{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,3]],"date-time":"2026-04-03T15:37:24Z","timestamp":1775230644355,"version":"3.50.1"},"reference-count":77,"publisher":"IEEE","license":[{"start":{"date-parts":[[2025,10,8]],"date-time":"2025-10-08T00:00:00Z","timestamp":1759881600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2025,10,8]],"date-time":"2025-10-08T00:00:00Z","timestamp":1759881600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/100000001","name":"National Science Foundation","doi-asserted-by":"publisher","award":["CNS-2114035"],"award-info":[{"award-number":["CNS-2114035"]}],"id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100000183","name":"Army Research Office","doi-asserted-by":"publisher","award":["W911NF-23-1-0401"],"award-info":[{"award-number":["W911NF-23-1-0401"]}],"id":[{"id":"10.13039\/100000183","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2025,10,8]]},"DOI":"10.1109\/ismar67309.2025.00061","type":"proceedings-article","created":{"date-parts":[[2025,11,11]],"date-time":"2025-11-11T18:26:11Z","timestamp":1762885571000},"page":"507-517","source":"Crossref","is-referenced-by-count":1,"title":["PrivateXR: Defending Privacy Attacks in Extended Reality Through Explainable AI-Guided Differential Privacy"],"prefix":"10.1109","author":[{"given":"Ripan Kumar","family":"Kundu","sequence":"first","affiliation":[{"name":"University of Missouri-Columbia"}]},{"given":"Istiak","family":"Ahmed","sequence":"additional","affiliation":[{"name":"University of Missouri-Columbia"}]},{"given":"Khaza Anuarul","family":"Hoque","sequence":"additional","affiliation":[{"name":"University of Missouri-Columbia"}]}],"member":"263","reference":[{"key":"ref1","volume-title":"Ehtask dataset.","year":"2024"},{"key":"ref2","volume-title":"Simulation 2021 dataset.","year":"2024"},{"key":"ref3","volume-title":"Tensorflow privacy.","year":"2023"},{"key":"ref4","volume-title":"Vreed dataset.","year":"2024"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1145\/2976749.2978318"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1080\/00222895.2023.2202620"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1007\/s44196-024-00406-x"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1016\/j.cpr.2012.09.004"},{"key":"ref10","article-title":"Federated learning with differential privacy","author":"Banse","year":"2024","journal-title":"arXiv preprint arXiv"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1371\/journal.pone.0255979"},{"key":"ref12","article-title":"Eye-tracked virtual reality: A comprehensive survey on methods and privacy challenges","author":"Bozkir","year":"2023","journal-title":"arXiv preprint arXiv"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/ICPR.2010.764"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/SP46214.2022.9833649"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2953882"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1145\/3675094.3677578"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.3758\/s13428-017-0876-8"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1145\/3517031.3529618"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/TVCG.2023.3247048"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/TVCG.2021.3067787"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1007\/11787006_1"},{"key":"ref22","first-page":"20","article-title":"Federated learning for appearance-based gaze estimation in the wild","volume-title":"Annual Conference on Neural Information Processing Systems","author":"Elfares"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-86380-7_48"},{"key":"ref24","volume-title":"Hands-on machine learning with Scikit-Learn Keras, and TensorFlow.","author":"G\u00e9ron","year":"2022"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/tpami.2023.3321337"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/TAFFC.2017.2781732"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM48880.2022.9796665"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/TVCG.2021.3138902"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1109\/TVCG.2020.2973473"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1109\/ISMAR52148.2021.00017"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1145\/3659594"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1007\/s10055-023-00804-0"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1145\/3314111.3319816"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1145\/3379157.3390512"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1109\/ISMAR62088.2024.00015"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1109\/VR55154.2023.00076"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1109\/TVCG.2019.2899186"},{"key":"ref38","first-page":"1793","article-title":"\\{Kal\u025bido\\}:\\{RealTime\\} privacy control for \\{Eye-Tracking\\} systems","volume-title":"30th USENIX security symposium (USENIX security 21)","author":"Li"},{"issue":"9","key":"ref39","first-page":"3867","article-title":"Application of virtual reality technology in clinical medicine","volume":"9","author":"Li","year":"2017","journal-title":"American journal of translational research"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1109\/AICAS.2019.8771510"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1145\/3314111.3319823"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.3321\/j.issn:0529-6579.2007.z1.029"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1109\/TVCG.2022.3203113"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2019.00029"},{"key":"ref45","volume-title":"Melonloader community.","year":"2022"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.1109\/TMC.2024.3426046"},{"key":"ref47","doi-asserted-by":"publisher","DOI":"10.1109\/WoWMoM60985.2024.00023"},{"key":"ref48","doi-asserted-by":"publisher","DOI":"10.1109\/VR51125.2022.00060"},{"key":"ref49","doi-asserted-by":"publisher","DOI":"10.1109\/CSF.2017.11"},{"key":"ref50","doi-asserted-by":"publisher","DOI":"10.1109\/ISMAR59233.2023.00054"},{"key":"ref51","doi-asserted-by":"publisher","DOI":"10.1109\/ISMAR52148.2021.00037"},{"key":"ref52","doi-asserted-by":"publisher","DOI":"10.1007\/s002210050473"},{"key":"ref53","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2023.3306159"},{"key":"ref54","first-page":"895","article-title":"Unique identification of 50,000+ virtual reality users from head & hand motion data","volume-title":"32nd USENIX Security Symposium (USENIX Security 23)","author":"Nair"},{"key":"ref55","doi-asserted-by":"publisher","DOI":"10.1109\/VRW62533.2024.00096"},{"key":"ref56","doi-asserted-by":"publisher","DOI":"10.1145\/3586183.3606754"},{"key":"ref57","article-title":"Improving deep learning with differential privacy using gradient encoding and denoising","author":"Nasr","year":"2020","journal-title":"arXiv preprint arXiv"},{"key":"ref58","article-title":"Adversarial robustness toolbox v1. 0.0","author":"Nicolae","year":"2018","journal-title":"arXiv preprint arXiv"},{"key":"ref59","doi-asserted-by":"publisher","DOI":"10.3390\/s20102944"},{"key":"ref60","doi-asserted-by":"publisher","DOI":"10.1145\/3649902.3653439"},{"key":"ref61","article-title":"Pytorch: An imperative style, high-performance deep learning library","volume":"32","author":"Paszke","year":"2019","journal-title":"Advances in neural information processing systems"},{"key":"ref62","doi-asserted-by":"publisher","DOI":"10.1109\/TPSISA52974.2021.00009"},{"key":"ref63","doi-asserted-by":"publisher","DOI":"10.1145\/3505284.3529973"},{"key":"ref64","doi-asserted-by":"publisher","DOI":"10.1109\/TVCG.2025.3549850"},{"key":"ref65","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2017.41"},{"key":"ref66","first-page":"159","article-title":"Going through the motions: AR\/VR keylogging from user head motions","volume-title":"32nd USENIX Security Symposium (USENIX Security 23)","author":"Slocum"},{"key":"ref67","doi-asserted-by":"publisher","DOI":"10.1145\/3133956.3134077"},{"key":"ref68","doi-asserted-by":"publisher","DOI":"10.1145\/3495002"},{"key":"ref69","doi-asserted-by":"publisher","DOI":"10.48550\/ARXIV.1706.03762"},{"key":"ref70","doi-asserted-by":"publisher","DOI":"10.1109\/VRW62533.2024.00210"},{"key":"ref71","doi-asserted-by":"publisher","DOI":"10.1109\/ISMAR62088.2024.00032"},{"key":"ref72","doi-asserted-by":"publisher","DOI":"10.1109\/TVCG.2024.3456164"},{"key":"ref73","doi-asserted-by":"publisher","DOI":"10.1109\/TVCG.2024.3372032"},{"key":"ref74","doi-asserted-by":"publisher","DOI":"10.1111\/cgf.13355"},{"key":"ref75","first-page":"27252742","article-title":"Can virtual reality protect users from keystroke inference attacks?","volume-title":"33rd USENIX Security Symposium (USENIX Security 24)","author":"Yang"},{"key":"ref76","article-title":"Opacus: User-friendly differential privacy library in pytorch","author":"Yousefpour","year":"2021","journal-title":"arXiv preprint arXiv"},{"key":"ref77","doi-asserted-by":"publisher","DOI":"10.3758\/s13428-017-0860-3"},{"key":"ref78","doi-asserted-by":"publisher","DOI":"10.1109\/TVCG.2025.3549863"}],"event":{"name":"2025 IEEE International Symposium on Mixed and Augmented Reality (ISMAR)","location":"Daejeon, Korea, Republic of","start":{"date-parts":[[2025,10,8]]},"end":{"date-parts":[[2025,10,12]]}},"container-title":["2025 IEEE International Symposium on Mixed and Augmented Reality (ISMAR)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/11220258\/11220261\/11220393.pdf?arnumber=11220393","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,11,13]],"date-time":"2025-11-13T18:42:27Z","timestamp":1763059347000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/11220393\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,10,8]]},"references-count":77,"URL":"https:\/\/doi.org\/10.1109\/ismar67309.2025.00061","relation":{},"subject":[],"published":{"date-parts":[[2025,10,8]]}}}