{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,1]],"date-time":"2025-10-01T15:25:45Z","timestamp":1759332345467,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":14,"publisher":"ACM","license":[{"start":{"date-parts":[[2019,11,13]],"date-time":"2019-11-13T00:00:00Z","timestamp":1573603200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"DARPA","award":["FA8750-16-2-0021"],"award-info":[{"award-number":["FA8750-16-2-0021"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2019,11,13]]},"DOI":"10.1145\/3364544.3364827","type":"proceedings-article","created":{"date-parts":[[2019,12,23]],"date-time":"2019-12-23T20:55:31Z","timestamp":1577134531000},"page":"18-21","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":6,"title":["Exploring Privacy Breaches and Mitigation Strategies of Occupancy Sensors in Smart Buildings"],"prefix":"10.1145","author":[{"given":"Phillip","family":"Lee","sequence":"first","affiliation":[{"name":"Honeywell"}]},{"given":"Eun-Jeong","family":"Shin","sequence":"additional","affiliation":[{"name":"University of California, Irvine"}]},{"given":"Valerie","family":"Guralnik","sequence":"additional","affiliation":[{"name":"Resideo"}]},{"given":"Sharad","family":"Mehrotra","sequence":"additional","affiliation":[{"name":"University of California, Irvine"}]},{"given":"Nalini","family":"Venkatasubramanian","sequence":"additional","affiliation":[{"name":"University of California, Irvine"}]},{"given":"Kevin T.","family":"Smith","sequence":"additional","affiliation":[{"name":"Tridium"}]}],"member":"320","published-online":{"date-parts":[[2019,11,13]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1109\/MSPEC.2003.1222043"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2013.6525606"},{"key":"e_1_3_2_1_3_1","first-page":"177","volume-title":"ACM\/IEEE 8th International Conference on Cyber-Physical Systems (ICCPS)","author":"Ruoxi","year":"2017","unstructured":"Ruoxi Jia and et al. Privacy-enhanced architecture for occupancy-based HVAC control . In ACM\/IEEE 8th International Conference on Cyber-Physical Systems (ICCPS) , pages 177 -- 186 . IEEE, 2017 . Ruoxi Jia and et al. Privacy-enhanced architecture for occupancy-based HVAC control. In ACM\/IEEE 8th International Conference on Cyber-Physical Systems (ICCPS), pages 177--186. IEEE, 2017."},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1145\/2666652.2666655"},{"key":"e_1_3_2_1_5_1","first-page":"1","volume-title":"Proceedings of the 2nd ACM workshop on embedded sensing systems for energy-efficiency in building","author":"Yuvraj","year":"2010","unstructured":"Yuvraj Agarwal and et al. Occupancy-driven energy management for smart building automation . In Proceedings of the 2nd ACM workshop on embedded sensing systems for energy-efficiency in building , pages 1 -- 6 . ACM, 2010 . Yuvraj Agarwal and et al. Occupancy-driven energy management for smart building automation. In Proceedings of the 2nd ACM workshop on embedded sensing systems for energy-efficiency in building, pages 1--6. ACM, 2010."},{"key":"e_1_3_2_1_6_1","first-page":"1","volume-title":"IEEE International Conference on Pervasive Computing and Communication Workshops (PerCom Workshops)","author":"Sharad","year":"2016","unstructured":"Sharad Mehrotra and et al. Tippers: A privacy cognizant iot environment . In IEEE International Conference on Pervasive Computing and Communication Workshops (PerCom Workshops) , pages 1 -- 6 . IEEE, 2016 . Sharad Mehrotra and et al. Tippers: A privacy cognizant iot environment. In IEEE International Conference on Pervasive Computing and Communication Workshops (PerCom Workshops), pages 1--6. IEEE, 2016."},{"key":"e_1_3_2_1_7_1","volume-title":"September 27","author":"Khurana Himanshu","year":"2018","unstructured":"Himanshu Khurana and Daniel Kirschner . Space utilization and building management system analysis , September 27 2018 . US Patent App . 15\/467, 824. Himanshu Khurana and Daniel Kirschner. Space utilization and building management system analysis, September 27 2018. US Patent App. 15\/467, 824."},{"key":"e_1_3_2_1_8_1","first-page":"193","volume-title":"Distributed Computing Systems Workshops (ICDCSW), 2017 IEEE 37th International Conference on","author":"Primal","year":"2017","unstructured":"Primal Pappachan and et al. Towards privacy-aware smart buildings: Capturing, communicating, and enforcing privacy policies and preferences . In Distributed Computing Systems Workshops (ICDCSW), 2017 IEEE 37th International Conference on , pages 193 -- 198 . IEEE, 2017 . Primal Pappachan and et al. Towards privacy-aware smart buildings: Capturing, communicating, and enforcing privacy policies and preferences. In Distributed Computing Systems Workshops (ICDCSW), 2017 IEEE 37th International Conference on, pages 193--198. IEEE, 2017."},{"key":"e_1_3_2_1_9_1","first-page":"1375","volume-title":"Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security","author":"Yan","year":"2017","unstructured":"Yan Chen and et al. PeGaSus: Data-adaptive differentially private stream processing . In Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security , pages 1375 -- 1388 . ACM, 2017 . Yan Chen and et al. PeGaSus: Data-adaptive differentially private stream processing. In Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security, pages 1375--1388. ACM, 2017."},{"key":"e_1_3_2_1_10_1","first-page":"1725","volume-title":"Proceedings of the 2018 International Conference on Management of Data","author":"Sameera","year":"2018","unstructured":"Sameera Ghayyur and et al. Iot-detective: Analyzing iot data under differential privacy . In Proceedings of the 2018 International Conference on Management of Data , pages 1725 -- 1728 . ACM, 2018 . Sameera Ghayyur and et al. Iot-detective: Analyzing iot data under differential privacy. In Proceedings of the 2018 International Conference on Management of Data, pages 1725--1728. ACM, 2018."},{"key":"e_1_3_2_1_11_1","first-page":"151","volume-title":"Proceedings. 11th IEEE International Requirements Engineering Conference, 2003","author":"Lin","year":"2003","unstructured":"Lin Liu and et al. Security and privacy requirements analysis within a social setting . In Proceedings. 11th IEEE International Requirements Engineering Conference, 2003 ., pages 151 -- 161 . IEEE, 2003 . Lin Liu and et al. Security and privacy requirements analysis within a social setting. In Proceedings. 11th IEEE International Requirements Engineering Conference, 2003., pages 151--161. IEEE, 2003."},{"key":"e_1_3_2_1_12_1","first-page":"258","volume-title":"Proceedings of the 10th ACM\/IEEE International Conference on Information Processing in Sensor Networks","author":"Varick","year":"2011","unstructured":"Varick L Erickson and et al. Observe: Occupancy-based system for efficient reduction of hvac energy . In Proceedings of the 10th ACM\/IEEE International Conference on Information Processing in Sensor Networks , pages 258 -- 269 . IEEE, 2011 . Varick L Erickson and et al. Observe: Occupancy-based system for efficient reduction of hvac energy. In Proceedings of the 10th ACM\/IEEE International Conference on Information Processing in Sensor Networks, pages 258--269. IEEE, 2011."},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1142\/S0218488502001648"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4419-5906-5_752"}],"event":{"name":"BuildSys '19: The 6th ACM International Conference on Systems for Energy-Efficient Buildings, Cities, and Transportation","sponsor":["SIGEnergy ACM Special Interest Group on Energy Systems and Informatics"],"location":"New York NY USA","acronym":"BuildSys '19"},"container-title":["Proceedings of the 1st ACM International Workshop on Technology Enablers and Innovative Applications for Smart Cities and Communities"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3364544.3364827","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3364544.3364827","content-type":"application\/pdf","content-version":"vor","intended-application":"syndication"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3364544.3364827","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T23:23:23Z","timestamp":1750202603000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3364544.3364827"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,11,13]]},"references-count":14,"alternative-id":["10.1145\/3364544.3364827","10.1145\/3364544"],"URL":"https:\/\/doi.org\/10.1145\/3364544.3364827","relation":{},"subject":[],"published":{"date-parts":[[2019,11,13]]},"assertion":[{"value":"2019-11-13","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}