{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,25]],"date-time":"2026-02-25T17:39:35Z","timestamp":1772041175108,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":29,"publisher":"ACM","license":[{"start":{"date-parts":[[2018,2,12]],"date-time":"2018-02-12T00:00:00Z","timestamp":1518393600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"CNS","award":["1705042"],"award-info":[{"award-number":["1705042"]}]},{"DOI":"10.13039\/100000001","name":"NSF","doi-asserted-by":"publisher","award":["AST-1443956"],"award-info":[{"award-number":["AST-1443956"]}],"id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018,2,12]]},"DOI":"10.1145\/3177102.3177106","type":"proceedings-article","created":{"date-parts":[[2018,2,1]],"date-time":"2018-02-01T13:10:57Z","timestamp":1517490657000},"page":"87-92","source":"Crossref","is-referenced-by-count":24,"title":["Adversarial Localization against Wireless Cameras"],"prefix":"10.1145","author":[{"given":"Zhijing","family":"Li","sequence":"first","affiliation":[{"name":"University of California, Santa Barbara, Goleta, CA, USA"}]},{"given":"Zhujun","family":"Xiao","sequence":"additional","affiliation":[{"name":"University of Chicago, Chicago, IL, USA"}]},{"given":"Yanzi","family":"Zhu","sequence":"additional","affiliation":[{"name":"University of California, Santa Barbara, Goleta, CA, USA"}]},{"given":"Irene","family":"Pattarachanyakul","sequence":"additional","affiliation":[{"name":"University of California, Santa Barbara, Goleta, CA, USA"}]},{"given":"Ben Y.","family":"Zhao","sequence":"additional","affiliation":[{"name":"University of Chicago, Chicago, IL, USA"}]},{"given":"Haitao","family":"Zheng","sequence":"additional","affiliation":[{"name":"University of Chicago, Chicago, IL, USA"}]}],"member":"320","published-online":{"date-parts":[[2018,2,12]]},"reference":[{"key":"e_1_3_2_1_1_1","volume-title":"Secure Localization in Sensor Networks Using Transmission Range Variation Proc. of MASS.","author":"Anjum F.","year":"2005"},{"key":"e_1_3_2_1_2_1","unstructured":"P. Bahl and V.N. Padmanabhan 2000. RADAR: An in-building RF-based User Location and Tracking System Proc. of INFOCOM.  P. Bahl and V.N. Padmanabhan 2000. RADAR: An in-building RF-based User Location and Tracking System Proc. of INFOCOM."},{"key":"e_1_3_2_1_3_1","volume-title":"Proc. of GLOBECOM.","author":"Bauer K.","year":"2009"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"crossref","unstructured":"B. Bloessl M. Segata C. Sommer and F. Dressler. 2013. An IEEE 802.11 a\/g\/p OFDM Receiver for GNU Radio. In SRIF. 10.1145\/2491246.2491248   B. Bloessl M. Segata C. Sommer and F. Dressler. 2013. An IEEE 802.11 a\/g\/p OFDM Receiver for GNU Radio. In SRIF. 10.1145\/2491246.2491248","DOI":"10.1145\/2491246.2491248"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/2799650.2799653"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1145\/1859995.1860016"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"crossref","unstructured":"N. Dutta A. Saxena and S. Chellappan 2010. Defending Wireless Sensor Networks against Adversarial Localization Proc. of MDM. 10.1109\/MDM.2010.75   N. Dutta A. Saxena and S. Chellappan 2010. Defending Wireless Sensor Networks against Adversarial Localization Proc. of MDM. 10.1109\/MDM.2010.75","DOI":"10.1109\/MDM.2010.75"},{"key":"e_1_3_2_1_8_1","volume-title":"Hyberloc: Providing Physical Layer Location Privacy in Hybrid Sensor Networks Proc. of ICC.","author":"El-Badry R.","year":"2010"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1145\/1247660.1247689"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICDCS.2005.31"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1145\/2414456.2414487"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/2785956.2787487"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"crossref","unstructured":"J.H. Lee and R.M. Buehrer 2009. Location Estimation using Differential RSS with Spatially Correlated Shadowing Proc. of GLOBECOM.   J.H. Lee and R.M. Buehrer 2009. Location Estimation using Differential RSS with Spatially Correlated Shadowing Proc. of GLOBECOM.","DOI":"10.1109\/GLOCOM.2009.5425272"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1145\/2639108.2639118"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"crossref","unstructured":"X. Li Y. Chen J. Yang and X. Zheng. 2011. Designing Localization Algorithms Robust to Signal Strength Attacks Proc. of INFOCOM.  X. Li Y. Chen J. Yang and X. Zheng. 2011. Designing Localization Algorithms Robust to Signal Strength Attacks Proc. of INFOCOM.","DOI":"10.1109\/INFCOM.2011.5935178"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1145\/3038912.3052563"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1145\/2594368.2594393"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"crossref","unstructured":"J. Martin T. Mayberry C. Donahue L. Foppe L. Brown C. Riggins E.C. Rye and D. Brown 2017. A Study of MAC Address Randomization in Mobile Devices and When it Fails. arXiv preprint arXiv:1703.02874 (2017).  J. Martin T. Mayberry C. Donahue L. Foppe L. Brown C. Riggins E.C. Rye and D. Brown 2017. A Study of MAC Address Randomization in Mobile Devices and When it Fails. arXiv preprint arXiv:1703.02874 (2017).","DOI":"10.1515\/popets-2017-0054"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1109\/TMC.2011.32"},{"key":"e_1_3_2_1_20_1","volume-title":"Phantom: Physical Layer Cooperation for Location Privacy Protection Proc. of INFOCOM.","author":"Oh S."},{"key":"e_1_3_2_1_21_1","unstructured":"Y. Qiao O. Zhang W. Zhou K. Srinivasan and A. Arora 2016. PhyCloak: Obfuscating Sensing from Communication Signals Proc. of NSDI.   Y. Qiao O. Zhang W. Zhou K. Srinivasan and A. Arora 2016. PhyCloak: Obfuscating Sensing from Communication Signals Proc. of NSDI."},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"crossref","unstructured":"C. Sanders. 2011. Practical Packet Analysis: Using Wireshark to Solve Real-World Network Problems. No Starch Press.   C. Sanders. 2011. Practical Packet Analysis: Using Wireshark to Solve Real-World Network Problems. No Starch Press.","DOI":"10.1016\/S1353-4858(11)70082-4"},{"key":"e_1_3_2_1_23_1","unstructured":"S. Shekhar and S. Chawla 2003. Spatial Databases: A Tour. Introduction to Spatial Data Mining. Pearson.  S. Shekhar and S. Chawla 2003. Spatial Databases: A Tour. Introduction to Spatial Data Mining. Pearson."},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1145\/3055245.3055253"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1145\/2973750.2973776"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"crossref","unstructured":"T. Wang and Y. Yang. 2011. Location Privacy Protection from RSS Localization System using Antenna Pattern Synthesis Proc. of INFOCOM.  T. Wang and Y. Yang. 2011. Location Privacy Protection from RSS Localization System using Antenna Pattern Synthesis Proc. of INFOCOM.","DOI":"10.1109\/INFCOM.2011.5935061"},{"key":"e_1_3_2_1_27_1","volume-title":"Proc. of IPDPS.","author":"Xi Y.","year":"2006"},{"key":"e_1_3_2_1_28_1","volume-title":"Proc. of NSDI.","author":"Xiong J.","year":"2013"},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1145\/1134680.1134698"}],"event":{"name":"HotMobile '18: The 19th International Workshop on Mobile Computing Systems and Applications","location":"Tempe Arizona USA","acronym":"HotMobile '18","sponsor":["SIGMOBILE ACM Special Interest Group on Mobility of Systems, Users, Data and Computing"]},"container-title":["Proceedings of the 19th International Workshop on Mobile Computing Systems &amp; Applications"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3177102.3177106","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3177102.3177106","content-type":"application\/pdf","content-version":"vor","intended-application":"syndication"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3177102.3177106","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T19:07:28Z","timestamp":1750273648000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3177102.3177106"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,2,12]]},"references-count":29,"alternative-id":["10.1145\/3177102.3177106","10.1145\/3177102"],"URL":"https:\/\/doi.org\/10.1145\/3177102.3177106","relation":{},"subject":[],"published":{"date-parts":[[2018,2,12]]}}}