{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,18]],"date-time":"2025-11-18T12:17:51Z","timestamp":1763468271277,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":45,"publisher":"ACM","license":[{"start":{"date-parts":[[2015,10,12]],"date-time":"2015-10-12T00:00:00Z","timestamp":1444608000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/100000001","name":"National Science Foundation","doi-asserted-by":"publisher","award":["CNS-13-18415"],"award-info":[{"award-number":["CNS-13-18415"]}],"id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2015,10,12]]},"DOI":"10.1145\/2810103.2813605","type":"proceedings-article","created":{"date-parts":[[2015,10,6]],"date-time":"2015-10-06T15:22:12Z","timestamp":1444144932000},"page":"817-828","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":38,"title":["Where's Wally?"],"prefix":"10.1145","author":[{"given":"Iasonas","family":"Polakis","sequence":"first","affiliation":[{"name":"Columbia University, New York, NY, USA"}]},{"given":"George","family":"Argyros","sequence":"additional","affiliation":[{"name":"Columbia University, New York, NY, USA"}]},{"given":"Theofilos","family":"Petsios","sequence":"additional","affiliation":[{"name":"Columbia University, New York, NY, USA"}]},{"given":"Suphannee","family":"Sivakorn","sequence":"additional","affiliation":[{"name":"Columbia University, New York, NY, USA"}]},{"given":"Angelos D.","family":"Keromytis","sequence":"additional","affiliation":[{"name":"Columbia University, New York, NY, USA"}]}],"member":"320","published-online":{"date-parts":[[2015,10,12]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"http:\/\/cityspeed.sourceforge.net\/CitySpeed - Road network efficiency.  http:\/\/cityspeed.sourceforge.net\/CitySpeed - Road network efficiency."},{"key":"e_1_3_2_1_2_1","unstructured":"http:\/\/grindr.com\/blog\/grindrs-location-security-update\/Grindr - Location Security Update. (09\/2014).  http:\/\/grindr.com\/blog\/grindrs-location-security-update\/Grindr - Location Security Update. (09\/2014)."},{"key":"e_1_3_2_1_3_1","unstructured":"https:\/\/www.synack.com\/labs\/projects\/the-dos-and-donts-of-location-aware-apps-a-case-studySynack Security - The Do's and Don'ts of Location Aware Apps; A Case Study. (09\/2014).  https:\/\/www.synack.com\/labs\/projects\/the-dos-and-donts-of-location-aware-apps-a-case-studySynack Security - The Do's and Don'ts of Location Aware Apps; A Case Study. (09\/2014)."},{"key":"e_1_3_2_1_4_1","unstructured":"http:\/\/techcrunch.com\/2014\/04\/17\/facebook-nearby-friends\/Techcrunch - Facebook Nearby Friends. (04\/2014).  http:\/\/techcrunch.com\/2014\/04\/17\/facebook-nearby-friends\/Techcrunch - Facebook Nearby Friends. (04\/2014)."},{"key":"e_1_3_2_1_5_1","unstructured":"http:\/\/time.com\/8604\/tinder-app-user-location-security-flaw\/Time - Tinder Security Flaw Exposed Users' Locations. (02\/2014).  http:\/\/time.com\/8604\/tinder-app-user-location-security-flaw\/Time - Tinder Security Flaw Exposed Users' Locations. (02\/2014)."},{"key":"e_1_3_2_1_6_1","unstructured":"http:\/\/www.huffingtonpost.com\/2010\/03\/16\/fbi-uses-fake-facebook-pr_n_500776.htmlHuffington Post - Feds Using Fake Online Profiles To Spy On Suspects. (03\/2010).  http:\/\/www.huffingtonpost.com\/2010\/03\/16\/fbi-uses-fake-facebook-pr_n_500776.htmlHuffington Post - Feds Using Fake Online Profiles To Spy On Suspects. (03\/2010)."},{"key":"e_1_3_2_1_7_1","unstructured":"http:\/\/www.independent.co.uk\/news\/world\/africa\/grindr-urges-lgbt-community-to-hide-their-identities-as-egypt-persecutes-nations-gay-community-9757652.htmlThe Independent - Grindr and Egypt. (09\/2014).  http:\/\/www.independent.co.uk\/news\/world\/africa\/grindr-urges-lgbt-community-to-hide-their-identities-as-egypt-persecutes-nations-gay-community-9757652.htmlThe Independent - Grindr and Egypt. (09\/2014)."},{"key":"e_1_3_2_1_8_1","unstructured":"http:\/\/www.policeforum.org\/assets\/docs\/Free_Online_Documents\/Technology\/social%20media%20and%20tactical%20considerations%20for%20law%20enforcement%202013.pdfPolice Forum - Social Media and Tactical Considerations For Law Enforcement. (2013).  http:\/\/www.policeforum.org\/assets\/docs\/Free_Online_Documents\/Technology\/social%20media%20and%20tactical%20considerations%20for%20law%20enforcement%202013.pdfPolice Forum - Social Media and Tactical Considerations For Law Enforcement. (2013)."},{"key":"e_1_3_2_1_9_1","unstructured":"http:\/\/www.washingtonpost.com\/blogs\/worldviews\/wp\/2014\/09\/12\/could-using-gay-dating-app-grindr-get-you-arrested-in-egypt\/Washington Post - Could using gay dating app Grindr get you arrested in Egypt? (09\/2014).  http:\/\/www.washingtonpost.com\/blogs\/worldviews\/wp\/2014\/09\/12\/could-using-gay-dating-app-grindr-get-you-arrested-in-egypt\/Washington Post - Could using gay dating app Grindr get you arrested in Egypt? (09\/2014)."},{"key":"e_1_3_2_1_10_1","unstructured":"http:\/\/online.wsj.com\/articles\/SB10001424052748703467304575383522318244234WSJ- Stalkers Exploit Cellphone GPS. (08\/2010).  http:\/\/online.wsj.com\/articles\/SB10001424052748703467304575383522318244234WSJ- Stalkers Exploit Cellphone GPS. (08\/2010)."},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1145\/2508859.2516735"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/1526709.1526784"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.5555\/993483"},{"volume-title":"NDSS '12","author":"Chaabane A.","key":"e_1_3_2_1_14_1","unstructured":"A. Chaabane , G. Acs , and M. Kaafar . You are what you like! information leakage through users' interests . In NDSS '12 . A. Chaabane, G. Acs, and M. Kaafar. You are what you like! information leakage through users' interests. In NDSS '12."},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1016\/0012-365X(90)90358-O"},{"key":"e_1_3_2_1_16_1","volume-title":"CCCG","author":"De M.","year":"2011","unstructured":"M. De , G. K. Das , and S. C. Nandy . Approximation algorithms for the discrete piercing set problem for unit disks . In CCCG , 2011 . M. De, G. K. Das, and S. C. Nandy. Approximation algorithms for the discrete piercing set problem for unit disks. In CCCG, 2011."},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1145\/2660267.2660270"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1145\/1653771.1653807"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1145\/1066116.1189037"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.is.2012.07.001"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-0-387-21606-5"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1080\/03772063.2014.890826"},{"key":"e_1_3_2_1_23_1","volume-title":"W2SP","author":"Jia Y.","year":"2014","unstructured":"Y. Jia , X. Dong , Z. Liang , and P. Saxena . I know where you've been: Geo-inference attacks via the browser cache . In W2SP 2014 . Y. Jia, X. Dong, Z. Liang, and P. Saxena. I know where you've been: Geo-inference attacks via the browser cache. In W2SP 2014."},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1145\/2632951.2632953"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-32946-3_7"},{"key":"e_1_3_2_1_26_1","first-page":"25","article-title":"Simple heuristics for unit disk graphs","author":"Marathe M.","year":"1995","unstructured":"M. Marathe , H. Breu , H. B. Hunt , S. S. Ravi , and D. J. Rosenkrantz . Simple heuristics for unit disk graphs . NETWORKS , 25 , 1995 . M. Marathe, H. Breu, H. B. Hunt, S. S. Ravi, and D. J. Rosenkrantz. Simple heuristics for unit disk graphs. NETWORKS, 25, 1995.","journal-title":"NETWORKS"},{"volume-title":"NDSS'14","author":"Marforio C.","key":"e_1_3_2_1_27_1","unstructured":"C. Marforio , N. Karapanos , C. Soriente , K. Kostiainen , and S. Capkun . Smartphones as practical and secure location verification tokens for payments . NDSS'14 . C. Marforio, N. Karapanos, C. Soriente, K. Kostiainen, and S. Capkun. Smartphones as practical and secure location verification tokens for payments. NDSS'14."},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1137\/0111030"},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1109\/MDM.2013.19"},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1109\/MDM.2009.14"},{"key":"e_1_3_2_1_31_1","volume-title":"IEICE TRANSACTIONS","author":"Masuyama S.","year":"1981","unstructured":"S. Masuyama , T. Ibaraki , and T. Hasegawa . Computational complexity of the m-center problems on the plane . IEICE TRANSACTIONS , 1981 . S. Masuyama, T. Ibaraki, and T. Hasegawa. Computational complexity of the m-center problems on the plane. IEICE TRANSACTIONS, 1981."},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1145\/1866919.1866938"},{"volume-title":"NDSS '11","author":"Narayanan A.","key":"e_1_3_2_1_33_1","unstructured":"A. Narayanan , N. Thiagarajan , M. Hamburg , M. Lakhani , and D. Boneh . Location privacy via private proximity testing . In NDSS '11 . A. Narayanan, N. Thiagarajan, M. Hamburg, M. Lakhani, and D. Boneh. Location privacy via private proximity testing. In NDSS '11."},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1007\/11671411_23"},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1145\/2523649.2523653"},{"key":"e_1_3_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.1145\/1734583.1734585"},{"volume-title":"IFIP SEC '14","author":"Qin G.","key":"e_1_3_2_1_38_1","unstructured":"G. Qin , C. Patsakis , and M. Bouroche . Playing hide and seek with mobile dating applications . In IFIP SEC '14 . G. Qin, C. Patsakis, and M. Bouroche. Playing hide and seek with mobile dating applications. In IFIP SEC '14."},{"key":"e_1_3_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2011.18"},{"key":"e_1_3_2_1_40_1","doi-asserted-by":"publisher","DOI":"10.1145\/2382196.2382261"},{"volume-title":"SST '09","author":"Thomsen J. R.","key":"e_1_3_2_1_41_1","unstructured":"L.v Siksnys, J. R. Thomsen , S.v Saltenis, M. L. Yiu , and O. Andersen . A location privacy aware friend locator . In SST '09 . L.v Siksnys, J. R. Thomsen, S.v Saltenis, M. L. Yiu, and O. Andersen. A location privacy aware friend locator. In SST '09."},{"key":"e_1_3_2_1_42_1","doi-asserted-by":"publisher","DOI":"10.1145\/2665943.2665946"},{"key":"e_1_3_2_1_43_1","doi-asserted-by":"publisher","DOI":"10.1109\/WICON.2005.13"},{"key":"e_1_3_2_1_44_1","first-page":"1","article-title":"Human mobility enhances global positioning accuracy for mobile phone localization","volume":"99","author":"Yang Z.","year":"2014","unstructured":"Z. Yang , Y. Zhao , Y. Liu , and Y. Xu . Human mobility enhances global positioning accuracy for mobile phone localization . IEEE TPDS , 99 : 1 , 2014 . Z. Yang, Y. Zhao, Y. Liu, and Y. Xu. Human mobility enhances global positioning accuracy for mobile phone localization. IEEE TPDS, 99:1, 2014.","journal-title":"IEEE TPDS"},{"volume-title":"INFOCOM '13","author":"Zhao X.","key":"e_1_3_2_1_45_1","unstructured":"X. Zhao , L. Li , and G. Xue . Checking in without worries: Location privacy in location based social networks . In INFOCOM '13 . X. Zhao, L. Li, and G. Xue. Checking in without worries: Location privacy in location based social networks. In INFOCOM '13."},{"volume-title":"PETS '07","author":"Zhong G.","key":"e_1_3_2_1_46_1","unstructured":"G. Zhong , I. Goldberg , and U. Hengartner . Louis, lester and pierre: Three protocols for location privacy . In PETS '07 . G. Zhong, I. Goldberg, and U. Hengartner. Louis, lester and pierre: Three protocols for location privacy. In PETS '07."}],"event":{"name":"CCS'15: The 22nd ACM Conference on Computer and Communications Security","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"],"location":"Denver Colorado USA","acronym":"CCS'15"},"container-title":["Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2810103.2813605","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2810103.2813605","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T05:48:36Z","timestamp":1750225716000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2810103.2813605"}},"subtitle":["Precise User Discovery Attacks in Location Proximity Services"],"short-title":[],"issued":{"date-parts":[[2015,10,12]]},"references-count":45,"alternative-id":["10.1145\/2810103.2813605","10.1145\/2810103"],"URL":"https:\/\/doi.org\/10.1145\/2810103.2813605","relation":{},"subject":[],"published":{"date-parts":[[2015,10,12]]},"assertion":[{"value":"2015-10-12","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}