{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,30]],"date-time":"2024-10-30T02:13:01Z","timestamp":1730254381374,"version":"3.28.0"},"reference-count":24,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017,12]]},"DOI":"10.1109\/icpads.2017.00016","type":"proceedings-article","created":{"date-parts":[[2018,5,31]],"date-time":"2018-05-31T22:18:41Z","timestamp":1527805121000},"page":"33-40","source":"Crossref","is-referenced-by-count":1,"title":["Charge-Depleting of the Batteries Makes Smartphones Recognizable"],"prefix":"10.1109","author":[{"given":"Jing","family":"Chen","sequence":"first","affiliation":[]},{"given":"Yingying","family":"Fang","sequence":"additional","affiliation":[]},{"given":"Kun","family":"He","sequence":"additional","affiliation":[]},{"given":"Ruiying","family":"Du","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"journal-title":"MIRtoolbox","year":"0","author":"lartillot","key":"ref10"},{"journal-title":"FEAST","year":"0","author":"pocock","key":"ref11"},{"key":"ref12","first-page":"27","article-title":"Conditional likelihood maximisation: A unifying framework for information theoretic feature selection","volume":"13","author":"brown","year":"2012","journal-title":"Journal of Machine Learning Research"},{"journal-title":"Supervised learning (machine learning) workflow and alporithms","year":"0","key":"ref13"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.1999.749287"},{"key":"ref15","first-page":"1","article-title":"How unique is your web browser?","author":"eckersley","year":"2010","journal-title":"Privacy Enhancing Technologies 10th International Symposium PETS 2010"},{"key":"ref16","first-page":"1129","article-title":"Fpdetectivc: dusting the web for fingerprinters","author":"acar","year":"2013","journal-title":"2013 ACM SIGSAC Conference on Computer and Communications Security CCS'13"},{"key":"ref17","first-page":"143","article-title":"Effective attacks and provable defenses for website fingerprinting","author":"wang","year":"2014","journal-title":"Proceedings of the 23rd USENIX Security Symposium"},{"key":"ref18","article-title":"Pixel perfect: Fingerprinting canvas in HTML5","author":"mowery","year":"2012","journal-title":"Proceedings of W2SP 2012"},{"year":"0","key":"ref19"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2016.57"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1145\/2736277.2741679"},{"key":"ref6","article-title":"Mobile device identification via sensor fingerprinting","volume":"abs 1408 1416","author":"bojinov","year":"2014","journal-title":"CoRR"},{"key":"ref5","doi-asserted-by":"crossref","DOI":"10.14722\/ndss.2016.23390","article-title":"Tracking mobile web users through motion sensors: Attacks and defenses","author":"das","year":"2016","journal-title":"23nd Annu Network and Distributed System Security Symp NDSS"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1145\/1878961.1878982"},{"key":"ref7","first-page":"616","article-title":"The leaking battery: A privacy analysis of the HTML5 battery status API","volume":"2015","author":"olejnik","year":"2015","journal-title":"IACR Cryptology ePrint Archive"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2013.43"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2016.31"},{"journal-title":"An application that displays the power consumed by major system components","year":"0","author":"gordon","key":"ref9"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2014.23059"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1145\/2660267.2660325"},{"key":"ref21","first-page":"92","author":"giuffrida","year":"2014","journal-title":"I Sensed It Was You Authenticating Mobile Users with Sensor-Enhanced Keystroke Dynamics"},{"year":"0","key":"ref24"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1145\/2660267.2660300"}],"event":{"name":"2017 IEEE 23rd International Conference on Parallel and Distributed Systems (ICPADS)","start":{"date-parts":[[2017,12,15]]},"location":"Shenzhen","end":{"date-parts":[[2017,12,17]]}},"container-title":["2017 IEEE 23rd International Conference on Parallel and Distributed Systems (ICPADS)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8345570\/8368329\/08368345.pdf?arnumber=8368345","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,1,26]],"date-time":"2022-01-26T04:54:22Z","timestamp":1643172862000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/8368345\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,12]]},"references-count":24,"URL":"https:\/\/doi.org\/10.1109\/icpads.2017.00016","relation":{},"subject":[],"published":{"date-parts":[[2017,12]]}}}