{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,26]],"date-time":"2025-06-26T04:08:35Z","timestamp":1750910915758,"version":"3.41.0"},"reference-count":62,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"12","license":[{"start":{"date-parts":[[2024,6,15]],"date-time":"2024-06-15T00:00:00Z","timestamp":1718409600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2024,6,15]],"date-time":"2024-06-15T00:00:00Z","timestamp":1718409600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2024,6,15]],"date-time":"2024-06-15T00:00:00Z","timestamp":1718409600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["62272166","62272416","62372176"],"award-info":[{"award-number":["62272166","62272416","62372176"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Huawei Innovation Research Program Project"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Internet Things J."],"published-print":{"date-parts":[[2024,6,15]]},"DOI":"10.1109\/jiot.2024.3374556","type":"journal-article","created":{"date-parts":[[2024,3,12]],"date-time":"2024-03-12T18:51:14Z","timestamp":1710269474000},"page":"21411-21426","source":"Crossref","is-referenced-by-count":1,"title":["TapChecker: A Lightweight SMT-Based Conflict Analysis for Trigger-Action Programming"],"prefix":"10.1109","volume":"11","author":[{"ORCID":"https:\/\/orcid.org\/0009-0005-0243-3613","authenticated-orcid":false,"given":"Liangyu","family":"Chen","sequence":"first","affiliation":[{"name":"Shanghai Key Laboratory of Trustworthy Computing, East China Normal University, Shanghai, China"}]},{"given":"Chen","family":"Wang","sequence":"additional","affiliation":[{"name":"Shanghai Key Laboratory of Trustworthy Computing, East China Normal University, Shanghai, China"}]},{"given":"Cheng","family":"Chen","sequence":"additional","affiliation":[{"name":"Shanghai Key Laboratory of Trustworthy Computing, East China Normal University, Shanghai, China"}]},{"given":"Caidie","family":"Huang","sequence":"additional","affiliation":[{"name":"Shanghai Key Laboratory of Trustworthy Computing, East China Normal University, Shanghai, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-2217-6659","authenticated-orcid":false,"given":"Xiaohong","family":"Chen","sequence":"additional","affiliation":[{"name":"Shanghai Key Laboratory of Trustworthy Computing, East China Normal University, Shanghai, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-1938-2902","authenticated-orcid":false,"given":"Min","family":"Zhang","sequence":"additional","affiliation":[{"name":"Shanghai Key Laboratory of Trustworthy Computing, East China Normal University, Shanghai, China"}]}],"member":"263","reference":[{"volume-title":"Smart Home Market With COVID-19 Impact Analysis By Product (Lighting Control, Security & Access Control, HVAC Control, Entertainment, Home Healthcare), Software & Services (Proactive, Behavioural), and Region-Global Forecast to 2025","year":"2020","key":"ref1"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1016\/j.jss.2018.06.035"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1145\/2556288.2557420"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1145\/2858036.2858556"},{"volume-title":"Automation for business and home","year":"2020","key":"ref5"},{"volume-title":"Scale success with automation","year":"2020","key":"ref6"},{"volume-title":"HomeKit","year":"2020","key":"ref7"},{"volume-title":"SmartThings","year":"2020","key":"ref8"},{"volume-title":"HiLink","year":"2020","key":"ref9"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1145\/3038912.3052709"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1145\/3319535.3345662"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1145\/3290605.3300782"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1016\/j.rser.2019.109663"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/SPW.2019.00036"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2022.102812"},{"key":"ref16","first-page":"1559","article-title":"Detecting and handling IoT interaction threats in multi-platform multi-control-channel smart homes","volume-title":"Proc. 32nd USENIX Secur. Symp.","author":"Chi"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1016\/j.enbuild.2019.06.025"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1145\/3281411.3281440"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.2019.00043"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1145\/3185501"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1007\/s12927-019-0003-8"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-65306-6_21"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-78800-3_24"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.17706\/jsw.10.12.1343-1350"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1016\/j.procir.2016.11.037"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/KST.2018.8426071"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1007\/978-981-13-8566-7_54"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.18293\/DMS2016-017"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1145\/1328897.1328461"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.29007\/1l7f"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1007\/s10617-015-9163-z"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1007\/s10817-017-9432-6"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.3233\/AIC-2012-0525"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-63387-9_5"},{"key":"ref35","first-page":"4790","article-title":"A unified view of piecewise linear neural network verification","volume-title":"Proc. Adv. Neural Inf. Process. Syst.","author":"Bunel"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-10575-8_11"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-08867-9_49"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-22110-1_14"},{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1109\/JPROC.2011.2160929"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1017\/cbo9781139172752"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-07964-5"},{"key":"ref42","doi-asserted-by":"crossref","DOI":"10.1007\/3-540-45949-9","volume-title":"Isabelle\/HOL: A Proof Assistant for Higher-Order Logic","volume":"2283","author":"Nipkow","year":"2002"},{"key":"ref43","volume-title":"All About Maude\u2014A High-Performance Logical Framework: How to Specify, Program, and Verify Systems in Rewriting Logic","volume":"4350","author":"Clavel","year":"2007"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-41540-6_4"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1145\/1629575.1629596"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.1145\/1538788.1538814"},{"key":"ref47","doi-asserted-by":"publisher","DOI":"10.1145\/2676726.2676985"},{"key":"ref48","doi-asserted-by":"publisher","DOI":"10.1007\/978-0-387-35520-7_5"},{"key":"ref49","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-17465-1_3"},{"key":"ref50","doi-asserted-by":"publisher","DOI":"10.1006\/jsco.1995.1037"},{"key":"ref51","doi-asserted-by":"publisher","DOI":"10.1145\/2737095.2737115"},{"key":"ref52","doi-asserted-by":"publisher","DOI":"10.1145\/3334480.3382940"},{"key":"ref53","doi-asserted-by":"publisher","DOI":"10.1090\/S0002-9904-1946-08555-9"},{"volume-title":"The satisfiability modulo theories library (SMT-LIB)","year":"2010","author":"Barrett","key":"ref54"},{"key":"ref55","doi-asserted-by":"publisher","DOI":"10.3115\/v1\/p14-5010"},{"key":"ref56","doi-asserted-by":"publisher","DOI":"10.1145\/360248.360252"},{"key":"ref57","doi-asserted-by":"publisher","DOI":"10.1109\/SFCS.1977.32"},{"key":"ref58","doi-asserted-by":"publisher","DOI":"10.1145\/3333501"},{"key":"ref59","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijhcs.2018.11.005"},{"key":"ref60","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-74173-2_6"},{"key":"ref61","doi-asserted-by":"publisher","DOI":"10.1145\/3290605.3300618"},{"key":"ref62","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2021.3092774"}],"container-title":["IEEE Internet of Things Journal"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6488907\/10551641\/10462505.pdf?arnumber=10462505","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,25]],"date-time":"2025-06-25T18:24:43Z","timestamp":1750875883000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10462505\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,6,15]]},"references-count":62,"journal-issue":{"issue":"12"},"URL":"https:\/\/doi.org\/10.1109\/jiot.2024.3374556","relation":{},"ISSN":["2327-4662","2372-2541"],"issn-type":[{"type":"electronic","value":"2327-4662"},{"type":"electronic","value":"2372-2541"}],"subject":[],"published":{"date-parts":[[2024,6,15]]}}}