U   C   L (daniele quercia)
I’m finishing my PhD @
U niversity C ollege L ondon
<My Research>
Ratings on ...
Ratings on phones
MobiRate:  how mobiles  collect  &  store  ratings
Why   ratings on mobiles?
Daniele Quercia Situation : People exchange digital content
drowning user (content overload) help! who will come to the rescue?
Proposal: Accept content only from reputable people
how mobiles  collect  &  store  ratings
collect >  store  > use
Ignorant   Forgers   Liars   collect >  store  > use
Ignorant   Forgers   Liars   [Suspected]
Ignorant   Forgers   Liars   [Suspected] [Exposed]
Ignorant   Forgers   Liars   [Suspected] [Exposed] [Filtered Out]
Ignorant   Forgers   Liars   [Suspected] [Exposed] [Filtered Out] Work done:    AAAI,KDD,   ICDM,...
Ignorant   Forgers   Liars   [Suspected] [Exposed] [Filtered Out] Work done:    AAAI,KDD,   ICDM,... ~ø ~ø
Ignorant   Forgers   Liars   [Exposed] [Filtered Out] Work done:    AAAI,KDD,   ICDM,... MobiRate collect >  store
How to  collect  &  store  ratings?
1.Log (credentials) 2. Gossip (to check each credential)
1.Log (credentials) 2. Gossip (to check each credential)   Impractical 
Idea behind MobiRate
Let’s make it practical...
1.Sealed Log (of credentials) 2. Gossip (to check seals only)
1.Sealed Log (of credentials) 2. Gossip (to check seals only)    Practical
1.Sealed Log (of credentials) entry (rating) “ seal” (for the entry)
1.Sealed Log (of credentials) entry (rating) “ seal” (for the entry) “ hash chain” binding whole table
Assumption  ID is a  unique  public key
Gossiping:   To whom?
To witnesses [slow down]
Audit!  [slow down] What  witnesses do
Audit!  [slow down] What  witnesses do Why?
If one is ignorant   If one is a forger   [Suspected] [Exposed]
Who  are my witnesses Those who will share  content with me
. Who  are my witnesses Like-minded   familiar strangers
1.Sealed Log (of credentials) 2. Gossip (to check seals only)    Practical
Does MobiRate work?
Mobility Traces  AND  Social Networks Reality Mining
Does MobiRate work?
Does MobiRate work?  <1> Is it  robust  to malicious individuals? <2> Does it  run  on phones?
<1>  robust The  f  factor
 
 
MobiRate Oracle
MobiRate reduces  f!!!
<2>  run
“ heaviest” protocol runs < 2sec
“ longest” protocol completed in 2.5ms   (if Bluetooth 100kb/s)
MobiRate works    robust     runs on phones
Ignorant   Forgers   is a step towards...
…  rescuing drowning user help!
Daniele Quercia All this on … mobblog mobirate
 
Assumption   ID is  unique  public key
If not unique    Sybil attacks!
Ignorant   Forgers   Liars [Exposed] MobiRate (eg, Sybils) collect >  store  > use
Ignorant   Forgers   Liars [Exposed] Filtered Out  by [ICDM07] MobiRate (eg, Sybils) collect >  store  > use [ICDM07]  Lightweight Distributed Trust Propagation

More Related Content

PPT
Netsci10 report
PPT
Rethinking Mobile Recommendations
PPT
PPT
Urban*: Crowdsourcing for the Good of London
PDF
Spotting Trends: The Wisdom of the Few
PPT
Psychological Maps 2.0 [www 2013]
PPT
The Digital Life of Walkable Streets
PPTX
Finger on the Pulse: Towards a Real-time City Health Monitor
Netsci10 report
Rethinking Mobile Recommendations
Urban*: Crowdsourcing for the Good of London
Spotting Trends: The Wisdom of the Few
Psychological Maps 2.0 [www 2013]
The Digital Life of Walkable Streets
Finger on the Pulse: Towards a Real-time City Health Monitor

Similar to MobiRate [Ubicomp 2008] (20)

PPT
Selecting Trustworthy Content Using Tags
PPTX
Cybercrime and the Developer Java2Days 2016 Sofia
PDF
Weaponizing OSINT – Hacker Halted 2019 – Michael James
PPTX
Data Privacy for Activists
PPTX
Devnexus 2017 Cybercrime and the Developer: How do you make a difference?
PPTX
Progscon cybercrime and the developer
PDF
Hacking the Company : Risks with carbon-based lifeforms using vulnerable systems
PPTX
PPTX
Alexey Sintsov. Honeypot that Can Bite: Reverse Penetration.
PDF
Privacy is an Illusion and you’re all losers! - Cryptocow - Infosecurity 2013
PDF
Infosecurity2013nl 131103184054-phpapp01
PPTX
CrowdSec A-Round Fundraising Deck
PDF
Opsec for security researchers
PPTX
Intro to Android, IOT, Hacking & Web Designinng
PDF
Testing IoT Security shouldn't fear you if you have got a hacker mindset - By...
PPTX
Cybercrime and the Developer: How to Start Defending Against the Darker Side...
PDF
PSCR 2019 - ICAM Standards
PDF
E security and payment 2013-1
PDF
Identity 2.0 - OpenID And User Centric Identity
PPTX
Jax london2016 cybercrime-and-the-developer
Selecting Trustworthy Content Using Tags
Cybercrime and the Developer Java2Days 2016 Sofia
Weaponizing OSINT – Hacker Halted 2019 – Michael James
Data Privacy for Activists
Devnexus 2017 Cybercrime and the Developer: How do you make a difference?
Progscon cybercrime and the developer
Hacking the Company : Risks with carbon-based lifeforms using vulnerable systems
Alexey Sintsov. Honeypot that Can Bite: Reverse Penetration.
Privacy is an Illusion and you’re all losers! - Cryptocow - Infosecurity 2013
Infosecurity2013nl 131103184054-phpapp01
CrowdSec A-Round Fundraising Deck
Opsec for security researchers
Intro to Android, IOT, Hacking & Web Designinng
Testing IoT Security shouldn't fear you if you have got a hacker mindset - By...
Cybercrime and the Developer: How to Start Defending Against the Darker Side...
PSCR 2019 - ICAM Standards
E security and payment 2013-1
Identity 2.0 - OpenID And User Centric Identity
Jax london2016 cybercrime-and-the-developer
Ad

More from Daniele Quercia (20)

PPTX
10 urban intangible properties
PPT
Like Partying? Your Face Says It All. Predicting Place AMBIANCE From Profile ...
PDF
Trend Makers and Trend Spotters in a Mobile Application
PDF
Ads and the City
PPT
Unleashing the potential of spatial data
PPT
Loosing "Friends" on Facebook
PPT
Talk of the City: Londoners and Social Media
PPT
The Social World of Twitter: Topics, Geography, and Emotions
PPT
Facebook and Privacy: The Balancing Act of Personality, Gender, and Relations...
PDF
Middleware for social computing: a roadmap
PPT
Auralist: Introducing Serendipity into Music Recommendation
PPT
Personality in Twitter: influentials and popular users
PPT
In the mood for being influential
PPT
Geomob London September 2011
PPT
FriendSensing
PPT
Sybil Attacks Against Mobile Users
PPT
Promoting location privacy… one lie at a time
PPT
Lightweight Distributed Trust Propagation
PPT
TRULLO - local trust bootstrapping
PPT
Inter-context Trust Bootstrapping for Mobile Content Sharing
10 urban intangible properties
Like Partying? Your Face Says It All. Predicting Place AMBIANCE From Profile ...
Trend Makers and Trend Spotters in a Mobile Application
Ads and the City
Unleashing the potential of spatial data
Loosing "Friends" on Facebook
Talk of the City: Londoners and Social Media
The Social World of Twitter: Topics, Geography, and Emotions
Facebook and Privacy: The Balancing Act of Personality, Gender, and Relations...
Middleware for social computing: a roadmap
Auralist: Introducing Serendipity into Music Recommendation
Personality in Twitter: influentials and popular users
In the mood for being influential
Geomob London September 2011
FriendSensing
Sybil Attacks Against Mobile Users
Promoting location privacy… one lie at a time
Lightweight Distributed Trust Propagation
TRULLO - local trust bootstrapping
Inter-context Trust Bootstrapping for Mobile Content Sharing
Ad

Recently uploaded (20)

PDF
STKI Israel Market Study 2025 version august
PPT
Galois Field Theory of Risk: A Perspective, Protocol, and Mathematical Backgr...
PDF
UiPath Agentic Automation session 1: RPA to Agents
PDF
Hybrid horned lizard optimization algorithm-aquila optimizer for DC motor
PDF
Zenith AI: Advanced Artificial Intelligence
PPTX
GROUP4NURSINGINFORMATICSREPORT-2 PRESENTATION
PDF
CloudStack 4.21: First Look Webinar slides
PDF
Flame analysis and combustion estimation using large language and vision assi...
PPTX
TEXTILE technology diploma scope and career opportunities
PDF
Comparative analysis of machine learning models for fake news detection in so...
PDF
Enhancing plagiarism detection using data pre-processing and machine learning...
PDF
NewMind AI Weekly Chronicles – August ’25 Week III
PPTX
Benefits of Physical activity for teenagers.pptx
PPTX
Chapter 5: Probability Theory and Statistics
PDF
Architecture types and enterprise applications.pdf
PPTX
Final SEM Unit 1 for mit wpu at pune .pptx
PDF
sustainability-14-14877-v2.pddhzftheheeeee
PDF
Five Habits of High-Impact Board Members
PDF
How IoT Sensor Integration in 2025 is Transforming Industries Worldwide
PDF
A proposed approach for plagiarism detection in Myanmar Unicode text
STKI Israel Market Study 2025 version august
Galois Field Theory of Risk: A Perspective, Protocol, and Mathematical Backgr...
UiPath Agentic Automation session 1: RPA to Agents
Hybrid horned lizard optimization algorithm-aquila optimizer for DC motor
Zenith AI: Advanced Artificial Intelligence
GROUP4NURSINGINFORMATICSREPORT-2 PRESENTATION
CloudStack 4.21: First Look Webinar slides
Flame analysis and combustion estimation using large language and vision assi...
TEXTILE technology diploma scope and career opportunities
Comparative analysis of machine learning models for fake news detection in so...
Enhancing plagiarism detection using data pre-processing and machine learning...
NewMind AI Weekly Chronicles – August ’25 Week III
Benefits of Physical activity for teenagers.pptx
Chapter 5: Probability Theory and Statistics
Architecture types and enterprise applications.pdf
Final SEM Unit 1 for mit wpu at pune .pptx
sustainability-14-14877-v2.pddhzftheheeeee
Five Habits of High-Impact Board Members
How IoT Sensor Integration in 2025 is Transforming Industries Worldwide
A proposed approach for plagiarism detection in Myanmar Unicode text

MobiRate [Ubicomp 2008]