Login / Signup
Protecting your daily in-home activity information from a wireless snooping attack.
Vijay Srinivasan
John A. Stankovic
Kamin Whitehouse
Published in:
UbiComp (2008)
Keyphrases
</>
information processing
end users
computer systems
structural information
daily activities
data sets
social networks
prior knowledge
domain knowledge
semantic information
activity recognition
mobile terminals
information leakage