{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,29]],"date-time":"2025-09-29T17:10:12Z","timestamp":1759165812461,"version":"3.44.0"},"publisher-location":"New York, NY, USA","reference-count":41,"publisher":"ACM","content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2024,11,30]]},"DOI":"10.1145\/3726986.3727017","type":"proceedings-article","created":{"date-parts":[[2025,9,29]],"date-time":"2025-09-29T15:13:01Z","timestamp":1759158781000},"page":"223-231","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":0,"title":["Privacy in Motion: Implementing Differential Privacy for User Motion in VR"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-5404-8550","authenticated-orcid":false,"suffix":"Dr","given":"Ruoxi","family":"Sun","sequence":"first","affiliation":[{"name":"CSIRO's Data61, Adelaide, Australia"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-8247-1986","authenticated-orcid":false,"given":"Hanwen","family":"Wang","sequence":"additional","affiliation":[{"name":"The University of Adelaide, Adelaide, Australia"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-0873-2698","authenticated-orcid":false,"suffix":"Dr","given":"Hsiang-Ting","family":"Chen","sequence":"additional","affiliation":[{"name":"School of Computer and Mathematical Sciences, University of Adelaide, Adelaide, South Australia, Australia"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-9172-4252","authenticated-orcid":false,"suffix":"Dr","given":"Minhui","family":"Xue","sequence":"additional","affiliation":[{"name":"CSIRO's Data61, Marsfield, NSW, Australia"}]}],"member":"320","published-online":{"date-parts":[[2025,9,29]]},"reference":[{"key":"e_1_3_3_2_2_2","unstructured":"2021. Virtual Reality Market Size Share & Trends Analysis Report. https:\/\/www.grandviewresearch.com\/industry-analysis\/virtual-realityvr-market."},{"key":"e_1_3_3_2_3_2","unstructured":"2022. Immersive Media Technologies: The Acceleration of Augmented and Virtual Reality in the Wake of COVID-19. https:\/\/www.weforum.org\/reports\/immersive-media-technologies-the-acceleration-of-augmented-and-virtual-reality-in-the-wake-of-covid-19."},{"key":"e_1_3_3_2_4_2","unstructured":"2022. Meta Connect 2022: Meta Quest Pro More Social VR and a Look Into the Future. https:\/\/about.fb.com\/news\/2022\/10\/meta-quest-pro-social-vrconnect-2022\/."},{"key":"e_1_3_3_2_5_2","first-page":"427","volume-title":"SOUPS@ USENIX Security Symposium","author":"Adams Devon","year":"2018","unstructured":"Devon Adams, Alseny Bah, Catherine Barwulor, Nureli Musaby, Kadeem Pitkin, and Elissa\u00a0M Redmiles. 2018. Ethics emerging: the story of privacy and security perceptions in virtual reality. In SOUPS@ USENIX Security Symposium. 427\u2013442."},{"key":"e_1_3_3_2_6_2","doi-asserted-by":"publisher","DOI":"10.1109\/AIVR50618.2020.00031"},{"key":"e_1_3_3_2_7_2","doi-asserted-by":"publisher","DOI":"10.1109\/VRW52623.2021.00086"},{"key":"e_1_3_3_2_8_2","doi-asserted-by":"publisher","DOI":"10.1109\/VR55154.2023.00025"},{"key":"e_1_3_3_2_9_2","unstructured":"Wannes Meert; Kilian Hendrickx; Toon\u00a0Van Craenendonck. 2020. wannesm\/dtaidistance v2.0.0. Zenodo (2020)."},{"key":"e_1_3_3_2_10_2","doi-asserted-by":"crossref","unstructured":"Jaybie\u00a0A De\u00a0Guzman Kanchana Thilakarathna and Aruna Seneviratne. 2019. Security and privacy approaches in mixed reality: A literature survey. ACM Computing Surveys (CSUR) 52 6 (2019) 1\u201337.","DOI":"10.1145\/3359626"},{"key":"e_1_3_3_2_11_2","doi-asserted-by":"publisher","DOI":"10.1007\/11787006_1"},{"key":"e_1_3_3_2_12_2","doi-asserted-by":"publisher","DOI":"10.1007\/11681878_14"},{"key":"e_1_3_3_2_13_2","doi-asserted-by":"crossref","unstructured":"Cynthia Dwork Aaron Roth et\u00a0al. 2014. The algorithmic foundations of differential privacy. Foundations and Trends\u00ae in Theoretical Computer Science 9 3\u20134 (2014) 211\u2013407.","DOI":"10.1561\/0400000042"},{"key":"e_1_3_3_2_14_2","unstructured":"Gonzalo\u00a0Munilla Garrido Vivekand Nair and Dawn Song. 2023. Going Incognito in the Metaverse. arXiv preprint arXiv:https:\/\/arXiv.org\/abs\/2301.05940 (2023)."},{"key":"e_1_3_3_2_15_2","unstructured":"Thomas Germain. 2022. Meta\u2019s New Headset Will Track Your Eyes for Targeted Ads. https:\/\/gizmodo.com\/meta-quest-pro-vr-headset-track-eyes-ads-facebook-1849654424."},{"key":"e_1_3_3_2_16_2","doi-asserted-by":"crossref","unstructured":"Ruobin Gong Erica\u00a0L. Groshen and Salil Vadhan. 2022. Harnessing the Known Unknowns: Differential Privacy and the 2020 Census. Harvard Data Science Review (2022).","DOI":"10.1162\/99608f92.cb06b469"},{"key":"e_1_3_3_2_17_2","unstructured":"David Heaney. 2022. Apple Reportedly Has 3000 People Working On Its Upcoming Headset. https:\/\/uploadvr.com\/apple-3000-staff-ar-vr-headset\/."},{"key":"e_1_3_3_2_18_2","unstructured":"Naoise Holohan Stefano Braghin P\u00f3l Mac\u00a0Aonghusa and Killian Levacher. 2019. Diffprivlib: the IBM differential privacy library. ArXiv e-prints 1907.02444 [cs.CR] (July 2019)."},{"key":"e_1_3_3_2_19_2","doi-asserted-by":"crossref","unstructured":"Naoise Holohan Douglas\u00a0J Leith and Oliver Mason. 2015. Differential privacy in metric spaces: Numerical categorical and functional data under the one roof. Information Sciences 305 (2015) 256\u2013268.","DOI":"10.1016\/j.ins.2015.01.021"},{"key":"e_1_3_3_2_20_2","doi-asserted-by":"publisher","DOI":"10.1109\/CSE-EUC.2017.134"},{"key":"e_1_3_3_2_21_2","unstructured":"Chuck Kapelke. 2021. Using differential privacy to harness big data and preserve privacy. https:\/\/www.brookings.edu\/articles\/using-differential-privacy-to-harness-big-data-and-preserve-privacy\/."},{"key":"e_1_3_3_2_22_2","doi-asserted-by":"publisher","DOI":"10.1145\/3411764.3445528"},{"key":"e_1_3_3_2_23_2","doi-asserted-by":"crossref","unstructured":"Mark\u00a0Roman Miller Fernanda Herrera Hanseul Jun James\u00a0A Landay and Jeremy\u00a0N Bailenson. 2020. Personal identifiability of user tracking data during observation of 360-degree VR video. Scientific Reports 10 1 (2020) 1\u201310.","DOI":"10.1038\/s41598-020-74486-y"},{"key":"e_1_3_3_2_24_2","unstructured":"Vivek Nair Gonzalo\u00a0Munilla Garrido and Dawn Song. 2022. Exploring the unprecedented privacy risks of the metaverse. arXiv preprint arXiv:https:\/\/arXiv.org\/abs\/2207.13176 (2022)."},{"key":"e_1_3_3_2_25_2","unstructured":"Vivek Nair Wenbo Guo Justus Mattern Rui Wang James\u00a0F O\u2019Brien Louis Rosenberg and Dawn Song. 2023. Unique Identification of 50 000+ Virtual Reality Users from Head & Hand Motion Data. arXiv preprint arXiv:https:\/\/arXiv.org\/abs\/2302.08927 (2023)."},{"key":"e_1_3_3_2_26_2","doi-asserted-by":"crossref","unstructured":"Ilesanmi Olade Charles Fleming and Hai-Ning Liang. 2020. Biomove: Biometric user identification from human kinesiological movements for virtual reality systems. Sensors 20 10 (2020) 2944.","DOI":"10.3390\/s20102944"},{"key":"e_1_3_3_2_27_2","doi-asserted-by":"publisher","DOI":"10.1145\/3290605.3300340"},{"key":"e_1_3_3_2_28_2","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2018.00886"},{"key":"e_1_3_3_2_29_2","doi-asserted-by":"publisher","DOI":"10.1145\/3447993.3483272"},{"key":"e_1_3_3_2_30_2","doi-asserted-by":"publisher","DOI":"10.1145\/3589335.3651571"},{"key":"e_1_3_3_2_31_2","doi-asserted-by":"publisher","DOI":"10.1109\/VRW62533.2024.00324"},{"key":"e_1_3_3_2_32_2","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE43902.2021.00101"},{"key":"e_1_3_3_2_33_2","volume-title":"Proceedings of the 30th ACM Joint European Software Engineering Conference and Symposium on the Foundations of Software Engineering","author":"Sun Ruoxi","year":"2023","unstructured":"Ruoxi Sun, Minhui Xue, Gareth Tyson, Tian Dong, Shaofeng Li, Shuo Wang, Haojin Zhu, Seyit Camtepe, and Surya Nepal. 2023. Mate! Are You Really Aware? An Explainability-Guided Testing Framework for Robustness of Malware Detectors. In Proceedings of the 30th ACM Joint European Software Engineering Conference and Symposium on the Foundations of Software Engineering."},{"key":"e_1_3_3_2_34_2","doi-asserted-by":"publisher","DOI":"10.1145\/3543507.3583327"},{"key":"e_1_3_3_2_35_2","doi-asserted-by":"publisher","DOI":"10.1145\/3491102.3502008"},{"key":"e_1_3_3_2_36_2","doi-asserted-by":"crossref","unstructured":"Pier\u00a0Paolo Tricomi Federica Nenna Luca Pajola Mauro Conti and Luciano Gamberi. 2023. You can\u2019t hide behind your headset: User profiling in augmented and virtual reality. IEEE Access 11 (2023) 9859\u20139875.","DOI":"10.1109\/ACCESS.2023.3240071"},{"key":"e_1_3_3_2_37_2","first-page":"3789","volume-title":"31st USENIX security symposium (USENIX security 22)","author":"Trimananda Rahmadi","year":"2022","unstructured":"Rahmadi Trimananda, Hieu Le, Hao Cui, Janice\u00a0Tran Ho, Anastasia Shuba, and Athina Markopoulou. 2022. { OVRseen} : Auditing Network Traffic and Privacy Policies in Oculus { VR}. In 31st USENIX security symposium (USENIX security 22). 3789\u20133806."},{"key":"e_1_3_3_2_38_2","doi-asserted-by":"publisher","DOI":"10.1109\/ISMAR59233.2023.00121"},{"key":"e_1_3_3_2_39_2","volume-title":"AAAI 2024","author":"Wu Renjie","year":"2023","unstructured":"Renjie Wu, Hu Wang, Feras Dayoub, and Hsiang-Ting Chen. 2023. Segment Beyond View: Handling Partially Missing Modality for Audio-Visual Semantic Segmentation. In AAAI 2024."},{"key":"e_1_3_3_2_40_2","doi-asserted-by":"publisher","DOI":"10.1109\/SP54263.2024.00108"},{"key":"e_1_3_3_2_41_2","doi-asserted-by":"publisher","DOI":"10.1145\/3589334.3645545"},{"key":"e_1_3_3_2_42_2","doi-asserted-by":"crossref","unstructured":"Howe\u00a0Yuan Zhu Hsiang-Ting Chen and Chin-Teng Lin. 2021. The effects of virtual and physical elevation on physiological stress during virtual reality height exposure. IEEE Transactions on Visualization and Computer Graphics 29 4 (2021) 1937\u20131950.","DOI":"10.1109\/TVCG.2021.3134412"}],"event":{"name":"OzCHI '24: 36th Australasian Conference on Human-Computer Interaction","acronym":"OzCHI '24","location":"Meanjin | Brisbane Australia"},"container-title":["Proceedings of the 36th Australasian Conference on Human-Computer Interaction"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3726986.3727017","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,9,29]],"date-time":"2025-09-29T16:35:00Z","timestamp":1759163700000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3726986.3727017"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,11,30]]},"references-count":41,"alternative-id":["10.1145\/3726986.3727017","10.1145\/3726986"],"URL":"https:\/\/doi.org\/10.1145\/3726986.3727017","relation":{},"subject":[],"published":{"date-parts":[[2024,11,30]]},"assertion":[{"value":"2025-09-29","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}