{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,25]],"date-time":"2026-03-25T14:41:20Z","timestamp":1774449680649,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":35,"publisher":"ACM","license":[{"start":{"date-parts":[[2014,8,11]],"date-time":"2014-08-11T00:00:00Z","timestamp":1407715200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2014,8,11]]},"DOI":"10.1145\/2632951.2632953","type":"proceedings-article","created":{"date-parts":[[2014,8,1]],"date-time":"2014-08-01T20:13:39Z","timestamp":1406924019000},"page":"43-52","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":107,"title":["All your location are belong to us"],"prefix":"10.1145","author":[{"given":"Muyuan","family":"Li","sequence":"first","affiliation":[{"name":"State University of New York at Buffalo, Amherst, NY, USA"}]},{"given":"Haojin","family":"Zhu","sequence":"additional","affiliation":[{"name":"Shanghai Jiao Tong University, Shanghai, China"}]},{"given":"Zhaoyu","family":"Gao","sequence":"additional","affiliation":[{"name":"Shanghai Jiao Tong University, Shanghai, China"}]},{"given":"Si","family":"Chen","sequence":"additional","affiliation":[{"name":"State University of New York at Buffalo, Amherst, NY, USA"}]},{"given":"Le","family":"Yu","sequence":"additional","affiliation":[{"name":"Shanghai Jiao Tong University, Shanghai, China"}]},{"given":"Shangqian","family":"Hu","sequence":"additional","affiliation":[{"name":"Shanghai Jiao Tong University, Shanghai, China"}]},{"given":"Kui","family":"Ren","sequence":"additional","affiliation":[{"name":"State University of New York at Buffalo, Amherst, NY, USA"}]}],"member":"320","published-online":{"date-parts":[[2014,8,11]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1145\/2508859.2516735"},{"key":"e_1_3_2_1_2_1","unstructured":"Apk Apps. Skout 3.4.3 Apk -- Meet Chat Friend. http:\/\/www.apk4.net\/applications\/social-applications\/skout-3-4-3-apk-meet-chat-friend\/.  Apk Apps. Skout 3.4.3 Apk -- Meet Chat Friend. http:\/\/www.apk4.net\/applications\/social-applications\/skout-3-4-3-apk-meet-chat-friend\/."},{"key":"e_1_3_2_1_3_1","unstructured":"Apple. Location Awareness Programming Guide. http:\/\/developer.apple.com\/library\/ios\/#documentation\/userexperience\/conceptual\/LocationAwarenessPG\/CoreLocation\/CoreLocation.html.  Apple. Location Awareness Programming Guide. http:\/\/developer.apple.com\/library\/ios\/#documentation\/userexperience\/conceptual\/LocationAwarenessPG\/CoreLocation\/CoreLocation.html."},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.5555\/1770560.1770566"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2009.25"},{"key":"e_1_3_2_1_6_1","unstructured":"Baidu. FAQ - Geolocation. http:\/\/developer.baidu.com\/map\/geosdk-android-qa.htm.  Baidu. FAQ - Geolocation. http:\/\/developer.baidu.com\/map\/geosdk-android-qa.htm."},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1109\/MPRV.2003.1186725"},{"key":"e_1_3_2_1_8_1","volume-title":"NDSS'12","author":"Bindschaedler L.","year":"2012","unstructured":"L. Bindschaedler , M. Jadliwala , I. Bilogrevic , I. Aad , P. Ginzboorg , V. Niemi , and J.-P. Hubaux . Track me if you can: on the effectiveness of context-based identifier changes in deployed mobile networks . In NDSS'12 , 2012 . L. Bindschaedler, M. Jadliwala, I. Bilogrevic, I. Aad, P. Ginzboorg, V. Niemi, and J.-P. Hubaux. Track me if you can: on the effectiveness of context-based identifier changes in deployed mobile networks. In NDSS'12, 2012."},{"key":"e_1_3_2_1_9_1","article-title":"Traffic signature-based mobile device location authentication","author":"Brassil J.","year":"2013","unstructured":"J. Brassil , P. Manadhata , and R. Netravali . Traffic signature-based mobile device location authentication . IEEE Transactions on Mobile Computing , 2013 . J. Brassil, P. Manadhata, and R. Netravali. Traffic signature-based mobile device location authentication. IEEE Transactions on Mobile Computing, 2013.","journal-title":"IEEE Transactions on Mobile Computing"},{"key":"e_1_3_2_1_10_1","unstructured":"CNET. How Skout attracted millions with its flirty ways. http:\/\/news.cnet.com\/8301-1035_3-57407367-94\/how-skout-attracted-millions-with-its-flirty-ways\/.  CNET. How Skout attracted millions with its flirty ways. http:\/\/news.cnet.com\/8301-1035_3-57407367-94\/how-skout-attracted-millions-with-its-flirty-ways\/."},{"key":"e_1_3_2_1_11_1","unstructured":"Craig Smith. How Many People Use the Top Social Media Apps & Services? http:\/\/expandedramblings.com\/index.php\/resource-how-many-people-use-the-top-social-media\/.  Craig Smith. How Many People Use the Top Social Media Apps & Services? http:\/\/expandedramblings.com\/index.php\/resource-how-many-people-use-the-top-social-media\/."},{"key":"e_1_3_2_1_12_1","volume-title":"Unique in the crowd: The privacy bounds of human mobility. Scientific reports, 3","author":"de Montjoye Y.-A.","year":"2013","unstructured":"Y.-A. de Montjoye , C. A. Hidalgo , M. Verleysen , and V. D. Blondel . Unique in the crowd: The privacy bounds of human mobility. Scientific reports, 3 , 2013 . Y.-A. de Montjoye, C. A. Hidalgo, M. Verleysen, and V. D. Blondel. Unique in the crowd: The privacy bounds of human mobility. Scientific reports, 3, 2013."},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-03168-7_13"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICDCS.2005.48"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-01516-8_26"},{"key":"e_1_3_2_1_16_1","unstructured":"Google. Location Source and Accuracy. http:\/\/support.google.com\/gmm\/bin\/ans-wer.py?answer=81873.  Google. Location Source and Accuracy. http:\/\/support.google.com\/gmm\/bin\/ans-wer.py?answer=81873."},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1145\/1066116.1189037"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1145\/1315245.1315266"},{"key":"e_1_3_2_1_19_1","volume-title":"ACSAC'12","author":"Iasonas M.","year":"2012","unstructured":"M. Iasonas , F. George , A. Sotiris , and S. Zanero . All your face are belong to us: Breaking facebook's social authentication . In ACSAC'12 , 2012 . M. Iasonas, F. George, A. Sotiris, and S. Zanero. All your face are belong to us: Breaking facebook's social authentication. In ACSAC'12, 2012."},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1145\/1132905.1132933"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1145\/1859995.1860017"},{"key":"e_1_3_2_1_22_1","unstructured":"Manila Standard Today. Whats APP? WeChat. http:\/\/manilastandardtoday.com\/2013\/04\/06\/whats-app\/.  Manila Standard Today. Whats APP? WeChat. http:\/\/manilastandardtoday.com\/2013\/04\/06\/whats-app\/."},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1145\/1614320.1614358"},{"key":"e_1_3_2_1_24_1","volume-title":"NDSS'11","author":"Narayanan A.","year":"2011","unstructured":"A. Narayanan , N. Thiagarajan , M. Lakhani , M. Hamburg , and D. Boneh . Location privacy via private proximity testing . In NDSS'11 , 2011 . A. Narayanan, N. Thiagarajan, M. Lakhani, M. Hamburg, and D. Boneh. Location privacy via private proximity testing. In NDSS'11, 2011."},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1145\/1514411.1514414"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1109\/MC.2003.1250896"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2011.18"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1145\/2382196.2382261"},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1126\/science.1177170"},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1145\/2382196.2382262"},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1145\/1653662.1653704"},{"key":"e_1_3_2_1_32_1","volume-title":"Accuracy of iphone locations: A comparison of assisted gps, wifi and cellular positioning. Transactions in GIS, 13(s1):5--25","author":"Zandbergen P. A.","year":"2009","unstructured":"P. A. Zandbergen . Accuracy of iphone locations: A comparison of assisted gps, wifi and cellular positioning. Transactions in GIS, 13(s1):5--25 , 2009 . P. A. Zandbergen. Accuracy of iphone locations: A comparison of assisted gps, wifi and cellular positioning. Transactions in GIS, 13(s1):5--25, 2009."},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1145\/2030613.2030630"},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-33167-1_21"},{"key":"e_1_3_2_1_35_1","unstructured":"Zhu Feng. Momo Announced Number of Users Exceeded 30 Million Active 450 Million. http:\/\/tech.ifeng.com\/mi\/detail_2013_03\/13\/23047454_0.shtml.  Zhu Feng. Momo Announced Number of Users Exceeded 30 Million Active 450 Million. http:\/\/tech.ifeng.com\/mi\/detail_2013_03\/13\/23047454_0.shtml."}],"event":{"name":"MobiHoc'14: The Fifteenth ACM International Symposium on Mobile Ad Hoc Networking and Computing","location":"Philadelphia Pennsylvania USA","acronym":"MobiHoc'14","sponsor":["SIGMOBILE ACM Special Interest Group on Mobility of Systems, Users, Data and Computing"]},"container-title":["Proceedings of the 15th ACM international symposium on Mobile ad hoc networking and computing"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2632951.2632953","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2632951.2632953","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T07:01:08Z","timestamp":1750230068000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2632951.2632953"}},"subtitle":["breaking mobile social networks for automated user location tracking"],"short-title":[],"issued":{"date-parts":[[2014,8,11]]},"references-count":35,"alternative-id":["10.1145\/2632951.2632953","10.1145\/2632951"],"URL":"https:\/\/doi.org\/10.1145\/2632951.2632953","relation":{},"subject":[],"published":{"date-parts":[[2014,8,11]]},"assertion":[{"value":"2014-08-11","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}