{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,4]],"date-time":"2024-09-04T00:58:53Z","timestamp":1725411533120},"reference-count":31,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018,11]]},"DOI":"10.1109\/pccc.2018.8711216","type":"proceedings-article","created":{"date-parts":[[2019,5,13]],"date-time":"2019-05-13T19:10:04Z","timestamp":1557774604000},"page":"1-8","source":"Crossref","is-referenced-by-count":0,"title":["Privacy Leakage in Smart Homes and Its Mitigation: IFTTT as a Case Study"],"prefix":"10.1109","author":[{"given":"Rixin","family":"Xu","sequence":"first","affiliation":[]},{"given":"Qiang","family":"Zeng","sequence":"additional","affiliation":[]},{"given":"Liehuang","family":"Zhu","sequence":"additional","affiliation":[]},{"given":"Haotian","family":"Chi","sequence":"additional","affiliation":[]},{"given":"Xiaojiang","family":"Du","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"journal-title":"Spying on the Smart Home Privacy Attacks and Defenses on Encrypted IoT Traffic","year":"2017","author":"apthorpe","key":"ref31"},{"journal-title":"A Smart Home Is No Castle Privacy Vulnerabilities of Encrypted IoT Traffic","year":"2017","author":"apthorpe","key":"ref30"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1016\/j.jclepro.2016.10.006"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/TNSE.2018.2830307"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.2013.6567115"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2016.07.019"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1016\/j.adhoc.2006.05.012"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/WiMOB.2015.7347956"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.23919\/IConAC.2017.8082057"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/JSEN.2017.2705045"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/PERCOMW.2017.7917634"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/TWC.2009.060598"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.2013.6567072"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2016.44"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2017.2730843"},{"journal-title":"ios-home-apple","year":"0","key":"ref3"},{"journal-title":"SmartThings","year":"2018","key":"ref6"},{"key":"ref29","first-page":"1","article-title":"Overcoming invasion of privacy in smart home environment with synthetic packet injection","author":"yoshigoe","year":"2015","journal-title":"2015 TRON Symposium (TRONSHOW)"},{"journal-title":"What is ifttt? how to use if this then that services","year":"2018","author":"martin","key":"ref5"},{"key":"ref8","first-page":"67","author":"lee","year":"2014","journal-title":"Securing Smart Home Technologies Security Challenges and Security Requirements"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/CSCWD.2012.6221884"},{"journal-title":"Weave &#x2014; nest","year":"0","key":"ref2"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.3390\/info7030044"},{"journal-title":"SmartThings-Add a little smartness to your things","year":"0","key":"ref1"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1145\/3078861.3078864"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2017.23051"},{"key":"ref21","first-page":"361","article-title":"SmartAuth: User-Centered Authorization for the Internet of Things","author":"tian","year":"2017","journal-title":"USENIX"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.23919\/MIPRO.2017.7973622"},{"key":"ref23","first-page":"1","author":"celik","year":"2018","journal-title":"Sensitive Information Tracking in Commodity IoT"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/MNET.2018.1700349"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2015.2472993"}],"event":{"name":"2018 IEEE 37th International Performance Computing and Communications Conference (IPCCC)","start":{"date-parts":[[2018,11,17]]},"location":"Orlando, FL, USA","end":{"date-parts":[[2018,11,19]]}},"container-title":["2018 IEEE 37th International Performance Computing and Communications Conference (IPCCC)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8703513\/8710749\/08711216.pdf?arnumber=8711216","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,6,3]],"date-time":"2019-06-03T19:54:31Z","timestamp":1559591671000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/8711216\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,11]]},"references-count":31,"URL":"https:\/\/doi.org\/10.1109\/pccc.2018.8711216","relation":{},"subject":[],"published":{"date-parts":[[2018,11]]}}}