{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,17]],"date-time":"2025-10-17T20:06:59Z","timestamp":1760731619006,"version":"3.44.0"},"publisher-location":"New York, NY, USA","reference-count":61,"publisher":"ACM","license":[{"start":{"date-parts":[[2024,5,27]],"date-time":"2024-05-27T00:00:00Z","timestamp":1716768000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/501100006374","name":"NSF (National Science Foundation)","doi-asserted-by":"publisher","award":["CNS-2204785,CNS-2205868,CNS-2309477,CNS-2310322,CNS-2309550"],"award-info":[{"award-number":["CNS-2204785,CNS-2205868,CNS-2309477,CNS-2310322,CNS-2309550"]}],"id":[{"id":"10.13039\/501100006374","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2024,5,27]]},"DOI":"10.1145\/3643833.3656124","type":"proceedings-article","created":{"date-parts":[[2024,5,20]],"date-time":"2024-05-20T19:25:07Z","timestamp":1716233107000},"page":"101-112","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":5,"title":["Seeing Is Believing: Extracting Semantic Information from Video for Verifying IoT Events"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-6555-9858","authenticated-orcid":false,"given":"Chenglong","family":"Fu","sequence":"first","affiliation":[{"name":"University of North Carolina at Charlotte, Charlotte, North Carolina, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-4235-9671","authenticated-orcid":false,"given":"Xiaojiang","family":"Du","sequence":"additional","affiliation":[{"name":"Stevens Institute of Technology, Hoboken, New Jersey, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-9432-6017","authenticated-orcid":false,"given":"Qiang","family":"Zeng","sequence":"additional","affiliation":[{"name":"George Mason University, Fairfax, Virginia, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-9189-5150","authenticated-orcid":false,"given":"Zhenyu","family":"Zhao","sequence":"additional","affiliation":[{"name":"Temple University, Philadelphia, Pennsylvania, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-8902-1753","authenticated-orcid":false,"given":"Fei","family":"Zuo","sequence":"additional","affiliation":[{"name":"University of Central Oklahoma, Edmond, Oklahoma, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-7718-0220","authenticated-orcid":false,"given":"Jia","family":"Di","sequence":"additional","affiliation":[{"name":"University of Arkansas, Fayetteville, Arkansas, USA"}]}],"member":"320","published-online":{"date-parts":[[2024,5,27]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"[n. d.]. 2023 Home Security Market Report. (Accessed on 01\/05\/2024)."},{"volume-title":"d.]. 64 Smart Home Statistics & Facts","year":"2023","key":"e_1_3_2_1_2_1","unstructured":"[n. d.]. 64 Smart Home Statistics & Facts 2023. https:\/\/smarthomelady.com\/smarthome- statistics\/#google_vignette. (Accessed on 01\/05\/2024)."},{"key":"e_1_3_2_1_3_1","unstructured":"[n. d.]. North America Smart Home Security Cameras Market Report. (Accessed on 01\/05\/2024)."},{"key":"e_1_3_2_1_4_1","unstructured":"[n. d.]. Ring Always Home Cam | Indoor Flying Camera Home Security Camera. https:\/\/ring.com\/always-home-cam-ying-camera. (Accessed on 01\/05\/2024)."},{"key":"e_1_3_2_1_5_1","unstructured":"2015. Foscam IPCamera CGI User Guide. https:\/\/www.foscam.es\/descarga\/Fosca m-IPCamera-CGI-User-Guide-AllPlatforms-2015.11.06.pdf."},{"key":"e_1_3_2_1_6_1","unstructured":"2019. August lock no longer respond consistently to smartthings. https:\/\/comm unity.smartthings.com\/t\/august-pro-no-longer-responding-consistently-tosmartthings\/ 147965."},{"key":"e_1_3_2_1_7_1","unstructured":"2019. Field of View Explained: Getting the Right Angle. https:\/\/www.brickhouse security.com\/field-of-view-explained\/."},{"key":"e_1_3_2_1_8_1","unstructured":"2020. Samsung SmartThings Add a little smartness to your things. https: \/\/www.smartthings.com\/"},{"key":"e_1_3_2_1_9_1","unstructured":"2021. Alexa. https:\/\/developer.amazon.com\/en-US\/alexa."},{"key":"e_1_3_2_1_10_1","unstructured":"2021. IFTTT Platform. https:\/\/ifttt.com\/."},{"key":"e_1_3_2_1_11_1","unstructured":"2021. Market Research Report: IoT. Fortune Business Insights. https:\/\/www. fortunebusinessinsights.com\/industry-reports\/internet-of-things-iot-market- 100307"},{"key":"e_1_3_2_1_12_1","unstructured":"2021. Tuya Smart. https:\/\/www.tuya.com\/."},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2019.00013"},{"key":"e_1_3_2_1_14_1","unstructured":"Amazon.com. 2021. Foscam Security Camera. https:\/\/www.amazon.com\/Foscam- Storage-Dialogue-Connection-Security\/dp\/B07DJ5RSTM\/ref=sr_1_3?dchild=1 &keywords=foscam&qid=1624455167&sr=8--3."},{"key":"e_1_3_2_1_15_1","unstructured":"Akshaya Asokan. 2020. FBI Warns Of Swatting Attacks Targeting Smart Home Devices. https:\/\/www.bankinfosecurity.com\/f bi-warns- swatting-attackstargeting- smart-home-devices-a-15685\/."},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1145\/3319535.3354254"},{"key":"e_1_3_2_1_17_1","volume-title":"Signature verification using a\" siamese\" time delay neural network. Ad- vances in neural information processing systems 6","author":"Bromley Jane","year":"1993","unstructured":"Jane Bromley, Isabelle Guyon, Yann LeCun, Eduard S\u00e4ckinger, and Roopak Shah. 1993. Signature verification using a\" siamese\" time delay neural network. Ad- vances in neural information processing systems 6 (1993), 737--744."},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"crossref","unstructured":"Z Berkay Celik Gang Tan and Patrick D McDaniel. 2019. IoTGuard: Dynamic Enforcement of Security and Safety Policy in Commodity IoT.. In NDSS.","DOI":"10.14722\/ndss.2019.23326"},{"key":"e_1_3_2_1_19_1","unstructured":"Jonathan Chadwick. 2020. Smart plugs sold on Amazon eBay and other popular online retailers are vulnerable to hackers and could start FIRES consumer watchdog warns. https:\/\/www.dailymail.co.uk\/sciencetech\/article-8793311\/Smartplugs- open-hackers-start-fires-says.html."},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP46214.2022.9833620"},{"key":"e_1_3_2_1_21_1","volume-title":"32nd USENIX Security Symposium (USENIX Security 23)","author":"Chi Haotian","year":"2023","unstructured":"Haotian Chi, Qiang Zeng, and Xiaojiang Du. 2023. Detecting and Handling {IoT} Interaction Threats in {Multi-Platform} {Multi-Control-Channel} Smart Homes. In 32nd USENIX Security Symposium (USENIX Security 23). 1559--1576."},{"key":"e_1_3_2_1_22_1","volume-title":"PFirewall: Semantics-Aware Customizable Data Flow Control for Smart Home Privacy Protection. In Network and Distributed Systems Security (NDSS) Symposium","author":"Chi Haotian","year":"2021","unstructured":"Haotian Chi, Qiang Zeng, Xiaojiang Du, and Lannan Luo. 2021. PFirewall: Semantics-Aware Customizable Data Flow Control for Smart Home Privacy Protection. In Network and Distributed Systems Security (NDSS) Symposium 2021."},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1109\/DSN48063.2020.00056"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1109\/DSN.2018.00068"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.3390\/s17122864"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2009.5206848"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICACT.2015.7224824"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP46215.2023.10179369"},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2016.44"},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1109\/DSN53405.2022.00050"},{"key":"e_1_3_2_1_31_1","volume-title":"HAWatcher: Semantics- Aware Anomaly Detection for Appified Smart Homes. In 30th USENIX Security Symposium (USENIX Security 21)","author":"Fu Chenglong","year":"2021","unstructured":"Chenglong Fu, Qiang Zeng, and Xiaojiang Du. 2021. HAWatcher: Semantics- Aware Anomaly Detection for Appified Smart Homes. In 30th USENIX Security Symposium (USENIX Security 21). USENIX Association."},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV.2015.169"},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2018.00041"},{"key":"e_1_3_2_1_34_1","unstructured":"Mordor Intelligent. 2020. Smart Homes Market - Growth Trends and Forecasts. url = https:\/\/www.mordorintelligence.com\/industry-reports\/global-smart-homesmarket- industry."},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP40000.2020.00051"},{"key":"e_1_3_2_1_36_1","first-page":"2","article-title":"ContexloT: Towards Providing Contextual Integrity to Appified IoT Platforms","volume":"2","author":"Jia Yunhan Jack","year":"2017","unstructured":"Yunhan Jack Jia, Qi Alfred Chen, ShiqiWang, Amir Rahmati, Earlence Fernandes, Zhuoqing Morley Mao, Atul Prakash, and SJ Unviersity. 2017. ContexloT: Towards Providing Contextual Integrity to Appified IoT Platforms.. In NDSS, Vol. 2. 2--2.","journal-title":"NDSS"},{"key":"e_1_3_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2017.23051"},{"key":"e_1_3_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.1145\/3292500.3330648"},{"volume-title":"28th {USENIX} Security Symposium ({USENIX} Security 19). 1169--1185.","author":"Kumar Deepak","key":"e_1_3_2_1_39_1","unstructured":"Deepak Kumar, Kelly Shen, Benton Case, Deepali Garg, Galina Alperovich, Dmitry Kuznetsov, Rajarshi Gupta, and Zakir Durumeric. 2019. All things considered: an analysis of IoT devices on home networks. In 28th {USENIX} Security Symposium ({USENIX} Security 19). 1169--1185."},{"key":"e_1_3_2_1_40_1","doi-asserted-by":"publisher","DOI":"10.1145\/3372297.3417286"},{"key":"e_1_3_2_1_41_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-10602-1_48"},{"key":"e_1_3_2_1_42_1","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2017.2707465"},{"key":"e_1_3_2_1_43_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-46448-0_2"},{"key":"e_1_3_2_1_44_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP40000.2020.00062"},{"key":"e_1_3_2_1_45_1","doi-asserted-by":"publisher","DOI":"10.1145\/3317549.3319724"},{"key":"e_1_3_2_1_46_1","unstructured":"Muslum Ozgur Ozmen Ruoyu Song Habiba Farrukh and Z Berkay Celik. 2023. Evasion attacks and defenses on smart home physical event verification. NDSS."},{"key":"e_1_3_2_1_47_1","doi-asserted-by":"publisher","DOI":"10.1109\/PERCOM.2015.7146510"},{"key":"e_1_3_2_1_48_1","volume-title":"Yolov3: An incremental improvement. arXiv preprint arXiv:1804.02767","author":"Redmon Joseph","year":"2018","unstructured":"Joseph Redmon and Ali Farhadi. 2018. Yolov3: An incremental improvement. arXiv preprint arXiv:1804.02767 (2018)."},{"key":"e_1_3_2_1_49_1","volume-title":"ARGUS: Context-Based Detection of Stealthy IoT Infiltration Attacks. arXiv preprint arXiv:2302.07589","author":"Rieger Phillip","year":"2023","unstructured":"Phillip Rieger, Marco Chilese, Reham Mohamed, Markus Miettinen, Hossein Fereidooni, and Ahmad-Reza Sadeghi. 2023. ARGUS: Context-Based Detection of Stealthy IoT Infiltration Attacks. arXiv preprint arXiv:2302.07589 (2023)."},{"key":"e_1_3_2_1_50_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2017.14"},{"key":"e_1_3_2_1_51_1","doi-asserted-by":"publisher","DOI":"10.1109\/IoTDI49375.2020.00012"},{"key":"e_1_3_2_1_52_1","volume-title":"5 Best Motion-Detector Cameras of","author":"Sandorf Brianne","year":"2021","unstructured":"Brianne Sandorf. 2020. 5 Best Motion-Detector Cameras of 2021. https:\/\/www.re views.org\/home-security\/best-motion-detector-cameras\/."},{"key":"e_1_3_2_1_53_1","doi-asserted-by":"publisher","DOI":"10.1145\/3359789.3359840"},{"key":"e_1_3_2_1_54_1","unstructured":"Arlo Smart. 2019. Arlo Smart Animal and Vehicle Detection. https:\/\/kb.arlo.com\/ 000062115\/Arlo-Smart-Animal-and-Vehicle-Detection."},{"key":"e_1_3_2_1_55_1","doi-asserted-by":"publisher","DOI":"10.1145\/3319535.3345662"},{"key":"e_1_3_2_1_56_1","unstructured":"Daniel Wroclawski. 2019. Can a Burglar Really Jam Your Wireless Security System? https:\/\/www.consumerreports.org\/diy-home-security-systems\/canburglar- jam-your-wireless-security-system\/."},{"key":"e_1_3_2_1_57_1","doi-asserted-by":"publisher","DOI":"10.1145\/3607199.3607225"},{"key":"e_1_3_2_1_58_1","doi-asserted-by":"publisher","DOI":"10.1109\/DSN58367.2023.00060"},{"key":"e_1_3_2_1_59_1","volume-title":"Scaling Vision Transformers. arXiv preprint arXiv:2106.04560","author":"Zhai Xiaohua","year":"2021","unstructured":"Xiaohua Zhai, Alexander Kolesnikov, Neil Houlsby, and Lucas Beyer. 2021. Scaling Vision Transformers. arXiv preprint arXiv:2106.04560 (2021)."},{"key":"e_1_3_2_1_60_1","doi-asserted-by":"publisher","DOI":"10.1145\/3243734.3243820"},{"volume-title":"28th {USENIX} Security Symposium ({USENIX} Security 19). 1133--1150.","author":"Zhou Wei","key":"e_1_3_2_1_61_1","unstructured":"Wei Zhou, Yan Jia, Yao Yao, Lipeng Zhu, Le Guan, Yuhang Mao, Peng Liu, and Yuqing Zhang. 2019. Discovering and understanding the security hazards in the interactions between IoT devices, mobile apps, and clouds on smart home platforms. In 28th {USENIX} Security Symposium ({USENIX} Security 19). 1133--1150."}],"event":{"name":"WiSec '24: 17th ACM Conference on Security and Privacy in Wireless and Mobile Networks","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control","SIGMOBILE ACM Special Interest Group on Mobility of Systems, Users, Data and Computing"],"location":"Seoul Republic of Korea","acronym":"WiSec '24"},"container-title":["Proceedings of the 17th ACM Conference on Security and Privacy in Wireless and Mobile Networks"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3643833.3656124","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3643833.3656124","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,8,23]],"date-time":"2025-08-23T00:00:45Z","timestamp":1755907245000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3643833.3656124"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,5,27]]},"references-count":61,"alternative-id":["10.1145\/3643833.3656124","10.1145\/3643833"],"URL":"https:\/\/doi.org\/10.1145\/3643833.3656124","relation":{},"subject":[],"published":{"date-parts":[[2024,5,27]]},"assertion":[{"value":"2024-05-27","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}