{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,10]],"date-time":"2025-11-10T21:22:41Z","timestamp":1762809761126,"version":"3.41.0"},"reference-count":51,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","license":[{"start":{"date-parts":[[2025,1,1]],"date-time":"2025-01-01T00:00:00Z","timestamp":1735689600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/legalcode"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Open J. Comput. Soc."],"published-print":{"date-parts":[[2025]]},"DOI":"10.1109\/ojcs.2025.3569437","type":"journal-article","created":{"date-parts":[[2025,5,12]],"date-time":"2025-05-12T17:46:12Z","timestamp":1747071972000},"page":"822-833","source":"Crossref","is-referenced-by-count":1,"title":["WiFi-Based Location Tracking: A Still Open Door on Laptops"],"prefix":"10.1109","volume":"6","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-8920-8128","authenticated-orcid":false,"given":"Mariana","family":"Cunha","sequence":"first","affiliation":[{"name":"Department of Computer Science, CISUC, CRACS\/INESC TEC, University of Porto, Porto, Portugal"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-2077-7223","authenticated-orcid":false,"given":"Ricardo","family":"Mendes","sequence":"additional","affiliation":[{"name":"CISUC\/NCS, DEI, University of Coimbra, Coimbra, Portugal"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-2559-5616","authenticated-orcid":false,"given":"Yves-Alexandre","family":"de Montjoye","sequence":"additional","affiliation":[{"name":"Imperial College London, South Kensington, London, U.K."}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-5805-1351","authenticated-orcid":false,"given":"Jo\u00e3o P.","family":"Vilela","sequence":"additional","affiliation":[{"name":"Department of Computer Science, CISUC, CRACS\/INESC TEC, University of Porto, Porto, Portugal"}]}],"member":"263","reference":[{"doi-asserted-by":"publisher","key":"ref1","DOI":"10.1145\/3432699"},{"doi-asserted-by":"publisher","key":"ref2","DOI":"10.1109\/PRISMS.2013.6927176"},{"doi-asserted-by":"publisher","key":"ref3","DOI":"10.1016\/j.pmcj.2017.09.005"},{"year":"2024","author":"Raphael","article-title":"Android versions: A living history from 1.0 to 15","key":"ref4"},{"doi-asserted-by":"publisher","key":"ref5","DOI":"10.1007\/978-3-031-17140-6_8"},{"doi-asserted-by":"publisher","key":"ref6","DOI":"10.1145\/2426656.2426685"},{"doi-asserted-by":"publisher","key":"ref7","DOI":"10.1109\/WoWMoM.2012.6263700"},{"doi-asserted-by":"publisher","key":"ref8","DOI":"10.1371\/journal.pone.0130824"},{"doi-asserted-by":"publisher","key":"ref9","DOI":"10.1016\/j.compenvurbsys.2018.07.006"},{"doi-asserted-by":"publisher","key":"ref10","DOI":"10.1007\/11552338_13"},{"key":"ref11","article-title":"Differentially private location privacy in practice","volume-title":"Proc. 3rd Workshop Mobile Secur. Technol.","author":"Primault","year":"2014"},{"doi-asserted-by":"publisher","key":"ref12","DOI":"10.1038\/srep01376"},{"doi-asserted-by":"publisher","key":"ref13","DOI":"10.1126\/sciadv.abl6464"},{"doi-asserted-by":"publisher","key":"ref14","DOI":"10.1145\/3287064"},{"doi-asserted-by":"publisher","key":"ref15","DOI":"10.1038\/s41598-021-82294-1"},{"doi-asserted-by":"publisher","key":"ref16","DOI":"10.1140\/epjds\/s13688-021-00299-2"},{"doi-asserted-by":"publisher","key":"ref17","DOI":"10.1109\/ACCESS.2021.3056152"},{"doi-asserted-by":"publisher","key":"ref18","DOI":"10.1016\/j.cosrev.2021.100403"},{"doi-asserted-by":"publisher","key":"ref19","DOI":"10.1145\/2766498.2766517"},{"doi-asserted-by":"publisher","key":"ref20","DOI":"10.1109\/ISSC.2019.8904968"},{"doi-asserted-by":"publisher","key":"ref21","DOI":"10.1145\/2897845.2897883"},{"doi-asserted-by":"publisher","key":"ref22","DOI":"10.1007\/978-3-031-09234-3_19"},{"doi-asserted-by":"publisher","key":"ref23","DOI":"10.1109\/TMC.2018.2849416"},{"doi-asserted-by":"publisher","key":"ref24","DOI":"10.1109\/INFOCOM.2016.7524459"},{"doi-asserted-by":"publisher","key":"ref25","DOI":"10.1109\/MILCOM.2012.6415713"},{"doi-asserted-by":"publisher","key":"ref26","DOI":"10.1109\/ICDCS.2017.139"},{"doi-asserted-by":"publisher","key":"ref27","DOI":"10.1145\/1873951.1874078"},{"doi-asserted-by":"publisher","key":"ref28","DOI":"10.1109\/ACCESS.2016.2579879"},{"doi-asserted-by":"publisher","key":"ref29","DOI":"10.1109\/IPSN.2016.7460727"},{"year":"2024","author":"GlobalStats","article-title":"Desktop operating system market share worldwide","key":"ref30"},{"year":"2024","author":"Learn","article-title":"Changes to API behavior for Wi-Fi access and location","key":"ref31"},{"doi-asserted-by":"publisher","key":"ref32","DOI":"10.1109\/PerCom53586.2022.9762379"},{"year":"2025","author":"Wise","article-title":"How many people use laptops in 2025?","key":"ref33"},{"volume-title":"A. Developers","year":"2024","article-title":"Get the last known location","key":"ref34"},{"volume-title":"P. Secur.","year":"2025","article-title":"Should you shut down your computer every night? 8 considerations","key":"ref35"},{"volume-title":"M. Learn","year":"2025","article-title":"What is modern standby","key":"ref36"},{"doi-asserted-by":"publisher","key":"ref37","DOI":"10.1016\/j.compenvurbsys.2017.05.004"},{"doi-asserted-by":"publisher","key":"ref38","DOI":"10.1145\/2020408.2020579"},{"doi-asserted-by":"publisher","key":"ref39","DOI":"10.1016\/j.patter.2022.100662"},{"volume-title":"S. GlobalStats","year":"2024","article-title":"Operating system market share worldwide","key":"ref40"},{"volume-title":"S. GlobalStats","year":"2024","article-title":"Desktop windows version market share worldwide","key":"ref41"},{"volume-title":"S. GlobalStats","year":"2024","article-title":"Desktop macOS version market share worldwide","key":"ref42"},{"volume-title":"S. GlobalStats","year":"2024","article-title":"Mobile & Tablet Android version market share worldwide","key":"ref43"},{"volume-title":"S. GlobalStats","year":"2024","article-title":"Mobile & Tablet iOS version market share worldwide","key":"ref44"},{"volume-title":"A. Source","year":"2024","article-title":"Wi-Fi preferred network offload scanning","key":"ref45"},{"volume-title":"A. Developers","year":"2024","article-title":"Wi-Fi scanning overview","key":"ref46"},{"volume-title":"A. Developers","year":"2024","article-title":"Request permission to access nearby Wi-Fi devices","key":"ref47"},{"volume-title":"M. Support","year":"2024","article-title":"Windows desktop apps and privacy","key":"ref48"},{"doi-asserted-by":"publisher","key":"ref49","DOI":"10.1007\/978-3-030-35055-0_3"},{"doi-asserted-by":"publisher","key":"ref50","DOI":"10.1145\/3672608.3707966"},{"doi-asserted-by":"publisher","key":"ref51","DOI":"10.1109\/COMST.2024.3432871"}],"container-title":["IEEE Open Journal of the Computer Society"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/8782664\/10834807\/11002526.pdf?arnumber=11002526","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,24]],"date-time":"2025-06-24T07:08:31Z","timestamp":1750748911000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/11002526\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025]]},"references-count":51,"URL":"https:\/\/doi.org\/10.1109\/ojcs.2025.3569437","relation":{},"ISSN":["2644-1268"],"issn-type":[{"type":"electronic","value":"2644-1268"}],"subject":[],"published":{"date-parts":[[2025]]}}}