aware recommendation by mining context logs through topic models,” in Advances in Knowledge Discovery and Data Mining: 16th Pacific-Asia Conference, PAKDD 2012, Kuala Lumpur, Malaysia, May 29-June 1, 2012, Proceedings, Part I, vol. 7301 of Lecture Notes in Computer Science, pp. 431–443, Springer, Berlin, Germany, 2012. View at Publisher · View at Google Scholar
  3. H. Zhu, E. Chen, H. Xiong, K. Yu, H. Cao, and J. Tian, “Mining mobile user preferences for personalized context-aware recommendation,” ACM Transactions on Intelligent Systems and Technology, vol. 5, no. 4, article 58, 2015. View at Publisher · View at Google Scholar
  4. H. Zhu, H. Xiong, Y. Ge, and E. Chen, “Mobile app recommendations with security and privacy awareness,” in Proceedings of the 20th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining (KDD '14), pp. 951–960, ACM, New York, NY, USA, August 2014. View at Publisher · View at Google Scholar · View at Scopus
  5. A. P. Felt, E. Chin, S. Hanna, D. Song, and D. Wagner, “Android permissions demystified,” in Proceedings of the 18th ACM Conference on Computer and Communications Security (CCS '11), pp. 627–638, ACM, Chicago, Ill, USA, October 2011. View at Publisher · View at Google Scholar · View at Scopus
  6. K. W. Y. Au, Y. F. Zhou, Z. Huang, P. Gill, and D. Lie, “Short paper: a look at smartphone permission models,” in Proceedings of the 1st ACM Workshop on Security and Privacy in Smartphones and Mobile Devices (SPSM ’11), pp. 63–67, ACM, October 2011. View at Publisher · View at Google Scholar · View at Scopus
  7. W. Enck, P. Gilbert, B.-G. Chun et al., “An information-flow tracking system for realtime privacy monitoring on smartphones,” in Proceedings of the 9th USENIX Conference on Operating Systems Design and Implementation (OSDI '10), pp. 1–6, USENIX Association, Berkeley, Calif, USA, 2010.
  8. Y. Zhou, X. Zhang, X. Jiang, and V. W. Freeh, “Taming information-stealing smartphone applications (on android),” in Proceedings of the 4th International Conference on Trust and Trustworthy Computing (TRUST '11), pp. 93–107, Springer, Pittsburgh, Pa, USA, June 2011.
  9. W. Enck, M. Ongtang, and P. McDaniel, “On lightweight mobile phone application certification,” in Proceedings of the 16th ACM Conference on Computer and Communications Security (CCS '09), pp. 235–245, ACM, Chicago, Ill, USA, November 2009. View at Publisher · View at Google Scholar · View at Scopus
  10. H. Peng, C. Gates, B. Sarma et al., “Using probabilistic generative models for ranking risks of Android apps,” in Proceedings of the ACM Conference on Computer and Communications Security (CCS '12), pp. 241–252, October 2012. View at Publisher · View at Google Scholar · View at Scopus
  11. J. Lin, B. Liu, N. Sadeh, and J. I. Hong, “Modeling users' mobile app privacy preferences: restoring usability in a sea of permission settings,” in Proceedings of the Symposium on Usable Privacy and Security (SOUPS '14), pp. 199–212, USENIX Association, Menlo Park, Calif, USA, July 2014.
  12. R. Liu, J. Cao, L. Yang, and K. Zhang, “PriWe: recommendation for privacy settings of mobile apps based on crowdsourced users' expectations,” in Proceedings of the IEEE International Conference on Mobile Services (MS '15), pp. 150–157, New York City, NY, USA, June 2015. View at Publisher · View at Google Scholar
  13. S. K. Katti and A. V. Rao, “Handbook of the poisson distribution,” Technometrics, vol. 10, no. 2, pp. 412–412, 1968. View at Publisher · View at Google Scholar
  14. D. M. Blei, A. Y. Ng, and M. I. Jordan, “Latent dirichlet allocation,” The Journal of Machine Learning Research, vol. 3, no. 4-5, pp. 993–1022, 2003. View at Google Scholar · View at Scopus