{"guid":"ad8da848-2268-51b7-89bf-628705f17f0b","title":"Machine learning and its use in creepy internet stalking","subtitle":null,"slug":"emf2014-193-machine-learning-and-its-use-in-creepy-internet-stalking","link":"https://c3voc.de","description":"This presentation will discuss the extreme vulnerability that most people have to being stalked online and then focusing on a few examples of research going on in universities on network inference. The purpose of this talk is to shed light on the topic of social network inference and show yet another application of machine learning.","original_language":"eng","persons":["Maria Han Veiga"],"tags":["emf2014","193","2014"],"view_count":2,"promoted":false,"date":"2014-08-31T15:15:00.000+02:00","release_date":"2024-08-27T00:00:00.000+02:00","updated_at":"2025-09-25T08:00:06.770+02:00","length":850,"duration":850,"thumb_url":"https://static.media.ccc.de/media/events/emf/2014/193-ad8da848-2268-51b7-89bf-628705f17f0b.jpg","poster_url":"https://static.media.ccc.de/media/events/emf/2014/193-ad8da848-2268-51b7-89bf-628705f17f0b_preview.jpg","timeline_url":"https://static.media.ccc.de/media/events/emf/2014/193-ad8da848-2268-51b7-89bf-628705f17f0b.timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/events/emf/2014/193-ad8da848-2268-51b7-89bf-628705f17f0b.thumbnails.vtt","frontend_link":"https://media.ccc.de/v/emf2014-193-machine-learning-and-its-use-in-creepy-internet-stalking","url":"https://api.media.ccc.de/public/events/ad8da848-2268-51b7-89bf-628705f17f0b","conference_title":"Electromagnetic Field 2014","conference_url":"https://api.media.ccc.de/public/conferences/emf2014","related":[],"recordings":[{"size":44,"length":850,"mime_type":"video/webm","language":"eng","filename":"emf2014-193-eng-Machine_learning_and_its_use_in_creepy_internet_stalking_webm-hd.webm","state":"new","folder":"webm-hd","high_quality":true,"width":854,"height":480,"updated_at":"2024-08-27T05:39:11.934+02:00","recording_url":"https://cdn.media.ccc.de/events/emf/2014/webm-hd/emf2014-193-eng-Machine_learning_and_its_use_in_creepy_internet_stalking_webm-hd.webm","url":"https://api.media.ccc.de/public/recordings/79335","event_url":"https://api.media.ccc.de/public/events/ad8da848-2268-51b7-89bf-628705f17f0b","conference_url":"https://api.media.ccc.de/public/conferences/emf2014"},{"size":31,"length":850,"mime_type":"video/webm","language":"eng","filename":"emf2014-193-eng-Machine_learning_and_its_use_in_creepy_internet_stalking_webm-sd.webm","state":"new","folder":"webm-sd","high_quality":false,"width":720,"height":576,"updated_at":"2024-08-27T05:38:17.045+02:00","recording_url":"https://cdn.media.ccc.de/events/emf/2014/webm-sd/emf2014-193-eng-Machine_learning_and_its_use_in_creepy_internet_stalking_webm-sd.webm","url":"https://api.media.ccc.de/public/recordings/79334","event_url":"https://api.media.ccc.de/public/events/ad8da848-2268-51b7-89bf-628705f17f0b","conference_url":"https://api.media.ccc.de/public/conferences/emf2014"},{"size":8,"length":850,"mime_type":"audio/opus","language":"eng","filename":"emf2014-193-eng-Machine_learning_and_its_use_in_creepy_internet_stalking_opus.opus","state":"new","folder":"opus","high_quality":false,"width":0,"height":0,"updated_at":"2024-08-27T05:29:17.801+02:00","recording_url":"https://cdn.media.ccc.de/events/emf/2014/opus/emf2014-193-eng-Machine_learning_and_its_use_in_creepy_internet_stalking_opus.opus","url":"https://api.media.ccc.de/public/recordings/79331","event_url":"https://api.media.ccc.de/public/events/ad8da848-2268-51b7-89bf-628705f17f0b","conference_url":"https://api.media.ccc.de/public/conferences/emf2014"},{"size":12,"length":850,"mime_type":"audio/mpeg","language":"eng","filename":"emf2014-193-eng-Machine_learning_and_its_use_in_creepy_internet_stalking_mp3.mp3","state":"new","folder":"mp3","high_quality":false,"width":0,"height":0,"updated_at":"2024-08-27T05:28:55.471+02:00","recording_url":"https://cdn.media.ccc.de/events/emf/2014/mp3/emf2014-193-eng-Machine_learning_and_its_use_in_creepy_internet_stalking_mp3.mp3","url":"https://api.media.ccc.de/public/recordings/79330","event_url":"https://api.media.ccc.de/public/events/ad8da848-2268-51b7-89bf-628705f17f0b","conference_url":"https://api.media.ccc.de/public/conferences/emf2014"},{"size":26,"length":850,"mime_type":"video/mp4","language":"eng","filename":"emf2014-193-eng-Machine_learning_and_its_use_in_creepy_internet_stalking_sd.mp4","state":"new","folder":"h264-sd","high_quality":false,"width":720,"height":576,"updated_at":"2024-08-27T05:19:48.846+02:00","recording_url":"https://cdn.media.ccc.de/events/emf/2014/h264-sd/emf2014-193-eng-Machine_learning_and_its_use_in_creepy_internet_stalking_sd.mp4","url":"https://api.media.ccc.de/public/recordings/79324","event_url":"https://api.media.ccc.de/public/events/ad8da848-2268-51b7-89bf-628705f17f0b","conference_url":"https://api.media.ccc.de/public/conferences/emf2014"},{"size":31,"length":850,"mime_type":"video/mp4","language":"eng","filename":"emf2014-193-eng-Machine_learning_and_its_use_in_creepy_internet_stalking_hd.mp4","state":"new","folder":"h264-hd","high_quality":true,"width":854,"height":480,"updated_at":"2024-08-27T05:17:18.882+02:00","recording_url":"https://cdn.media.ccc.de/events/emf/2014/h264-hd/emf2014-193-eng-Machine_learning_and_its_use_in_creepy_internet_stalking_hd.mp4","url":"https://api.media.ccc.de/public/recordings/79319","event_url":"https://api.media.ccc.de/public/events/ad8da848-2268-51b7-89bf-628705f17f0b","conference_url":"https://api.media.ccc.de/public/conferences/emf2014"}]}