{"id":"https://openalex.org/W2887851058","doi":"https://doi.org/10.1109/icc.2018.8422764","title":"Preventing Wi-Fi Privacy Leakage: A User Behavioral Similarity Approach","display_name":"Preventing Wi-Fi Privacy Leakage: A User Behavioral Similarity Approach","publication_year":2018,"publication_date":"2018-05-01","ids":{"openalex":"https://openalex.org/W2887851058","doi":"https://doi.org/10.1109/icc.2018.8422764","mag":"2887851058"},"language":"en","primary_location":{"id":"doi:10.1109/icc.2018.8422764","is_oa":false,"landing_page_url":"https://doi.org/10.1109/icc.2018.8422764","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2018 IEEE International Conference on Communications (ICC)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5100936044","display_name":"Xiuping Han","orcid":null},"institutions":[{"id":"https://openalex.org/I99065089","display_name":"Tsinghua University","ror":"https://ror.org/03cve4549","country_code":"CN","type":"education","lineage":["https://openalex.org/I99065089"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Xiuping Han","raw_affiliation_strings":["Department of Computer Science and Technology, Tsinghua University"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science and Technology, Tsinghua University","institution_ids":["https://openalex.org/I99065089"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5101788794","display_name":"Zhi Wang","orcid":"https://orcid.org/0009-0009-2484-0796"},"institutions":[{"id":"https://openalex.org/I99065089","display_name":"Tsinghua University","ror":"https://ror.org/03cve4549","country_code":"CN","type":"education","lineage":["https://openalex.org/I99065089"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Zhi Wang","raw_affiliation_strings":["Department of Computer Science and Technology, Tsinghua University"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science and Technology, Tsinghua University","institution_ids":["https://openalex.org/I99065089"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5046419834","display_name":"Dan Pei","orcid":"https://orcid.org/0000-0002-5113-838X"},"institutions":[{"id":"https://openalex.org/I99065089","display_name":"Tsinghua University","ror":"https://ror.org/03cve4549","country_code":"CN","type":"education","lineage":["https://openalex.org/I99065089"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Dan Pei","raw_affiliation_strings":["Department of Computer Science and Technology, Tsinghua University"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science and Technology, Tsinghua University","institution_ids":["https://openalex.org/I99065089"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5100936044"],"corresponding_institution_ids":["https://openalex.org/I99065089"],"apc_list":null,"apc_paid":null,"fwci":0.1629,"has_fulltext":false,"cited_by_count":1,"citation_normalized_percentile":{"value":0.58379883,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":94},"biblio":{"volume":null,"issue":null,"first_page":"1","last_page":"6"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10764","display_name":"Privacy-Preserving Technologies in Data","score":0.9991999864578247,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10764","display_name":"Privacy-Preserving Technologies in Data","score":0.9991999864578247,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11598","display_name":"Internet Traffic Analysis and Secure E-voting","score":0.9986000061035156,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11158","display_name":"Wireless Networks and Protocols","score":0.996399998664856,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8513062000274658},{"id":"https://openalex.org/keywords/information-leakage","display_name":"Information leakage","score":0.598236083984375},{"id":"https://openalex.org/keywords/privacy-protection","display_name":"Privacy protection","score":0.5981485247612},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.5023159980773926},{"id":"https://openalex.org/keywords/trace","display_name":"TRACE (psycholinguistics)","score":0.45220255851745605},{"id":"https://openalex.org/keywords/mobile-device","display_name":"Mobile device","score":0.4488504230976105},{"id":"https://openalex.org/keywords/information-sensitivity","display_name":"Information sensitivity","score":0.44007304310798645},{"id":"https://openalex.org/keywords/information-privacy","display_name":"Information privacy","score":0.43661853671073914},{"id":"https://openalex.org/keywords/identity","display_name":"Identity (music)","score":0.41992413997650146},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.377103328704834},{"id":"https://openalex.org/keywords/internet-privacy","display_name":"Internet privacy","score":0.3359154462814331},{"id":"https://openalex.org/keywords/world-wide-web","display_name":"World Wide Web","score":0.3019404411315918}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8513062000274658},{"id":"https://openalex.org/C2779201187","wikidata":"https://www.wikidata.org/wiki/Q2775060","display_name":"Information leakage","level":2,"score":0.598236083984375},{"id":"https://openalex.org/C3017597292","wikidata":"https://www.wikidata.org/wiki/Q25052250","display_name":"Privacy protection","level":2,"score":0.5981485247612},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.5023159980773926},{"id":"https://openalex.org/C75291252","wikidata":"https://www.wikidata.org/wiki/Q1315756","display_name":"TRACE (psycholinguistics)","level":2,"score":0.45220255851745605},{"id":"https://openalex.org/C186967261","wikidata":"https://www.wikidata.org/wiki/Q5082128","display_name":"Mobile device","level":2,"score":0.4488504230976105},{"id":"https://openalex.org/C137822555","wikidata":"https://www.wikidata.org/wiki/Q2587068","display_name":"Information sensitivity","level":2,"score":0.44007304310798645},{"id":"https://openalex.org/C123201435","wikidata":"https://www.wikidata.org/wiki/Q456632","display_name":"Information privacy","level":2,"score":0.43661853671073914},{"id":"https://openalex.org/C2778355321","wikidata":"https://www.wikidata.org/wiki/Q17079427","display_name":"Identity (music)","level":2,"score":0.41992413997650146},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.377103328704834},{"id":"https://openalex.org/C108827166","wikidata":"https://www.wikidata.org/wiki/Q175975","display_name":"Internet privacy","level":1,"score":0.3359154462814331},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.3019404411315918},{"id":"https://openalex.org/C138885662","wikidata":"https://www.wikidata.org/wiki/Q5891","display_name":"Philosophy","level":0,"score":0.0},{"id":"https://openalex.org/C121332964","wikidata":"https://www.wikidata.org/wiki/Q413","display_name":"Physics","level":0,"score":0.0},{"id":"https://openalex.org/C41895202","wikidata":"https://www.wikidata.org/wiki/Q8162","display_name":"Linguistics","level":1,"score":0.0},{"id":"https://openalex.org/C24890656","wikidata":"https://www.wikidata.org/wiki/Q82811","display_name":"Acoustics","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/icc.2018.8422764","is_oa":false,"landing_page_url":"https://doi.org/10.1109/icc.2018.8422764","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2018 IEEE International Conference on Communications (ICC)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":15,"referenced_works":["https://openalex.org/W1974861608","https://openalex.org/W2031500863","https://openalex.org/W2032642084","https://openalex.org/W2034466462","https://openalex.org/W2045686369","https://openalex.org/W2061480123","https://openalex.org/W2071079949","https://openalex.org/W2121953574","https://openalex.org/W2144411949","https://openalex.org/W2159024459","https://openalex.org/W2206219880","https://openalex.org/W2261555467","https://openalex.org/W2394784643","https://openalex.org/W2476314115","https://openalex.org/W2618506493"],"related_works":["https://openalex.org/W3022534164","https://openalex.org/W3177396334","https://openalex.org/W3134446890","https://openalex.org/W4288075818","https://openalex.org/W189451467","https://openalex.org/W3046095319","https://openalex.org/W3197497514","https://openalex.org/W1591172238","https://openalex.org/W4225340788","https://openalex.org/W2111194702"],"abstract_inverted_index":{"Mobile":[0],"devices":[1],"adopt":[2],"probe":[3,97],"requests":[4,98],"to":[5,25,45,102,114,161],"discover":[6],"nearby":[7,156],"Wi-":[8],"Fi":[9],"access":[10],"points":[11],"(APs)":[12],"and":[13,57,68,104,190],"set":[14],"up":[15],"fast":[16,192],"Wi-Fi":[17,31,89,174,193],"connections.":[18],"Preferred":[19],"Network":[20],"Lists":[21],"(PNLs)":[22],"are":[23,142,159],"used":[24,101],"store":[26],"the":[27,34,65,167,182,196],"lists":[28],"of":[29,169],"connected":[30],"APs":[32,90],"in":[33,91,138],"past.":[35],"Previous":[36],"studies":[37,79],"have":[38,111],"shown":[39],"that":[40,96,108,155,181],"such":[41,154],"mechanism":[42],"can":[43,52,99,124,185],"lead":[44],"serious":[46],"privacy":[47,66,116,135,189],"leakage,":[48],"for":[49],"example,":[50],"attackers":[51],"infer":[53],"users'":[54,122,140,157],"identity":[55],"information":[56],"movement":[58],"histories.":[59],"In":[60],"this":[61],"paper,":[62],"we":[63,75,131,165],"investigate":[64],"issue":[67],"propose":[69,132],"a":[70,133,150],"data-driven":[71],"protection":[72,136],"strategy.":[73],"First,":[74],"conduct":[76],"extensive":[77],"measurement":[78],"based":[80],"on":[81],"27":[82],"million":[83,88],"users":[84],"associating":[85],"with":[86],"4":[87,92],"cities.":[93],"We":[94],"show":[95],"be":[100,126],"identify":[103],"profile":[105],"users.":[106],"Despite":[107],"some":[109],"actions":[110],"been":[112],"taken":[113],"reduce":[115],"leakage":[117],"(e.g.,":[118],"MAC":[119],"address":[120],"randomization),":[121],"PNLs":[123,141,158,184],"still":[125],"inferred":[127],"by":[128,144],"attackers.":[129],"Second,":[130],"novel":[134],"method,":[137],"which":[139],"\"blurred\"":[143],"adding":[145],"faked":[146],"SSIDs":[147],"generated":[148],"using":[149,172],"collaborative":[151],"filtering":[152],"algorithm,":[153],"similar":[160],"each":[162],"other.":[163],"Finally,":[164],"evaluate":[166],"performance":[168],"our":[170],"design":[171],"real-world":[173],"association":[175],"traces.":[176],"Our":[177],"trace-driven":[178],"simulation":[179],"shows":[180],"refined":[183],"effectively":[186],"protect":[187],"user":[188],"ensure":[191],"connection":[194],"at":[195],"same":[197],"time.":[198]},"counts_by_year":[{"year":2020,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
