Android Developers: Motion Sensors. https://developer.android.com/guide/topics/sensors/sensors_motion.html
Android Open Source Project: Reporting modes. https://source.android.com/devices/sensors/report-modes
Ang, I.B.A., et al.: CD-HOC: Indoor Human Occupancy Counting using Carbon Dioxide Sensor Data. arXiv170605286 CsHC (2017)
Ang, I.B.A., et al.: Human occupancy recognition with multivariate ambient sensors. In: Pervasive Computing and Communication Workshops (PerCom Workshops), pp. 1–6 (2016)
Google Scholar
Aviv, A.J., et al.: Practicality of accelerometer side channels on smartphones. In: Proceedings of the 28th Annual Computer Security Applications Conference, pp. 41–50 ACM (2012)
Google Scholar
Bai, X., et al.: Sensor guardian: prevent privacy inference on Android sensors. EURASIP J. Inf. Secur. 2017, 1 (2017)
CrossRef
Google Scholar
Beltramelli, T., Risi, S.: Deep-Spying: Spying using Smartwatch and Deep Learning. arXiv151205616 Cs (2015)
Bojinov, H., et al.: Mobile device identification via sensor fingerprinting. arXiv:1408.1416. (2014)
Buriro, A., et al.: Please hold on: Unobtrusive user authentication using smartphone’s built-in sensors. In: Identity, Security and Behavior Analysis (ISBA), pp. 1–8. IEEE (2017)
Google Scholar
Cao, X., et al.: A lightweight robust indoor radio tomographic imaging method in wireless sensor networks. Prog. Electromagn. Res. 60, 19–31 (2017)
CrossRef
Google Scholar
Chen, Y., Shen, C.: Performance analysis of smartphone-sensor behavior for human activity recognition. IEEE Access 5, 3095–3110 (2017)
CrossRef
Google Scholar
Choe, E.K., et al.: Living in a glass house: a survey of private moments in the home. In: Proceedings of the 13th International Conference on Ubiquitous Computing, p. 41. ACM Press (2011)
Google Scholar
Cook, D.J., Krishnan, N.: Mining the home environment. J. Intell. Inf. Syst. 43(3), 503–519 (2014)
CrossRef
Google Scholar
Dalenius, T.: Finding a needle in a haystack or identifying anonymous census records. J. Off. Stat. 2(3), 329–336 (1986)
Google Scholar
Das, A., et al.: Tracking mobile web users through motion sensors: attacks and defenses. In: Network and Distributed System Security Symposium (NDSS). Internet Society (2016)
Google Scholar
Eibl, G., Engel, D.: Influence of data granularity on smart meter privacy. IEEE Trans. Smart Grid 6(2), 930–939 (2015)
CrossRef
Google Scholar
Evans, D.: The internet of things - how the next evolution of the internet is changing everything. https://www.cisco.com/c/dam/en_us/about/ac79/docs/innov/IoT_IBSG_0411FINAL.pdf
Fan, J., et al.: Privacy disclosure through smart meters: reactive power based attack and defense. In: Dependable Systems and Networks (DSN), pp. 13–24. IEEE (2017)
Google Scholar
Freudiger, J., Shokri, R., Hubaux, J.-P.: Evaluating the privacy risk of location-based services. In: Danezis, G. (ed.) FC 2011. LNCS, vol. 7035, pp. 31–46. Springer, Heidelberg (2012). https://doi.org/10.1007/978-3-642-27576-0_3
CrossRef
Google Scholar
Gascon, H., et al.: Continuous authentication on mobile devices by analysis of typing motion behavior. In: Proceedings of GI Conference “Sicherheit”, pp. 1–12 (2014)
Google Scholar
Gennarelli, G., et al.: Real-Time through-wall situation awareness using a microwave doppler radar sensor. Remote Sens. 8(8), 621 (2016)
MathSciNet
CrossRef
Google Scholar
Golle, P., Partridge, K.: On the anonymity of home/work location pairs. In: Tokuda, H., Beigl, M., Friday, A., Brush, A.J.B., Tobe, Y. (eds.) Pervasive 2009. LNCS, vol. 5538, pp. 390–397. Springer, Heidelberg (2009). https://doi.org/10.1007/978-3-642-01516-8_26
CrossRef
Google Scholar
Greveler, U., et al.: Multimedia content identification through smart meter power usage profiles. In: Proceedings of the International Conference on Information and Knowledge Engineering (IKE), p. 1. WorldComp (2012)
Google Scholar
Han, J., et al.: Accomplice: Location inference using accelerometers on smartphones. In: Communication Systems and Networks (COMSNETS), pp. 1–9. IEEE (2012)
Google Scholar
Hevesi, P., et al.: Monitoring household activities and user location with a cheap, unobtrusive thermal sensor array. In: Proceedings of the 2014 ACM International Joint Conference on Pervasive and Ubiquitous Computing, pp. 141–145. ACM, New York (2014)
Google Scholar
Hnat, T.W., et al.: Doorjamb: unobtrusive room-level tracking of people in homes using doorway sensors. In: Proceedings of the 10th ACM Conference on Embedded Network Sensor Systems, pp. 309–322. ACM (2012)
Google Scholar
Hua, J., et al.: We can track you if you take the metro: tracking metro riders using accelerometers on smartphones. IEEE Trans. Inf. Forensics Secur. 12(2), 286–297 (2017)
CrossRef
Google Scholar
Jain, A.K., et al.: An introduction to biometric recognition. IEEE Trans. Circuits Syst. Video Technol. 14(1), 4–20 (2004)
MathSciNet
CrossRef
Google Scholar
Júnior, J.F., et al.: Driver behavior profiling: an investigation with different smartphone sensors and machine learning. PLOS ONE. 12(4), e0174959 (2017)
CrossRef
Google Scholar
Kim, S.H., et al.: Improved occupancy detection accuracy using PIR and door sensors for a smart thermostat. In: Proceedings of the 15th IBPSA Conference, San Francisco, CA, USA, pp. 2753–2758 (2017)
Google Scholar
Kim, Y., et al.: Human detection using doppler radar based on physical characteristics of targets. IEEE Geosci. Remote Sens. Lett. 12(2), 289–293 (2015)
CrossRef
Google Scholar
Klasnja, P., Consolvo, S., Choudhury, T., Beckwith, R., Hightower, J.: Exploring privacy concerns about personal sensing. In: Tokuda, H., Beigl, M., Friday, A., Brush, A.J.B., Tobe, Y. (eds.) Pervasive 2009. LNCS, vol. 5538, pp. 176–183. Springer, Heidelberg (2009). https://doi.org/10.1007/978-3-642-01516-8_13
CrossRef
Google Scholar
Kohnstamm, J., Madhub, D.: Mauritius declaration on the internet of things. https://edps.europa.eu/sites/edp/files/publication/14-10-14_mauritius_declaration_en.pdf
Krishnan, N.C., Cook, D.J.: Activity recognition on streaming sensor data. Pervasive Mob. Comput. 10(Pt B), 138–154 (2014)
CrossRef
Google Scholar
Krumm, J.: Inference attacks on location tracks. In: LaMarca, A., Langheinrich, M., Truong, K.N. (eds.) Pervasive 2007. LNCS, vol. 4480, pp. 127–143. Springer, Heidelberg (2007). https://doi.org/10.1007/978-3-540-72037-9_8
CrossRef
Google Scholar
Lane, N.D., et al.: On the feasibility of user de-anonymization from shared mobile sensor data. In: Proceedings of the Third International Workshop on Sensing Applications on Mobile Phones, p. 3. ACM (2012)
Google Scholar
Lee, H., et al.: Towards unobtrusive emotion recognition for affective social communication. In: Consumer Communications and Networking Conference (CCNC), pp. 260–264. IEEE (2012)
Google Scholar
Lee, W.-H., Lee, R.: Multi-sensor authentication to improve smartphone security. In: 2015 International Conference on Information Systems Security and Privacy (ICISSP) (2015)
Google Scholar
Li, S., et al.: Whose move is it anyway? Authenticating smart wearable devices using unique head movement patterns. In: Pervasive Computing and Communications (PerCom), pp. 1–9. IEEE (2016)
Google Scholar
Maiti, A., et al.: Smartwatch-based keystroke inference attacks and context-aware protection mechanisms. In: Proceedings of the 11th ACM on Asia Conference on Computer and Communications Security, pp. 795–806. ACM, New York (2016)
Google Scholar
Matsuo, Y., et al.: Inferring long-term user properties based on users’ location history. In: IJCAI, pp. 2159–2165 (2007)
Google Scholar
Michalevsky, Y., et al.: PowerSpy: location tracking using mobile device power analysis. In: USENIX Security Symposium (2015)
Google Scholar
Mosenia, A., et al.: PinMe: Tracking a Smartphone User around the World. IEEE Trans. Multi-Scale Comput. Syst. 4(3), 420–435 (2018)
CrossRef
Google Scholar
Naeini, P.E., et al.: Privacy expectations and preferences in an IoT world. In: Thirteenth Symposium on Usable Privacy and Security (SOUPS) (2017)
Google Scholar
Nannuru, S., et al.: Radio-frequency tomography for passive indoor multitarget tracking. IEEE Trans. Mob. Comput. 12(12), 2322–2333 (2013)
CrossRef
Google Scholar
Narayanan, A., Felten, E.W.: No silver bullet: de-identification still doesn’t work. http://randomwalker.info/publications/no-silver-bullet-de-identification.pdf
Nef, T., et al.: Evaluation of three state-of-the-art classifiers for recognition of activities of daily living from smart home ambient data. Sensors 15(5), 11725–11740 (2015)
CrossRef
Google Scholar
Notra, S., et al.: An experimental study of security and privacy risks with emerging household appliances. In: Communications and Network Security (CNS), pp. 79–84. IEEE (2014)
Google Scholar
Owusu, E., et al.: ACCessory: password inference using accelerometers on smartphones. In: Proceedings of the Twelfth Workshop on Mobile Computing Systems & Applications, p. 9. ACM (2012)
Google Scholar
Parate, A.: Designing Efficient and Accurate Behavior-Aware Mobile Systems. University of Massachusetts Amherst (2014)
Google Scholar
Shen, Y.-L., Shin, C.: Distributed sensing floor for an intelligent environment. Sens. J. IEEE. 9, 1673–1678 (2010)
CrossRef
Google Scholar
Shukri, S., Kamarudin, L.M.: Device free localization technology for human detection and counting with RF sensor networks: a review. J. Netw. Comput. Appl. 97, 157–174 (2017)
CrossRef
Google Scholar
Spreitzer, R.: PIN skimming: exploiting the ambient-light sensor in mobile devices. In: Proceedings of the 4th ACM Workshop on Security and Privacy in Smartphones & Mobile Devices. ACM, New York (2014)
Google Scholar
Tang, Q.: Automated detection of puffing and smoking with wrist accelerometers. Northeastern University Boston (2014)
Google Scholar
Thomaz, E., et al.: A practical approach for recognizing eating moments with wrist-mounted inertial sensing. In: Proceedings of the ACM International Conference on Ubiquitous Computing, pp. 1029–1040. ACM Press (2015)
Google Scholar
Wang, H., et al.: MoLe: motion leaks through smartwatch sensors. In: Proceedings of the 21st Annual International Conference on Mobile Computing and Networking, pp. 155–166. ACM Press (2015)
Google Scholar
Xu, Z., Zhu, S.: SemaDroid: a privacy-aware sensor management framework for smartphones. In: Proceedings of the 5th ACM Conference on Data and Application Security and Privacy, pp. 61–72. ACM Press (2015)
Google Scholar
Yang, J., et al.: MotionAuth: motion-based authentication for wrist worn smart devices. In: Pervasive Computing and Communication Workshops (PerCom Workshops), pp. 550–555. IEEE (2015)
Google Scholar
Yang, L., et al.: Inferring occupancy from opportunistically available sensor data. In: Pervasive Computing and Communications (PerCom), pp. 60–68. IEEE (2014)
Google Scholar
Ziegeldorf, J.H., et al.: Privacy in the internet of things: threats and challenges. Secur. Commun. Netw. 7(12), 2728–2742 (2014)
CrossRef
Google Scholar