{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,28]],"date-time":"2025-10-28T03:16:56Z","timestamp":1761621416040,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":8,"publisher":"ACM","license":[{"start":{"date-parts":[[2018,10,15]],"date-time":"2018-10-15T00:00:00Z","timestamp":1539561600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2018,10,15]]},"DOI":"10.1145\/3243734.3278523","type":"proceedings-article","created":{"date-parts":[[2018,11,13]],"date-time":"2018-11-13T13:39:38Z","timestamp":1542116378000},"page":"2255-2257","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":9,"title":["The House That Knows You"],"prefix":"10.1145","author":[{"given":"Talha","family":"Ongun","sequence":"first","affiliation":[{"name":"Northeastern University, Boston, MA, USA"}]},{"given":"Alina","family":"Oprea","sequence":"additional","affiliation":[{"name":"Northeastern University, Boston, MA, USA"}]},{"given":"Cristina","family":"Nita-Rotaru","sequence":"additional","affiliation":[{"name":"Northeastern University, Boston, MA, USA"}]},{"given":"Mihai","family":"Christodorescu","sequence":"additional","affiliation":[{"name":"Visa Research, Palo Alto, CA, USA"}]},{"given":"Negin","family":"Salajegheh","sequence":"additional","affiliation":[{"name":"Visa Research, Palo Alto, CA, USA"}]}],"member":"320","published-online":{"date-parts":[[2018,10,15]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"2018. Mon(IoT)r Lab. https:\/\/moniotrlab.ccis.neu.edu  2018. Mon(IoT)r Lab. https:\/\/moniotrlab.ccis.neu.edu"},{"key":"e_1_3_2_1_2_1","volume-title":"Spying on the smart home: Privacy attacks and defenses on encrypted IoT traffic. arXiv preprint arXiv:1708.05044","author":"Apthorpe Noah","year":"2017","unstructured":"Noah Apthorpe , Dillon Reisman , Srikanth Sundaresan , Arvind Narayanan , and Nick Feamster . 2017. Spying on the smart home: Privacy attacks and defenses on encrypted IoT traffic. arXiv preprint arXiv:1708.05044 ( 2017 ). Noah Apthorpe, Dillon Reisman, Srikanth Sundaresan, Arvind Narayanan, and Nick Feamster. 2017. Spying on the smart home: Privacy attacks and defenses on encrypted IoT traffic. arXiv preprint arXiv:1708.05044 (2017)."},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"crossref","unstructured":"David Freeman Sakshi Jain Markus D\u00fcrmuth Battista Biggio and Giorgio Giacinto. 2016. Who Are You? A Statistical Approach to Measuring User Authenticity.. In NDSS. 1--15.  David Freeman Sakshi Jain Markus D\u00fcrmuth Battista Biggio and Giorgio Giacinto. 2016. Who Are You? A Statistical Approach to Measuring User Authenticity.. In NDSS. 1--15.","DOI":"10.14722\/ndss.2016.23240"},{"key":"e_1_3_2_1_4_1","volume-title":"27th USENIX Security Symposium (USENIX Security 18)","author":"He Weijia","year":"2018","unstructured":"Weijia He , Maximilian Golla , Roshni Padhi , Jordan Ofek , Markus D\u00fcrmuth , Earlence Fernandes , and Blase Ur . 2018 . Rethinking Access Control and Authentication for the Home Internet of Things (IoT) . In 27th USENIX Security Symposium (USENIX Security 18) . USENIX Association, Baltimore, MD, 255--272. https:\/\/www.usenix.org\/conference\/usenixsecurity18\/presentation\/he Weijia He, Maximilian Golla, Roshni Padhi, Jordan Ofek, Markus D\u00fcrmuth, Earlence Fernandes, and Blase Ur. 2018. Rethinking Access Control and Authentication for the Home Internet of Things (IoT). In 27th USENIX Security Symposium (USENIX Security 18). USENIX Association, Baltimore, MD, 255--272. https:\/\/www.usenix.org\/conference\/usenixsecurity18\/presentation\/he"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1162\/neco.1997.9.8.1735"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-08506-7_8"},{"key":"e_1_3_2_1_7_1","volume-title":"USENIX Security Symposium. 301--316","author":"Riva Oriana","year":"2012","unstructured":"Oriana Riva , Chuan Qin , Karin Strauss , and Dimitrios Lymberopoulos . 2012 . Progressive Authentication: Deciding When to Authenticate on Mobile Phones .. In USENIX Security Symposium. 301--316 . Oriana Riva, Chuan Qin, Karin Strauss, and Dimitrios Lymberopoulos. 2012. Progressive Authentication: Deciding When to Authenticate on Mobile Phones.. In USENIX Security Symposium. 301--316."},{"key":"e_1_3_2_1_8_1","volume-title":"International Conference on Information Security. Springer, 99--113","author":"Shi Elaine","year":"2010","unstructured":"Elaine Shi , Yuan Niu , Markus Jakobsson , and Richard Chow . 2010 . Implicit authentication through learning user behavior . In International Conference on Information Security. Springer, 99--113 . Elaine Shi, Yuan Niu, Markus Jakobsson, and Richard Chow. 2010. Implicit authentication through learning user behavior. In International Conference on Information Security. Springer, 99--113."}],"event":{"name":"CCS '18: 2018 ACM SIGSAC Conference on Computer and Communications Security","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"],"location":"Toronto Canada","acronym":"CCS '18"},"container-title":["Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3243734.3278523","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3243734.3278523","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T00:57:47Z","timestamp":1750208267000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3243734.3278523"}},"subtitle":["User Authentication Based on IoT Data"],"short-title":[],"issued":{"date-parts":[[2018,10,15]]},"references-count":8,"alternative-id":["10.1145\/3243734.3278523","10.1145\/3243734"],"URL":"https:\/\/doi.org\/10.1145\/3243734.3278523","relation":{},"subject":[],"published":{"date-parts":[[2018,10,15]]},"assertion":[{"value":"2018-10-15","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}