A plain type of mobile attack: Compromise of user's privacy through a simple implementation method.
Iosif AndroulidakisChris BasiosPublished in: COMSWARE (2008)
Keyphrases
- detection method
- objective function
- genetic algorithm
- image sequences
- high precision
- cost function
- dynamic programming
- clustering method
- cloud computing
- high accuracy
- mobile phone
- privacy issues
- neural network
- information loss
- support vector machine
- end users
- computational cost
- mobile devices
- preprocessing
- computational complexity