{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,30]],"date-time":"2026-01-30T07:40:42Z","timestamp":1769758842401,"version":"3.49.0"},"reference-count":45,"publisher":"IEEE","license":[{"start":{"date-parts":[[2023,5,17]],"date-time":"2023-05-17T00:00:00Z","timestamp":1684281600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2023,5,17]],"date-time":"2023-05-17T00:00:00Z","timestamp":1684281600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/501100005153","name":"China National Funds for Distinguished Young Scientists","doi-asserted-by":"publisher","id":[{"id":"10.13039\/501100005153","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2023,5,17]]},"DOI":"10.1109\/infocom53939.2023.10228880","type":"proceedings-article","created":{"date-parts":[[2023,8,29]],"date-time":"2023-08-29T17:40:43Z","timestamp":1693330843000},"page":"1-10","source":"Crossref","is-referenced-by-count":6,"title":["On Design and Performance of Offline Finding Network"],"prefix":"10.1109","author":[{"given":"Tong","family":"Li","sequence":"first","affiliation":[{"name":"Renmin University of China"}]},{"given":"Jiaxin","family":"Liang","sequence":"additional","affiliation":[{"name":"Huawei"}]},{"given":"Yukuan","family":"Ding","sequence":"additional","affiliation":[{"name":"HKUST"}]},{"given":"Kai","family":"Zheng","sequence":"additional","affiliation":[{"name":"Huawei"}]},{"given":"Xu","family":"Zhang","sequence":"additional","affiliation":[{"name":"Nanjing University"}]},{"given":"Ke","family":"Xu","sequence":"additional","affiliation":[{"name":"Tsinghua University"}]}],"member":"263","reference":[{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/TMC.2006.134"},{"key":"ref35","article-title":"U.s. missing pet epidemic","year":"0"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.2005.1498535"},{"key":"ref34","article-title":"Number of missing persons in the united states in 2020","year":"0"},{"key":"ref15","first-page":"181","article-title":"Neighbor discovery in wireless networks and the coupon collector&#x2019;s problem","author":"vasudevan","year":"2009","journal-title":"ACM MOBICOM"},{"key":"ref37","first-page":"211","article-title":"Validation of elliptic curve public keys","author":"antipa","year":"2002","journal-title":"Public Key Cryptography"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/TWC.2008.05908"},{"key":"ref36","article-title":"Smarttag","year":"0"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1145\/3341302.3342067"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1109\/ICC.2018.8422714"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1145\/3551659.3559052"},{"key":"ref33","article-title":"The international centre for missing and exploited children","year":"0"},{"key":"ref10","article-title":"Airtag analysis","year":"0"},{"key":"ref32","article-title":"How to easily find your lost android phone","year":"0"},{"key":"ref2","article-title":"A billion people now have iphones","year":"0"},{"key":"ref1","article-title":"Apple&#x2019;s find my feature","year":"0"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/TNET.2012.2189892"},{"key":"ref39","article-title":"Huawei tag","year":"0"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.2011.5935221"},{"key":"ref38","first-page":"439","article-title":"Bootstrapping battery-free wireless networks: Efficient neighbor discovery and synchronization in the face of intermittency","author":"geissdoerfer","year":"2021","journal-title":"USENIX NSDI"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM.2014.6848106"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM.2014.6847978"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/LCOMM.2012.073112.120877"},{"key":"ref23","article-title":"Measuring bluetooth low energy power consumption","year":"2010","journal-title":"Application Note AN092"},{"key":"ref45","article-title":"Bluetooth specifications","year":"0"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/ICCE.2016.7430639"},{"key":"ref25","article-title":"Precise energy modeling for the bluetooth low energy protocol","author":"kindt","year":"2014"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/SURV.2013.012414.00164"},{"key":"ref42","first-page":"1538","article-title":"Modeling and performance analysis of device discovery in bluetooth low energy networks","author":"liu","year":"2012","journal-title":"IEEE GLOBE-COM"},{"key":"ref41","article-title":"Android ble scan settings apis","year":"0"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM.2016.7524336"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1145\/3387514.3405850"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM.2015.7218438"},{"key":"ref43","article-title":"Huawei hilink","year":"0"},{"key":"ref28","first-page":"1865","article-title":"Performance analysis of neighbor discovery process in bluetooth low-energy networks","volume":"66","author":"jeon","year":"2016","journal-title":"IEEE ToV"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1016\/j.comcom.2015.10.008"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1109\/TMC.2017.2737008"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/WoWMoM54355.2022.00059"},{"key":"ref7","first-page":"181","article-title":"Who tracks the trackers? circumventing apple&#x2019;s anti-tracking alerts in the find my network","author":"mayberry","year":"2021"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/MNET.011.2000265"},{"key":"ref4","article-title":"Airtags are apple&#x2019;s next billion dollar business","year":"0"},{"key":"ref3","article-title":"Apple airtag","year":"0"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.2478\/popets-2021-0045"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1145\/3395351.3399422"},{"key":"ref40","article-title":"What is the range of bluetooth and how can it be extended","year":"0"}],"event":{"name":"IEEE INFOCOM 2023 - IEEE Conference on Computer Communications","location":"New York City, NY, USA","start":{"date-parts":[[2023,5,17]]},"end":{"date-parts":[[2023,5,20]]}},"container-title":["IEEE INFOCOM 2023 - IEEE Conference on Computer Communications"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/10228851\/10228852\/10228880.pdf?arnumber=10228880","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,9,18]],"date-time":"2023-09-18T17:45:44Z","timestamp":1695059144000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10228880\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,5,17]]},"references-count":45,"URL":"https:\/\/doi.org\/10.1109\/infocom53939.2023.10228880","relation":{},"subject":[],"published":{"date-parts":[[2023,5,17]]}}}