相关参考文献
注意:仅列出部分参考文献,下载原文获取全部文献信息。Pinpointing Hidden IoT Devices via Spatial-temporal Traffic Fingerprinting
Xiaobo Ma et al.
IEEE INFOCOM 2020 - IEEE CONFERENCE ON COMPUTER COMMUNICATIONS (2020)
IOTGAZE: IoT Security Enforcement via Wireless Context Analysis
Tianbo Gu et al.
IEEE INFOCOM 2020 - IEEE CONFERENCE ON COMPUTER COMMUNICATIONS (2020)
Classifying IoT Devices in Smart Environments Using Network Traffic Characteristics
Arunan Sivanathan et al.
IEEE TRANSACTIONS ON MOBILE COMPUTING (2019)
Internet of Things for enabling smart environments: A technology-centric perspective
Caries Gomez et al.
JOURNAL OF AMBIENT INTELLIGENCE AND SMART ENVIRONMENTS (2019)
Information Exposure From Consumer IoT Devices: A Multidimensional, Network-Informed Measurement Approach
Jingjing Ren et al.
IMC'19: PROCEEDINGS OF THE 2019 ACM INTERNET MEASUREMENT CONFERENCE (2019)
HOMESNITCH: Behavior Transparency and Control for Smart Home IoT Devices
T. J. OConnor et al.
PROCEEDINGS OF THE 2019 CONFERENCE ON SECURITY AND PRIVACY IN WIRELESS AND MOBILE NETWORKS (WISEC '19) (2019)
DeviceMien: Network Device Behavior Modeling for Identifying Unknown IoT Devices
Jorge Ortiz et al.
PROCEEDINGS OF THE 2019 INTERNATIONAL CONFERENCE ON INTERNET OF THINGS DESIGN AND IMPLEMENTATION (IOTDI '19) (2019)
Enhancing Attention-Based LSTM With Position Context for Aspect-Level Sentiment Classification
Jiangfeng Zeng et al.
IEEE ACCESS (2019)
E-Eye: Hidden Electronics Recognition through mmWave Nonlinear Effects
Zhengxiong Li et al.
SENSYS'18: PROCEEDINGS OF THE 16TH CONFERENCE ON EMBEDDED NETWORKED SENSOR SYSTEMS (2018)
Detecting Wireless Spy Cameras Via Stimulating and Probing
Tian Liu et al.
MOBISYS'18: PROCEEDINGS OF THE 16TH ACM INTERNATIONAL CONFERENCE ON MOBILE SYSTEMS, APPLICATIONS, AND SERVICES (2018)
Traffic Analysis of Encrypted Messaging Services: Apple iMessage and Beyond
Scott E. Coull et al.
ACM SIGCOMM COMPUTER COMMUNICATION REVIEW (2014)
Through-the-Wall Sensing of Personnel Using Passive Bistatic WiFi Radar at Standoff Distances
Kevin Chetty et al.
IEEE TRANSACTIONS ON GEOSCIENCE AND REMOTE SENSING (2012)
Intimate partner violence, technology, and stalking
Cynthia Southworth et al.
VIOLENCE AGAINST WOMEN (2007)
Indoor location tracking using RSSI readings from a single Wi-Fi access point
G. V. Zaruba et al.
WIRELESS NETWORKS (2007)
Inferring Internet denial-of-service activity
David Moore et al.
ACM TRANSACTIONS ON COMPUTER SYSTEMS (2006)
LANDMARC: Indoor location sensing using active RFID
LM Ni et al.
WIRELESS NETWORKS (2004)
SPADE: An efficient algorithm for mining frequent sequences
MJ Zaki
MACHINE LEARNING (2001)