{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,9]],"date-time":"2024-09-09T07:35:09Z","timestamp":1725867309342},"publisher-location":"Cham","reference-count":16,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319476490"},{"type":"electronic","value":"9783319476506"}],"license":[{"start":{"date-parts":[[2016,1,1]],"date-time":"2016-01-01T00:00:00Z","timestamp":1451606400000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2016]]},"DOI":"10.1007\/978-3-319-47650-6_36","type":"book-chapter","created":{"date-parts":[[2016,10,4]],"date-time":"2016-10-04T21:32:26Z","timestamp":1475616746000},"page":"453-464","source":"Crossref","is-referenced-by-count":1,"title":["i-Shield: A System to Protect the Security of Your Smartphone"],"prefix":"10.1007","author":[{"given":"Zhuolong","family":"Yu","sequence":"first","affiliation":[]},{"given":"Liusheng","family":"Huang","sequence":"additional","affiliation":[]},{"given":"Hansong","family":"Guo","sequence":"additional","affiliation":[]},{"given":"Hongli","family":"Xu","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2016,10,5]]},"reference":[{"key":"36_CR1","unstructured":"Apple. http:\/\/www.apple.com\/icloud\/find-my-iphone.html"},{"key":"36_CR2","unstructured":"Google. https:\/\/www.google.com\/android\/devicemanager"},{"key":"36_CR3","unstructured":"Lookout. https:\/\/www.lookout.com\/resources\/reports"},{"issue":"6","key":"36_CR4","doi-asserted-by":"crossref","first-page":"883","DOI":"10.1016\/j.pmcj.2012.08.003","volume":"8","author":"S Abbate","year":"2012","unstructured":"Abbate, S., Avvenuti, M., Bonatesta, F., Cola, G., Corsini, P., Vecchio, A.: A smartphone-based fall detection system. Pervasive Mob. Comput. 8(6), 883\u2013899 (2012)","journal-title":"Pervasive Mob. Comput."},{"key":"36_CR5","doi-asserted-by":"crossref","unstructured":"Chen, X., Jindal, A., Ding, N., Hu, Y.C., Gupta, M., Vannithamby, R.: Smartphone background activities in the wild: origin, energy drain, and optimization. In: Proceedings of the 21st Annual International Conference on Mobile Computing and Networking, pp. 40\u201352. ACM (2015)","DOI":"10.1145\/2789168.2790107"},{"key":"36_CR6","doi-asserted-by":"crossref","unstructured":"Gouthaman, S., Pandya, A., Karande, O., Kalbande, D.: Gesture detection system using smart watch based motion sensors. In: 2014 International Conference on Circuits, Systems, Communication and Information Technology Applications (CSCITA), pp. 311\u2013316. IEEE (2014)","DOI":"10.1109\/CSCITA.2014.6839278"},{"issue":"6","key":"36_CR7","doi-asserted-by":"crossref","first-page":"533","DOI":"10.1016\/j.datak.2010.01.004","volume":"69","author":"T Gu","year":"2010","unstructured":"Gu, T., Chen, S., Tao, X., Lu, J.: An unsupervised approach to activity recognition and segmentation based on object-use fingerprints. Data Knowl. Eng. 69(6), 533\u2013544 (2010)","journal-title":"Data Knowl. Eng."},{"key":"36_CR8","doi-asserted-by":"crossref","unstructured":"Parate, A., Chiu, M.C., Chadowitz, C., Ganesan, D., Kalogerakis, E.: RisQ: recognizing smoking gestures with inertial sensors on a wristband. In: Proceedings of the 12th annual international conference on Mobile systems, applications, and services, pp. 149\u2013161. ACM (2014)","DOI":"10.1145\/2594368.2594379"},{"key":"36_CR9","doi-asserted-by":"crossref","unstructured":"Ren, B., Sun, Y., Lin, Y.: Anti-theft and tracking loop model based on PC and smart phone. In: 2013 Fifth International Conference on Computational and Information Sciences (ICCIS), pp. 1943\u20131946. IEEE (2013)","DOI":"10.1109\/ICCIS.2013.508"},{"key":"36_CR10","doi-asserted-by":"crossref","unstructured":"Shao, J., Lu, R., Lin, X.: Fine: a fine-grained privacy-preserving location-based service framework for mobile devices. In: IEEE Conference on Computer Communications, IEEE INFOCOM 2014, pp. 244\u2013252. IEEE (2014)","DOI":"10.1109\/INFOCOM.2014.6847945"},{"key":"36_CR11","doi-asserted-by":"crossref","unstructured":"Shu, Y., Shin, K.G., He, T., Chen, J.: Last-mile navigation using smartphones. In: Proceedings of the 21st Annual International Conference on Mobile Computing and Networking. pp. 512\u2013524. ACM (2015)","DOI":"10.1145\/2789168.2790099"},{"key":"36_CR12","series-title":"Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering","doi-asserted-by":"publisher","first-page":"29","DOI":"10.1007\/978-3-642-17758-3_3","volume-title":"Mobile Wireless Middleware, Operating Systems, and Applications","author":"C Thompson","year":"2010","unstructured":"Thompson, C., White, J., Dougherty, B., Albright, A., Schmidt, D.C.: Using smartphones to detect car accidents and provide situational awareness to emergency responders. In: Cai, Y., Magedanz, T., Li, M., Xia, J., Giannelli, C. (eds.) MOBILWARE 2010. LNICST, vol. 48, pp. 29\u201342. Springer, Heidelberg (2010). doi: 10.1007\/978-3-642-17758-3_3"},{"key":"36_CR13","doi-asserted-by":"crossref","unstructured":"Weiss, G.M., Timko, J.L., Gallagher, C.M., Yoneda, K., Schreiber, A.J.: Smartwatch-based activity recognition: a machine learning approach. In: 2016 IEEE-EMBS International Conference on Biomedical and Health Informatics (BHI), pp. 426\u2013429. IEEE (2016)","DOI":"10.1109\/BHI.2016.7455925"},{"issue":"1","key":"36_CR14","doi-asserted-by":"crossref","first-page":"39","DOI":"10.1007\/s10610-007-9040-9","volume":"14","author":"S Whitehead","year":"2008","unstructured":"Whitehead, S., Mailley, J., Storer, I., McCardle, J., Torrens, G., Farrell, G.: In safe hands: a review of mobile phone anti-theft designs. Eur. J. Crim. Policy Res. 14(1), 39\u201360 (2008)","journal-title":"Eur. J. Crim. Policy Res."},{"issue":"5","key":"36_CR15","doi-asserted-by":"crossref","first-page":"e130","DOI":"10.2196\/jmir.2208","volume":"14","author":"W Wu","year":"2012","unstructured":"Wu, W., Dasgupta, S., Ramirez, E.E., Peterson, C., Norman, G.J.: Classification accuracies of physical activities using smartphone motion sensors. J. Med. Internet Res. 14(5), e130 (2012)","journal-title":"J. Med. Internet Res."},{"key":"36_CR16","doi-asserted-by":"crossref","unstructured":"Yu, X., Wang, Z., Sun, K., Zhu, W.T., Gao, N., Jing, J.: Remotely wiping sensitive data on stolen smartphones. In: Proceedings of the 9th ACM Symposium on Information, Computer and Communications Security, pp. 537\u2013542. ACM (2014)","DOI":"10.1145\/2590296.2590318"}],"container-title":["Lecture Notes in Computer Science","Knowledge Science, Engineering and Management"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-47650-6_36","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,25]],"date-time":"2017-06-25T00:21:49Z","timestamp":1498350109000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-47650-6_36"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016]]},"ISBN":["9783319476490","9783319476506"],"references-count":16,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-47650-6_36","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2016]]}}}