{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,10]],"date-time":"2026-03-10T14:52:30Z","timestamp":1773154350702,"version":"3.50.1"},"reference-count":18,"publisher":"IEEE","license":[{"start":{"date-parts":[[2025,5,19]],"date-time":"2025-05-19T00:00:00Z","timestamp":1747612800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2025,5,19]],"date-time":"2025-05-19T00:00:00Z","timestamp":1747612800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2025,5,19]]},"DOI":"10.1109\/infocomwkshps65812.2025.11152947","type":"proceedings-article","created":{"date-parts":[[2025,9,12]],"date-time":"2025-09-12T17:28:22Z","timestamp":1757698102000},"page":"1-6","source":"Crossref","is-referenced-by-count":1,"title":["Eavesdropping on Goal-Oriented Communication: Timing Attacks and Countermeasures"],"prefix":"10.1109","author":[{"given":"Federico","family":"Mason","sequence":"first","affiliation":[{"name":"University of Padova,Department of Information Engineering,Padua,Italy,35131"}]},{"given":"Federico","family":"Chiariotti","sequence":"additional","affiliation":[{"name":"University of Padova,Department of Information Engineering,Padua,Italy,35131"}]},{"given":"Pietro","family":"Talli","sequence":"additional","affiliation":[{"name":"University of Padova,Department of Information Engineering,Padua,Italy,35131"}]},{"given":"Andrea","family":"Zanella","sequence":"additional","affiliation":[{"name":"University of Padova,Department of Information Engineering,Padua,Italy,35131"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1145\/584091.584093"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2022.3223408"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/TCCN.2019.2919300"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/LCOMM.2023.3288070"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2024.3516819"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/ICC45041.2023.10278612"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.003.2200777"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1016\/j.jfranklin.2017.07.002"},{"key":"ref9","article-title":"A nearly information theoretically secure approach for semantic communications over wiretap channel","author":"Chen","year":"2024"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1145\/2810103.2813632"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1007\/0-387-24098-5_6"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1016\/j.automatica.2017.02.037"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/TASE.2011.2106775"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/TASE.2016.2604222"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2025.3559152"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1016\/j.artint.2022.103838"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1007\/s13235-023-00519-6"},{"key":"ref18","first-page":"330","article-title":"A proof of the equivalence of the programming problem and the game problem","volume-title":"Activity Analysis of Production and Allocation.","author":"Dantzig","year":"1951"}],"event":{"name":"IEEE INFOCOM 2025 - IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS)","location":"London, United Kingdom","start":{"date-parts":[[2025,5,19]]},"end":{"date-parts":[[2025,5,19]]}},"container-title":["IEEE INFOCOM 2025 - IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/11152714\/11152715\/11152947.pdf?arnumber=11152947","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,9,13]],"date-time":"2025-09-13T05:39:00Z","timestamp":1757741940000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/11152947\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,5,19]]},"references-count":18,"URL":"https:\/\/doi.org\/10.1109\/infocomwkshps65812.2025.11152947","relation":{},"subject":[],"published":{"date-parts":[[2025,5,19]]}}}