{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,8,23]],"date-time":"2025-08-23T00:09:00Z","timestamp":1755907740922,"version":"3.44.0"},"publisher-location":"New York, NY, USA","reference-count":29,"publisher":"ACM","license":[{"start":{"date-parts":[[2023,11,15]],"date-time":"2023-11-15T00:00:00Z","timestamp":1700006400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2023,11,15]]},"DOI":"10.1145\/3600100.3625376","type":"proceedings-article","created":{"date-parts":[[2023,11,3]],"date-time":"2023-11-03T12:17:16Z","timestamp":1699013836000},"page":"333-339","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":0,"title":["Mitigating Privacy Leakage in Anomalous Building Data Streams"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-3846-6282","authenticated-orcid":false,"given":"Mahathir","family":"Almashor","sequence":"first","affiliation":[{"name":"CSIRO Energy, Australia"}]},{"ORCID":"https:\/\/orcid.org\/0009-0005-1145-0239","authenticated-orcid":false,"given":"Akbar","family":"Fadiansyah","sequence":"additional","affiliation":[{"name":"CSIRO Data61, Australia"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-0277-104X","authenticated-orcid":false,"given":"Chehara","family":"Pathmabandu","sequence":"additional","affiliation":[{"name":"CSIRO Data61, Australia"}]},{"ORCID":"https:\/\/orcid.org\/0009-0008-8294-9936","authenticated-orcid":false,"given":"Matt","family":"Amos","sequence":"additional","affiliation":[{"name":"CSIRO Energy, Australia"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-4286-3774","authenticated-orcid":false,"given":"M.A.P.","family":"Chamikara","sequence":"additional","affiliation":[{"name":"CSIRO Data61, Australia"}]}],"member":"320","published-online":{"date-parts":[[2023,11,15]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-68015-6_5"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2021.3117285"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1145\/3133956.3134102"},{"key":"e_1_3_2_1_4_1","volume-title":"Australia.","author":"Department of Climate Change","year":"2022","unstructured":"Department of Climate Change, Energy, the Environment and Water, Australia. 2022. Commercial Buildings Energy Consumption Baseline Study 2022. Technical Report. Department of Climate Change, Energy, the Environment and Water, Australia. 247 pages. https:\/\/www.energy.gov.au\/publications\/commercial-buildings-energy-consumption-baseline-study-2022"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.3016937"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1145\/3183713.3193571"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.3390\/sym13061043"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.48550\/ARXIV.2206.09426"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2015.09.016"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2021.3124309"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1109\/TPDS.2018.2809624"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1109\/ISGTEurope.2017.8260283"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","unstructured":"Randhir Kumar Prabhat Kumar Rakesh Tripathi Govind\u00a0P. Gupta Thippa\u00a0Reddy Gadekallu and Gautam Srivastava. 2021-03. SP2F: A secured privacy-preserving framework for smart agricultural Unmanned Aerial Vehicles. Computer Networks 187 (2021-03) 107819. https:\/\/doi.org\/10.1016\/j.comnet.2021.107819","DOI":"10.1016\/j.comnet.2021.107819"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1145\/3322276.3322366"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-82786-1_11"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1145\/3606274.3606277"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-66399-9_18"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2020.2967734"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1109\/MASS.2016.049"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","unstructured":"Aya\u00a0Nabil Sayed Yassine Himeur and Faycal Bensaali. 2022-10. Deep and transfer learning for building occupancy detection: A review and comparative analysis. Engineering Applications of Artificial Intelligence 115 (2022-10) 105254. https:\/\/doi.org\/10.1016\/j.engappai.2022.105254","DOI":"10.1016\/j.engappai.2022.105254"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.14778\/3538598.3538602"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","unstructured":"Mohamed Seliem Khalid Elgazzar and Kasem Khalil. 2018-11-18. Towards Privacy Preserving IoT Environments: A Survey. Wireless Communications and Mobile Computing 2018 (2018-11-18) 1\u201315. https:\/\/doi.org\/10.1155\/2018\/1032761","DOI":"10.1155\/2018\/1032761"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","unstructured":"Lo\u2019ai Tawalbeh Fadi Muheidat Mais Tawalbeh and Muhannad Quwaider. 2020-06-15. IoT Privacy and Security: Challenges and Solutions. Applied Sciences 10 12 (2020-06-15) 4102. https:\/\/doi.org\/10.3390\/app10124102","DOI":"10.3390\/app10124102"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1109\/MSEC.2019.2924167"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.5555\/3172795.3172799"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1109\/HPCC\/SmartCity\/DSS.2019.00180"},{"key":"e_1_3_2_1_27_1","volume-title":"Towards the Detection of Building Occupancy with Synthetic Environmental Data. CoRR abs\/2010.04209","author":"Weber Manuel","year":"2020","unstructured":"Manuel Weber, Christoph Doblander, and Peter Mandl. 2020. Towards the Detection of Building Occupancy with Synthetic Environmental Data. CoRR abs\/2010.04209 (2020), 1\u20134. arXiv:2010.04209https:\/\/arxiv.org\/abs\/2010.04209"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2018.1701080"},{"key":"e_1_3_2_1_29_1","first-page":"1","article-title":"PyOD: A Python Toolbox for Scalable Outlier Detection","volume":"20","author":"Zhao Yue","year":"2019","unstructured":"Yue Zhao, Zain Nasrullah, and Zheng Li. 2019. PyOD: A Python Toolbox for Scalable Outlier Detection. Journal of Machine Learning Research 20, 96 (2019), 1\u20137. http:\/\/jmlr.org\/papers\/v20\/19-011.html","journal-title":"Journal of Machine Learning Research"}],"event":{"name":"BuildSys '23: The 10th ACM International Conference on Systems for Energy-Efficient Buildings, Cities, and Transportation","acronym":"BuildSys '23","location":"Istanbul Turkey"},"container-title":["Proceedings of the 10th ACM International Conference on Systems for Energy-Efficient Buildings, Cities, and Transportation"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3600100.3625376","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3600100.3625376","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,8,22]],"date-time":"2025-08-22T21:30:07Z","timestamp":1755898207000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3600100.3625376"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,11,15]]},"references-count":29,"alternative-id":["10.1145\/3600100.3625376","10.1145\/3600100"],"URL":"https:\/\/doi.org\/10.1145\/3600100.3625376","relation":{},"subject":[],"published":{"date-parts":[[2023,11,15]]},"assertion":[{"value":"2023-11-15","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}