{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,25]],"date-time":"2026-02-25T17:11:44Z","timestamp":1772039504693,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":27,"publisher":"ACM","license":[{"start":{"date-parts":[[2013,11,4]],"date-time":"2013-11-04T00:00:00Z","timestamp":1383523200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2013,11,4]]},"DOI":"10.1145\/2517840.2517842","type":"proceedings-article","created":{"date-parts":[[2013,11,12]],"date-time":"2013-11-12T15:29:36Z","timestamp":1384270176000},"page":"179-188","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":16,"title":["Inferring social ties in academic networks using short-range wireless communications"],"prefix":"10.1145","author":[{"given":"Igor","family":"Bilogrevic","sequence":"first","affiliation":[{"name":"EPFL, Lausanne, Switzerland"}]},{"given":"K\u00e9vin","family":"Huguenin","sequence":"additional","affiliation":[{"name":"EPFL, Lausanne, Switzerland"}]},{"given":"Murtuza","family":"Jadliwala","sequence":"additional","affiliation":[{"name":"Wichita State University, Wichita, USA"}]},{"given":"Florent","family":"Lopez","sequence":"additional","affiliation":[{"name":"Universit\u00e9 Paul Sabatier\/IRIT, Toulouse, France"}]},{"given":"Jean-Pierre","family":"Hubaux","sequence":"additional","affiliation":[{"name":"EPFL, Lausanne, Switzerland"}]},{"given":"Philip","family":"Ginzboorg","sequence":"additional","affiliation":[{"name":"Aalto University, Espoo, Finland"}]},{"given":"Valtteri","family":"Niemi","sequence":"additional","affiliation":[{"name":"University of Turku, Turku, Finland"}]}],"member":"320","published-online":{"date-parts":[[2013,11,4]]},"reference":[{"key":"e_1_3_2_1_2_1","first-page":"716","article-title":"A New Look at the Statistical Model Identification","volume":"19","author":"Akaike H.","year":"1974","unstructured":"H. Akaike . A New Look at the Statistical Model Identification . IEEE TAC , 19 : 716 -- 723 , 1974 . H. Akaike. A New Look at the Statistical Model Identification. IEEE TAC, 19:716--723, 1974.","journal-title":"IEEE TAC"},{"issue":"1","key":"e_1_3_2_1_3_1","article-title":"Estimating social graphs in an education environment","volume":"7","author":"Banford J.","year":"2012","unstructured":"J. Banford and J. Irvine . Estimating social graphs in an education environment . IEEE VT Mag. , 7 ( 1 ), 2012 . J. Banford and J. Irvine. Estimating social graphs in an education environment. IEEE VT Mag., 7(1), 2012.","journal-title":"IEEE VT Mag."},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1109\/MPRV.2003.1186725"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-31205-2_23"},{"key":"e_1_3_2_1_6_1","volume-title":"NDSS","author":"Bindschaedler L.","year":"2012","unstructured":"L. Bindschaedler , M. Jadliwala , I. Bilogrevic , I. Aad , P. Ginzboorg , V. Niemi , and J. Hubaux . Track me if you can: On the effectiveness of context-based identifier changes in deployed mobile networks . In NDSS , 2012 . L. Bindschaedler, M. Jadliwala, I. Bilogrevic, I. Aad, P. Ginzboorg, V. Niemi, and J. Hubaux. Track me if you can: On the effectiveness of context-based identifier changes in deployed mobile networks. In NDSS, 2012."},{"key":"e_1_3_2_1_7_1","first-page":"892","volume":"323","author":"Borgatti S. P.","year":"2009","unstructured":"S. P. Borgatti , A. Mehra , D. J. Brass , and G. Labianca . Network Analysis in the Social Sciences. Science , 323 : 892 -- 895 , 2009 . S. P. Borgatti, A. Mehra, D. J. Brass, and G. Labianca. Network Analysis in the Social Sciences. Science, 323:892--895, 2009.","journal-title":"Network Analysis in the Social Sciences. Science"},{"key":"e_1_3_2_1_8_1","volume-title":"ICICS","author":"Bose A.","year":"2007","unstructured":"A. Bose and C. Foh . A Practical Path Loss Model for Indoor WiFi Positioning Enhancement . In ICICS , 2007 . A. Bose and C. Foh. A Practical Path Loss Model for Indoor WiFi Positioning Enhancement. In ICICS, 2007."},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1073\/pnas.1006155107"},{"key":"e_1_3_2_1_10_1","unstructured":"C. Diot. Haggle Project. http:\/\/www.haggleproject.org\/. Last visited 13\/Mar\/2013.  C. Diot. Haggle Project. http:\/\/www.haggleproject.org\/. Last visited 13\/Mar\/2013."},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1007\/s00779-005-0046-3"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1073\/pnas.0900282106"},{"key":"e_1_3_2_1_13_1","unstructured":"Femto Forum. http:\/\/femtoforum.org\/fem2\/pressreleases.php?id=277 Last visited 13\/Mar\/2013.  Femto Forum. http:\/\/femtoforum.org\/fem2\/pressreleases.php?id=277 Last visited 13\/Mar\/2013."},{"key":"e_1_3_2_1_14_1","unstructured":"FON. http:\/\/corp.fon.com\/en. Last visited 13\/Mar\/2013.  FON. http:\/\/corp.fon.com\/en. Last visited 13\/Mar\/2013."},{"key":"e_1_3_2_1_15_1","first-page":"486","article-title":"Community Detection","author":"Fortunato S.","year":"2010","unstructured":"S. Fortunato . Community Detection in Graphs. Physics Reports , 486 , 2010 . S. Fortunato. Community Detection in Graphs. Physics Reports, 486, 2010.","journal-title":"Graphs. Physics Reports"},{"key":"e_1_3_2_1_16_1","unstructured":"Map of FreeWifi Hotspots. http:\/\/iphone.r0ro.fr\/fwConnect\/map.php Visited on 01\/Nov\/2012.  Map of FreeWifi Hotspots. http:\/\/iphone.r0ro.fr\/fwConnect\/map.php Visited on 01\/Nov\/2012."},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.5555\/1926743.1926753"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1109\/MPRV.2006.69"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1073\/pnas.0811973106"},{"key":"e_1_3_2_1_20_1","volume-title":"ICPS","author":"Kiukkonen N.","year":"2010","unstructured":"N. Kiukkonen , J. Blom , O. Dousse , D. Gatica-Perez , and J. Laurila . Towards Rich Mobile Phone Datasets: Lausanne Data Collection Campaign . In ICPS , 2010 . N. Kiukkonen, J. Blom, O. Dousse, D. Gatica-Perez, and J. Laurila. Towards Rich Mobile Phone Datasets: Lausanne Data Collection Campaign. In ICPS, 2010."},{"key":"e_1_3_2_1_21_1","volume-title":"IJCAI","author":"Matsuo Y.","year":"2007","unstructured":"Y. Matsuo , N. Okazaki , K. Izumi , Y. Nakamura , T. Nishimura , and K. Hasida . Inferring Long-term User Property based on Users . In IJCAI , 2007 . Y. Matsuo, N. Okazaki, K. Izumi, Y. Nakamura, T. Nishimura, and K. Hasida. Inferring Long-term User Property based on Users. In IJCAI, 2007."},{"key":"e_1_3_2_1_22_1","unstructured":"A Definitive List of NFC Phones. http:\/\/www.nfcworld.com\/nfc-phones-list\/ Last visited 13\/Mar\/2013.  A Definitive List of NFC Phones. http:\/\/www.nfcworld.com\/nfc-phones-list\/ Last visited 13\/Mar\/2013."},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1007\/11915034_112"},{"key":"e_1_3_2_1_24_1","first-page":"435","author":"Palla G.","year":"2005","unstructured":"G. Palla , I. Der\u00e9nyi , I. Farkas , and T. Vicsek . Uncovering the Overlapping Community Structure of Complex Networks in Nature and Society. Nature , 435 , 2005 . G. Palla, I. Der\u00e9nyi, I. Farkas, and T. Vicsek. Uncovering the Overlapping Community Structure of Complex Networks in Nature and Society. Nature, 435, 2005.","journal-title":"Nature"},{"key":"e_1_3_2_1_25_1","unstructured":"Qualcomm AllJoin. https:\/\/developer.qualcomm.com\/develop\/mobile-technologies\/peer-peer-alljoyn Last visited 13\/Mar\/2013.  Qualcomm AllJoin. https:\/\/developer.qualcomm.com\/develop\/mobile-technologies\/peer-peer-alljoyn Last visited 13\/Mar\/2013."},{"key":"e_1_3_2_1_26_1","unstructured":"SFR Carte Wifi. http:\/\/cartewifi.sfr.fr Last visited 13\/Mar\/2013.  SFR Carte Wifi. http:\/\/cartewifi.sfr.fr Last visited 13\/Mar\/2013."},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1002\/sec.149"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1109\/ASONAM.2009.42"}],"event":{"name":"CCS'13: 2013 ACM SIGSAC Conference on Computer and Communications Security","location":"Berlin Germany","acronym":"CCS'13","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"]},"container-title":["Proceedings of the 12th ACM workshop on Workshop on privacy in the electronic society"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2517840.2517842","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2517840.2517842","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T07:34:14Z","timestamp":1750232054000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2517840.2517842"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013,11,4]]},"references-count":27,"alternative-id":["10.1145\/2517840.2517842","10.1145\/2517840"],"URL":"https:\/\/doi.org\/10.1145\/2517840.2517842","relation":{},"subject":[],"published":{"date-parts":[[2013,11,4]]},"assertion":[{"value":"2013-11-04","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}