{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,9]],"date-time":"2024-09-09T08:00:19Z","timestamp":1725868819365},"publisher-location":"Cham","reference-count":9,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319491059"},{"type":"electronic","value":"9783319491066"}],"license":[{"start":{"date-parts":[[2016,10,22]],"date-time":"2016-10-22T00:00:00Z","timestamp":1477094400000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017]]},"DOI":"10.1007\/978-3-319-49106-6_74","type":"book-chapter","created":{"date-parts":[[2016,10,21]],"date-time":"2016-10-21T10:33:13Z","timestamp":1477045993000},"page":"739-746","source":"Crossref","is-referenced-by-count":0,"title":["Inferring Smartphone User Demographics from Wi-Fi trace Logs: A Study of Users\u2019 Privacy Concerns"],"prefix":"10.1007","author":[{"given":"Cheng-Ying","family":"Hsu","sequence":"first","affiliation":[]},{"given":"Shang-En","family":"Yang","sequence":"additional","affiliation":[]},{"given":"Hung-Yuan","family":"Chen","sequence":"additional","affiliation":[]},{"given":"Fang-Yie","family":"Leu","sequence":"additional","affiliation":[]},{"given":"Yao-Chung","family":"Fan","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2016,10,22]]},"reference":[{"unstructured":"Liang Cai and Hao Chen. Touchlogger: Inferring keystrokes on touch screen from smartphone motion. HotSec, 11:9\u20139, 2011.","key":"74_CR1"},{"doi-asserted-by":"crossref","unstructured":"2. Ningning Cheng, Xinlei Oscar Wang, Wei Cheng, Prasant Mohapatra, and Aruna Seneviratne. Characterizing privacy leakage of public wi_ networks for users on travel. In Proceedings of the IEEE INFOCOM 2013, Turin, Italy, April 14-19, 2013, pages 2769\u20132777. IEEE, 2013.","key":"74_CR2","DOI":"10.1109\/INFCOM.2013.6567086"},{"doi-asserted-by":"crossref","unstructured":"Nathan Eagle and Alex Sandy Pentland. Reality mining: sensing complex social systems. Personal and ubiquitous computing, 10(4):255\u2013268, 2006.","key":"74_CR3","DOI":"10.1007\/s00779-005-0046-3"},{"doi-asserted-by":"crossref","unstructured":"Kassem Fawaz and Kang G Shin. Location privacy protection for smartphone users. In Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security, pages 239\u2013250. ACM, 2014.","key":"74_CR4","DOI":"10.1145\/2660267.2660270"},{"unstructured":"5. Saikat Guha, Mudit Jain, and Venkata N Padmanabhan. Koi: A location-privacy platform for smartphone apps. In Proceedings of the 9th USENIX conference on Networked Systems Design and Implementation, pages 14\u201314. USENIX Association, 2012.","key":"74_CR5"},{"unstructured":"Hong Li, Limin Sun, Haojin Zhu, Xiang Lu, and Xiuzhen Cheng. Achieving privacy preservation in wi_ _ngerprint-based localization. In IEEE INFOCOM 2014-IEEE Conference on Computer Communications, pages 2337\u20132345. IEEE, 2014.","key":"74_CR6"},{"doi-asserted-by":"crossref","unstructured":"7. Emmanuel Owusu, Jun Han, Sauvik Das, Adrian Perrig, and Joy Zhang. Accessory: password inference using accelerometers on smartphones. In Proceedings of the Twelfth Workshop on Mobile Computing Systems & Applications, page 9. ACM, 2012.","key":"74_CR7","DOI":"10.1145\/2162081.2162095"},{"unstructured":"Roman Schlegel, Kehuan Zhang, Xiao-yong Zhou, Mehool Intwala, Apu Kapadia, and XiaoFeng Wang. Soundcomber: A stealthy and context-aware sound trojan for smartphones. In NDSS, volume 11, pages 17\u201333, 2011.","key":"74_CR8"},{"unstructured":"Yu Zheng, Xing Xie, and Wei-Ying Ma. Geolife: A collaborative social networking service among user, location and trajectory. IEEE Data Eng. Bull., 33(2):32\u201339, 2010.","key":"74_CR9"}],"container-title":["Lecture Notes on Data Engineering and Communications Technologies","Advances on Broad-Band Wireless Computing, Communication and Applications"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-49106-6_74","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,9,14]],"date-time":"2019-09-14T22:07:29Z","timestamp":1568498849000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-49106-6_74"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,10,22]]},"ISBN":["9783319491059","9783319491066"],"references-count":9,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-49106-6_74","relation":{},"ISSN":["2367-4512","2367-4520"],"issn-type":[{"type":"print","value":"2367-4512"},{"type":"electronic","value":"2367-4520"}],"subject":[],"published":{"date-parts":[[2016,10,22]]}}}