{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,1]],"date-time":"2026-02-01T06:24:34Z","timestamp":1769927074980,"version":"3.49.0"},"reference-count":30,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"2","license":[{"start":{"date-parts":[[2018,4,1]],"date-time":"2018-04-01T00:00:00Z","timestamp":1522540800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2018,4,1]],"date-time":"2018-04-01T00:00:00Z","timestamp":1522540800000},"content-version":"am","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2018,4,1]],"date-time":"2018-04-01T00:00:00Z","timestamp":1522540800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2018,4,1]],"date-time":"2018-04-01T00:00:00Z","timestamp":1522540800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/100000001","name":"National Science Foundation","doi-asserted-by":"publisher","award":["IIS-1722791"],"award-info":[{"award-number":["IIS-1722791"]}],"id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100000001","name":"National Science Foundation","doi-asserted-by":"publisher","award":["CNS-1343356"],"award-info":[{"award-number":["CNS-1343356"]}],"id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100000001","name":"National Science Foundation","doi-asserted-by":"publisher","award":["CNS-1409797"],"award-info":[{"award-number":["CNS-1409797"]}],"id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Internet Things J."],"published-print":{"date-parts":[[2018,4]]},"DOI":"10.1109\/jiot.2018.2799820","type":"journal-article","created":{"date-parts":[[2018,2,1]],"date-time":"2018-02-01T19:23:45Z","timestamp":1517513025000},"page":"1206-1217","source":"Crossref","is-referenced-by-count":129,"title":["EPIC: A Differential Privacy Framework to Defend Smart Homes Against Internet Traffic Analysis"],"prefix":"10.1109","volume":"5","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-7568-015X","authenticated-orcid":false,"given":"Jianqing","family":"Liu","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-6528-1427","authenticated-orcid":false,"given":"Chi","family":"Zhang","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-1079-3871","authenticated-orcid":false,"given":"Yuguang","family":"Fang","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2012.28"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/JPROC.2014.2387017"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2011.6069711"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2017.02.014"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2011.18"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1145\/2508859.2516735"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1145\/2660267.2660345"},{"key":"ref16","doi-asserted-by":"crossref","DOI":"10.14722\/ndss.2017.23241","article-title":"Dynamic differential location privacy with personalized error bounds","author":"yu","year":"2017","journal-title":"Proc Network and Distributed System Security Symp (NDSS)"},{"key":"ref17","volume":"39","author":"holton","year":"2003","journal-title":"Value-at-Risk Theory and Practice"},{"key":"ref18","year":"2017","journal-title":"AES-NI SSL Performance"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1145\/293411.293443"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/TPDS.2013.42"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1007\/s12394-010-0054-y"},{"key":"ref27","article-title":"Traffic morphing: An efficient defense against statistical traffic analysis","volume":"9","author":"wright","year":"2009","journal-title":"Proc NDSS"},{"key":"ref3","year":"2007","journal-title":"Chronic Care at the Crossroads"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1016\/j.pmcj.2006.12.001"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2016.2551203"},{"key":"ref5","year":"2003","journal-title":"Health Insurance Cost"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2015.09.003"},{"key":"ref7","first-page":"316","article-title":"Exploring potential 6lowpan traffic side channels","volume":"2017","author":"yan","year":"2017","journal-title":"IACR Cryptology ePrint"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1145\/2398356.2398377"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1145\/3019612.3019878"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2010.05.010"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1145\/1029102.1029117"},{"key":"ref22","article-title":"Epidemic routing for partially connected ad hoc networks","author":"vahdat","year":"2000"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/ICDCS.Workshops.2008.42"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2016.2624058"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1515\/popets-2015-0023"},{"key":"ref26","article-title":"Timing analysis of keystrokes and timing attacks on SSH","volume":"2001","author":"song","year":"2001","journal-title":"Proc Usenix Security Symp"},{"key":"ref25","first-page":"43","article-title":"Language identification of encrypted VoIP traffic: Alejandra y Roberto or Alice and bob?","volume":"3","author":"wright","year":"2007","journal-title":"Proc Usenix Security Symp"}],"container-title":["IEEE Internet of Things Journal"],"original-title":[],"link":[{"URL":"https:\/\/ieeexplore.ieee.org\/ielaam\/6488907\/8334665\/8278156-aam.pdf","content-type":"application\/pdf","content-version":"am","intended-application":"syndication"},{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6488907\/8334665\/08278156.pdf?arnumber=8278156","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,4,8]],"date-time":"2022-04-08T18:54:05Z","timestamp":1649444045000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/8278156\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,4]]},"references-count":30,"journal-issue":{"issue":"2"},"URL":"https:\/\/doi.org\/10.1109\/jiot.2018.2799820","relation":{},"ISSN":["2327-4662"],"issn-type":[{"value":"2327-4662","type":"electronic"}],"subject":[],"published":{"date-parts":[[2018,4]]}}}