{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,1,22]],"date-time":"2024-01-22T23:09:09Z","timestamp":1705964949287},"reference-count":50,"publisher":"Association for Computing Machinery (ACM)","issue":"3","content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":["Digital Threats"],"published-print":{"date-parts":[[2022,9,30]]},"abstract":"Contact tracing in case of pandemic is becoming an essential mitigation tool for national health services to break infection chains and prevent the virus from spreading further. To support manual tracing, several countries have been developing contact tracing apps that detect nearby mobile phones using Bluetooth. Such data collection raised privacy concerns and several privacy-preserving protocols have been proposed to prevent the leakage of personal and sensitive information. These solutions are mainly divided into two categories using a centralized or a decentralized exposure score computation. However, both approaches depict limitations.<\/jats:p>\n \n This article presents\n Desire<\/jats:sc>\n , a novel exposure notification system that leverages the best of centralized and decentralized systems. As opposed to existing contact tracing schemes,\n Desire<\/jats:sc>\n leverages Private Encounter Tokens (\n Pets<\/jats:sc>\n ) generated locally on the device that uniquely identify an encounter between two nodes while being private and unlinkable by the server. The role of the server is merely to match PETs generated by diagnosed users with the pets provided by requesting users. Our privacy risk analysis shows that\n Desire<\/jats:sc>\n drastically improves privacy against malicious users (i.e., limitation of decentralized systems) and authority (i.e., limitation of centralised systems). We implemented\n Desire<\/jats:sc>\n , evaluated it in real condition, and show it feasibility.\n <\/jats:p>","DOI":"10.1145\/3480467","type":"journal-article","created":{"date-parts":[[2021,8,20]],"date-time":"2021-08-20T16:46:32Z","timestamp":1629477992000},"page":"1-20","update-policy":"http:\/\/dx.doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":2,"title":["Desire<\/scp>\n : Leveraging the Best of Centralized and Decentralized Contact Tracing Systems"],"prefix":"10.1145","volume":"3","author":[{"ORCID":"http:\/\/orcid.org\/0000-0002-4057-416X","authenticated-orcid":false,"given":"Antoine","family":"Boutet","sequence":"first","affiliation":[{"name":"University of Lyon, INSA Lyon, Inria, CITI, Lyon, France"}]},{"given":"Claude","family":"Castelluccia","sequence":"additional","affiliation":[{"name":"Inria, France"}]},{"given":"Mathieu","family":"Cunche","sequence":"additional","affiliation":[{"name":"University of Lyon, INSA Lyon, Inria, CITI, Lyon, France"}]},{"given":"C\u00e9dric","family":"Lauradou","sequence":"additional","affiliation":[{"name":"Inria, France"}]},{"given":"Vincent","family":"Roca","sequence":"additional","affiliation":[{"name":"Inria, France"}]},{"given":"Adrien","family":"Baud","sequence":"additional","affiliation":[{"name":"Inria, France"}]},{"given":"Pierre-Guillaume","family":"Raverdy","sequence":"additional","affiliation":[{"name":"Inria, France"}]}],"member":"320","published-online":{"date-parts":[[2022,3,10]]},"reference":[{"key":"e_1_3_2_2_2","unstructured":"https:\/\/www.apple.com\/covid19\/contacttracing 2020 Apple and Google. Privacy-Preserving Contact Tracing"},{"key":"e_1_3_2_3_2","unstructured":"https:\/\/github.com\/oseiskar\/corona-sniffer 2020 BLE Contact Tracing Sniffer PoC"},{"key":"e_1_3_2_4_2","unstructured":"https:\/\/www.coronadetective.eu 2020 Corona Detective\u2014Find Out Who Gave You COVID19"},{"key":"e_1_3_2_5_2","unstructured":"https:\/\/edpb.europa.eu\/our-work-tools\/our-documents\/guidelines\/guidelines-042020-use-location-data-and-contact-tracing_en 2020 Guidelines 04\/2020 on the Use of Location Data and Contact Tracing Tools in the Context of the COVID-19 Outbreak"},{"key":"e_1_3_2_6_2","unstructured":"https:\/\/www.reuters.com\/article\/us-health-coronavirus-latinamerica-medic-idUSKCN21X2WL 2020 \u2018It\u2019s Covid! Stay away!\u2019 Latin America\u2019s Health Workers Face Rising Hostility"},{"key":"e_1_3_2_7_2","unstructured":"https:\/\/blog.appcensus.io\/2021\/04\/27\/why-google-should-stop-logging-contact-tracing-data\/ 2021 Why Google Should Stop Logging Contact-Tracing Data"},{"key":"e_1_3_2_8_2","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.3010226"},{"key":"e_1_3_2_9_2","volume-title":"Exposure Notification\u2014Bluetooth Specification v1.2","author":"Google Apple and","year":"2020","unstructured":"Apple and Google. 2020. Exposure Notification\u2014Bluetooth Specification v1.2. Technical Report."},{"key":"e_1_3_2_10_2","unstructured":"J. Bay Joel Kek A. Tan and Chai Sheng Hau. 2020. BlueTrace: A privacy-preserving protocol for community-driven contact tracing across borders."},{"key":"e_1_3_2_11_2","first-page":"207","volume-title":"Workshop on Public Key Cryptography","author":"Bernstein Daniel J.","year":"2006","unstructured":"Daniel J. Bernstein. 2006. Curve25519: New Diffie-Hellman speed records. In Workshop on Public Key Cryptography. 207\u2013228."},{"key":"e_1_3_2_12_2","first-page":"505","article-title":"ConTra corona: Contact tracing against the coronavirus by bridging the centralized-decentralized divide for stronger privacy.","author":"Beskorovajnov Wasilij","year":"2020","unstructured":"Wasilij Beskorovajnov, Felix D\u00f6rre, Gunnar Hartung, Alexander Koch, J\u00f6rn M\u00fcller-Quade, and Thorsten Strufe. 2020. ConTra corona: Contact tracing against the coronavirus by bridging the centralized-decentralized divide for stronger privacy. IACR Cryptol. ePrint Arch. (2020), 505.","journal-title":"IACR Cryptol. ePrint Arch."},{"key":"e_1_3_2_13_2","doi-asserted-by":"crossref","first-page":"441","DOI":"10.1145\/3132747.3132769","volume-title":"Proceedings of the Symposium on Operating Systems Principles","author":"Bittau Andrea","year":"2017","unstructured":"Andrea Bittau, \u00dalfar Erlingsson, Petros Maniatis, Ilya Mironov, Ananth Raghunathan, David Lie, Mitch Rudominer, Ushasree Kode, Julien Tinnes, and Bernhard Seefeld. 2017. Prochlo: Strong privacy for analytics in the crowd. In Proceedings of the Symposium on Operating Systems Principles. 441\u2013459."},{"key":"e_1_3_2_14_2","volume-title":"Proximity Tracing Approaches\u2014Comparative Impact Analysis","author":"Boutet Antoine","year":"2020","unstructured":"Antoine Boutet, Nataliia Bielova, Claude Castelluccia, Mathieu Cunche, C\u00e9dric Lauradoux, Daniel Le M\u00e9tayer, and Vincent Roca. 2020. Proximity Tracing Approaches\u2014Comparative Impact Analysis. Research Report."},{"key":"e_1_3_2_15_2","volume-title":"Contact Tracing by Giant Data Collectors: Opening Pandora\u2019s Box of Threats to Privacy, Sovereignty and National Security","author":"Boutet Antoine","year":"2020","unstructured":"Antoine Boutet, Claude Castelluccia, Mathieu Cunche, Alexandra Dmitrienko, Vincenzo Iovino, Markus Miettinen, Thien Duc Nguyen, Vincent Roca, Ahmad-Reza Sadeghi, Serge Vaudenay, Ivan Visconti, and Martin Vuagnoux. 2020. Contact Tracing by Giant Data Collectors: Opening Pandora\u2019s Box of Threats to Privacy, Sovereignty and National Security. University Works. EPFL, Switzerland."},{"key":"e_1_3_2_16_2","first-page":"2861","volume-title":"Proceedings of the ACM International Conference on Information and Knowledge Management (CIKM\u201919)","author":"Boutet Antoine","year":"2019","unstructured":"Antoine Boutet and S\u00e9bastien Gambs. 2019. Demo: Inspect what your location history reveals about you Raising user awareness on privacy threats associated with disclosing his location data. In Proceedings of the ACM International Conference on Information and Knowledge Management (CIKM\u201919). 2861\u20132864."},{"key":"e_1_3_2_17_2","volume-title":"Workshop on Offensive Technologies","author":"Brasser Ferdinand","year":"2017","unstructured":"Ferdinand Brasser, Urs M\u00fcller, Alexandra Dmitrienko, Kari Kostiainen, Srdjan Capkun, and Ahmad-Reza Sadeghi. 2017. Software grand exposure: SGX cache attacks are practical. In Workshop on Offensive Technologies."},{"key":"e_1_3_2_18_2","doi-asserted-by":"crossref","first-page":"132","DOI":"10.1145\/1030083.1030103","volume-title":"Proceedings of the ACM Conference on Computer and Communications Security","author":"Brickell Ernie","year":"2004","unstructured":"Ernie Brickell, Jan Camenisch, and Liqun Chen. 2004. Direct anonymous attestation. In Proceedings of the ACM Conference on Computer and Communications Security. 132\u2013145."},{"key":"e_1_3_2_19_2","volume-title":"DESIRE: A Third Way for a European Exposure Notification System Leveraging the Best of Centralized and Decentralized Systems","author":"Castelluccia Claude","year":"2020","unstructured":"Claude Castelluccia, Nataliia Bielova, Antoine Boutet, Mathieu Cunche, C\u00e9dric Lauradoux, Daniel Le M\u00e9tayer, and Vincent Roca. 2020. DESIRE: A Third Way for a European Exposure Notification System Leveraging the Best of Centralized and Decentralized Systems. Technical Report. Inria and INSA de Lyon."},{"key":"e_1_3_2_20_2","volume-title":"ROBERT: ROBust and Privacy-presERving Proximity Tracing","author":"Castelluccia Claude","year":"2020","unstructured":"Claude Castelluccia, Nataliia Bielova, Antoine Boutet, Mathieu Cunche, C\u00e9dric Lauradoux, Daniel Le M\u00e9tayer, and Vincent Roca. 2020. ROBERT: ROBust and Privacy-presERving Proximity Tracing. Technical Report. Inria and INSA de Lyon."},{"key":"e_1_3_2_21_2","article-title":"Pact: Privacy sensitive protocols and mechanisms for mobile contact tracing","author":"Chan Justin","year":"2020","unstructured":"Justin Chan, Shyam Gollakota, Eric Horvitz, Joseph Jaeger, Sham Kakade, Tadayoshi Kohno, John Langford, Jonathan Larson, Sudheesh Singanamalla, Jacob Sunshine, et\u00a0al. 2020. Pact: Privacy sensitive protocols and mechanisms for mobile contact tracing. arXiv:2004.03544. Retrieved from https:\/\/arxiv.org\/abs\/2004.03544.","journal-title":"arXiv:2004.03544"},{"key":"e_1_3_2_22_2","first-page":"294","volume-title":"Advances in Cryptology","author":"Chaum David","year":"1990","unstructured":"David Chaum, Bert den Boer, Eug\u00e8ne van Heyst, Stig Mj\u00f8lsnes, and Adri Steenbeek. 1990. Efficient offline electronic checks. In Advances in Cryptology, Jean-Jacques Quisquater and Joos Vandewalle (Eds.). 294\u2013301."},{"key":"e_1_3_2_23_2","unstructured":"Hyunghoon Cho Daphne Ippolito and Yun William Yu. 2020. Contact tracing mobile apps for COVID-19: Privacy considerations and related trade-offs. arxiv:cs.CR\/2003.11511. Retrieved from https:\/\/arxiv.org\/abs\/2003.11511."},{"key":"e_1_3_2_24_2","volume-title":"On Using Bluetooth-Low-Energy for Contact Tracing","author":"Cunche Mathieu","year":"2020","unstructured":"Mathieu Cunche, Antoine Boutet, Claude Castelluccia, C\u00e9dric Lauradoux, and Vincent Roca. 2020. On Using Bluetooth-Low-Energy for Contact Tracing. Research Report. Inria Grenoble Rh\u00f4ne-Alpes; INSA de Lyon."},{"issue":"2","key":"e_1_3_2_25_2","first-page":"65","article-title":"Social discrimination perception of health-care workers and ordinary people toward individuals with COVID-19","volume":"15","author":"Dalky Heyam F.","year":"2020","unstructured":"Heyam F. Dalky, Ayman M. Hamdan-Mansour, Basil H. Amarneh, Manar AlAzzam R. N., Nuha Remon Yacoub, Anas H. Khalifeh, Mohammed Aldalaykeh, Alaa Fawwaz Dalky, Rana Akram Rawashdeh, Dalal Bashir Yehia, and Malek Alnajar. 2020. Social discrimination perception of health-care workers and ordinary people toward individuals with COVID-19. Soc. Inf. 15, 2-4 (2020), 65\u201379.","journal-title":"Soc. Inf."},{"key":"e_1_3_2_26_2","doi-asserted-by":"publisher","DOI":"10.1038\/srep01376"},{"key":"e_1_3_2_27_2","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.1976.1055638"},{"key":"e_1_3_2_28_2","volume-title":"Proceedings of the EAI International Conference on Security and Privacy in Communication Networks (SecureComm\u201920)","author":"Leith Stephen Farrell Douglas","year":"2020","unstructured":"Stephen Farrell Douglas Leith. 2020. Contact tracing app privacy: What data is shared by europe\u2019s GAEN contact tracing apps. In Proceedings of the EAI International Conference on Security and Privacy in Communication Networks (SecureComm\u201920)."},{"key":"e_1_3_2_29_2","first-page":"254","volume-title":"Public-Key Cryptography","author":"Freire Eduarda S. V.","year":"2013","unstructured":"Eduarda S. V. Freire, Dennis Hofheinz, Eike Kiltz, and Kenneth G. Paterson. 2013. Non-interactive key exchange. In Public-Key Cryptography, Kaoru Kurosawa and Goichiro Hanaoka (Eds.). 254\u2013271."},{"key":"e_1_3_2_30_2","volume-title":"An Efficient Algorithm to Estimate Covid-19 Infectiousness Risk from BLE-RSSI Measurements","author":"Gorce Jean-Marie","year":"2020","unstructured":"Jean-Marie Gorce, Malcolm Egan, and R\u00e9mi Gribonval. 2020. An Efficient Algorithm to Estimate Covid-19 Infectiousness Risk from BLE-RSSI Measurements. Research Report RR-9345. Inria Grenoble Rh\u00f4ne-Alpes."},{"key":"e_1_3_2_31_2","article-title":"Security Analysis of the COVID-19 Contact Tracing Specifications by Apple Inc. and Google Inc.","author":"Gvili Yaron","year":"2020","unstructured":"Yaron Gvili. 2020. Security Analysis of the COVID-19 Contact Tracing Specifications by Apple Inc. and Google Inc. Cryptology ePrint Archive, Report 2020\/428.","journal-title":"Cryptology ePrint Archive, Report 2020\/428"},{"key":"e_1_3_2_32_2","article-title":"On the Effectiveness of Time Travel to Inject COVID-19 Alerts","author":"Iovino Vincenzo","year":"2020","unstructured":"Vincenzo Iovino, Serge Vaudenay, and Martin Vuagnoux. 2020. On the Effectiveness of Time Travel to Inject COVID-19 Alerts. Cryptology ePrint Archive, Report 2020\/1393.","journal-title":"Cryptology ePrint Archive, Report 2020\/1393"},{"key":"e_1_3_2_33_2","doi-asserted-by":"publisher","DOI":"10.1371\/journal.pone.0239943"},{"key":"e_1_3_2_34_2","article-title":"What makes people install a COVID-19 contact-tracing app? Understanding the influence of app design and individual difference on contact-tracing app adoption intention","author":"Li Tianshi","year":"2021","unstructured":"Tianshi Li, Camille Cobb, Jackie, Yang, Sagar Baviskar, Yuvraj Agarwal, Beibei Li, Lujo Bauer, and Jason I. Hong. 2021. What makes people install a COVID-19 contact-tracing app? Understanding the influence of app design and individual difference on contact-tracing app adoption intention. arXiv:2012.12415. Retrieved from https:\/\/arxiv.org\/abs\/2012.12415.","journal-title":"arXiv:2012.12415"},{"key":"e_1_3_2_35_2","unstructured":"Tianshi Li Jackie Yang Cori Faklaris Jennifer King Yuvraj Agarwal Laura Dabbish and Jason I. Hong. 2020. Decentralized is not risk-free: Understanding public perceptions of privacy-utility trade-offs in COVID-19 contact-tracing apps. arxiv:cs.HC\/2005.11957. Retrieved from https:\/\/arxiv.org\/abs\/2005.11957."},{"key":"e_1_3_2_36_2","article-title":"NHS COVID-19 App","author":"NHSX UK National Health Service","year":"2020","unstructured":"UK National Health Service NHSX. 2020. NHS COVID-19 App. Retrieved from https:\/\/www.nhsx.nhs.uk\/covid-19-response\/nhs-covid-19-app\/.","journal-title":"https:\/\/www.nhsx.nhs.uk\/covid-19-response\/nhs-covid-19-app\/"},{"key":"e_1_3_2_37_2","article-title":"COVIDSafe App","author":"Health Australian Government Department of","year":"2020","unstructured":"Australian Government Department of Health. 2020. COVIDSafe App. Retrieved from https:\/\/www.health.gov.au\/resources\/apps-and-tools\/covidsafe-app.","journal-title":"https:\/\/www.health.gov.au\/resources\/apps-and-tools\/covidsafe-app"},{"key":"e_1_3_2_38_2","doi-asserted-by":"crossref","first-page":"556","DOI":"10.1007\/978-3-662-43951-7_47","volume-title":"Automata, Languages, and Programming","author":"Ohrimenko Olga","year":"2014","unstructured":"Olga Ohrimenko, Michael T. Goodrich, Roberto Tamassia, and Eli Upfal. 2014. The melbourne shuffle: Improving oblivious storage in the cloud. In Automata, Languages, and Programming, Javier Esparza, Pierre Fraigniaud, Thore Husfeldt, and Elias Koutsoupias (Eds.). 556\u2013567."},{"key":"e_1_3_2_39_2","first-page":"1","article-title":"A national survey of attitudes to COVID-19 digital contact tracing in the Republic of Ireland","author":"O\u2019Callaghan Michael Edmund","year":"2020","unstructured":"Michael Edmund O\u2019Callaghan, Jim Buckley, Brian Fitzgerald, Kevin Johnson, John Laffey, Bairbre McNicholas, Bashar Nuseibeh, Derek O\u2019Keeffe, Ian O\u2019Keeffe, Abdul Razzaq, et\u00a0al. 2020. A national survey of attitudes to COVID-19 digital contact tracing in the Republic of Ireland. Irish J. Med. Sci. (2020), 1\u201325.","journal-title":"Irish J. Med. Sci."},{"key":"e_1_3_2_40_2","unstructured":"Ramesh Raskar Isabel Schunemann Rachel Barbar Kristen Vilcans Jim Gray Praneeth Vepakomma Suraj Kapa Andrea Nuzzo Rajiv Gupta Alex Berke Dazza Greenwood Christian Keegan Shriank Kanaparti Robson Beaudry David Stansbury Beatriz Botero Arcila Rishank Kanaparti Vitor Pamplona Francesco M. Benedetti Alina Clough Riddhiman Das Kaushal Jain Khahlil Louisy Greg Nadeau Vitor Pamplona Steve Penrod Yasaman Rajaee Abhishek Singh Greg Storm and John Werner. 2020. Apps gone rogue: Maintaining personal privacy in an epidemic. arxiv:cs.CR\/2003.08567. Retrieved from https:\/\/arxiv.org\/abs\/2003.08567."},{"key":"e_1_3_2_41_2","unstructured":"Elissa M. Redmiles. 2020. User concerns & tradeoffs in technology-facilitated contact tracing. arxiv:cs.CR\/2004.13219. Retrieved from https:\/\/arxiv.org\/abs\/2004.13219."},{"key":"e_1_3_2_42_2","volume-title":"Bluetooth Core Specification v5.1","author":"SIG Bluetooth","year":"2019","unstructured":"Bluetooth SIG. 2019. Bluetooth Core Specification v5.1. Retrieved August 30, 2019 from https:\/\/www.bluetooth.org\/docman\/handlers\/downloaddoc.ashx?doc_id=457080."},{"key":"e_1_3_2_43_2","unstructured":"DP3T Team. 2020. Privacy and Security Attacks on Digital Proximity Tracing Systems."},{"key":"e_1_3_2_44_2","unstructured":"Ni Trieu Kareem Shehata Prateek Saxena Reza Shokri and Dawn Song. 2020. Epione: Lightweight contact tracing with strong privacy. arxiv:cs.CR\/2004.13293. Retrieved from https:\/\/arxiv.org\/abs\/2004.13293."},{"issue":"4","key":"e_1_3_2_45_2","first-page":"307","article-title":"Systematizing decentralization and privacy: Lessons from 15 years of research and deployments","volume":"2017","author":"Troncoso Carmela","year":"2017","unstructured":"Carmela Troncoso, Marios Isaakidis, George Danezis, and Harry Halpin. 2017. Systematizing decentralization and privacy: Lessons from 15 years of research and deployments. Priv. Enhanc. Technol. 2017, 4 (2017), 307\u2013329.","journal-title":"Priv. Enhanc. Technol."},{"key":"e_1_3_2_46_2","unstructured":"Carmela Troncoso Mathias Payer Jean-Pierre Hubaux Marcel Salath\u00e9 James Larus Edouard Bugnion Wouter Lueks Theresa Stadler Apostolos Pyrgelis Daniele Antonioli Ludovic Barman Sylvain Chatel Kenneth Paterson Srdjan Capkun David Basin Jan Beutel Dennis Jackson Marc Roeschlin Patrick Leu Bart Preneel Nigel Smart Aysajan Abidin Seda G\u00c3rses Michael Veale Cas Cremers Michael Backes Nils Ole Tippenhauer Reuben Binns Ciro Cattuto Alain Barrat Dario Fiore Manuel Barbosa Rui Oliveira and JosA. Pereira. 2020. Decentralized privacy-preserving proximity tracing. arxiv:cs.CR\/2005.12273. Retrieved from https:\/\/arxiv.org\/abs\/2005.12273."},{"key":"e_1_3_2_47_2","first-page":"21","volume-title":"Decentralized Privacy-Preserving Proximity Tracing","author":"Troncoso Carmela","year":"2020","unstructured":"Carmela Troncoso, Mathias Payer, Marcel Salath\u00e9, James Larus, Dr Wouter Lueks, Theresa Stadler, Dr Apostolos Pyrgelis, Daniele Antonioli, Ludovic Barman, Sylvain Chatel, Kenneth Paterson, Srdjan Capkun, David Basin, Dennis Jackson, KU Leuven, Bart Preneel, Nigel Smart, Dr Dave Singelee, Dr Aysajan Abidin, TU Delft, Seda Guerses, and Cas Cremers. 2020. Decentralized Privacy-Preserving Proximity Tracing. Technical Report v1.0. 21 pages."},{"key":"e_1_3_2_48_2","article-title":"Analysis of DP3T","author":"Vaudenay Serge","year":"2020","unstructured":"Serge Vaudenay. 2020. Analysis of DP3T. Cryptology ePrint Archive, Report 2020\/399. (2020).","journal-title":"Cryptology ePrint Archive, Report 2020\/399"},{"key":"e_1_3_2_49_2","article-title":"Centralized or Decentralized? The Contact Tracing Dilemma","author":"Vaudenay Serge","year":"2020","unstructured":"Serge Vaudenay. 2020. Centralized or Decentralized? The Contact Tracing Dilemma. Cryptology ePrint Archive, Report 2020\/531. (2020).","journal-title":"Cryptology ePrint Archive, Report 2020\/531"},{"key":"e_1_3_2_50_2","first-page":"640","volume-title":"Proceedings of the IEEE Symposium on Security and Privacy","author":"Xu Yuanzhong","year":"2015","unstructured":"Yuanzhong Xu, Weidong Cui, and Marcus Peinado. 2015. Controlled-channel attacks: Deterministic side channels for untrusted operating systems. In Proceedings of the IEEE Symposium on Security and Privacy. 640\u2013656."},{"key":"e_1_3_2_51_2","doi-asserted-by":"crossref","first-page":"295","DOI":"10.1145\/2684822.2685287","volume-title":"Proceedings of the ACM International Conference on Web Search and Data Mining (WSDM\u201915)","author":"Zhong Yuan","year":"2015","unstructured":"Yuan Zhong, Nicholas Jing Yuan, Wen Zhong, Fuzheng Zhang, and Xing Xie. 2015. You are where you go: Inferring demographic attributes from location check-ins. In Proceedings of the ACM International Conference on Web Search and Data Mining (WSDM\u201915). 295\u2013304."}],"container-title":["Digital Threats: Research and Practice"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3480467","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,1,1]],"date-time":"2023-01-01T18:49:24Z","timestamp":1672598964000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3480467"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,3,10]]},"references-count":50,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2022,9,30]]}},"alternative-id":["10.1145\/3480467"],"URL":"https:\/\/doi.org\/10.1145\/3480467","relation":{},"ISSN":["2692-1626","2576-5337"],"issn-type":[{"value":"2692-1626","type":"print"},{"value":"2576-5337","type":"electronic"}],"subject":[],"published":{"date-parts":[[2022,3,10]]},"assertion":[{"value":"2020-12-04","order":0,"name":"received","label":"Received","group":{"name":"publication_history","label":"Publication History"}},{"value":"2021-08-05","order":1,"name":"accepted","label":"Accepted","group":{"name":"publication_history","label":"Publication History"}},{"value":"2022-03-10","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}