{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,1]],"date-time":"2025-11-01T02:42:27Z","timestamp":1761964947099,"version":"3.41.0"},"publisher-location":"Cham","reference-count":29,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319712451"},{"type":"electronic","value":"9783319712468"}],"license":[{"start":{"date-parts":[[2017,1,1]],"date-time":"2017-01-01T00:00:00Z","timestamp":1483228800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2017,1,1]],"date-time":"2017-01-01T00:00:00Z","timestamp":1483228800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017]]},"DOI":"10.1007\/978-3-319-71246-8_14","type":"book-chapter","created":{"date-parts":[[2017,12,29]],"date-time":"2017-12-29T09:03:20Z","timestamp":1514538200000},"page":"222-237","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["Partial Device Fingerprints"],"prefix":"10.1007","author":[{"given":"Michael","family":"Ciere","sequence":"first","affiliation":[]},{"given":"Carlos","family":"Ga\u00f1\u00e1n","sequence":"additional","affiliation":[]},{"given":"Michel","family":"van Eeten","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2017,12,30]]},"reference":[{"issue":"6","key":"14_CR1","doi-asserted-by":"publisher","first-page":"1152","DOI":"10.1214\/aos\/1176342871","volume":"2","author":"CE Antoniak","year":"1974","unstructured":"Antoniak, C.E.: Mixtures of dirichlet processes with applications to Bayesian nonparametric problems. Ann. Stat. 2(6), 1152\u20131174 (1974). http:\/\/projecteuclid.org\/euclid.aos\/1176342871","journal-title":"Ann. Stat."},{"key":"14_CR2","volume-title":"Tracking and Data Association","author":"Y Bar-Shalom","year":"1988","unstructured":"Bar-Shalom, Y., Fortmann, T.E.: Tracking and Data Association. Academic Press, New York (1988)"},{"key":"14_CR3","volume-title":"Multiple-target Tracking with Radar Applications","author":"SS Blackman","year":"1986","unstructured":"Blackman, S.S.: Multiple-target Tracking with Radar Applications. Artech House, Norwood (1986)"},{"key":"14_CR4","doi-asserted-by":"crossref","unstructured":"Brik, V., Banerjee, S., Gruteser, M., Oh, S.: Wireless device identification with radiometric signatures. In: Proceedings of the 14th ACM International Conference on Mobile Computing and Networking, MobiCom 2008, pp. 116\u2013127. ACM, New York (2008). http:\/\/doi.acm.org\/10.1145\/1409944.1409959","DOI":"10.1145\/1409944.1409959"},{"issue":"2","key":"14_CR5","doi-asserted-by":"publisher","first-page":"235","DOI":"10.1111\/j.1467-9868.2005.00499.x","volume":"67","author":"BS Caffo","year":"2005","unstructured":"Caffo, B.S., Jank, W., Jones, G.L.: Ascent-based Monte Carlo expectation maximization. J. Royal Stat. Soc.: Series B (Stat. Methodol.) 67(2), 235\u2013251 (2005). http:\/\/onlinelibrary.wiley.com\/doi\/10.1111\/j.1467-9868.2005.00499.x\/abstract","journal-title":"J. Royal Stat. Soc.: Series B (Stat. Methodol.)"},{"issue":"1","key":"14_CR6","doi-asserted-by":"publisher","first-page":"53","DOI":"10.1007\/BF01440847","volume":"10","author":"IJ Cox","year":"1993","unstructured":"Cox, I.J.: A review of statistical data association techniques for motion correspondence. Int. J. Comput. Vis. 10(1), 53\u201366 (1993). https:\/\/doi.org\/10.1007\/BF01440847","journal-title":"Int. J. Comput. Vis."},{"issue":"1\u20132","key":"14_CR7","doi-asserted-by":"publisher","first-page":"45","DOI":"10.1023\/A:1020245811187","volume":"50","author":"F Dellaert","year":"2003","unstructured":"Dellaert, F., Seitz, S.M., Thorpe, C.E., Thrun, S.: EM, MCMC, and chain flipping for structure from motion with unknown correspondence. Mach. Learn. 50(1\u20132), 45\u201371 (2003). https:\/\/doi.org\/10.1023\/A:1020245811187","journal-title":"Mach. Learn."},{"issue":"1","key":"14_CR8","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1111\/j.2517-6161.1977.tb01600.x","volume":"39","author":"AP Dempster","year":"1977","unstructured":"Dempster, A.P., Laird, N.M., Rubin, D.B.: Maximum likelihood from incomplete data via the EM algorithm. J. Roy. Stat. Soc. Series B (Methodol.) 39(1), 1\u201338 (1977). http:\/\/www.jstor.org\/stable\/2984875","journal-title":"J. Roy. Stat. Soc. Series B (Methodol.)"},{"issue":"4","key":"14_CR9","doi-asserted-by":"publisher","first-page":"842","DOI":"10.1890\/0012-9658(2006)87[842:ESRAAB]2.0.CO;2","volume":"87","author":"RM Dorazio","year":"2006","unstructured":"Dorazio, R.M., Royle, J.A., Sderstrm, B., Glimskr, A.: Estimating species richness and accumulation by modeling species occurrence and detectability. Ecology 87(4), 842\u2013854 (2006)","journal-title":"Ecology"},{"key":"14_CR10","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/978-3-642-14527-8_1","volume-title":"Privacy Enhancing Technologies","author":"P Eckersley","year":"2010","unstructured":"Eckersley, P.: How unique is your web browser? In: Atallah, M.J., Hopper, N.J. (eds.) PETS 2010. LNCS, vol. 6205, pp. 1\u201318. Springer, Heidelberg (2010). https:\/\/doi.org\/10.1007\/978-3-642-14527-8_1"},{"issue":"1","key":"14_CR11","doi-asserted-by":"publisher","first-page":"87","DOI":"10.1016\/0040-5809(72)90035-4","volume":"3","author":"WJ Ewens","year":"1972","unstructured":"Ewens, W.J.: The sampling theory of selectively neutral alleles. Theor. Popul. Biol. 3(1), 87\u2013112 (1972). http:\/\/www.sciencedirect.com\/science\/article\/pii\/0040580972900354","journal-title":"Theor. Popul. Biol."},{"key":"14_CR12","unstructured":"Gilks, W.R.: Markov chain Monte Carlo. In: Encyclopedia of Biostatistics. Wiley, Hoboken (2005). http:\/\/onlinelibrary.wiley.com\/doi\/10.1002\/0470011815.b2a14021\/abstract"},{"key":"14_CR13","unstructured":"Huang, T., Russell, S.: Object identification in a Bayesian context. In: Proceedings of the Fifteenth International Joint Conference on Artifical Intelligence, IJCAI 1997, vol. 2, pp. 1276\u20131282. Morgan Kaufmann Publishers Inc., San Francisco, CA, USA (1997). http:\/\/dl.acm.org\/citation.cfm?id=1622270.1622340"},{"issue":"2","key":"14_CR14","doi-asserted-by":"publisher","first-page":"93","DOI":"10.1109\/TDSC.2005.26","volume":"2","author":"T Kohno","year":"2005","unstructured":"Kohno, T., Broido, A., Claffy, K.C.: Remote physical device fingerprinting. IEEE Trans. Dependable Secure Comput. 2(2), 93\u2013108 (2005)","journal-title":"IEEE Trans. Dependable Secure Comput."},{"issue":"9","key":"14_CR15","doi-asserted-by":"publisher","first-page":"361","DOI":"10.1109\/4234.951377","volume":"5","author":"J Luo","year":"2001","unstructured":"Luo, J., Pattipati, K.R., Willett, P.K., Hasegawa, F.: Near-optimal multiuser detection in synchronous CDMA using probabilistic data association. IEEE Commun. Lett. 5(9), 361\u2013363 (2001)","journal-title":"IEEE Commun. Lett."},{"issue":"2","key":"14_CR16","doi-asserted-by":"publisher","first-page":"293","DOI":"10.1109\/TRO.2008.918048","volume":"24","author":"D Marinakis","year":"2008","unstructured":"Marinakis, D., Dudek, G.: Occam\u2019s Razor applied to network topology inference. IEEE Trans. Robot. 24(2), 293\u2013306 (2008)","journal-title":"IEEE Trans. Robot."},{"key":"14_CR17","doi-asserted-by":"crossref","unstructured":"Marinakis, D., Dudek, G., Fleet, D.J.: Learning sensor network topology through Monte Carlo expectation maximization. In: Proceedings of the 2005 IEEE International Conference on Robotics and Automation, pp. 4581\u20134587, April 2005","DOI":"10.1109\/ROBOT.2005.1570826"},{"key":"14_CR18","unstructured":"Marinakis, D., Dudek, G.: Topological mapping through distributed, passive sensors. In: Proceedings of the 20th International Joint Conference on Artifical Intelligence, IJCAI 2007, pp. 2147\u20132152. Morgan Kaufmann Publishers Inc., San Francisco, CA, USA (2007). http:\/\/dl.acm.org\/citation.cfm?id=1625275.1625622"},{"key":"14_CR19","unstructured":"Mowery, K., Bogenreif, D., Yilek, S., Shacham, H.: Fingerprinting information in Javascript implementations. ResearchGate, May 2012"},{"key":"14_CR20","doi-asserted-by":"crossref","unstructured":"Neal, R.M., Hinton, G.E.: Learning in Graphical Models, pp. 355\u2013368. MIT Press, Cambridge (1999). http:\/\/dl.acm.org\/citation.cfm?id=308574.308679","DOI":"10.1007\/978-94-011-5014-9_12"},{"key":"14_CR21","doi-asserted-by":"crossref","unstructured":"Neumann, C., Heen, O., Onno, S.: An empirical study of passive 802.11 device fingerprinting. In: 2012 32nd International Conference on Distributed Computing Systems Workshops, pp. 593\u2013602, June 2012","DOI":"10.1109\/ICDCSW.2012.8"},{"key":"14_CR22","doi-asserted-by":"crossref","unstructured":"Nikiforakis, N., Kapravelos, A., Joosen, W., Kruegel, C., Piessens, F., Vigna, G.: Cookieless Monster: exploring the ecosystem of web-based device fingerprinting. In: 2013 IEEE Symposium on Security and Privacy (SP), pp. 541\u2013555, May 2013","DOI":"10.1109\/SP.2013.43"},{"issue":"3","key":"14_CR23","doi-asserted-by":"publisher","first-page":"481","DOI":"10.1109\/TAC.2009.2012975","volume":"54","author":"S Oh","year":"2009","unstructured":"Oh, S., Russell, S., Sastry, S.: Markov chain Monte Carlo data association for multi-target tracking. IEEE Trans. Autom. Control 54(3), 481\u2013497 (2009)","journal-title":"IEEE Trans. Autom. Control"},{"key":"14_CR24","unstructured":"Oh, S., Russell, S., Sastry, S.: Markov chain Monte Carlo data association for general multiple-target tracking problems. In: 43rd IEEE Conference on Decision and Control, 2004. CDC, vol. 1, pp. 735\u2013742, December 2004"},{"key":"14_CR25","unstructured":"Pasula, H., Russell, S.J., Ostland, M., Ritov, Y.: Tracking many objects with many sensors. In: Proceedings of the Sixteenth International Joint Conference on Artificial Intelligence, pp. 1160\u20131171. IJCAI 1999. Morgan Kaufmann Publishers Inc., San Francisco (1999). http:\/\/dl.acm.org\/citation.cfm?id=646307.687451"},{"key":"14_CR26","series-title":"Lecture Notes in Mathematics","doi-asserted-by":"publisher","DOI":"10.1007\/b11601500","volume-title":"Combinatorial Stochastic Processes","author":"J Pitman","year":"2006","unstructured":"Pitman, J.: Combinatorial Stochastic Processes. Lecture Notes in Mathematics, vol. 1875. Springer, Heidelberg (2006). https:\/\/doi.org\/10.1007\/b11601500"},{"issue":"2","key":"14_CR27","doi-asserted-by":"publisher","first-page":"125","DOI":"10.1109\/TME.1964.4323129","volume":"8","author":"RW Sittler","year":"1964","unstructured":"Sittler, R.W.: An optimal data association problem in surveillance theory. IEEE Trans. Mil. Electron. 8(2), 125\u2013139 (1964)","journal-title":"IEEE Trans. Mil. Electron."},{"key":"14_CR28","doi-asserted-by":"crossref","unstructured":"Spooren, J., Preuveneers, D., Joosen, W.: Mobile device fingerprinting considered harmful for risk-based authentication. In: Proceedings of the Eighth European Workshop on System Security, EuroSec 2015, pp. 6:1\u20136:6. ACM, New York (2015). http:\/\/doi.acm.org\/10.1145\/2751323.2751329","DOI":"10.1145\/2751323.2751329"},{"issue":"411","key":"14_CR29","doi-asserted-by":"publisher","first-page":"699","DOI":"10.1080\/01621459.1990.10474930","volume":"85","author":"GCG Wei","year":"1990","unstructured":"Wei, G.C.G., Tanner, M.A.: A Monte Carlo implementation of the EM algorithm and the poor man\u2019s data augmentation algorithms. J. Am. Stat. Assoc. 85(411), 699\u2013704 (1990). https:\/\/doi.org\/10.1080\/01621459.1990.10474930","journal-title":"J. Am. Stat. Assoc."}],"container-title":["Lecture Notes in Computer Science","Machine Learning and Knowledge Discovery in Databases"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-71246-8_14","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,29]],"date-time":"2025-06-29T09:09:00Z","timestamp":1751188140000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-319-71246-8_14"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017]]},"ISBN":["9783319712451","9783319712468"],"references-count":29,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-71246-8_14","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2017]]},"assertion":[{"value":"30 December 2017","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ECML PKDD","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Joint European Conference on Machine Learning and Knowledge Discovery in Databases","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Skopje","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Macedonia","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2017","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"18 September 2017","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"22 September 2017","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"17","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"ecml2017","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/ecmlpkdd2017.ijs.si\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"This content has been made available to all.","name":"free","label":"Free to read"}]}}