{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,14]],"date-time":"2026-03-14T17:57:18Z","timestamp":1773511038665,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":14,"publisher":"ACM","license":[{"start":{"date-parts":[[2019,8,26]],"date-time":"2019-08-26T00:00:00Z","timestamp":1566777600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2019,8,26]]},"DOI":"10.1145\/3339252.3340518","type":"proceedings-article","created":{"date-parts":[[2019,8,9]],"date-time":"2019-08-09T12:21:03Z","timestamp":1565353263000},"page":"1-9","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":10,"title":["Location Tracking Using Smartphone Accelerometer and Magnetometer Traces"],"prefix":"10.1145","author":[{"given":"Khuong An","family":"Nguyen","sequence":"first","affiliation":[{"name":"Department of Computer Science, Royal Holloway, University of London, Egham, United Kingdom"}]},{"given":"Raja Naeem","family":"Akram","sequence":"additional","affiliation":[{"name":"ISG-SCC, Royal Holloway, University of London, Egham, United Kingdom"}]},{"given":"Konstantinos","family":"Markantonakis","sequence":"additional","affiliation":[{"name":"ISG-SCC, Royal Holloway, University of London, Egham, United Kingdom"}]},{"given":"Zhiyuan","family":"Luo","sequence":"additional","affiliation":[{"name":"Department of Computer Science, Royal Holloway, University of London, Egham, United Kingdom"}]},{"given":"Chris","family":"Watkins","sequence":"additional","affiliation":[{"name":"Department of Computer Science, Royal Holloway, University of London, Egham, United Kingdom"}]}],"member":"320","published-online":{"date-parts":[[2019,8,26]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1186\/s13635-017-0061-8"},{"key":"e_1_3_2_1_2_1","volume-title":"Official Journal of the European Union L119 (4","author":"2016. Regulation (EU) 2016\/679 of the European Parliament and of the Council of 27 April 2016 on the protection of natural persons with regard to the processing of personal data and on the free movement of such data, and repealing Directive 95\/46\/EC (General Data Protection Regulation).","year":"2016","unstructured":"2016. Regulation (EU) 2016\/679 of the European Parliament and of the Council of 27 April 2016 on the protection of natural persons with regard to the processing of personal data and on the free movement of such data, and repealing Directive 95\/46\/EC (General Data Protection Regulation). Official Journal of the European Union L119 (4 May 2016 ), 1--88. 2016. Regulation (EU) 2016\/679 of the European Parliament and of the Council of 27 April 2016 on the protection of natural persons with regard to the processing of personal data and on the free movement of such data, and repealing Directive 95\/46\/EC (General Data Protection Regulation). Official Journal of the European Union L119 (4 May 2016), 1--88."},{"key":"e_1_3_2_1_3_1","volume-title":"Proceedings of the 5th USENIX Conference on Hot Topics in Security (HotSec'10)","author":"Friedland Gerald","year":"2010","unstructured":"Gerald Friedland and Robin Sommer . 2010 . Cybercasing the Joint: On the Privacy Implications of Geo-tagging . In Proceedings of the 5th USENIX Conference on Hot Topics in Security (HotSec'10) . 1--8. Gerald Friedland and Robin Sommer. 2010. Cybercasing the Joint: On the Privacy Implications of Geo-tagging. In Proceedings of the 5th USENIX Conference on Hot Topics in Security (HotSec'10). 1--8."},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-33167-1_22"},{"key":"e_1_3_2_1_5_1","volume-title":"Proceedings of the 3rd Wonference on Online Social Networks (WOSN'10)","author":"Krishnamurthy Balachander","unstructured":"Balachander Krishnamurthy and Craig E. Wills . 2010. Privacy Leakage in Mobile Online Social Networks . In Proceedings of the 3rd Wonference on Online Social Networks (WOSN'10) . 4--4. Balachander Krishnamurthy and Craig E. Wills. 2010. Privacy Leakage in Mobile Online Social Networks. In Proceedings of the 3rd Wonference on Online Social Networks (WOSN'10). 4--4."},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1109\/CRISIS.2012.6378951"},{"key":"e_1_3_2_1_7_1","volume-title":"Privacy protection and self-disclosure across societies: A study of global Twitter users. new media & society 19, 9","author":"Liang Hai","year":"2017","unstructured":"Hai Liang , Fei Shen , and King-wa Fu. 2017. Privacy protection and self-disclosure across societies: A study of global Twitter users. new media & society 19, 9 ( 2017 ), 1476--1497. Hai Liang, Fei Shen, and King-wa Fu. 2017. Privacy protection and self-disclosure across societies: A study of global Twitter users. new media & society 19, 9 (2017), 1476--1497."},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.5555\/1324818"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2016.31"},{"key":"e_1_3_2_1_10_1","unstructured":"Arvind Narayanan Narendran Thiagarajan Mugdha Lakhani Michael Hamburg Dan Boneh etal 2011. Location Privacy via Private Proximity Testing.. In NDSS.  Arvind Narayanan Narendran Thiagarajan Mugdha Lakhani Michael Hamburg Dan Boneh et al. 2011. Location Privacy via Private Proximity Testing.. In NDSS."},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1145\/2668332.2668348"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-45472-5_23"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1109\/PerCom.2014.6813957"},{"key":"e_1_3_2_1_14_1","volume-title":"The Oxford Handbook of Quantitative Methods in Psychology","author":"Wei William WS","unstructured":"William WS Wei . 2006. Time series analysis . In The Oxford Handbook of Quantitative Methods in Psychology : Vol. 2 . William WS Wei. 2006. Time series analysis. In The Oxford Handbook of Quantitative Methods in Psychology: Vol. 2."}],"event":{"name":"ARES '19: 14th International Conference on Availability, Reliability and Security","location":"Canterbury CA United Kingdom","acronym":"ARES '19"},"container-title":["Proceedings of the 14th International Conference on Availability, Reliability and Security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3339252.3340518","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3339252.3340518","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T23:54:29Z","timestamp":1750204469000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3339252.3340518"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,8,26]]},"references-count":14,"alternative-id":["10.1145\/3339252.3340518","10.1145\/3339252"],"URL":"https:\/\/doi.org\/10.1145\/3339252.3340518","relation":{},"subject":[],"published":{"date-parts":[[2019,8,26]]},"assertion":[{"value":"2019-08-26","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}