Skip to main content

Showing 1–34 of 34 results for author: Hoang, P

Searching in archive cs. Search in all archives.
.
  1. arXiv:2406.09168  [pdf, other

    eess.IV cs.CV cs.LG

    SR-CACO-2: A Dataset for Confocal Fluorescence Microscopy Image Super-Resolution

    Authors: Soufiane Belharbi, Mara KM Whitford, Phuong Hoang, Shakeeb Murtaza, Luke McCaffrey, Eric Granger

    Abstract: Confocal fluorescence microscopy is one of the most accessible and widely used imaging techniques for the study of biological processes. Scanning confocal microscopy allows the capture of high-quality images from 3D samples, yet suffers from well-known limitations such as photobleaching and phototoxicity of specimens caused by intense light exposure, which limits its use in some applications, espe… ▽ More

    Submitted 13 June, 2024; originally announced June 2024.

    Comments: 23 pages, 13 figures

  2. arXiv:2404.16741  [pdf, other

    cs.DS

    Parameterized Complexity of Efficient Sortation

    Authors: Robert Ganian, Hung P. Hoang, Simon Wietheger

    Abstract: A crucial challenge arising in the design of large-scale logistical networks is to optimize parcel sortation for routing. We study this problem under the recent graph-theoretic formalization of Van Dyk, Klause, Koenemann and Megow (IPCO 2024). The problem asks - given an input digraph D (the fulfillment network) together with a set of commodities represented as source-sink tuples - for a minimum-o… ▽ More

    Submitted 25 April, 2024; originally announced April 2024.

  3. arXiv:2403.15882  [pdf, other

    cs.CL

    VLUE: A New Benchmark and Multi-task Knowledge Transfer Learning for Vietnamese Natural Language Understanding

    Authors: Phong Nguyen-Thuan Do, Son Quoc Tran, Phu Gia Hoang, Kiet Van Nguyen, Ngan Luu-Thuy Nguyen

    Abstract: The success of Natural Language Understanding (NLU) benchmarks in various languages, such as GLUE for English, CLUE for Chinese, KLUE for Korean, and IndoNLU for Indonesian, has facilitated the evaluation of new NLU models across a wide range of tasks. To establish a standardized set of benchmarks for Vietnamese NLU, we introduce the first Vietnamese Language Understanding Evaluation (VLUE) benchm… ▽ More

    Submitted 23 March, 2024; originally announced March 2024.

    Comments: Accepted at NAACL 2024 (Findings)

  4. arXiv:2402.07061  [pdf, other

    cs.DS cs.DM math.CO

    The $k$-Opt algorithm for the Traveling Salesman Problem has exponential running time for $k \ge 5$

    Authors: Sophia Heimann, Hung P. Hoang, Stefan Hougardy

    Abstract: The $k$-Opt algorithm is a local search algorithm for the Traveling Salesman Problem. Starting with an initial tour, it iteratively replaces at most $k$ edges in the tour with the same number of edges to obtain a better tour. Krentel (FOCS 1989) showed that the Traveling Salesman Problem with the $k$-Opt neighborhood is complete for the class PLS (polynomial time local search) and that the $k$-Opt… ▽ More

    Submitted 13 June, 2024; v1 submitted 10 February, 2024; originally announced February 2024.

    Comments: Appeared in ICALP 2024

    MSC Class: 68W25; 68W40; 68Q25; 90C27 ACM Class: F.2.2; G.2.1; G.2.2

  5. arXiv:2401.10044  [pdf, other

    cs.CV

    Deep spatial context: when attention-based models meet spatial regression

    Authors: Paulina Tomaszewska, Elżbieta Sienkiewicz, Mai P. Hoang, Przemysław Biecek

    Abstract: We propose 'Deep spatial context' (DSCon) method, which serves for investigation of the attention-based vision models using the concept of spatial context. It was inspired by histopathologists, however, the method can be applied to various domains. The DSCon allows for a quantitative measure of the spatial context's role using three Spatial Context Measures: $SCM_{features}$, $SCM_{targets}$,… ▽ More

    Submitted 10 March, 2024; v1 submitted 18 January, 2024; originally announced January 2024.

  6. arXiv:2311.15297  [pdf, other

    cs.LG math.OC

    Controllable Expensive Multi-objective Learning with Warm-starting Bayesian Optimization

    Authors: Quang-Huy Nguyen, Long P. Hoang, Hoang V. Viet, Dung D. Le

    Abstract: Pareto Set Learning (PSL) is a promising approach for approximating the entire Pareto front in multi-objective optimization (MOO) problems. However, existing derivative-free PSL methods are often unstable and inefficient, especially for expensive black-box MOO problems where objective function evaluations are costly. In this work, we propose to address the instability and inefficiency of existing… ▽ More

    Submitted 9 February, 2024; v1 submitted 26 November, 2023; originally announced November 2023.

  7. arXiv:2304.04835  [pdf, other

    cs.CR cs.CY cs.NI

    Measuring and Evading Turkmenistan's Internet Censorship: A Case Study in Large-Scale Measurements of a Low-Penetration Country

    Authors: Sadia Nourin, Van Tran, Xi Jiang, Kevin Bock, Nick Feamster, Nguyen Phong Hoang, Dave Levin

    Abstract: Since 2006, Turkmenistan has been listed as one of the few Internet enemies by Reporters without Borders due to its extensively censored Internet and strictly regulated information control policies. Existing reports of filtering in Turkmenistan rely on a small number of vantage points or test a small number of websites. Yet, the country's poor Internet adoption rates and small population can make… ▽ More

    Submitted 17 April, 2023; v1 submitted 10 April, 2023; originally announced April 2023.

    Comments: To appear in Proceedings of The 2023 ACM Web Conference (WWW 2023)

  8. arXiv:2303.07401  [pdf, other

    cs.CG

    Drawings of Complete Multipartite Graphs Up to Triangle Flips

    Authors: Oswin Aichholzer, Man-Kwun Chiu, Hung P. Hoang, Michael Hoffmann, Jan Kynčl, Yannic Maus, Birgit Vogtenhuber, Alexandra Weinberger

    Abstract: For a drawing of a labeled graph, the rotation of a vertex or crossing is the cyclic order of its incident edges, represented by the labels of their other endpoints. The extended rotation system (ERS) of the drawing is the collection of the rotations of all vertices and crossings. A drawing is simple if each pair of edges has at most one common point. Gioan's Theorem states that for any two simple… ▽ More

    Submitted 13 March, 2023; originally announced March 2023.

    Comments: Abstract shortened for arxiv. This work (without appendix) is available at the 39th International Symposium on Computational Geometry (SoCG 2023)

  9. arXiv:2302.02031  [pdf, other

    cs.LG cs.AI cs.CY cs.NI

    Augmenting Rule-based DNS Censorship Detection at Scale with Machine Learning

    Authors: Jacob Brown, Xi Jiang, Van Tran, Arjun Nitin Bhagoji, Nguyen Phong Hoang, Nick Feamster, Prateek Mittal, Vinod Yegneswaran

    Abstract: The proliferation of global censorship has led to the development of a plethora of measurement platforms to monitor and expose it. Censorship of the domain name system (DNS) is a key mechanism used across different countries. It is currently detected by applying heuristics to samples of DNS queries and responses (probes) for specific destinations. These heuristics, however, are both platform-speci… ▽ More

    Submitted 15 June, 2023; v1 submitted 3 February, 2023; originally announced February 2023.

    Comments: To appear in Proceedings of the 29th ACM SIGKDD Conference on Knowledge Discovery and Data Mining (KDD '23)

  10. arXiv:2301.10186  [pdf, other

    cs.CL

    ViHOS: Hate Speech Spans Detection for Vietnamese

    Authors: Phu Gia Hoang, Canh Duc Luu, Khanh Quoc Tran, Kiet Van Nguyen, Ngan Luu-Thuy Nguyen

    Abstract: The rise in hateful and offensive language directed at other users is one of the adverse side effects of the increased use of social networking platforms. This could make it difficult for human moderators to review tagged comments filtered by classification systems. To help address this issue, we present the ViHOS (Vietnamese Hate and Offensive Spans) dataset, the first human-annotated corpus cont… ▽ More

    Submitted 26 January, 2023; v1 submitted 24 January, 2023; originally announced January 2023.

    Comments: EACL 2023

  11. arXiv:2212.03915  [pdf, other

    math.CO cs.DM

    Combinatorial generation via permutation languages. V. Acyclic orientations

    Authors: Jean Cardinal, Hung P. Hoang, Arturo Merino, Ondřej Mička, Torsten Mütze

    Abstract: In 1993, Savage, Squire, and West described an inductive construction for generating every acyclic orientation of a chordal graph exactly once, flip** one arc at a time. We provide two generalizations of this result. Firstly, we describe Gray codes for acyclic orientations of hypergraphs that satisfy a simple ordering condition, which generalizes the notion of perfect elimination order of graphs… ▽ More

    Submitted 7 December, 2022; originally announced December 2022.

  12. arXiv:2212.01130  [pdf, other

    cs.LG

    Improving Pareto Front Learning via Multi-Sample Hypernetworks

    Authors: Long P. Hoang, Dung D. Le, Tran Anh Tuan, Tran Ngoc Thang

    Abstract: Pareto Front Learning (PFL) was recently introduced as an effective approach to obtain a map** function from a given trade-off vector to a solution on the Pareto front, which solves the multi-objective optimization (MOO) problem. Due to the inherent trade-off between conflicting objectives, PFL offers a flexible approach in many scenarios in which the decision makers can not specify the preferen… ▽ More

    Submitted 28 April, 2023; v1 submitted 2 December, 2022; originally announced December 2022.

    Comments: Accepted to AAAI-23

  13. arXiv:2210.11374  [pdf, other

    cs.CL

    Meeting Decision Tracker: Making Meeting Minutes with De-Contextualized Utterances

    Authors: Shumpei Inoue, Hy Nguyen, Pham Viet Hoang, Tsungwei Liu, Minh-Tien Nguyen

    Abstract: Meetings are a universal process to make decisions in business and project collaboration. The capability to automatically itemize the decisions in daily meetings allows for extensive tracking of past discussions. To that end, we developed Meeting Decision Tracker, a prototype system to construct decision items comprising decision utterance detector (DUD) and decision utterance rewriter (DUR). We s… ▽ More

    Submitted 20 October, 2022; originally announced October 2022.

    Comments: 7 pages, AACL-IJCNLP 2022

  14. On approximating the rank of graph divisors

    Authors: Kristóf Bérczi, Hung P. Hoang, Lilla Tóthmérész

    Abstract: Baker and Norine initiated the study of graph divisors as a graph-theoretic analogue of the Riemann-Roch theory for Riemann surfaces. One of the key concepts of graph divisor theory is the {\it rank} of a divisor on a graph. The importance of the rank is well illustrated by Baker's {\it Specialization lemma}, stating that the dimension of a linear system can only go up under specialization from cu… ▽ More

    Submitted 11 April, 2024; v1 submitted 20 June, 2022; originally announced June 2022.

    Comments: 11 pages, 3 figures

    Journal ref: Discrete Math. 346 (2023), no. 9, Paper No. 113528, 8 pp

  15. arXiv:2206.00524  [pdf, other

    cs.CL cs.AI cs.LG

    Vietnamese Hate and Offensive Detection using PhoBERT-CNN and Social Media Streaming Data

    Authors: Khanh Q. Tran, An T. Nguyen, Phu Gia Hoang, Canh Duc Luu, Trong-Hop Do, Kiet Van Nguyen

    Abstract: Society needs to develop a system to detect hate and offense to build a healthy and safe environment. However, current research in this field still faces four major shortcomings, including deficient pre-processing techniques, indifference to data imbalance issues, modest performance models, and lacking practical applications. This paper focused on develo** an intelligent system capable of addres… ▽ More

    Submitted 1 June, 2022; originally announced June 2022.

  16. arXiv:2202.00663  [pdf, other

    cs.NI cs.CR cs.SI

    Measuring the Accessibility of Domain Name Encryption and Its Impact on Internet Filtering

    Authors: Nguyen Phong Hoang, Michalis Polychronakis, Phillipa Gill

    Abstract: Most online communications rely on DNS to map domain names to their hosting IP address(es). Previous work has shown that DNS-based network interference is widespread due to the unencrypted and unauthenticated nature of the original DNS protocol. In addition to DNS, accessed domain names can also be monitored by on-path observers during the TLS handshake when the SNI extension is used. These linger… ▽ More

    Submitted 1 February, 2022; originally announced February 2022.

    Comments: To appear in Proceedings of the Passive and Active Measurement Conference 2022

  17. arXiv:2107.14550  [pdf, other

    cs.DS math.OC

    Assistance and Interdiction Problems on Interval Graphs

    Authors: Hung P. Hoang, Stefan Lendl, Lasse Wulf

    Abstract: We introduce a novel framework of graph modifications specific to interval graphs. We study interdiction problems with respect to these graph modifications. Given a list of original intervals, each interval has a replacement interval such that either the replacement contains the original, or the original contains the replacement. The interdictor is allowed to replace up to $k$ original intervals w… ▽ More

    Submitted 30 July, 2021; originally announced July 2021.

  18. arXiv:2107.00221  [pdf, other

    cs.IR

    Embedding-based Recommender System for Job to Candidate Matching on Scale

    Authors: **g Zhao, **gya Wang, Madhav Sigdel, Bopeng Zhang, Phuong Hoang, Mengshu Liu, Mohammed Korayem

    Abstract: The online recruitment matching system has been the core technology and service platform in CareerBuilder. One of the major challenges in an online recruitment scenario is to provide good matches between job posts and candidates using a recommender system on the scale. In this paper, we discussed the techniques for applying an embedding-based recommender system for the large scale of job to candid… ▽ More

    Submitted 1 July, 2021; originally announced July 2021.

    Comments: 8 pages

  19. arXiv:2106.02167  [pdf, other

    cs.CR cs.CY cs.NI cs.SI

    How Great is the Great Firewall? Measuring China's DNS Censorship

    Authors: Nguyen Phong Hoang, Arian Akhavan Niaki, Jakub Dalek, Jeffrey Knockel, Pellaeon Lin, Bill Marczak, Masashi Crete-Nishihata, Phillipa Gill, Michalis Polychronakis

    Abstract: The DNS filtering apparatus of China's Great Firewall (GFW) has evolved considerably over the past two decades. However, most prior studies of China's DNS filtering were performed over short time periods, leading to unnoticed changes in the GFW's behavior. In this study, we introduce GFWatch, a large-scale, longitudinal measurement platform capable of testing hundreds of millions of domains daily,… ▽ More

    Submitted 3 June, 2021; originally announced June 2021.

    Comments: To appear at the 30th USENIX Security Symposium

  20. arXiv:2105.08693  [pdf, other

    cs.DM math.CO

    Conflict-Free Coloring: Graphs of Bounded Clique Width and Intersection Graphs

    Authors: Sriram Bhyravarapu, Tim A. Hartmann, Hung P. Hoang, Subrahmanyam Kalyanasundaram, I. Vinod Reddy

    Abstract: A conflict-free coloring of a graph $G$ is a (partial) coloring of its vertices such that every vertex $u$ has a neighbor whose assigned color is unique in the neighborhood of $u$. There are two variants of this coloring, one defined using the open neighborhood and one using the closed neighborhood. For both variants, we study the problem of deciding whether the conflict-free coloring of a given g… ▽ More

    Submitted 11 March, 2024; v1 submitted 18 May, 2021; originally announced May 2021.

    Comments: Accepted in Algorithmica

  21. arXiv:2104.07376  [pdf, other

    cs.CL

    UIT-E10dot3 at SemEval-2021 Task 5: Toxic Spans Detection with Named Entity Recognition and Question-Answering Approaches

    Authors: Phu Gia Hoang, Luan Thanh Nguyen, Kiet Van Nguyen

    Abstract: The increment of toxic comments on online space is causing tremendous effects on other vulnerable users. For this reason, considerable efforts are made to deal with this, and SemEval-2021 Task 5: Toxic Spans Detection is one of those. This task asks competitors to extract spans that have toxicity from the given texts, and we have done several analyses to understand its structure before doing exper… ▽ More

    Submitted 15 April, 2021; originally announced April 2021.

    Comments: Accepted at SemEval-2021 Task 5: Toxic Spans Detection, ACL-IJCNLP 2021

  22. arXiv:2102.08332  [pdf, other

    cs.CR cs.NI

    Domain Name Encryption Is Not Enough: Privacy Leakage via IP-based Website Fingerprinting

    Authors: Nguyen Phong Hoang, Arian Akhavan Niaki, Phillipa Gill, Michalis Polychronakis

    Abstract: Although the security benefits of domain name encryption technologies such as DNS over TLS (DoT), DNS over HTTPS (DoH), and Encrypted Client Hello (ECH) are clear, their positive impact on user privacy is weakened by--the still exposed--IP address information. However, content delivery networks, DNS-based load balancing, co-hosting of different websites on the same server, and IP address churn, al… ▽ More

    Submitted 16 June, 2021; v1 submitted 16 February, 2021; originally announced February 2021.

    Comments: To appear in Proceedings of the 21st Privacy Enhancing Technologies Symposium (PETS 2021)

  23. arXiv:2102.06427  [pdf, other

    cs.DS

    A Subexponential Algorithm for ARRIVAL

    Authors: Bernd Gärtner, Sebastian Haslebacher, Hung P. Hoang

    Abstract: The ARRIVAL problem is to decide the fate of a train moving along the edges of a directed graph, according to a simple (deterministic) pseudorandom walk. The problem is in $NP \cap coNP$ but not known to be in $P$. The currently best algorithms have runtime $2^{Θ(n)}$ where $n$ is the number of vertices. This is not much better than just performing the pseudorandom walk. We develop a subexponentia… ▽ More

    Submitted 9 April, 2021; v1 submitted 12 February, 2021; originally announced February 2021.

    Comments: 13 pages, 1 figure Added a reference

    MSC Class: 05C57; 05C85; 68Q25; 68W05; 91A46 ACM Class: F.2.2; G.2.2

  24. arXiv:2004.04623  [pdf, other

    cs.NI cs.CR

    The Web is Still Small After More Than a Decade

    Authors: Nguyen Phong Hoang, Arian Akhavan Niaki, Michalis Polychronakis, Phillipa Gill

    Abstract: Understanding web co-location is essential for various reasons. For instance, it can help one to assess the collateral damage that denial-of-service attacks or IP-based blocking can cause to the availability of co-located web sites. However, it has been more than a decade since the first study was conducted in 2007. The Internet infrastructure has changed drastically since then, necessitating a re… ▽ More

    Submitted 9 April, 2020; originally announced April 2020.

    Comments: ACM SIGCOMM Computer Communication Review, Volume 50, Issue 2, April 2020

  25. K-resolver: Towards Decentralizing Encrypted DNS Resolution

    Authors: Nguyen Phong Hoang, Ivan Lin, Seyedhamed Ghavamnia, Michalis Polychronakis

    Abstract: Centralized DNS over HTTPS/TLS (DoH/DoT) resolution, which has started being deployed by major hosting providers and web browsers, has sparked controversy among Internet activists and privacy advocates due to several privacy concerns. This design decision causes the trace of all DNS resolutions to be exposed to a third-party resolver, different than the one specified by the user's access network.… ▽ More

    Submitted 17 February, 2020; v1 submitted 24 January, 2020; originally announced January 2020.

    Comments: NDSS Workshop on Measurements, Attacks, and Defenses for the Web (MADWeb) 2020

  26. Assessing the Privacy Benefits of Domain Name Encryption

    Authors: Nguyen Phong Hoang, Arian Akhavan Niaki, Nikita Borisov, Phillipa Gill, Michalis Polychronakis

    Abstract: As Internet users have become more savvy about the potential for their Internet communication to be observed, the use of network traffic encryption technologies (e.g., HTTPS/TLS) is on the rise. However, even when encryption is enabled, users leak information about the domains they visit via DNS queries and via the Server Name Indication (SNI) extension of TLS. Two recent proposals to ameliorate t… ▽ More

    Submitted 8 July, 2020; v1 submitted 1 November, 2019; originally announced November 2019.

    Comments: In Proceedings of the 15th ACM Asia Conference on Computer and Communications Security (ASIA CCS '20), October 5-9, 2020, Taipei, Taiwan

  27. arXiv:1907.11086  [pdf, other

    cs.LG cs.IR stat.ML

    Automated Discovery and Classification of Training Videos for Career Progression

    Authors: Alan Chern, Phuong Hoang, Madhav Sigdel, Janani Balaji, Mohammed Korayem

    Abstract: Job transitions and upskilling are common actions taken by many industry working professionals throughout their career. With the current rapidly changing job landscape where requirements are constantly changing and industry sectors are emerging, it is especially difficult to plan and navigate a predetermined career path. In this work, we implemented a system to automate the collection and classifi… ▽ More

    Submitted 23 July, 2019; originally announced July 2019.

    Comments: 5 pages, 4 figures, Proceedings of the Data Collection, Curation, and Labeling for Mining and Learning

  28. arXiv:1907.07120  [pdf, other

    cs.CY cs.NI cs.SI

    Measuring I2P Censorship at a Global Scale

    Authors: Nguyen Phong Hoang, Sadie Doreen, Michalis Polychronakis

    Abstract: The prevalence of Internet censorship has prompted the creation of several measurement platforms for monitoring filtering activities. An important challenge faced by these platforms revolves around the trade-off between depth of measurement and breadth of coverage. In this paper, we present an opportunistic censorship measurement infrastructure built on top of a network of distributed VPN servers… ▽ More

    Submitted 16 July, 2019; originally announced July 2019.

    Comments: To appear in Proceedings of the 9th USENIX Workshop on Free and Open Communications on the Internet (FOCI '19). San Francisco, CA. May 2020

  29. arXiv:1907.04245  [pdf, other

    cs.CR cs.CY cs.NI cs.SI

    ICLab: A Global, Longitudinal Internet Censorship Measurement Platform

    Authors: Arian Akhavan Niaki, Shinyoung Cho, Zachary Weinberg, Nguyen Phong Hoang, Abbas Razaghpanah, Nicolas Christin, Phillipa Gill

    Abstract: Researchers have studied Internet censorship for nearly as long as attempts to censor contents have taken place. Most studies have however been limited to a short period of time and/or a few countries; the few exceptions have traded off detail for breadth of coverage. Collecting enough data for a comprehensive, global, longitudinal perspective remains challenging. In this work, we present ICLab, a… ▽ More

    Submitted 10 July, 2019; v1 submitted 9 July, 2019; originally announced July 2019.

    Comments: To appear in Proceedings of the 41st IEEE Symposium on Security and Privacy (Oakland 2020). San Francisco, CA. May 2020

  30. arXiv:1906.06069  [pdf, other

    cs.DM math.CO

    Combinatorial generation via permutation languages. I. Fundamentals

    Authors: Elizabeth Hartung, Hung Phuc Hoang, Torsten Mütze, Aaron Williams

    Abstract: In this work we present a general and versatile algorithmic framework for exhaustively generating a large variety of different combinatorial objects, based on encoding them as permutations. This approach provides a unified view on many known results and allows us to prove many new ones. In particular, we obtain four classical Gray codes for permutations, bitstrings, binary trees and set partitions… ▽ More

    Submitted 3 November, 2021; v1 submitted 14 June, 2019; originally announced June 2019.

  31. An Empirical Study of the I2P Anonymity Network and its Censorship Resistance

    Authors: Nguyen Phong Hoang, Panagiotis Kintis, Manos Antonakakis, Michalis Polychronakis

    Abstract: Tor and I2P are well-known anonymity networks used by many individuals to protect their online privacy and anonymity. Tor's centralized directory services facilitate the understanding of the Tor network, as well as the measurement and visualization of its structure through the Tor Metrics project. In contrast, I2P does not rely on centralized directory servers, and thus obtaining a complete view o… ▽ More

    Submitted 25 September, 2018; v1 submitted 24 September, 2018; originally announced September 2018.

    Comments: 14 pages, To appear in the 2018 Internet Measurement Conference (IMC'18)

  32. arXiv:1610.02065  [pdf

    cs.CR

    Towards an Autonomous System Monitor for Mitigating Correlation Attacks in the Tor Network

    Authors: Nguyen Phong Hoang

    Abstract: After carefully considering the scalability problem in Tor and exhaustively evaluating related works on AS-level adversaries, the author proposes ASmoniTor, which is an autonomous system monitor for mitigating correlation attacks in the Tor network. In contrast to prior works, which often released offline packets, including the source code of a modified Tor client and a snapshot of the Internet to… ▽ More

    Submitted 6 October, 2016; originally announced October 2016.

    Comments: Master's thesis

  33. Your Neighbors Are My Spies: Location and other Privacy Concerns in GLBT-focused Location-based Dating Applications

    Authors: Nguyen Phong Hoang, Yasuhito Asano, Masatoshi Yoshikawa

    Abstract: Trilateration is one of the well-known threat models to the user's location privacy in location-based apps, especially those contain highly sensitive information such as dating apps. The threat model mainly bases on the publicly shown distance from a targeted victim to the adversary to pinpoint the victim's location. As a countermeasure, most of location-based apps have already implemented the 'hi… ▽ More

    Submitted 20 April, 2016; originally announced April 2016.

    Comments: This work is a follow-up to arXiv:1604.07850, and is being submitted to the ICACT Transactions on Advanced Communications Technology, thus not a final version of this study

  34. Your Neighbors Are My Spies: Location and other Privacy Concerns in Dating Apps

    Authors: Nguyen Phong Hoang, Yasuhito Asano, Masatoshi Yoshikawa

    Abstract: Trilateration has recently become one of the well-known threat models to the user's location privacy in location-based applications (aka: location-based services or LBS), especially those containing highly sensitive information such as dating applications. The threat model mainly depends on the distance shown from the targeted victim to the adversary to pinpoint the victim's position. As a counter… ▽ More

    Submitted 20 April, 2016; originally announced April 2016.

    Comments: The 18th IEEE International Conference on Advanced Communication Technology (ICACT 2016)