{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,2]],"date-time":"2026-01-02T07:49:43Z","timestamp":1767340183035,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":25,"publisher":"ACM","license":[{"start":{"date-parts":[[2022,5,16]],"date-time":"2022-05-16T00:00:00Z","timestamp":1652659200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"INSA-Lyon SPIE ICS IoT Chair"},{"name":"H2020 SPARTA"},{"name":"ANR-BMBF PIVOT"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2022,5,16]]},"DOI":"10.1145\/3507657.3528556","type":"proceedings-article","created":{"date-parts":[[2022,5,7]],"date-time":"2022-05-07T11:30:36Z","timestamp":1651923036000},"page":"98-103","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":6,"title":["Device Re-identification in LoRaWAN through Messages Linkage"],"prefix":"10.1145","author":[{"given":"Samuel","family":"P\u00e9lissier","sequence":"first","affiliation":[{"name":"University of Lyon, INSA-Lyon, Inria, CITI Lab., Lyon, France"}]},{"given":"Mathieu","family":"Cunche","sequence":"additional","affiliation":[{"name":"University of Lyon, INSA-Lyon, Inria, CITI Lab., Lyon, France"}]},{"given":"Vincent","family":"Roca","sequence":"additional","affiliation":[{"name":"University Grenoble Alpes, Inria, Grenoble, France"}]},{"given":"Didier","family":"Donsez","sequence":"additional","affiliation":[{"name":"University Grenoble Alpes, LIG, Grenoble, France"}]}],"member":"320","published-online":{"date-parts":[[2022,5,16]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1145\/3395351.3399421"},{"volume-title":"Re-identifying addresses in LoRaWAN networks. Unpublished Research Report. Inria Rh\u00f4ne-Alpes","author":"Ancian Lucas","key":"e_1_3_2_1_2_1","unstructured":"Lucas Ancian and Mathieu Cunche . 2020. Re-identifying addresses in LoRaWAN networks. Unpublished Research Report. Inria Rh\u00f4ne-Alpes ; INSA de Lyon . https:\/\/hal.inria.fr\/hal-02926894 Lucas Ancian and Mathieu Cunche. 2020. Re-identifying addresses in LoRaWAN networks. Unpublished Research Report. Inria Rh\u00f4ne-Alpes; INSA de Lyon. https:\/\/hal.inria.fr\/hal-02926894"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.2478\/popets-2019-0040"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1145\/3144457.3144478"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.2478\/popets-2019-0036"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1186\/s12864-019-6413-7"},{"key":"e_1_3_2_1_7_1","unstructured":"LoRa Alliance Technical Committee. 2017. LoRaWAN \u00ae Specification v1.1.  LoRa Alliance Technical Committee. 2017. LoRaWAN \u00ae Specification v1.1."},{"key":"e_1_3_2_1_8_1","volume-title":"Inferring Activity From Smart Home Network Traffic. In 2016 IEEE Security and Privacy Workshops (SPW). IEEE, 245--251","author":"Copos Bogdan","year":"2016","unstructured":"Bogdan Copos , Karl Levitt , Matt Bishop , and Jeff Rowe . 2016 . Is Anybody Home? Inferring Activity From Smart Home Network Traffic. In 2016 IEEE Security and Privacy Workshops (SPW). IEEE, 245--251 . https:\/\/doi.org\/10.1109\/SPW.2016.48 10.1109\/SPW.2016.48 Bogdan Copos, Karl Levitt, Matt Bishop, and Jeff Rowe. 2016. Is Anybody Home? Inferring Activity From Smart Home Network Traffic. In 2016 IEEE Security and Privacy Workshops (SPW). IEEE, 245--251. https:\/\/doi.org\/10.1109\/SPW.2016.48"},{"key":"#cr-split#-e_1_3_2_1_9_1.1","doi-asserted-by":"crossref","unstructured":"Rachel L. Finn David Wright and Michael Friedewald. 2013. Seven Types of Privacy. In European Data Protection: Coming of Age. https:\/\/doi.org\/10.1007\/978-94-007-5170-5_1 10.1007\/978-94-007-5170-5_1","DOI":"10.1007\/978-94-007-5170-5_1"},{"key":"#cr-split#-e_1_3_2_1_9_1.2","doi-asserted-by":"crossref","unstructured":"Rachel L. Finn David Wright and Michael Friedewald. 2013. Seven Types of Privacy. In European Data Protection: Coming of Age. https:\/\/doi.org\/10.1007\/978-94-007-5170-5_1","DOI":"10.1007\/978-94-007-5170-5_1"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1109\/MITS.2019.2898973"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.3390\/s18113995"},{"key":"e_1_3_2_1_12_1","volume-title":"Lightgbm: A Highly Efficient Gradient Boosting Decision Tree. Advances in neural information processing systems","author":"Ke Guolin","year":"2017","unstructured":"Guolin Ke , Qi Meng , Thomas Finley , Taifeng Wang , Wei Chen , Weidong Ma , Qiwei Ye , and Tie-Yan Liu . 2017 . Lightgbm: A Highly Efficient Gradient Boosting Decision Tree. Advances in neural information processing systems , Vol. 30 (2017), 3146--3154. Guolin Ke, Qi Meng, Thomas Finley, Taifeng Wang, Wei Chen, Weidong Ma, Qiwei Ye, and Tie-Yan Liu. 2017. Lightgbm: A Highly Efficient Gradient Boosting Decision Tree. Advances in neural information processing systems, Vol. 30 (2017), 3146--3154."},{"key":"e_1_3_2_1_13_1","first-page":"1137","article-title":"A Study of Cross-Validation and Bootstrap for Accuracy Estimation and Model Selection","volume":"14","author":"Kohavi Ron","year":"1995","unstructured":"Ron Kohavi . 1995 . A Study of Cross-Validation and Bootstrap for Accuracy Estimation and Model Selection . In Ijcai , Vol. 14. 1137 -- 1145 . Ron Kohavi. 1995. A Study of Cross-Validation and Bootstrap for Accuracy Estimation and Model Selection. In Ijcai, Vol. 14. 1137--1145.","journal-title":"Ijcai"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1145\/3212480.3212508"},{"key":"e_1_3_2_1_15_1","volume-title":"Linking Bluetooth LE & Classic and Implications for Privacy-Preserving Bluetooth-Based Protocols. In 2021 IEEE Symposium on Security and Privacy (SP). IEEE, 1318--1331","author":"Ludant Norbert","year":"2021","unstructured":"Norbert Ludant , Tien D. Vo-Huu , Sashank Narain , and Guevara Noubir . 2021 . Linking Bluetooth LE & Classic and Implications for Privacy-Preserving Bluetooth-Based Protocols. In 2021 IEEE Symposium on Security and Privacy (SP). IEEE, 1318--1331 . https:\/\/doi.org\/10.1109\/SP40001.2021.00102 10.1109\/SP40001.2021.00102 Norbert Ludant, Tien D. Vo-Huu, Sashank Narain, and Guevara Noubir. 2021. Linking Bluetooth LE & Classic and Implications for Privacy-Preserving Bluetooth-Based Protocols. In 2021 IEEE Symposium on Security and Privacy (SP). IEEE, 1318--1331. https:\/\/doi.org\/10.1109\/SP40001.2021.00102"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1145\/2991079.2991098"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.5555\/1953048.2078195"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.3390\/electronics10070864"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1145\/3098243.3098267"},{"key":"e_1_3_2_1_20_1","volume-title":"Lozano","author":"Rodriguez Juan D.","year":"2009","unstructured":"Juan D. Rodriguez , Aritz Perez , and Jose A . Lozano . 2009 . Sensitivity Analysis of K-Fold Cross Validation in Prediction Error Estimation. IEEE transactions on pattern analysis and machine intelligence, Vol. 32 , 3 (2009), 569--575. Juan D. Rodriguez, Aritz Perez, and Jose A. Lozano. 2009. Sensitivity Analysis of K-Fold Cross Validation in Prediction Error Estimation. IEEE transactions on pattern analysis and machine intelligence, Vol. 32, 3 (2009), 569--575."},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1109\/MedComNet52149.2021.9501247"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.3390\/app11073176"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1145\/2897845.2897883"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1109\/IACC.2016.25"}],"event":{"name":"WiSec '22: 15th ACM Conference on Security and Privacy in Wireless and Mobile Networks","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control","SIGMOBILE ACM Special Interest Group on Mobility of Systems, Users, Data and Computing"],"location":"San Antonio TX USA","acronym":"WiSec '22"},"container-title":["Proceedings of the 15th ACM Conference on Security and Privacy in Wireless and Mobile Networks"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3507657.3528556","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3507657.3528556","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T18:10:15Z","timestamp":1750183815000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3507657.3528556"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,5,16]]},"references-count":25,"alternative-id":["10.1145\/3507657.3528556","10.1145\/3507657"],"URL":"https:\/\/doi.org\/10.1145\/3507657.3528556","relation":{},"subject":[],"published":{"date-parts":[[2022,5,16]]},"assertion":[{"value":"2022-05-16","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}