{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,20]],"date-time":"2025-11-20T12:53:49Z","timestamp":1763643229408,"version":"3.37.3"},"reference-count":145,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"2","license":[{"start":{"date-parts":[[2023,2,1]],"date-time":"2023-02-01T00:00:00Z","timestamp":1675209600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2023,2,1]],"date-time":"2023-02-01T00:00:00Z","timestamp":1675209600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2023,2,1]],"date-time":"2023-02-01T00:00:00Z","timestamp":1675209600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/501100002341","name":"Academy of Finland","doi-asserted-by":"publisher","id":[{"id":"10.13039\/501100002341","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans. on Mobile Comput."],"published-print":{"date-parts":[[2023,2,1]]},"DOI":"10.1109\/tmc.2021.3092271","type":"journal-article","created":{"date-parts":[[2021,6,24]],"date-time":"2021-06-24T19:50:07Z","timestamp":1624564207000},"page":"781-796","source":"Crossref","is-referenced-by-count":5,"title":["Camouflage Learning: Feature Value Obscuring Ambient Intelligence for Constrained Devices"],"prefix":"10.1109","volume":"22","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-7765-1483","authenticated-orcid":false,"given":"Le Ngu","family":"Nguyen","sequence":"first","affiliation":[{"name":"Department of Communications and Networking, Aalto University, Espoo, Finland"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-6118-3355","authenticated-orcid":false,"given":"Stephan","family":"Sigg","sequence":"additional","affiliation":[{"name":"Department of Communications and Networking, Aalto University, Espoo, Finland"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-7908-4547","authenticated-orcid":false,"given":"Jari","family":"Lietzen","sequence":"additional","affiliation":[{"name":"Department of Communications and Networking, Aalto University, Espoo, Finland"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-6985-1298","authenticated-orcid":false,"given":"Rainhard Dieter","family":"Findling","sequence":"additional","affiliation":[{"name":"University of Applied Science Upper Austria, Hagenberg, Austria"}]},{"given":"Kalle","family":"Ruttik","sequence":"additional","affiliation":[{"name":"Department of Communications and Networking, Aalto University, Espoo, Finland"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1145\/2370216.2370222"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2017.2773600"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1016\/j.pmcj.2012.08.006"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1145\/2693843"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1016\/j.pmcj.2009.06.009"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2019.2934489"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1016\/S0141-9331(00)00072-7"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1016\/j.micpro.2020.103183"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1145\/3313831.3376162"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2011.5936152"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1111\/cgf.13390"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1145\/3322241"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2019.04.057"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/WorldS450073.2020.9210355"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1515\/popets-2015-0024"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2017.2787987"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/MCAS.2015.2510198"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1126\/scitranslmed.aan4950"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1016\/j.snb.2017.01.198"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1016\/j.icte.2017.03.004"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/ISSCS.2017.8034915"},{"key":"ref22","first-page":"271","article-title":"Netscatter: Enabling large-scale backscatter networks","volume-title":"Proc. USENIX Symp. Netw. Syst. Des. Implementation","author":"Hessar"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1145\/2976749.2978331"},{"article-title":"Inference attacks against collaborative learning","year":"2018","author":"Melis","key":"ref24"},{"article-title":"Securing distributed machine learning in high dimensions","year":"2018","author":"Su","key":"ref25"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-93387-0_13"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1145\/2857705.2857731"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.2196\/medinform.8805"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.7551\/mitpress\/11140.001.0001"},{"article-title":"Artificial intelligence: A modern approach","year":"2002","author":"Russell","key":"ref30"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4615-7566-5"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1016\/j.pmcj.2009.04.001"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1007\/s11569-009-0077-8"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.4018\/978-1-60566-058-5.ch010"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1016\/J.ENG.2016.02.008"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2019.2937079"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1145\/3357223.3362707"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1007\/s13748-012-0035-5"},{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2014.2320099"},{"key":"ref40","first-page":"1273","article-title":"Communication-efficient learning of deep networks from decentralized data","volume-title":"Proc. Int. Conf. Artif. Intell. Statist.","author":"McMahan"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1109\/TEVC.2002.800882"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1109\/TSP.2019.2952051"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-44597-8_39"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-40994-3_21"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1109\/TSP.2018.2881661"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-45014-9_1"},{"key":"ref47","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-05318-5_2"},{"key":"ref48","first-page":"509","article-title":"Decentralized Collaborative Learning of Personalized Models over Networks","volume-title":"Proc. Artif. Intell. Statist.","author":"Vanhaesebrouck"},{"key":"ref49","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-48912-6_59"},{"key":"ref50","doi-asserted-by":"publisher","DOI":"10.1145\/3298981"},{"article-title":"Federated learning: Strategies for improving communication efficiency","year":"2016","author":"Kone\u010dn\u1ef3","key":"ref51"},{"key":"ref52","doi-asserted-by":"publisher","DOI":"10.1016\/j.comcom.2021.02.014"},{"key":"ref53","first-page":"131","article-title":"Collective data mining: A new perspective toward distributed data mining","volume":"2","author":"Kargupta","year":"1999","journal-title":"Adv. Distrib. Parallel Knowl. Discov."},{"key":"ref54","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-41579-2_40"},{"key":"ref55","doi-asserted-by":"publisher","DOI":"10.1145\/3052973.3053009"},{"key":"ref56","doi-asserted-by":"publisher","DOI":"10.1109\/JSAIT.2021.3053220"},{"key":"ref57","doi-asserted-by":"publisher","DOI":"10.1109\/MSEC.2018.2888775"},{"key":"ref58","doi-asserted-by":"publisher","DOI":"10.3390\/electronics8040411"},{"key":"ref59","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2019.2931068"},{"key":"ref60","doi-asserted-by":"publisher","DOI":"10.1109\/CDC40024.2019.9029938"},{"key":"ref61","doi-asserted-by":"publisher","DOI":"10.1561\/0400000042"},{"key":"ref62","doi-asserted-by":"publisher","DOI":"10.1109\/ICAIIC.2019.8669038"},{"key":"ref63","doi-asserted-by":"publisher","DOI":"10.1515\/popets-2017-0053"},{"key":"ref64","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2018.05.005"},{"key":"ref65","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-30119-6_25"},{"key":"ref66","doi-asserted-by":"publisher","DOI":"10.1145\/2220336.2220339"},{"key":"ref67","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM.2016.7524543"},{"key":"ref68","doi-asserted-by":"publisher","DOI":"10.1039\/C7LC00390K"},{"key":"ref69","first-page":"26.1","article-title":"Distributed learning, communication complexity and privacy","volume-title":"Proc. Conf. Learn. Theory","author":"Balcan"},{"key":"ref70","doi-asserted-by":"publisher","DOI":"10.1016\/j.talanta.2008.03.005"},{"key":"ref71","doi-asserted-by":"publisher","DOI":"10.1145\/3129881.3129890"},{"key":"ref72","doi-asserted-by":"publisher","DOI":"10.1145\/3266037.3266108"},{"key":"ref73","doi-asserted-by":"publisher","DOI":"10.1109\/ISWC.2010.5665861"},{"key":"ref74","doi-asserted-by":"publisher","DOI":"10.1109\/TMC.2011.170"},{"key":"ref75","doi-asserted-by":"publisher","DOI":"10.1109\/JPROC.2016.2547946"},{"key":"ref76","doi-asserted-by":"publisher","DOI":"10.1109\/TCSI.2017.2730600"},{"key":"ref77","doi-asserted-by":"publisher","DOI":"10.1149\/2.0181808jes"},{"key":"ref78","doi-asserted-by":"publisher","DOI":"10.1109\/SECON.2008.4494336"},{"key":"ref79","doi-asserted-by":"publisher","DOI":"10.1109\/SURV.2011.060710.00094"},{"key":"ref80","doi-asserted-by":"publisher","DOI":"10.1016\/j.energy.2019.04.088"},{"key":"ref81","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2016.2604078"},{"key":"ref82","doi-asserted-by":"publisher","DOI":"10.3390\/s140202822"},{"key":"ref83","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2006.871582"},{"key":"ref84","doi-asserted-by":"publisher","DOI":"10.1017\/CBO9780511794308"},{"key":"ref85","doi-asserted-by":"publisher","DOI":"10.1145\/3130970"},{"key":"ref86","doi-asserted-by":"publisher","DOI":"10.1109\/SCVT.2017.8240313"},{"key":"ref87","first-page":"151","article-title":"Passive Wi-Fi: Bringing low power to Wi-Fi transmissions","volume-title":"Proc. USENIX Symp. Netw. Syst. Des. Implementation","author":"Kellogg"},{"key":"ref88","doi-asserted-by":"publisher","DOI":"10.1109\/IEEE-IWS.2013.6616827"},{"key":"ref89","doi-asserted-by":"publisher","DOI":"10.1109\/SCVT.2016.7797659"},{"key":"ref90","doi-asserted-by":"publisher","DOI":"10.1109\/WiMOB.2017.8115793"},{"key":"ref91","doi-asserted-by":"publisher","DOI":"10.1109\/JRPROC.1948.226245"},{"key":"ref92","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2018.2841964"},{"key":"ref93","doi-asserted-by":"publisher","DOI":"10.1109\/TMTT.2010.2047916"},{"key":"ref94","first-page":"271","article-title":"NetScatter: Enabling large-scale backscatter networks","volume-title":"Proc. USENIX Symp. Netw. Syst. Des. Implementation","author":"Hessar"},{"key":"ref95","doi-asserted-by":"publisher","DOI":"10.1145\/3131672.3136996"},{"key":"ref96","doi-asserted-by":"publisher","DOI":"10.1109\/TCOMM.2016.2602341"},{"key":"ref97","doi-asserted-by":"publisher","DOI":"10.1145\/2534169.2486015"},{"key":"ref98","doi-asserted-by":"publisher","DOI":"10.1145\/3300061.3300121"},{"key":"ref99","doi-asserted-by":"publisher","DOI":"10.1145\/2934872.2934901"},{"key":"ref100","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-28783-1_1"},{"key":"ref101","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2008.04.002"},{"key":"ref102","doi-asserted-by":"publisher","DOI":"10.1109\/IPSN.2007.4379708"},{"key":"ref103","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2007.4342873"},{"key":"ref104","doi-asserted-by":"publisher","DOI":"10.1145\/2740070.2626312"},{"key":"ref105","doi-asserted-by":"publisher","DOI":"10.3233\/AIS-2012-0139"},{"key":"ref106","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2015.2472291"},{"key":"ref107","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2006.1632656"},{"key":"ref108","doi-asserted-by":"publisher","DOI":"10.1109\/ICASSP.2012.6288527"},{"key":"ref109","doi-asserted-by":"publisher","DOI":"10.1109\/TCOMM.2013.072913.120815"},{"key":"ref110","doi-asserted-by":"publisher","DOI":"10.1109\/WCL.2014.022314.140005"},{"key":"ref111","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2018.2871070"},{"key":"ref112","doi-asserted-by":"publisher","DOI":"10.1109\/SPAWC.2013.6612067"},{"key":"ref113","doi-asserted-by":"publisher","DOI":"10.1109\/ICC.2016.7510770"},{"key":"ref114","doi-asserted-by":"publisher","DOI":"10.1109\/VTCFall.2012.6399379"},{"article-title":"Over-the-air computation for distributed machine learning","year":"2020","author":"Frey","key":"ref115"},{"volume-title":"Machine learning","year":"1997","author":"Mitchell","key":"ref116"},{"key":"ref117","doi-asserted-by":"publisher","DOI":"10.1137\/16M1080173"},{"volume-title":"The algebra of random variables, ser. Wiley series in probability and mathem. statistics","year":"1979","author":"Springer","key":"ref118"},{"key":"ref119","doi-asserted-by":"publisher","DOI":"10.1109\/IPSN.2005.1440950"},{"key":"ref120","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2015.2497324"},{"key":"ref121","doi-asserted-by":"publisher","DOI":"10.1016\/j.enbuild.2015.11.071"},{"key":"ref122","doi-asserted-by":"publisher","DOI":"10.1016\/j.jpdc.2004.03.020"},{"key":"ref123","doi-asserted-by":"publisher","DOI":"10.1145\/3230543.3230567"},{"key":"ref124","doi-asserted-by":"publisher","DOI":"10.1145\/3297858.3304011"},{"key":"ref125","doi-asserted-by":"publisher","DOI":"10.1145\/1323293.1294286"},{"key":"ref126","doi-asserted-by":"publisher","DOI":"10.1109\/WiMob.2008.16"},{"key":"ref127","doi-asserted-by":"publisher","DOI":"10.1109\/PERCOMW.2017.7917625"},{"key":"ref128","doi-asserted-by":"publisher","DOI":"10.1109\/JSEN.2015.2445094"},{"key":"ref129","doi-asserted-by":"publisher","DOI":"10.1145\/3117811.3117814"},{"key":"ref130","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2018.2872383"},{"key":"ref131","doi-asserted-by":"publisher","DOI":"10.1016\/S0925-4005(02)00170-3"},{"key":"ref132","doi-asserted-by":"publisher","DOI":"10.1109\/TWC.2013.031813.120224"},{"key":"ref133","doi-asserted-by":"publisher","DOI":"10.1109\/TCOMM.2013.13.120855"},{"key":"ref134","first-page":"C226","article-title":"A self-calibrating RF energy harvester generating 1V at- 26.3 dBm","volume-title":"Proc. IEEE Symp. VLSI Circuits","author":"Stoopman"},{"key":"ref135","doi-asserted-by":"publisher","DOI":"10.1109\/JSSC.2014.2302793"},{"key":"ref136","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-56669-6_7"},{"key":"ref137","doi-asserted-by":"publisher","DOI":"10.1109\/IMWS-BIO.2013.6756226"},{"key":"ref138","doi-asserted-by":"publisher","DOI":"10.1145\/2536853.2536895"},{"key":"ref139","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4757-4036-3"},{"key":"ref140","doi-asserted-by":"publisher","DOI":"10.1145\/3477601"},{"key":"ref141","first-page":"601","article-title":"Stealing machine learning models via prediction APIs","volume-title":"Proc. USENIX Conf. Secur. Symp.","author":"Tram\u00e8r"},{"key":"ref142","doi-asserted-by":"publisher","DOI":"10.1145\/321941.321944"},{"key":"ref143","volume-title":"The Art of Computer Programming","volume":"2","author":"Knuth","year":"1997"},{"key":"ref144","doi-asserted-by":"publisher","DOI":"10.1145\/312129.312212"},{"key":"ref145","first-page":"492","article-title":"An assessment of features related to phishing websites using an automated technique","volume-title":"Proc. Internet Technol. Secured Trans.","author":"Mohammad"}],"container-title":["IEEE Transactions on Mobile Computing"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/7755\/10008232\/09464748.pdf?arnumber=9464748","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,1,11]],"date-time":"2024-01-11T23:07:04Z","timestamp":1705014424000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9464748\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,2,1]]},"references-count":145,"journal-issue":{"issue":"2"},"URL":"https:\/\/doi.org\/10.1109\/tmc.2021.3092271","relation":{},"ISSN":["1536-1233","1558-0660","2161-9875"],"issn-type":[{"type":"print","value":"1536-1233"},{"type":"electronic","value":"1558-0660"},{"type":"electronic","value":"2161-9875"}],"subject":[],"published":{"date-parts":[[2023,2,1]]}}}