{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,5]],"date-time":"2025-11-05T05:52:07Z","timestamp":1762321927531},"reference-count":40,"publisher":"IEEE","license":[{"start":{"date-parts":[[2022,5,2]],"date-time":"2022-05-02T00:00:00Z","timestamp":1651449600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2022,5,2]],"date-time":"2022-05-02T00:00:00Z","timestamp":1651449600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2022,5,2]]},"DOI":"10.1109\/infocom48880.2022.9796908","type":"proceedings-article","created":{"date-parts":[[2022,6,20]],"date-time":"2022-06-20T21:18:49Z","timestamp":1655759929000},"page":"370-379","source":"Crossref","is-referenced-by-count":17,"title":["IoTMosaic: Inferring User Activities from IoT Network Traffic in Smart Homes"],"prefix":"10.1109","author":[{"given":"Yinxin","family":"Wan","sequence":"first","affiliation":[{"name":"Arizona State University"}]},{"given":"Kuai","family":"Xu","sequence":"additional","affiliation":[{"name":"Arizona State University"}]},{"given":"Feng","family":"Wang","sequence":"additional","affiliation":[{"name":"Arizona State University"}]},{"given":"Guoliang","family":"Xue","sequence":"additional","affiliation":[{"name":"Arizona State University"}]}],"member":"263","reference":[{"key":"ref39","article-title":"Discovering and Understanding the Security Hazards in the Interactions between IoT Devices, Mobile Apps, and Clouds on Smart Home Platforms","author":"zhou","year":"2019","journal-title":"Proc of USENIX Security"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1145\/3243734.3243820"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1109\/TWC.2021.3098608"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1109\/TNSE.2020.3026961"},{"key":"ref31","article-title":"PingPong: Packet-Level Signatures for Smart Home Device Events","author":"trimananda","year":"2019","journal-title":"Proc of NDSS"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1145\/2939918.2939925"},{"key":"ref37","article-title":"You Are What You Broadcast: Identification of Mobile and IoT Devices from (Public) WiFi","author":"yu","year":"2020","journal-title":"Proc of USENIX Security"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1145\/3326285.3329072"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2018.23282"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM41043.2020.9155424"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM42981.2021.9488687"},{"key":"ref40","article-title":"ZigBee Exploited: The Good, the Bad and the Ugly","author":"zillner","year":"2017","journal-title":"Proc of the DeepSec Conferences In Depth Security"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2016.44"},{"key":"ref12","article-title":"HAWatcher: Semantics-Aware Anomaly Detection for Appified Smart Homes","author":"fu","year":"2021","journal-title":"Proc of USENIX Security"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2019.23488"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM.2018.8486369"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/SP40000.2020.00051"},{"journal-title":"Algorithm Design","year":"2006","author":"kleinberg","key":"ref16"},{"key":"ref17","article-title":"All Things Considered: An Analysis of IoT Devices on Home Networks","author":"kumar","year":"2019","journal-title":"Proc of USENIX Security"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM42981.2021.9488873"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM41043.2020.9155346"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/BigData.2018.8622243"},{"article-title":"Ring Video Doorbells Rescued By This Great New Feature","year":"2020","author":"barry","key":"ref4"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2017.14"},{"key":"ref3","article-title":"Understanding the Mirai Botnet","author":"antonakakis","year":"2017","journal-title":"Proc of USENIX Security"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.5220\/0010476503090314"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1109\/TMC.2018.2866249"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1145\/3266444.3266452"},{"key":"ref8","article-title":"PFirewall: Semantics-Aware Customizable Data Flow Control for Home Automation Systems","author":"chi","year":"2021","journal-title":"Proc of NDSS"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1145\/3319535.3354254"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2019.00013"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1145\/3098243.3098251"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1145\/3395351.3399421"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/SP40000.2020.00062"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1145\/3098243.3098254"},{"key":"ref21","article-title":"IoT SENTINEL: Automated Device-Type Identification for Security Enforcement in IoT","author":"miettinen","year":"2017","journal-title":"Proc of IEEE ICDCS"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1145\/3317549.3323409"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/TETC.2016.2606384"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1145\/3355369.3355577"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2010.148"}],"event":{"name":"IEEE INFOCOM 2022 - IEEE Conference on Computer Communications","start":{"date-parts":[[2022,5,2]]},"location":"London, United Kingdom","end":{"date-parts":[[2022,5,5]]}},"container-title":["IEEE INFOCOM 2022 - IEEE Conference on Computer Communications"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9796607\/9796652\/09796908.pdf?arnumber=9796908","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,7,11]],"date-time":"2022-07-11T20:01:07Z","timestamp":1657569667000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9796908\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,5,2]]},"references-count":40,"URL":"https:\/\/doi.org\/10.1109\/infocom48880.2022.9796908","relation":{},"subject":[],"published":{"date-parts":[[2022,5,2]]}}}