{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,7]],"date-time":"2026-03-07T18:33:08Z","timestamp":1772908388873,"version":"3.50.1"},"reference-count":66,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"5","license":[{"start":{"date-parts":[[2018,5,1]],"date-time":"2018-05-01T00:00:00Z","timestamp":1525132800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["U1401253"],"award-info":[{"award-number":["U1401253"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61672350"],"award-info":[{"award-number":["61672350"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["U1405251"],"award-info":[{"award-number":["U1405251"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["71671114"],"award-info":[{"award-number":["71671114"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans. on Mobile Comput."],"published-print":{"date-parts":[[2018,5,1]]},"DOI":"10.1109\/tmc.2017.2753244","type":"journal-article","created":{"date-parts":[[2017,9,18]],"date-time":"2017-09-18T18:07:53Z","timestamp":1505758073000},"page":"1033-1047","source":"Crossref","is-referenced-by-count":33,"title":["Demographic Information Inference through Meta-Data Analysis of Wi-Fi Traffic"],"prefix":"10.1109","volume":"17","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-8347-2841","authenticated-orcid":false,"given":"Huaxin","family":"Li","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-5079-4556","authenticated-orcid":false,"given":"Haojin","family":"Zhu","sequence":"additional","affiliation":[]},{"given":"Di","family":"Ma","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2006.40"},{"key":"ref38","article-title":"Hotspot 2.0 (release 2) technical specification package v1.2","year":"2017"},{"key":"ref33","first-page":"110","article-title":"Dummy traffic against long term intersection attacks","author":"berthold","year":"2002","journal-title":"Proc Springer Int Workshop Privacy Enhancing Technol"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.2009.5062146"},{"key":"ref31","article-title":"You are\n what you like! information leakage through users&#x2019; interests","author":"chaabane","year":"2012","journal-title":"Proc Symp Network and Distributed System Security"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1145\/2623330.2623703"},{"key":"ref37","first-page":"31","article-title":"Active traffic analysis attacks and countermeasures","author":"fu","year":"2003","journal-title":"Proc IEEE Int Conf Comput Netw Mobile Comput"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1109\/ICISA.2010.5480564"},{"key":"ref35","first-page":"17","article-title":"Practical traffic analysis: Extending and resisting statistical disclosure","volume":"3423","author":"mathewson","year":"2004","journal-title":"Proc Privacy Enhancing Technol"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1145\/2508859.2516740"},{"key":"ref60","doi-asserted-by":"crossref","DOI":"10.14722\/ndss.2016.23390","article-title":"Tracking mobile web users\n through motion sensors: Attacks and defenses","author":"das","year":"2016","journal-title":"Proc Symp Network and Distributed System Security"},{"key":"ref62","article-title":"vpwns: Virtual pwned networks","author":"appelbaum","year":"2012","journal-title":"Proc 1st Usenix Workshop Free and Open Communication on the Internet"},{"key":"ref61","doi-asserted-by":"publisher","DOI":"10.1145\/1352533.1352547"},{"key":"ref63","doi-asserted-by":"crossref","first-page":"413","DOI":"10.1145\/2897845.2897883","article-title":"Why MAC address randomization is not enough: An analysis of Wi-Fi\n network discovery mechanisms","author":"vanhoef","year":"2016","journal-title":"Proc ACM Asia Conf Comput Commun Security"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1145\/2488388.2488401"},{"key":"ref64","first-page":"1","article-title":"Explaining\n and harnessing adversarial examples","author":"goodfellow","year":"2015","journal-title":"Proc Int Conf Learn Represent"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1371\/journal.pone.0073791"},{"key":"ref65","first-page":"97","article-title":"Support\n vector machines under adversarial label noise","author":"biggio","year":"2011","journal-title":"Proc Asian Conf Mach Learn"},{"key":"ref66","article-title":"Transferability in machine learning: From phenomena to black-box attacks using adversarial samples","author":"papernot","year":"2016"},{"key":"ref29","first-page":"590","article-title":"A comparative study of demographic\n attribute inference in twitter","author":"chen","year":"2015","journal-title":"Proc Int Conf Weblogs and Social Media"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.2013.6567086"},{"key":"ref1","article-title":"WiFi offloading to skyrocket","author":"valerio","year":"2015"},{"key":"ref20","first-page":"218","article-title":"No NAT&#x2019;d user left behind: Fingerprinting users behind NAT\n from NetFlow records alone","author":"verde","year":"2015","journal-title":"Proc IEEE Int Conf Distrib Comput Syst"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1145\/2699026.2699119"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1145\/2462096.2462099"},{"key":"ref24","doi-asserted-by":"crossref","DOI":"10.14722\/ndss.2016.23353","article-title":"The price of free: Privacy leakage in personalized mobile in-App\n Ads","author":"meng","year":"2016","journal-title":"Proc Symp Network and Distributed System Security"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2015.2478741"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1145\/2721896.2721908"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1145\/1242572.1242594"},{"key":"ref50","doi-asserted-by":"publisher","DOI":"10.1145\/2660267.2662367"},{"key":"ref51","doi-asserted-by":"publisher","DOI":"10.1145\/2632951.2632953"},{"key":"ref59","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-08506-7_11"},{"key":"ref58","doi-asserted-by":"publisher","DOI":"10.1109\/CSE.2009.53"},{"key":"ref57","doi-asserted-by":"publisher","DOI":"10.1007\/s102080010030"},{"key":"ref56","doi-asserted-by":"crossref","first-page":"171","DOI":"10.1007\/978-3-642-02326-2_18","article-title":"Influence of\n hyperparameters on random forest accuracy","author":"bernard","year":"2009","journal-title":"Proc Int Workshop Multiple Classifier Syst"},{"key":"ref55","article-title":"Introduction to Boosted Trees","author":"chen","year":"2014"},{"key":"ref54","doi-asserted-by":"publisher","DOI":"10.1002\/widm.8"},{"key":"ref53","first-page":"439","article-title":"Samples: Self adaptive mining of persistent lexical snippets for classifying\n mobile application traffic","author":"yao","year":"2015","journal-title":"Proc ACM Int Conf Mobile Comput Netw"},{"key":"ref52","doi-asserted-by":"publisher","DOI":"10.1109\/EuroSP.2016.40"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.2013.6566868"},{"key":"ref11","first-page":"1068","article-title":"When CSI meets public WiFi: Inferring your mobile phone\n password via WiFi signals","author":"li et","year":"2016","journal-title":"Proc ACM SIGSAC Conf Comput Commun Security"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1145\/1514274.1514286"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/GLOCOM.2016.7842384"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/MDM.2013.65"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/ICNP.2013.6733573"},{"key":"ref15","first-page":"781","article-title":"Markov chain fingerprinting to classify encrypted traffic","author":"korczy?ski","year":"2014","journal-title":"Proc IEEE Inf Comput Commun"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1145\/2873587.2873594"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1145\/2504730.2504742"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1145\/2426656.2426685"},{"key":"ref19","first-page":"46","article-title":"No place to hide that bytes won't reveal: Sniffing\n location-based encrypted traffic to track a user's position","author":"ateniese","year":"2015","journal-title":"Proc Springer Int Conf Netw Syst Security"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1137\/1.9781611973440.80"},{"key":"ref3","article-title":"Why using a public Wi-Fi network can be dangerous, even when\n accessing encrypted websites","author":"hoffman","year":"2014"},{"key":"ref6","article-title":"Characterization of wireless\n multi-device users","volume":"16","author":"das","year":"2016","journal-title":"ACM Trans Internet Technol special issue on Internet Things"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM.2014.6848021"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1145\/2534169.2486008"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM.2016.7524528"},{"key":"ref49","first-page":"1","article-title":"Privacy leakage of location sharing in mobile social networks: Attacks and defense","volume":"pp","author":"li","year":"2016","journal-title":"IEEE Trans Dependable Secure Comput"},{"key":"ref9","article-title":"Wandera reveals Q2 2015 mobile security and data usage figures","year":"2015"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.1145\/1143844.1143865"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1145\/2939672.2939785"},{"key":"ref48","first-page":"192","article-title":"Feature subset selection using the wrapper method: Overfitting and dynamic\n search space topology","author":"kohavi","year":"1995","journal-title":"Proc ACM SIGKDD Int Conf Knowl Discovery Data Mining"},{"key":"ref47","doi-asserted-by":"publisher","DOI":"10.1145\/2382196.2382262"},{"key":"ref42","article-title":"Use case: Location-based advertising over Wi-Fi","year":"2014"},{"key":"ref41","first-page":"306","article-title":"Socio-technical security analysis of\n wireless hotspots","author":"ferreira","year":"2014","journal-title":"Proc Int Conf Hum Asp Inf Secur Priv Trust"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1023\/A:1010933404324"},{"key":"ref43","article-title":"Use Case: Mobile Targeted Advertising","year":"2014"}],"container-title":["IEEE Transactions on Mobile Computing"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/7755\/8330738\/08039198.pdf?arnumber=8039198","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,1,26]],"date-time":"2022-01-26T06:34:44Z","timestamp":1643178884000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/8039198\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,5,1]]},"references-count":66,"journal-issue":{"issue":"5"},"URL":"https:\/\/doi.org\/10.1109\/tmc.2017.2753244","relation":{},"ISSN":["1536-1233","1558-0660","2161-9875"],"issn-type":[{"value":"1536-1233","type":"print"},{"value":"1558-0660","type":"electronic"},{"value":"2161-9875","type":"electronic"}],"subject":[],"published":{"date-parts":[[2018,5,1]]}}}