{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,3]],"date-time":"2024-09-03T22:53:55Z","timestamp":1725404035920},"reference-count":17,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018,5]]},"DOI":"10.1109\/icc.2018.8422764","type":"proceedings-article","created":{"date-parts":[[2018,8,20]],"date-time":"2018-08-20T22:51:41Z","timestamp":1534805501000},"page":"1-6","source":"Crossref","is-referenced-by-count":0,"title":["Preventing Wi-Fi Privacy Leakage: A User Behavioral Similarity Approach"],"prefix":"10.1109","author":[{"given":"Xiuping","family":"Han","sequence":"first","affiliation":[]},{"given":"Zhi","family":"Wang","sequence":"additional","affiliation":[]},{"given":"Dan","family":"Pei","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1145\/2504730.2504742"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1142\/S0218488502001648"},{"key":"ref12","article-title":"Privacy and your app","author":"skinner","year":"2015","journal-title":"apple worldwide dev conf (wwdc)"},{"year":"2015","key":"ref13","article-title":"Android 6.0 changes"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1145\/2030613.2030630"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM.2016.7524459"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1016\/j.comcom.2010.04.044"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1145\/2723372.2742785"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1145\/1287853.1287866"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2015.2489657"},{"key":"ref6","first-page":"379","article-title":"Raising awareness on smartphone privacy issues with sasquatch, and solving them with privacy police","author":"bonn\u00e9","year":"2014","journal-title":"Proceedings of the 11 th International Conference on Mobile and Ubiquitous Systems Computing Networking and Services ser MOBIQUITOUS &#x2018;14"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1016\/j.pmcj.2013.04.001"},{"key":"ref8","doi-asserted-by":"crossref","first-page":"413","DOI":"10.1145\/2897845.2897883","article-title":"Why mac address randomization is not enough: An analysis of wi-fi network discovery mechanisms","author":"vanhoef","year":"2016","journal-title":"Proceedings of the 11th ACM on Asia Conference on Computer and Communications Security ser ASIA CCS &#x2018;16"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1145\/1514274.1514293"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2015.2507542"},{"key":"ref1","first-page":"8:1","article-title":"How talkative is your mobile device?: An experimental study of wi-fi probe requests","author":"freudiger","year":"2015","journal-title":"Proceedings of the 8th ACM Conference on Security & Privacy in Wireless and Mobile Networks ser WiSec '15"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1155\/2017\/6235484"}],"event":{"name":"2018 IEEE International Conference on Communications (ICC 2018)","start":{"date-parts":[[2018,5,20]]},"location":"Kansas City, MO","end":{"date-parts":[[2018,5,24]]}},"container-title":["2018 IEEE International Conference on Communications (ICC)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8411665\/8422068\/08422764.pdf?arnumber=8422764","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,8,24]],"date-time":"2020-08-24T00:12:14Z","timestamp":1598227934000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/8422764\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,5]]},"references-count":17,"URL":"https:\/\/doi.org\/10.1109\/icc.2018.8422764","relation":{},"subject":[],"published":{"date-parts":[[2018,5]]}}}