{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,21]],"date-time":"2026-02-21T06:03:09Z","timestamp":1771653789408,"version":"3.50.1"},"reference-count":28,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2015,6]]},"DOI":"10.1109\/icc.2015.7248377","type":"proceedings-article","created":{"date-parts":[[2015,9,11]],"date-time":"2015-09-11T00:40:36Z","timestamp":1441932036000},"page":"536-541","source":"Crossref","is-referenced-by-count":22,"title":["Privacy for IoT: Involuntary privacy enablement for smart energy systems"],"prefix":"10.1109","author":[{"given":"Arijit","family":"Ukil","sequence":"first","affiliation":[]},{"given":"Soma","family":"Bandyopadhyay","sequence":"additional","affiliation":[]},{"given":"Arpan","family":"Pal","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/SmartGridComm.2011.6102315"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/CISP.2008.180"},{"key":"ref12","article-title":"General Foundations for Studying Masking and Swamping Robustness of Outlier Identifiers","author":"serfling","year":"2013","journal-title":"Elsevier Statistical Methodology"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/SmartGridComm.2011.6102335"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/ISCC.2014.6912486"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1080\/01621459.1993.10476339"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1016\/j.compchemeng.2004.01.009"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1080\/00401706.1983.10487848"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1145\/1878431.1878446"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/TDC.2012.6281659"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1145\/2674061.2675029"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1145\/773153.773173"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1007\/978-94-007-2792-2_8"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/PDGC.2010.5679976"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1145\/2382196.2382242"},{"key":"ref5","first-page":"8","article-title":"Privacy in Data Publishing","author":"vimercati","year":"2011","journal-title":"DPM"},{"key":"ref8","article-title":"REDD: A public data set for energy disaggregation research","author":"kolter","year":"2011","journal-title":"ACM SustKDD"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2013.2253320"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1145\/2046707.2046720"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/SMARTGRID.2010.5622047"},{"key":"ref1","article-title":"Guidelines for Smart Grid Cyber Security","volume":"2","author":"locke","year":"2010","journal-title":"Privacy and the Smart Grid NISTIR 7628"},{"key":"ref20","article-title":"BLUED: A Fully Labeled Public Dataset for Event-Based Non-Intrusive Load Monitoring Research","author":"anderson","year":"2012","journal-title":"ACM SustKDD"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1142\/S021848850200165X"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOMW.2014.6849186"},{"key":"ref24","first-page":"472","article-title":"Towards mechanism for incentivating privacy","author":"bonatti","year":"2011","journal-title":"ESORICS"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1145\/1217299.1217302"},{"key":"ref26","first-page":"1","article-title":"Evaluating Laplace Noise Addition to Satisfy Differential Privacy for Numeric Data","volume":"4","author":"sarathy","year":"2011","journal-title":"Trans Data Privacy"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/IMIS.2013.78"}],"event":{"name":"2015 IEEE International Conference on Signal Processing for Communications (ICC)","location":"London","start":{"date-parts":[[2015,6,8]]},"end":{"date-parts":[[2015,6,12]]}},"container-title":["2015 IEEE International Conference on Communications (ICC)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/7225357\/7248285\/07248377.pdf?arnumber=7248377","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,5]],"date-time":"2017-06-05T16:55:06Z","timestamp":1496681706000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/7248377\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015,6]]},"references-count":28,"URL":"https:\/\/doi.org\/10.1109\/icc.2015.7248377","relation":{},"subject":[],"published":{"date-parts":[[2015,6]]}}}