{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,27]],"date-time":"2026-02-27T03:48:28Z","timestamp":1772164108493,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":6,"publisher":"ACM","license":[{"start":{"date-parts":[[2021,5,31]],"date-time":"2021-05-31T00:00:00Z","timestamp":1622419200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/501100001659","name":"Deutsche Forschungsgemeinschaft","doi-asserted-by":"publisher","award":["447586980 \/ 210487104"],"award-info":[{"award-number":["447586980 \/ 210487104"]}],"id":[{"id":"10.13039\/501100001659","id-type":"DOI","asserted-by":"publisher"}]},{"name":"LOEWE initiative","award":["emergenCITY"],"award-info":[{"award-number":["emergenCITY"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2021,5,31]]},"DOI":"10.1145\/3410220.3456280","type":"proceedings-article","created":{"date-parts":[[2021,6,6]],"date-time":"2021-06-06T06:11:02Z","timestamp":1622959862000},"page":"83-84","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":1,"title":["Stay Connected, Leave no Trace: Enhancing Security and Privacy in WiFi via Obfuscating Radiometric Fingerprints"],"prefix":"10.1145","author":[{"given":"Luis F.","family":"Abanto-Leon","sequence":"first","affiliation":[{"name":"Technical University of Darmstadt, Darmstadt, Germany"}]},{"given":"Andreas","family":"B\u00e4uml","sequence":"additional","affiliation":[{"name":"Technical University of Darmstadt, Darmstadt, Germany"}]},{"given":"Gek Hong (Allyson)","family":"Sim","sequence":"additional","affiliation":[{"name":"Technical University of Darmstadt, Darmstadt, Germany"}]},{"given":"Matthias","family":"Hollick","sequence":"additional","affiliation":[{"name":"Technical University of Darmstadt, Darmstadt, Germany"}]},{"given":"Arash","family":"Asadi","sequence":"additional","affiliation":[{"name":"Technical University of Darmstadt, Darmstadt, Germany"}]}],"member":"320","published-online":{"date-parts":[[2021,6,6]]},"reference":[{"key":"e_1_3_2_2_1_1","doi-asserted-by":"crossref","unstructured":"Vladimir Brik Suman Banerjee Marco Gruteser and Sangho Oh. 2008. Wireless Device Identification with Radiometric Signatures. In ACM MobiCom. 116--127.","DOI":"10.1145\/1409944.1409959"},{"key":"e_1_3_2_2_2_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2933242"},{"key":"e_1_3_2_2_3_1","doi-asserted-by":"crossref","unstructured":"P. Liu P. Yang W. Song Y. Yan and X. Li. 2019. Real-time Identification of Rogue WiFi Connections Using Environment-Independent Physical Features. In IEEE INFOCOM. 190--198.","DOI":"10.1109\/INFOCOM.2019.8737455"},{"key":"e_1_3_2_2_4_1","volume-title":"Security and Communication Networks","author":"Robyns Pieter","year":"2017","unstructured":"Pieter Robyns, Bram Bonn\u00e9, Peter Quax, and Wim Lamotte. 2017. Noncooperative 802.11 MAC Layer Fingerprinting and Tracking of Mobile Devices. Security and Communication Networks (2017)."},{"key":"e_1_3_2_2_5_1","first-page":"6","article-title":"Precise Power Delay Profiling with Commodity Wi-Fi","volume":"18","author":"Xie Yaxiong","year":"2018","unstructured":"Yaxiong Xie, Zhenjiang Li, and Mo Li. 2018. Precise Power Delay Profiling with Commodity Wi-Fi. IEEE Transactions on Mobile Computing, Vol. 18, 6 (Sep 2018), 1342--1355.","journal-title":"IEEE Transactions on Mobile Computing"},{"key":"e_1_3_2_2_6_1","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2015.2476338"}],"event":{"name":"SIGMETRICS '21: ACM SIGMETRICS \/ International Conference on Measurement and Modeling of Computer Systems","location":"Virtual Event China","acronym":"SIGMETRICS '21","sponsor":["SIGMETRICS ACM Special Interest Group on Measurement and Evaluation"]},"container-title":["Abstract Proceedings of the 2021 ACM SIGMETRICS \/ International Conference on Measurement and Modeling of Computer Systems"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3410220.3456280","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3410220.3456280","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T18:40:59Z","timestamp":1750185659000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3410220.3456280"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,5,31]]},"references-count":6,"alternative-id":["10.1145\/3410220.3456280","10.1145\/3410220"],"URL":"https:\/\/doi.org\/10.1145\/3410220.3456280","relation":{"is-identical-to":[{"id-type":"doi","id":"10.1145\/3543516.3456280","asserted-by":"object"}]},"subject":[],"published":{"date-parts":[[2021,5,31]]},"assertion":[{"value":"2021-06-06","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}