{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,6]],"date-time":"2026-02-06T05:03:02Z","timestamp":1770354182861,"version":"3.49.0"},"reference-count":46,"publisher":"IEEE","license":[{"start":{"date-parts":[[2024,5,20]],"date-time":"2024-05-20T00:00:00Z","timestamp":1716163200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2024,5,20]],"date-time":"2024-05-20T00:00:00Z","timestamp":1716163200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2024,5,20]]},"DOI":"10.1109\/infocom52122.2024.10621247","type":"proceedings-article","created":{"date-parts":[[2024,8,12]],"date-time":"2024-08-12T17:25:41Z","timestamp":1723483541000},"page":"1860-1869","source":"Crossref","is-referenced-by-count":2,"title":["BLE Location Tracking Attacks by Exploiting Frequency Synthesizer Imperfection"],"prefix":"10.1109","author":[{"given":"Yeming","family":"Li","sequence":"first","affiliation":[{"name":"Zhejiang University,The State Key Laboratory of Blockchain and Data Security College of Computer Science"}]},{"given":"Hailong","family":"Lin","sequence":"additional","affiliation":[{"name":"Zhejiang University,The State Key Laboratory of Blockchain and Data Security College of Computer Science"}]},{"given":"Jiamei","family":"Lv","sequence":"additional","affiliation":[{"name":"Zhejiang University,The State Key Laboratory of Blockchain and Data Security College of Computer Science"}]},{"given":"Yi","family":"Gao","sequence":"additional","affiliation":[{"name":"Zhejiang University,The State Key Laboratory of Blockchain and Data Security College of Computer Science"}]},{"given":"Wei","family":"Dong","sequence":"additional","affiliation":[{"name":"Zhejiang University,The State Key Laboratory of Blockchain and Data Security College of Computer Science"}]}],"member":"263","reference":[{"key":"ref1","article-title":"Core specification 5.4","year":"2023"},{"key":"ref2","article-title":"Bluetooth 2022 market update","year":"2022"},{"key":"ref3","article-title":"ibeacon","year":"2023"},{"key":"ref4","article-title":"Eddystone","year":"2023"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/SP46214.2022.9833758"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1145\/3143361.3143385"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1145\/3524107"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/ICCE-Asia53811.2021.9641870"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/Cybermatics_2018.2018.00039"},{"key":"ref10","article-title":"Bluetooth technology protecting your privacy","year":"2015"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.2478\/popets-2019-0036"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1145\/3338507.3358617"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/FMEC49853.2020.9144756"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM.2014.6848235"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1145\/2939918.2939936"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/GLOCOM.2014.7036875"},{"key":"ref17","article-title":"Application note crystal basics","year":"2023"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-88626-4_3"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/RFIC.2003.1213919"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1145\/3507657.3528542"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM.2018.8485917"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1145\/1409944.1409959"},{"key":"ref23","article-title":"nRF52840 Objective Product Specification v0.5","year":"2016"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1145\/513918.514045"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/4.643663"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2005.857206"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/58.393101"},{"key":"ref28","article-title":"Q2 & first half report 2023","author":"Semiconductor","year":"2023"},{"key":"ref29","article-title":"DA14580","year":"2022"},{"key":"ref30","article-title":"CC2650 SimpleLink Multistandard Wireless MCU","year":"2016"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1109\/ISPCC53510.2021.9609421"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1109\/ICCITM53167.2021.9677727"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1145\/3458864.3466865"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1109\/TCSII.2003.820250"},{"key":"ref35","article-title":"SX1276\/77\/78\/79 - 137 MHz to 1020 MHz Low Power Long Range Transceiver","year":"2020"},{"key":"ref36","article-title":"At86rf231 - complete datasheet","year":"2023"},{"key":"ref37","article-title":"Bcm43455 datasheet","year":"2015"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM.2018.8485917"},{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2018.2838071"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM.2019.8737455"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1145\/1741866.1741894"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM.2019.8737455"},{"key":"ref43","article-title":"Enhancing intrusion detection in wireless networks using radio frequency fingerprinting","volume":"1","author":"Hall","year":"2004","journal-title":"Communications, internet, and information technology"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1109\/AusCTW.2012.6164912"},{"key":"ref45","first-page":"4","article-title":"Detection of rogue devices in bluetooth networks using radio frequency fingerprinting","volume-title":"Proc. of Citeseer CCN","author":"Barbeau"},{"key":"ref46","first-page":"25","article-title":"Transient-based identification of wireless sensor nodes","volume-title":"Proc. of IEEE IPSN.","author":"Danev"}],"event":{"name":"IEEE INFOCOM 2024 - IEEE Conference on Computer Communications","location":"Vancouver, BC, Canada","start":{"date-parts":[[2024,5,20]]},"end":{"date-parts":[[2024,5,23]]}},"container-title":["IEEE INFOCOM 2024 - IEEE Conference on Computer Communications"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/10621050\/10621073\/10621247.pdf?arnumber=10621247","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,8,13]],"date-time":"2024-08-13T05:25:44Z","timestamp":1723526744000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10621247\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,5,20]]},"references-count":46,"URL":"https:\/\/doi.org\/10.1109\/infocom52122.2024.10621247","relation":{},"subject":[],"published":{"date-parts":[[2024,5,20]]}}}