{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,2]],"date-time":"2025-10-02T05:47:55Z","timestamp":1759384075027,"version":"3.37.3"},"reference-count":47,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"5","license":[{"start":{"date-parts":[[2022,3,1]],"date-time":"2022-03-01T00:00:00Z","timestamp":1646092800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2022,3,1]],"date-time":"2022-03-01T00:00:00Z","timestamp":1646092800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2022,3,1]],"date-time":"2022-03-01T00:00:00Z","timestamp":1646092800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"name":"Hong Kong General Research Fund","award":["16200120"],"award-info":[{"award-number":["16200120"]}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Internet Things J."],"published-print":{"date-parts":[[2022,3,1]]},"DOI":"10.1109\/jiot.2021.3100276","type":"journal-article","created":{"date-parts":[[2021,7,26]],"date-time":"2021-07-26T22:32:48Z","timestamp":1627338768000},"page":"3465-3480","source":"Crossref","is-referenced-by-count":19,"title":["vContact: Private WiFi-Based IoT Contact Tracing With Virus Lifespan"],"prefix":"10.1109","volume":"9","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-3950-9360","authenticated-orcid":false,"given":"Guanyao","family":"Li","sequence":"first","affiliation":[{"name":"Department of Computer Science and Engineering, The Hong Kong University of Science and Technology, Hong Kong, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-4189-7999","authenticated-orcid":false,"given":"Siyan","family":"Hu","sequence":"additional","affiliation":[{"name":"Department of Computer Science and Engineering, The Hong Kong University of Science and Technology, Hong Kong, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-4037-4288","authenticated-orcid":false,"given":"Shuhan","family":"Zhong","sequence":"additional","affiliation":[{"name":"Department of Computer Science and Engineering, The Hong Kong University of Science and Technology, Hong Kong, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-4578-6492","authenticated-orcid":false,"given":"Wai Lun","family":"Tsui","sequence":"additional","affiliation":[{"name":"Department of Computer Science and Engineering, The Hong Kong University of Science and Technology, Hong Kong, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-4207-764X","authenticated-orcid":false,"given":"S.-H. Gary","family":"Chan","sequence":"additional","affiliation":[{"name":"Department of Computer Science and Engineering, The Hong Kong University of Science and Technology, Hong Kong, China"}]}],"member":"263","reference":[{"volume-title":"One Chart Shows How Long the Coronavirus Lives on Surfaces Like Cardboard, Plastic, Wood, and Steel","year":"2020","author":"Aylin","key":"ref1"},{"volume-title":"COVID-19: How Long Does the Coronavirus Last on Surfaces?","year":"2020","author":"Gray","key":"ref2"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1145\/3524107"},{"volume-title":"Assessing disease exposure risk with location histories and protecting privacy: A cryptographic approach in response to a global pandemic","year":"2020","author":"Berke","key":"ref4"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1371\/currents.outbreaks.0177e7fcf52217b8b634376e2f3efc5e"},{"volume-title":"TraceSecure: Towards privacy preserving contact tracing","year":"2020","author":"Bell","key":"ref6"},{"volume-title":"PACT: Privacy sensitive protocols and mechanisms for mobile contact tracing","year":"2020","author":"Chan","key":"ref7"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.3010226"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1145\/3090089"},{"volume-title":"COVID-19 contact-tracing apps: A survey on the global deployment and challenges","year":"2020","author":"Li","key":"ref10"},{"key":"ref11","first-page":"672","article-title":"A survey of automatic contact tracing approaches","volume-title":"Proc. Cryptol. ePrint Archive","author":"Reichert"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1186\/1476-072X-12-6"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1145\/3407023.3409204"},{"volume-title":"Digital AriadNE: Citizen empowerment for epidemic control","year":"2020","author":"Klopfenstein","key":"ref14"},{"key":"ref15","first-page":"375","article-title":"Privacy-preserving contact tracing of COVID-19 patients","volume":"2020","author":"Reichert","year":"2020","journal-title":"IACR Cryptol. ePrint Arch."},{"key":"ref16","first-page":"18","article-title":"Estimating crowd flow and crowd density from cellular data for mass rapid transit","volume-title":"Proc. 6th Int. Workshop Urban Comput.","author":"Li"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1145\/3132847.3133173"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1371\/journal.pone.0017144"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1073\/pnas.1009094108"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1145\/3448084"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1145\/3384419.3430598"},{"volume-title":"Corowarner","year":"2020","key":"ref22"},{"volume-title":"Aarogya Setu Mobile App","year":"2020","key":"ref23"},{"volume-title":"Cotrack","year":"2020","key":"ref24"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2020.3049024"},{"volume-title":"Contact tracing mobile apps for COVID-19: Privacy considerations and related trade-offs","year":"2020","author":"Cho","key":"ref26"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2895075"},{"volume-title":"CONTAIN: privacy-oriented contact tracing protocols for epidemics","year":"2020","author":"Hekmati","key":"ref28"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1038\/s41746-020-00340-0"},{"volume-title":"How to return to normalcy: Fast and comprehensive contact tracing of COVID-19 through proximity sensing using mobile devices","year":"2020","author":"Xia","key":"ref30"},{"volume-title":"Tracing contacts to control the COVID-19 pandemic","year":"2020","author":"G\u00fcnther","key":"ref31"},{"volume-title":"BlueTrace: A Privacy-Preserving Protocol for Community-Driven Contact Tracing Across Borders","year":"2020","author":"Bay","key":"ref32"},{"volume-title":"ROBERT: Robust and privacy-preserving proximity tracing","year":"2020","author":"Castelluccia","key":"ref33"},{"volume-title":"Tracetogether","year":"2020","key":"ref34"},{"volume-title":"Covidsafe","year":"2020","key":"ref35"},{"volume-title":"DESIRE: A third way for a european exposure notification system leveraging the best of centralized and decentralized systems","year":"2020","author":"Castelluccia","key":"ref36"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2020.3025953"},{"volume-title":"PACT: Private Automated Contact Tracing","year":"2020","author":"Rivest","key":"ref38"},{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.14722\/coronadef.2021.23013"},{"volume-title":"Privacy-Preserving Contact Tracing","year":"2020","key":"ref40"},{"volume-title":"Slowing the Spread of Infectious Diseases Using Crowdsourced Data","year":"2020","author":"Sydney","key":"ref41"},{"volume-title":"SwissCovid","year":"2020","key":"ref42"},{"key":"ref43","first-page":"1","article-title":"A hidden Markov model for indoor user tracking based on WiFi fingerprinting and step detection","volume-title":"Proc. IEEE 21st Eur. Signal Process. Conf. (EUSIPCO)","author":"Hoang"},{"volume-title":"Convolutional mixture density recurrent neural network for predicting user location with WiFi fingerprints","year":"2019","author":"Qian","key":"ref44"},{"volume-title":"Proximity inference with WiFi-colocation during the COVID-19 pandemic","year":"2020","author":"Dmitrienko","key":"ref45"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.1080\/03081079.2018.1455192"},{"key":"ref47","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2021.3056325"}],"container-title":["IEEE Internet of Things Journal"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6488907\/9717339\/09496688.pdf?arnumber=9496688","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,1,11]],"date-time":"2024-01-11T23:02:29Z","timestamp":1705014149000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9496688\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,3,1]]},"references-count":47,"journal-issue":{"issue":"5"},"URL":"https:\/\/doi.org\/10.1109\/jiot.2021.3100276","relation":{},"ISSN":["2327-4662","2372-2541"],"issn-type":[{"type":"electronic","value":"2327-4662"},{"type":"electronic","value":"2372-2541"}],"subject":[],"published":{"date-parts":[[2022,3,1]]}}}