{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,21]],"date-time":"2025-12-21T06:25:42Z","timestamp":1766298342591,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":79,"publisher":"ACM","license":[{"start":{"date-parts":[[2021,10,6]],"date-time":"2021-10-06T00:00:00Z","timestamp":1633478400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2021,10,6]]},"DOI":"10.1145\/3471621.3471856","type":"proceedings-article","created":{"date-parts":[[2021,10,7]],"date-time":"2021-10-07T14:50:46Z","timestamp":1633618246000},"page":"33-47","source":"Crossref","is-referenced-by-count":16,"title":["SniffMislead: Non-Intrusive Privacy Protection against Wireless Packet Sniffers in Smart Homes"],"prefix":"10.1145","author":[{"given":"Xuanyu","family":"Liu","sequence":"first","affiliation":[{"name":"Nanjing University, China"}]},{"given":"Qiang","family":"Zeng","sequence":"additional","affiliation":[{"name":"University of South Carolina, US"}]},{"given":"Xiaojiang","family":"Du","sequence":"additional","affiliation":[{"name":"Temple University, US"}]},{"given":"Siva Likitha","family":"Valluru","sequence":"additional","affiliation":[{"name":"University of South Carolina, US"}]},{"given":"Chenglong","family":"Fu","sequence":"additional","affiliation":[{"name":"Temple University, US"}]},{"given":"Xiao","family":"Fu","sequence":"additional","affiliation":[{"name":"Nanjing University, China"}]},{"given":"Bin","family":"Luo","sequence":"additional","affiliation":[{"name":"Nanjing University, China"}]}],"member":"320","published-online":{"date-parts":[[2021,10,7]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1145\/3395351.3399421"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1002\/cpe.4263"},{"key":"e_1_3_2_1_3_1","volume-title":"Tracking and Behavior Augmented Activity Recognition for Multiple Inhabitants","author":"Arif\u00a0Ul Alam Mohammad","year":"2019","unstructured":"Mohammad Arif\u00a0Ul Alam , Nirmalya Roy , and Archan Misra . 2019. Tracking and Behavior Augmented Activity Recognition for Multiple Inhabitants . IEEE Transactions on Mobile Computing( 2019 ). Mohammad Arif\u00a0Ul Alam, Nirmalya Roy, and Archan Misra. 2019. Tracking and Behavior Augmented Activity Recognition for Multiple Inhabitants. IEEE Transactions on Mobile Computing(2019)."},{"key":"e_1_3_2_1_4_1","unstructured":"The\u00a0ZigBee Alliance. 2015. ZigBee Specification. https:\/\/zigbeealliance.org\/wp-content\/uploads\/2019\/11\/docs-05-3474-21-0csg-zigbee-specification.pdf.  The\u00a0ZigBee Alliance. 2015. ZigBee Specification. https:\/\/zigbeealliance.org\/wp-content\/uploads\/2019\/11\/docs-05-3474-21-0csg-zigbee-specification.pdf."},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2019.00013"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.2478\/popets-2019-0040"},{"key":"e_1_3_2_1_7_1","unstructured":"Noah Apthorpe Dillon Reisman and Nick Feamster. 2017. Closing the blinds: Four strategies for protecting smart home privacy from network observers. arXiv preprint arXiv:1705.06809(2017).  Noah Apthorpe Dillon Reisman and Nick Feamster. 2017. Closing the blinds: Four strategies for protecting smart home privacy from network observers. arXiv preprint arXiv:1705.06809(2017)."},{"key":"e_1_3_2_1_8_1","unstructured":"Noah Apthorpe Dillon Reisman and Nick Feamster. 2017. A smart home is no castle: Privacy vulnerabilities of encrypted iot traffic. arXiv preprint arXiv:1705.06805(2017).  Noah Apthorpe Dillon Reisman and Nick Feamster. 2017. A smart home is no castle: Privacy vulnerabilities of encrypted iot traffic. arXiv preprint arXiv:1705.06805(2017)."},{"key":"e_1_3_2_1_9_1","unstructured":"Noah Apthorpe Dillon Reisman Srikanth Sundaresan Arvind Narayanan and Nick Feamster. 2017. Spying on the smart home: Privacy attacks and defenses on encrypted iot traffic. arXiv preprint arXiv:1708.05044(2017).  Noah Apthorpe Dillon Reisman Srikanth Sundaresan Arvind Narayanan and Nick Feamster. 2017. Spying on the smart home: Privacy attacks and defenses on encrypted iot traffic. arXiv preprint arXiv:1708.05044(2017)."},{"key":"e_1_3_2_1_10_1","volume-title":"Iotdots: A digital forensics framework for smart environments. arXiv preprint arXiv:1809.00745(2018).","author":"Babun Leonardo","year":"2018","unstructured":"Leonardo Babun , Amit\u00a0Kumar Sikder , Abbas Acar , and A\u00a0Selcuk Uluagac . 2018 . Iotdots: A digital forensics framework for smart environments. arXiv preprint arXiv:1809.00745(2018). Leonardo Babun, Amit\u00a0Kumar Sikder, Abbas Acar, and A\u00a0Selcuk Uluagac. 2018. Iotdots: A digital forensics framework for smart environments. arXiv preprint arXiv:1809.00745(2018)."},{"key":"e_1_3_2_1_11_1","volume-title":"ACM SIGSAC conference on computer and communications security.","author":"Bastys Iulia","year":"2018","unstructured":"Iulia Bastys , Musard Balliu , and Andrei Sabelfeld . 2018 . If this then what? Controlling flows in IoT apps . In ACM SIGSAC conference on computer and communications security. Iulia Bastys, Musard Balliu, and Andrei Sabelfeld. 2018. If this then what? Controlling flows in IoT apps. In ACM SIGSAC conference on computer and communications security."},{"key":"e_1_3_2_1_12_1","volume-title":"USENIX Security Symposium.","author":"Celik Z\u00a0Berkay","year":"2018","unstructured":"Z\u00a0Berkay Celik , Leonardo Babun , Amit\u00a0Kumar Sikder , Hidayet Aksu , Gang Tan , Patrick McDaniel , and A\u00a0Selcuk Uluagac . 2018 . Sensitive information tracking in commodity IoT . In USENIX Security Symposium. Z\u00a0Berkay Celik, Leonardo Babun, Amit\u00a0Kumar Sikder, Hidayet Aksu, Gang Tan, Patrick McDaniel, and A\u00a0Selcuk Uluagac. 2018. Sensitive information tracking in commodity IoT. In USENIX Security Symposium."},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2019.23326"},{"key":"e_1_3_2_1_14_1","volume-title":"Data Privacy in Trigger-Action Systems. In IEEE Symposium on Security and Privacy.","author":"Chen Yunang","year":"2021","unstructured":"Yunang Chen , Amrita\u00a0Roy Chowdhury , Ruizhe Wang , Andrei Sabelfeld , Rahul Chatterjee , and Earlence Fernandes . 2021 . Data Privacy in Trigger-Action Systems. In IEEE Symposium on Security and Privacy. Yunang Chen, Amrita\u00a0Roy Chowdhury, Ruizhe Wang, Andrei Sabelfeld, Rahul Chatterjee, and Earlence Fernandes. 2021. Data Privacy in Trigger-Action Systems. In IEEE Symposium on Security and Privacy."},{"key":"e_1_3_2_1_15_1","volume-title":"PFirewall: Semantics-Aware Customizable Data Flow Control for Smart Home Privacy Protection. In Network and Distributed Systems Security Symposium.","author":"Chi Haotian","year":"2021","unstructured":"Haotian Chi , Qiang Zeng , Xiaojiang Du , and Lannan Luo . 2021 . PFirewall: Semantics-Aware Customizable Data Flow Control for Smart Home Privacy Protection. In Network and Distributed Systems Security Symposium. Haotian Chi, Qiang Zeng, Xiaojiang Du, and Lannan Luo. 2021. PFirewall: Semantics-Aware Customizable Data Flow Control for Smart Home Privacy Protection. In Network and Distributed Systems Security Symposium."},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1109\/DSN48063.2020.00056"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1109\/DSN.2018.00068"},{"key":"e_1_3_2_1_18_1","volume-title":"International Symposium on Robot and Human Interactive Communication.","author":"Choi Sungjoon","year":"2013","unstructured":"Sungjoon Choi , Eunwoo Kim , and Songhwai Oh . 2013 . Human behavior prediction for smart homes using deep learning . In International Symposium on Robot and Human Interactive Communication. Sungjoon Choi, Eunwoo Kim, and Songhwai Oh. 2013. Human behavior prediction for smart homes using deep learning. In International Symposium on Robot and Human Interactive Communication."},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1109\/SPW.2016.48"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1145\/3229565.3229567"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1145\/2398356.2398377"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1145\/3243734.3243865"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2012.28"},{"key":"e_1_3_2_1_24_1","volume-title":"Security analysis of zigbee. MWR InfoSecurity","author":"Fan Xueqi","year":"2017","unstructured":"Xueqi Fan , Fransisca Susan , William Long , and Shangyan Li. 2017. Security analysis of zigbee. MWR InfoSecurity ( 2017 ), 1\u201318. Xueqi Fan, Fransisca Susan, William Long, and Shangyan Li. 2017. Security analysis of zigbee. MWR InfoSecurity (2017), 1\u201318."},{"key":"e_1_3_2_1_25_1","volume-title":"FlowFence: Practical Data Protection for Emerging IoT Application Frameworks. In USENIX Security Symposium.","author":"Fernandes Earlence","year":"2016","unstructured":"Earlence Fernandes , Justin Paupore , Amir Rahmati , Daniel Simionato , M. Conti , and Atul Prakash . 2016 . FlowFence: Practical Data Protection for Emerging IoT Application Frameworks. In USENIX Security Symposium. Earlence Fernandes, Justin Paupore, Amir Rahmati, Daniel Simionato, M. Conti, and Atul Prakash. 2016. FlowFence: Practical Data Protection for Emerging IoT Application Frameworks. In USENIX Security Symposium."},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2018.23119"},{"key":"e_1_3_2_1_27_1","volume-title":"SVM-based multimodal classification of activities of daily living in health smart homes: sensors, algorithms, and first experimental results","author":"Fleury Anthony","year":"2009","unstructured":"Anthony Fleury , Michel Vacher , and Norbert Noury . 2009. SVM-based multimodal classification of activities of daily living in health smart homes: sensors, algorithms, and first experimental results . IEEE transactions on information technology in biomedicine 14, 2( 2009 ), 274\u2013283. Anthony Fleury, Michel Vacher, and Norbert Noury. 2009. SVM-based multimodal classification of activities of daily living in health smart homes: sensors, algorithms, and first experimental results. IEEE transactions on information technology in biomedicine 14, 2(2009), 274\u2013283."},{"key":"e_1_3_2_1_28_1","volume-title":"USENIX Security Symposium.","author":"Fu Chenglong","year":"2021","unstructured":"Chenglong Fu , Qiang Zeng , and Xiaojiang Du . 2021 . Hawatcher: Semantics-aware anomaly detection for appified smart homes . In USENIX Security Symposium. Chenglong Fu, Qiang Zeng, and Xiaojiang Du. 2021. Hawatcher: Semantics-aware anomaly detection for appified smart homes. In USENIX Security Symposium."},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2018.00041"},{"key":"e_1_3_2_1_30_1","unstructured":"HKCERT. 2020. Device (ZigBee) Security Study. https:\/\/www.hkcert.org\/f\/blog\/264453\/3a1c8eed-012c-4b59-9d9e-971001d66c77-DLFE-14602.pdf.  HKCERT. 2020. Device (ZigBee) Security Study. https:\/\/www.hkcert.org\/f\/blog\/264453\/3a1c8eed-012c-4b59-9d9e-971001d66c77-DLFE-14602.pdf."},{"key":"e_1_3_2_1_31_1","volume-title":"ZigBee Market - growth, trends, and forecast (2020 -","author":"Intelligence Mordor","year":"2025","unstructured":"Mordor Intelligence . 2020. ZigBee Market - growth, trends, and forecast (2020 - 2025 ). https:\/\/www.mordorintelligence.com\/industry-reports\/zigbee-market. Mordor Intelligence. 2020. ZigBee Market - growth, trends, and forecast (2020 - 2025). https:\/\/www.mordorintelligence.com\/industry-reports\/zigbee-market."},{"key":"e_1_3_2_1_32_1","volume-title":"Network and Distributed Systems Security Symposium.","author":"Jia Yunhan\u00a0Jack","year":"2017","unstructured":"Yunhan\u00a0Jack Jia , Qi\u00a0Alfred Chen , Shiqi Wang , Amir Rahmati , Earlence Fernandes , Zhuoqing\u00a0Morley Mao , Atul Prakash , and SJ Unviersity . 2017 . ContexloT: Towards Providing Contextual Integrity to Appified IoT Platforms .. In Network and Distributed Systems Security Symposium. Yunhan\u00a0Jack Jia, Qi\u00a0Alfred Chen, Shiqi Wang, Amir Rahmati, Earlence Fernandes, Zhuoqing\u00a0Morley Mao, Atul Prakash, and SJ Unviersity. 2017. ContexloT: Towards Providing Contextual Integrity to Appified IoT Platforms.. In Network and Distributed Systems Security Symposium."},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM.2016.7524359"},{"key":"e_1_3_2_1_34_1","unstructured":"Joo Kyung-don. 2020. Samsung\u2019s SmartThings app has gathered 112 million subscribers around the world with 52 million of them recognized as active users. https:\/\/en.yna.co.kr\/view\/AEN20200108006700320.  Joo Kyung-don. 2020. Samsung\u2019s SmartThings app has gathered 112 million subscribers around the world with 52 million of them recognized as active users. https:\/\/en.yna.co.kr\/view\/AEN20200108006700320."},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1145\/3078861.3078864"},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2017.2747560"},{"key":"e_1_3_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2016.2587060"},{"key":"e_1_3_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.1145\/3019612.3019878"},{"key":"e_1_3_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2017.2772294"},{"key":"e_1_3_2_1_40_1","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2018.2871719"},{"key":"e_1_3_2_1_41_1","doi-asserted-by":"crossref","unstructured":"Qin Ni Ana\u00a0Bel\u00e9n Garc\u00eda\u00a0Hernando and Iv\u00e1n Pau de\u00a0la Cruz. 2016. A context-aware system infrastructure for monitoring activities of daily living in smart home. Journal of Sensors 2016(2016).  Qin Ni Ana\u00a0Bel\u00e9n Garc\u00eda\u00a0Hernando and Iv\u00e1n Pau de\u00a0la Cruz. 2016. A context-aware system infrastructure for monitoring activities of daily living in smart home. Journal of Sensors 2016(2016).","DOI":"10.1155\/2016\/9493047"},{"key":"e_1_3_2_1_42_1","doi-asserted-by":"publisher","DOI":"10.1145\/3317549.3323409"},{"key":"e_1_3_2_1_43_1","unstructured":"Mikko Ohtamaa. 2017. Levenshtein Python C Extension Module. https:\/\/github.com\/miohtama\/python-Levenshtein.  Mikko Ohtamaa. 2017. Levenshtein Python C Extension Module. https:\/\/github.com\/miohtama\/python-Levenshtein."},{"key":"e_1_3_2_1_44_1","volume-title":"Packet Padding for Improving Privacy in Consumer IoT. In IEEE Symposium on Computers and Communications.","author":"Pinheiro J","year":"2018","unstructured":"Ant\u00f4nio\u00a0 J Pinheiro , Jeandro\u00a0 M Bezerra , and Divanilson\u00a0 R Campelo . 2018 . Packet Padding for Improving Privacy in Consumer IoT. In IEEE Symposium on Computers and Communications. Ant\u00f4nio\u00a0J Pinheiro, Jeandro\u00a0M Bezerra, and Divanilson\u00a0R Campelo. 2018. Packet Padding for Improving Privacy in Consumer IoT. In IEEE Symposium on Computers and Communications."},{"key":"e_1_3_2_1_45_1","volume-title":"Discovering activities to recognize and track in a smart environment","author":"Rashidi Parisa","year":"2010","unstructured":"Parisa Rashidi , Diane\u00a0 J Cook , Lawrence\u00a0 B Holder , and Maureen Schmitter-Edgecombe . 2010. Discovering activities to recognize and track in a smart environment . IEEE transactions on knowledge and data engineering 23, 4( 2010 ), 527\u2013539. Parisa Rashidi, Diane\u00a0J Cook, Lawrence\u00a0B Holder, and Maureen Schmitter-Edgecombe. 2010. Discovering activities to recognize and track in a smart environment. IEEE transactions on knowledge and data engineering 23, 4(2010), 527\u2013539."},{"key":"e_1_3_2_1_46_1","doi-asserted-by":"publisher","DOI":"10.1145\/3355369.3355577"},{"key":"e_1_3_2_1_47_1","unstructured":"ScienceDirect. 2008. Zigbee End Device. https:\/\/www.sciencedirect.com\/topics\/computer-science\/zigbee-end-device.  ScienceDirect. 2008. Zigbee End Device. https:\/\/www.sciencedirect.com\/topics\/computer-science\/zigbee-end-device."},{"key":"e_1_3_2_1_48_1","unstructured":"River\u00a0Loop Security. 2021. Killerbee. https:\/\/github.com\/riverloopsec\/killerbee.  River\u00a0Loop Security. 2021. Killerbee. https:\/\/github.com\/riverloopsec\/killerbee."},{"key":"e_1_3_2_1_49_1","unstructured":"Hardik Shah. 2021. Introduction to BLE security for IoT.https:\/\/www.simform.com\/iot-bluetooth-security-vulnerabilities\/.  Hardik Shah. 2021. Introduction to BLE security for IoT.https:\/\/www.simform.com\/iot-bluetooth-security-vulnerabilities\/."},{"key":"e_1_3_2_1_50_1","doi-asserted-by":"publisher","DOI":"10.1109\/BigData.2018.8622243"},{"key":"e_1_3_2_1_51_1","unstructured":"Sharon Shea. 2018. What is Z-Wave?https:\/\/internetofthingsagenda.techtarget.com\/definition\/Z-Wave.  Sharon Shea. 2018. What is Z-Wave?https:\/\/internetofthingsagenda.techtarget.com\/definition\/Z-Wave."},{"key":"e_1_3_2_1_52_1","volume-title":"USENIX Security Symposium.","author":"Sikder Amit\u00a0Kumar","year":"2017","unstructured":"Amit\u00a0Kumar Sikder , Hidayet Aksu , and A\u00a0Selcuk Uluagac . 2017 . 6thsense: A context-aware sensor-based attack detector for smart devices . In USENIX Security Symposium. Amit\u00a0Kumar Sikder, Hidayet Aksu, and A\u00a0Selcuk Uluagac. 2017. 6thsense: A context-aware sensor-based attack detector for smart devices. In USENIX Security Symposium."},{"key":"e_1_3_2_1_53_1","unstructured":"Amit\u00a0Kumar Sikder Giuseppe Petracca Hidayet Aksu Trent Jaeger and A\u00a0Selcuk Uluagac. 2018. A survey on sensor-based threats to internet-of-things (iot) devices and applications. arXiv preprint arXiv:1802.02041(2018).  Amit\u00a0Kumar Sikder Giuseppe Petracca Hidayet Aksu Trent Jaeger and A\u00a0Selcuk Uluagac. 2018. A survey on sensor-based threats to internet-of-things (iot) devices and applications. arXiv preprint arXiv:1802.02041(2018)."},{"key":"e_1_3_2_1_54_1","doi-asserted-by":"publisher","DOI":"10.1109\/TMC.2018.2866249"},{"key":"e_1_3_2_1_55_1","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOMW.2017.8116438"},{"key":"e_1_3_2_1_56_1","unstructured":"SmartThings. 2020. Samsung SmartThings. https:\/\/www.smartthings.com.  SmartThings. 2020. Samsung SmartThings. https:\/\/www.smartthings.com."},{"key":"e_1_3_2_1_57_1","doi-asserted-by":"publisher","DOI":"10.1145\/1409635.1409663"},{"key":"e_1_3_2_1_58_1","unstructured":"SYNOPSYS. 2020. OpenHub. https:\/\/www.openhub.net.  SYNOPSYS. 2020. OpenHub. https:\/\/www.openhub.net."},{"key":"e_1_3_2_1_59_1","doi-asserted-by":"publisher","DOI":"10.1109\/EuroSP.2016.40"},{"key":"e_1_3_2_1_60_1","unstructured":"Crossbow Technology. 2020. TelosB. https:\/\/www.willow.co.uk\/TelosB_Datasheet.pdf.  Crossbow Technology. 2020. TelosB. https:\/\/www.willow.co.uk\/TelosB_Datasheet.pdf."},{"key":"e_1_3_2_1_61_1","volume-title":"USENIX Security Symposium.","author":"Tian Yuan","year":"2017","unstructured":"Yuan Tian , Nan Zhang , Yueh-Hsun Lin , XiaoFeng Wang , Blase Ur , Xianzheng Guo , and Patrick Tague . 2017 . Smartauth: User-centered authorization for the internet of things . In USENIX Security Symposium. Yuan Tian, Nan Zhang, Yueh-Hsun Lin, XiaoFeng Wang, Blase Ur, Xianzheng Guo, and Patrick Tague. 2017. Smartauth: User-centered authorization for the internet of things. In USENIX Security Symposium."},{"key":"e_1_3_2_1_62_1","doi-asserted-by":"publisher","DOI":"10.1111\/1467-9868.00293"},{"key":"e_1_3_2_1_63_1","volume-title":"A survey of IoT protocols and their security issues through the lens of a generic IoT stack. Internet of Things","author":"Tournier Jonathan","year":"2020","unstructured":"Jonathan Tournier , Fran\u00e7ois Lesueur , Fr\u00e9d\u00e9ric Le\u00a0Mou\u00ebl , Laurent Guyon , and Hicham Ben-Hassine . 2020. A survey of IoT protocols and their security issues through the lens of a generic IoT stack. Internet of Things ( 2020 ), 100264. Jonathan Tournier, Fran\u00e7ois Lesueur, Fr\u00e9d\u00e9ric Le\u00a0Mou\u00ebl, Laurent Guyon, and Hicham Ben-Hassine. 2020. A survey of IoT protocols and their security issues through the lens of a generic IoT stack. Internet of Things (2020), 100264."},{"key":"e_1_3_2_1_64_1","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2020.24097"},{"key":"e_1_3_2_1_65_1","doi-asserted-by":"publisher","DOI":"10.1109\/PERCOM.2019.8767413"},{"key":"e_1_3_2_1_66_1","doi-asserted-by":"publisher","DOI":"10.5555\/1834668.1834670"},{"key":"e_1_3_2_1_67_1","doi-asserted-by":"publisher","DOI":"10.1145\/2897845.2897883"},{"key":"e_1_3_2_1_68_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.1967.1054010"},{"key":"e_1_3_2_1_69_1","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2018.23282"},{"key":"e_1_3_2_1_70_1","unstructured":"WSU. 2009. Wsu casas dataset. http:\/\/ailab.wsu.edu\/casas\/datasets\/.  WSU. 2009. Wsu casas dataset. http:\/\/ailab.wsu.edu\/casas\/datasets\/."},{"key":"e_1_3_2_1_71_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICASSP.2018.8461330"},{"key":"e_1_3_2_1_72_1","volume-title":"International Performance Computing and Communications Conference.","author":"Xu Rixin","year":"2018","unstructured":"Rixin Xu , Qiang Zeng , Liehuang Zhu , Haotian Chi , and Xiaojiang Du . 2018 . Privacy Leakage in Smart Homes and Its Mitigation: IFTTT as a Case Study . In International Performance Computing and Communications Conference. Rixin Xu, Qiang Zeng, Liehuang Zhu, Haotian Chi, and Xiaojiang Du. 2018. Privacy Leakage in Smart Homes and Its Mitigation: IFTTT as a Case Study. In International Performance Computing and Communications Conference."},{"key":"e_1_3_2_1_73_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2017.2719921"},{"key":"e_1_3_2_1_74_1","doi-asserted-by":"publisher","DOI":"10.1109\/TPAMI.2007.1078"},{"key":"e_1_3_2_1_75_1","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2019.2911558"},{"key":"e_1_3_2_1_76_1","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2016.2553452"},{"key":"e_1_3_2_1_77_1","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2014.2357018"},{"key":"e_1_3_2_1_78_1","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM.2017.8057145"},{"key":"e_1_3_2_1_79_1","doi-asserted-by":"publisher","DOI":"10.1145\/3243734.3243820"}],"event":{"name":"RAID '21: 24th International Symposium on Research in Attacks, Intrusions and Defenses","acronym":"RAID '21","location":"San Sebastian Spain"},"container-title":["24th International Symposium on Research in Attacks, Intrusions and Defenses"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3471621.3471856","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3471621.3471856","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T21:24:49Z","timestamp":1750195489000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3471621.3471856"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,10,6]]},"references-count":79,"alternative-id":["10.1145\/3471621.3471856","10.1145\/3471621"],"URL":"https:\/\/doi.org\/10.1145\/3471621.3471856","relation":{},"subject":[],"published":{"date-parts":[[2021,10,6]]}}}