{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,16]],"date-time":"2026-01-16T10:42:29Z","timestamp":1768560149081,"version":"3.49.0"},"publisher-location":"New York, NY, USA","reference-count":4,"publisher":"ACM","license":[{"start":{"date-parts":[[2023,6,18]],"date-time":"2023-06-18T00:00:00Z","timestamp":1687046400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/501100003725","name":"National Research Foundation of Korea","doi-asserted-by":"publisher","award":["2021R1A2C4002380"],"award-info":[{"award-number":["2021R1A2C4002380"]}],"id":[{"id":"10.13039\/501100003725","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2023,6,18]]},"DOI":"10.1145\/3581791.3597291","type":"proceedings-article","created":{"date-parts":[[2023,6,16]],"date-time":"2023-06-16T17:52:21Z","timestamp":1686937941000},"page":"598-599","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":1,"title":["Demo: Exploiting Indices for Man-in-the-Middle Attacks on Collaborative Unpooling Autoencoders"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-7276-7196","authenticated-orcid":false,"given":"Kichang","family":"Lee","sequence":"first","affiliation":[{"name":"Yonsei University, Seoul, Republic of Korea"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-5649-1537","authenticated-orcid":false,"given":"Jonghyuk","family":"Yun","sequence":"additional","affiliation":[{"name":"Yonsei University, Seoul, Republic of Korea"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-0798-704X","authenticated-orcid":false,"given":"Jun","family":"Han","sequence":"additional","affiliation":[{"name":"Yonsei University, Seoul, Republic of Korea"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-0799-4039","authenticated-orcid":false,"given":"Jeonggil","family":"Ko","sequence":"additional","affiliation":[{"name":"Yonsei University, Seoul, Republic of Korea"}]}],"member":"320","published-online":{"date-parts":[[2023,6,18]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.iot.2022.100644"},{"key":"e_1_3_2_1_2_1","volume-title":"Segnet: A deep convolutional encoder-decoder architecture for image segmentation","author":"Badrinarayanan Vijay","year":"2017","unstructured":"Vijay Badrinarayanan , Alex Kendall , and Roberto Cipolla . 2017 . Segnet: A deep convolutional encoder-decoder architecture for image segmentation . IEEE transactions on pattern analysis and machine intelligence 39, 12 (2017), 2481--2495. Vijay Badrinarayanan, Alex Kendall, and Roberto Cipolla. 2017. Segnet: A deep convolutional encoder-decoder architecture for image segmentation. IEEE transactions on pattern analysis and machine intelligence 39, 12 (2017), 2481--2495."},{"key":"e_1_3_2_1_3_1","volume-title":"USENIX Security Symposium. 4347--4364","author":"Oltrogge Marten","year":"2021","unstructured":"Marten Oltrogge , Nicolas Huaman , Sabrina Amft , Yasemin Acar , Michael Backes , and Sascha Fahl . 2021 . Why Eve and Mallory Still Love Android: Revisiting TLS (In) Security in Android Applications .. In USENIX Security Symposium. 4347--4364 . Marten Oltrogge, Nicolas Huaman, Sabrina Amft, Yasemin Acar, Michael Backes, and Sascha Fahl. 2021. Why Eve and Mallory Still Love Android: Revisiting TLS (In) Security in Android Applications.. In USENIX Security Symposium. 4347--4364."},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.3390\/ijgi9040256"}],"event":{"name":"MobiSys '23: 21st Annual International Conference on Mobile Systems, Applications and Services","location":"Helsinki Finland","acronym":"MobiSys '23","sponsor":["SIGMOBILE ACM Special Interest Group on Mobility of Systems, Users, Data and Computing","SIGOPS ACM Special Interest Group on Operating Systems"]},"container-title":["Proceedings of the 21st Annual International Conference on Mobile Systems, Applications and Services"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3581791.3597291","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T16:36:31Z","timestamp":1750178191000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3581791.3597291"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,6,18]]},"references-count":4,"alternative-id":["10.1145\/3581791.3597291","10.1145\/3581791"],"URL":"https:\/\/doi.org\/10.1145\/3581791.3597291","relation":{},"subject":[],"published":{"date-parts":[[2023,6,18]]},"assertion":[{"value":"2023-06-18","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}