{"id":"https://openalex.org/W4389665590","doi":"https://doi.org/10.1109/iros55552.2023.10342376","title":"Sensor Selection for Fine-Grained Behavior Verification that Respects Privacy","display_name":"Sensor Selection for Fine-Grained Behavior Verification that Respects Privacy","publication_year":2023,"publication_date":"2023-10-01","ids":{"openalex":"https://openalex.org/W4389665590","doi":"https://doi.org/10.1109/iros55552.2023.10342376"},"language":"en","primary_location":{"id":"doi:10.1109/iros55552.2023.10342376","is_oa":false,"landing_page_url":"http://dx.doi.org/10.1109/iros55552.2023.10342376","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2023 IEEE/RSJ International Conference on Intelligent Robots and Systems (IROS)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5092550142","display_name":"Rishi Phatak","orcid":null},"institutions":[{"id":"https://openalex.org/I91045830","display_name":"Texas A&M University","ror":"https://ror.org/01f5ytq51","country_code":"US","type":"education","lineage":["https://openalex.org/I91045830"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Rishi Phatak","raw_affiliation_strings":["Texas A&#x0026;M University,Dept. of Computer Science &#x0026; Engineering,College Station,TX,USA"],"affiliations":[{"raw_affiliation_string":"Texas A&#x0026;M University,Dept. of Computer Science &#x0026; Engineering,College Station,TX,USA","institution_ids":["https://openalex.org/I91045830"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5035574727","display_name":"Dylan A. Shell","orcid":null},"institutions":[{"id":"https://openalex.org/I91045830","display_name":"Texas A&M University","ror":"https://ror.org/01f5ytq51","country_code":"US","type":"education","lineage":["https://openalex.org/I91045830"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Dylan A. Shell","raw_affiliation_strings":["Texas A&#x0026;M University,Dept. of Computer Science &#x0026; Engineering,College Station,TX,USA"],"affiliations":[{"raw_affiliation_string":"Texas A&#x0026;M University,Dept. of Computer Science &#x0026; Engineering,College Station,TX,USA","institution_ids":["https://openalex.org/I91045830"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5092550142"],"corresponding_institution_ids":["https://openalex.org/I91045830"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.24706401,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":"88","issue":null,"first_page":"10117","last_page":"10124"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10142","display_name":"Formal Methods in Verification","score":0.9965000152587891,"subfield":{"id":"https://openalex.org/subfields/1703","display_name":"Computational Theory and Mathematics"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10142","display_name":"Formal Methods in Verification","score":0.9965000152587891,"subfield":{"id":"https://openalex.org/subfields/1703","display_name":"Computational Theory and Mathematics"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10772","display_name":"Distributed systems and fault tolerance","score":0.9955999851226807,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11704","display_name":"Mobile Crowdsensing and Crowdsourcing","score":0.9934999942779541,"subfield":{"id":"https://openalex.org/subfields/1706","display_name":"Computer Science Applications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8084114789962769},{"id":"https://openalex.org/keywords/scalability","display_name":"Scalability","score":0.7721269130706787},{"id":"https://openalex.org/keywords/ambiguity","display_name":"Ambiguity","score":0.7395809888839722},{"id":"https://openalex.org/keywords/exploit","display_name":"Exploit","score":0.586975634098053},{"id":"https://openalex.org/keywords/bounded-function","display_name":"Bounded function","score":0.5666295886039734},{"id":"https://openalex.org/keywords/trace","display_name":"TRACE (psycholinguistics)","score":0.5586846470832825},{"id":"https://openalex.org/keywords/conflation","display_name":"Conflation","score":0.544994592666626},{"id":"https://openalex.org/keywords/limit","display_name":"Limit (mathematics)","score":0.4818912148475647},{"id":"https://openalex.org/keywords/selection","display_name":"Selection (genetic algorithm)","score":0.4642665386199951},{"id":"https://openalex.org/keywords/task","display_name":"Task (project management)","score":0.46183112263679504},{"id":"https://openalex.org/keywords/theoretical-computer-science","display_name":"Theoretical computer science","score":0.40499892830848694},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.36985525488853455},{"id":"https://openalex.org/keywords/data-mining","display_name":"Data mining","score":0.3380718231201172},{"id":"https://openalex.org/keywords/machine-learning","display_name":"Machine learning","score":0.33079877495765686},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.15965679287910461},{"id":"https://openalex.org/keywords/mathematics","display_name":"Mathematics","score":0.09946087002754211}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8084114789962769},{"id":"https://openalex.org/C48044578","wikidata":"https://www.wikidata.org/wiki/Q727490","display_name":"Scalability","level":2,"score":0.7721269130706787},{"id":"https://openalex.org/C2780522230","wikidata":"https://www.wikidata.org/wiki/Q1140419","display_name":"Ambiguity","level":2,"score":0.7395809888839722},{"id":"https://openalex.org/C165696696","wikidata":"https://www.wikidata.org/wiki/Q11287","display_name":"Exploit","level":2,"score":0.586975634098053},{"id":"https://openalex.org/C34388435","wikidata":"https://www.wikidata.org/wiki/Q2267362","display_name":"Bounded function","level":2,"score":0.5666295886039734},{"id":"https://openalex.org/C75291252","wikidata":"https://www.wikidata.org/wiki/Q1315756","display_name":"TRACE (psycholinguistics)","level":2,"score":0.5586846470832825},{"id":"https://openalex.org/C130440534","wikidata":"https://www.wikidata.org/wiki/Q14946528","display_name":"Conflation","level":2,"score":0.544994592666626},{"id":"https://openalex.org/C151201525","wikidata":"https://www.wikidata.org/wiki/Q177239","display_name":"Limit (mathematics)","level":2,"score":0.4818912148475647},{"id":"https://openalex.org/C81917197","wikidata":"https://www.wikidata.org/wiki/Q628760","display_name":"Selection (genetic algorithm)","level":2,"score":0.4642665386199951},{"id":"https://openalex.org/C2780451532","wikidata":"https://www.wikidata.org/wiki/Q759676","display_name":"Task (project management)","level":2,"score":0.46183112263679504},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.40499892830848694},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.36985525488853455},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.3380718231201172},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.33079877495765686},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.15965679287910461},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.09946087002754211},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.0},{"id":"https://openalex.org/C111472728","wikidata":"https://www.wikidata.org/wiki/Q9471","display_name":"Epistemology","level":1,"score":0.0},{"id":"https://openalex.org/C134306372","wikidata":"https://www.wikidata.org/wiki/Q7754","display_name":"Mathematical analysis","level":1,"score":0.0},{"id":"https://openalex.org/C77088390","wikidata":"https://www.wikidata.org/wiki/Q8513","display_name":"Database","level":1,"score":0.0},{"id":"https://openalex.org/C41895202","wikidata":"https://www.wikidata.org/wiki/Q8162","display_name":"Linguistics","level":1,"score":0.0},{"id":"https://openalex.org/C187736073","wikidata":"https://www.wikidata.org/wiki/Q2920921","display_name":"Management","level":1,"score":0.0},{"id":"https://openalex.org/C162324750","wikidata":"https://www.wikidata.org/wiki/Q8134","display_name":"Economics","level":0,"score":0.0},{"id":"https://openalex.org/C138885662","wikidata":"https://www.wikidata.org/wiki/Q5891","display_name":"Philosophy","level":0,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/iros55552.2023.10342376","is_oa":false,"landing_page_url":"http://dx.doi.org/10.1109/iros55552.2023.10342376","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2023 IEEE/RSJ International Conference on Intelligent Robots and Systems (IROS)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[{"id":"https://openalex.org/G6424272732","display_name":null,"funder_award_id":"W911NF2120064","funder_id":"https://openalex.org/F4320338281","funder_display_name":"Army Research Office"},{"id":"https://openalex.org/G6957526834","display_name":null,"funder_award_id":"IIS-2034097","funder_id":"https://openalex.org/F4320306076","funder_display_name":"National Science Foundation"}],"funders":[{"id":"https://openalex.org/F4320306076","display_name":"National Science Foundation","ror":"https://ror.org/021nxhr62"},{"id":"https://openalex.org/F4320338281","display_name":"Army Research Office","ror":"https://ror.org/05epdh915"}],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":29,"referenced_works":["https://openalex.org/W62741668","https://openalex.org/W1492880052","https://openalex.org/W1609747062","https://openalex.org/W1966547590","https://openalex.org/W1982129592","https://openalex.org/W1985787415","https://openalex.org/W2001653139","https://openalex.org/W2007464118","https://openalex.org/W2052227055","https://openalex.org/W2061840562","https://openalex.org/W2156530413","https://openalex.org/W2416559203","https://openalex.org/W2570759866","https://openalex.org/W2603253225","https://openalex.org/W2761853058","https://openalex.org/W2775072457","https://openalex.org/W2783159776","https://openalex.org/W2804520243","https://openalex.org/W2805386500","https://openalex.org/W2811312112","https://openalex.org/W3136836759","https://openalex.org/W3188483015","https://openalex.org/W4295597268","https://openalex.org/W4302339081","https://openalex.org/W4385292083","https://openalex.org/W6608997407","https://openalex.org/W6636181345","https://openalex.org/W6733576423","https://openalex.org/W6854959206"],"related_works":["https://openalex.org/W2186092498","https://openalex.org/W2058252362","https://openalex.org/W1982687909","https://openalex.org/W2352149790","https://openalex.org/W1984630168","https://openalex.org/W2373256103","https://openalex.org/W1539211164","https://openalex.org/W2008166176","https://openalex.org/W3110150146","https://openalex.org/W4245621531"],"abstract_inverted_index":{"A":[0],"useful":[1],"capability":[2],"is":[3,107,125,168,209],"that":[4,188,196,222],"of":[5,17,28,102,123,132,160,193,243,252],"classifying":[6],"some":[7,49,105,135],"agent's":[8,46,86],"behavior":[9,106,174],"using":[10],"data":[11],"from":[12,142,171,180,190],"a":[13,26,58,89,126,130,163,169],"sequence,":[14],"or":[15],"trace,":[16],"sensor":[18,21,117,153],"measurements.":[19],"The":[20,207],"selection":[22],"problem":[23,208,221],"involves":[24],"choosing":[25],"subset":[27],"available":[29],"sensors":[30,69,103,176],"to":[31,42,71,78,83,119,218,237,248],"ensure":[32],"that,":[33],"when":[34],"generated,":[35],"observation":[36],"traces":[37],"will":[38],"contain":[39],"enough":[40],"information":[41],"determine":[43],"whether":[44],"the":[45,85,121,184,239,250,253],"activities":[47],"match":[48],"pattern.":[50],"In":[51,91],"generalizing":[52],"prior":[53],"work,":[54],"this":[55,155,220],"paper":[56,156],"studies":[57,234],"formulation":[59],"in":[60,162,211],"which":[61,134],"multiple":[62,94],"behavioral":[63],"itineraries":[64],"may":[65],"be":[66],"supplied,":[67],"with":[68,93],"selected":[70],"distinguish":[72],"between":[73,226],"behaviors.":[74],"This":[75],"allows":[76],"one":[77,96],"pose":[79],"fine-grained":[80],"questions,":[81],"e.g.,":[82],"position":[84],"activity":[87],"on":[88],"spectrum.":[90],"addition,":[92],"itineraries,":[95],"can":[97,223],"also":[98],"ask":[99],"about":[100],"choices":[101,177],"where":[104],"always":[108],"plausibly":[109],"concealed":[110],"by":[111],"(or":[112],"mistaken":[113],"for)":[114],"another.":[115],"Using":[116],"ambiguity":[118],"limit":[120],"acquisition":[122],"knowledge":[124],"strong":[127],"privacy":[128,150],"guarantee,":[129],"form":[131],"guarantee":[133],"earlier":[136],"work":[137,161],"examined":[138],"under":[139,202],"formulations":[140],"distinct":[141],"our":[143,244],"inter-itinerary":[144],"conflation":[145],"approach.":[146],"By":[147],"concretely":[148],"formulating":[149],"requirements":[151],"for":[152,231],"selection,":[154],"connects":[157],"both":[158,191],"lines":[159],"novel":[164],"fashion:":[165],"privacy-where":[166],"there":[167],"bound":[170],"above,":[172],"and":[173,228,241,247],"verification-where":[175],"are":[178,199,235],"bounded":[179],"below.":[181],"We":[182],"examine":[183],"worst-case":[185],"computational":[186,204],"complexity":[187,205],"results":[189],"types":[192],"bounds,":[194],"proving":[195],"upper":[197],"bounds":[198],"more":[200],"challenging":[201],"standard":[203],"assumptions.":[206],"intractable":[210],"general,":[212],"but":[213],"we":[214],"introduce":[215],"an":[216],"approach":[217],"solving":[219],"exploit":[224],"interrelationships":[225],"constraints,":[227],"identify":[229],"opportunities":[230],"optimizations.":[232,254],"Case":[233],"presented":[236],"demonstrate":[238],"usefulness":[240],"scalability":[242],"proposed":[245],"solution,":[246],"assess":[249],"impact":[251]},"counts_by_year":[],"updated_date":"2025-12-21T23:12:01.093139","created_date":"2025-10-10T00:00:00"}
