Unauthorized Microphone Access Restraint Based on User Behavior Perception in Mobile Devices.
Wenbin HuangWenjuan TangHanyuan ChenHongbo JiangYaoxue ZhangPublished in: IEEE Trans. Mob. Comput. (2024)
Keyphrases
- user behavior
- mobile internet
- mobile devices
- user interaction
- user preferences
- user actions
- user experience
- web usage mining
- mobile phone
- mobile applications
- physical location
- internet access
- implicit feedback
- context aware
- user activities
- mobile users
- online advertising
- individual user
- user browsing
- log analysis
- search behavior
- smart phones
- access control
- user intent
- information retrieval systems
- user interface
- data mining