{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,6]],"date-time":"2026-03-06T07:01:35Z","timestamp":1772780495972,"version":"3.50.1"},"reference-count":30,"publisher":"IEEE","license":[{"start":{"date-parts":[[2025,11,11]],"date-time":"2025-11-11T00:00:00Z","timestamp":1762819200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2025,11,11]],"date-time":"2025-11-11T00:00:00Z","timestamp":1762819200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2025,11,11]]},"DOI":"10.1109\/cic67133.2025.00018","type":"proceedings-article","created":{"date-parts":[[2026,3,5]],"date-time":"2026-03-05T20:42:02Z","timestamp":1772743322000},"page":"78-87","source":"Crossref","is-referenced-by-count":0,"title":["ShadowScan: LLM-Based Device Fingerprinting in IoT Networks"],"prefix":"10.1109","author":[{"given":"Duwarahavidyan","family":"Jeganathan","sequence":"first","affiliation":[{"name":"University of Ruhuna,Department of Electrical and Information Engineering,Matara,Sri Lanka,81000"}]},{"given":"Tharuka Harshajith","family":"Bandara","sequence":"additional","affiliation":[{"name":"University of Ruhuna,Department of Electrical and Information Engineering,Matara,Sri Lanka,81000"}]},{"given":"Harsha S.","family":"Gardiyawasam Pussewalage","sequence":"additional","affiliation":[{"name":"University of Agder (UiA),Department of Information and Communication Technology,Grimstad,Norway,N-4898"}]},{"given":"Thilina Deshan","family":"Dissanayake","sequence":"additional","affiliation":[{"name":"University of Ruhuna,Department of Electrical and Information Engineering,Matara,Sri Lanka,81000"}]},{"given":"Dinithi Sachinthana","family":"Fernando","sequence":"additional","affiliation":[{"name":"University of Ruhuna,Department of Electrical and Information Engineering,Matara,Sri Lanka,81000"}]},{"given":"Kushan Sudheera Kalupahana","family":"Liyanage","sequence":"additional","affiliation":[{"name":"University of Ruhuna,Department of Electrical and Information Engineering,Matara,Sri Lanka,81000"}]},{"given":"Thilini","family":"Dahanayaka","sequence":"additional","affiliation":[{"name":"University of Sydney (USYD),School of Computer Science,Camperdown,NSW,Australia,2006"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/ICDCS.2017.283"},{"key":"ref2","article-title":"Iot behavioral monitoring via network traffic analysis","volume-title":"Ph.D. dissertation","author":"Sivanathan","year":"2020"},{"issue":"1","key":"ref3","doi-asserted-by":"crossref","first-page":"140","DOI":"10.3390\/iot2010008","article-title":"Iot traffic: Modeling and measurement experiments","volume":"2","author":"Nguyen-An","year":"2021","journal-title":"IoT"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/TWC.2021.3098608"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/SCSE56529.2022.9905212"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1145\/3674213.3674217"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1201\/9781032659770-1"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/WCNC.2019.8885429"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2023.10.011"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1145\/3580890"},{"issue":"2","key":"ref11","first-page":"1311","article-title":"Iot device recognition using device fingerprinting","volume":"5","author":"Sunil Kumar","year":"2024","journal-title":"International Journal of Research Publication and Reviews"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1016\/j.cie.2025.111041"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/TrustCom\/BigDataSE.2019.00023"},{"key":"ref14","volume-title":"Your smart home can\u2019t keep a secret: Towards automated fingerprinting of iot traffic","author":"Dong","year":"2020"},{"key":"ref15","article-title":"Iot device fingerprint using deep learning","author":"Aneja","year":"2019"},{"key":"ref16","article-title":"Lora device fingerprinting via deep learning: Effectiveness and deployment sensitivity","author":"Elmaghbub","year":"2022"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2014.2369033"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1145\/3727115"},{"key":"ref19","doi-asserted-by":"crossref","first-page":"109387","DOI":"10.1016\/j.comnet.2022.109387","article-title":"Classifying and tracking enterprise assets via dual-grained network behavioral analysis","volume":"218","year":"2022","journal-title":"Computer Networks"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1145\/3646547.3688435"},{"key":"ref21","article-title":"I still see you: Why existing iot traffic reshaping fails","author":"Wang","year":"2024"},{"key":"ref22","doi-asserted-by":"crossref","DOI":"10.1145\/3559613.3563191","volume-title":"Classification of encrypted iot traffic despite padding and shaping","author":"Engelberg","year":"2022"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.3390\/electronics12163477"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2020.3025988"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-45744-4_2"},{"key":"ref26","article-title":"Trafficllm: Enhancing large language models for network traffic analysis with generic traffic representation","author":"Cui","year":"2025"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR52688.2022.00683"},{"key":"ref28","article-title":"Agentic retrieval-augmented generation: A survey on agentic rag","author":"Singh","year":"2025"},{"key":"ref29","article-title":"Large language models (llms) on tabular data: Prediction, generation, and understanding \u2013 a survey","volume-title":"Transactions on Machine Learning Research","author":"Fang","year":"2024"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2018.2865604"}],"event":{"name":"2025 IEEE 11th International Conference on Collaboration and Internet Computing (CIC)","location":"Pittsburgh, PA, USA","start":{"date-parts":[[2025,11,11]]},"end":{"date-parts":[[2025,11,14]]}},"container-title":["2025 IEEE 11th International Conference on Collaboration and Internet Computing (CIC)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/11413914\/11413884\/11413986.pdf?arnumber=11413986","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,3,6]],"date-time":"2026-03-06T05:51:26Z","timestamp":1772776286000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/11413986\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,11,11]]},"references-count":30,"URL":"https:\/\/doi.org\/10.1109\/cic67133.2025.00018","relation":{},"subject":[],"published":{"date-parts":[[2025,11,11]]}}}