| Title/Authors | Title | Research Artifacts
									 
										[?]  A research
											artifact is any by-product of a research project that is not
											directly included in the published research paper. In Computer
											Science research this is often source code and data sets, but
											it could also be media, documentation, inputs to proof
											assistants, shell-scripts to run experiments, etc. 
									 
								 | 
								Details | 
|---|
| 
									
									 Biyi Fang, Nicholas D. Lane, Mi Zhang, Aidan Boran, Fahim Kawsar  | 
								
								Details | 
									 | 
								
									
									 Discussion Comments:
										0
									 
									
										Verification:
										Authors have
										not verified
										information
									 
									
								 | 
							
| 
									 Regulating ARM TrustZone Devices in Restricted Spaces Franz Ferdinand Brasser, Daeyoung Kim, Christopher Liebchen, Vinod Ganapathy, Liviu Iftode, Ahmad-Reza Sadeghi  | 
								
								
									 Regulating ARM TrustZone Devices in Restricted Spaces Details | 
								
									 | 
								
									 Discussion Comments:
										0
									 
									
										Verification:
										Authors have
										not verified
										information
									 
									
								 | 
							
| 
									 Beetle: Flexible Communication for Bluetooth Low Energy Amit A. Levy, James Hong, Laurynas Riliskis, Philip Levis, Keith Winstein  | 
								
								
									 Beetle: Flexible Communication for Bluetooth Low Energy Details | 
								
									 | 
								
									 Discussion Comments:
										0
									 
									
										Verification:
										Authors have
										not verified
										information
									 
									
								 | 
							
| 
									 Viola: Trustworthy Sensor Notifications for Enhanced Privacy on Mobile Systems Saeed Mirzamohammadi, Ardalan Amiri Sani  | 
								
								
									 Viola: Trustworthy Sensor Notifications for Enhanced Privacy on Mobile Systems Details | 
								
									 Discussion Comments:
										0
									 
									
										Verification:
										Authors have
										not verified
										information
									 
									
								 | 
							|
| 
									
									 Seungyeop Han, Haichen Shen, Matthai Philipose, Sharad Agarwal, Alec Wolman, Arvind Krishnamurthy  | 
								
								Details | 
									 | 
								
									 Discussion Comments:
										0
									 
									
										Verification:
										Authors have
										not verified
										information
									 
									
								 | 
							
| 
									 I am a Smartwatch and I can Track my User's Arm Sheng Shen, He Wang, Romit Roy Choudhury  | 
								
								
									 I am a Smartwatch and I can Track my User's Arm Details | 
								
									 | 
								
									 Discussion Comments:
										0
									 
									
										Verification:
										Authors have
										not verified
										information
									 
									
								 | 
							
| 
									 DefDroid: Towards a More Defensive Mobile OS Against Disruptive App Behavior Peng Huang, Tianyin Xu, Xinxin Jin, Yuanyuan Zhou  | 
								
								
									 DefDroid: Towards a More Defensive Mobile OS Against Disruptive App Behavior Details | 
								
									 Discussion Comments:
										0
									 
									
										Verification:
										Authors have
										not verified
										information
									 
									
								 | 
							|
| 
									 Practical Bluetooth Traffic Sniffing: Systems and Privacy Implications Wahhab Albazrqaoe, Jun Huang, Guoliang Xing  | 
								
								
									 Practical Bluetooth Traffic Sniffing: Systems and Privacy Implications Details | 
								
									 | 
								
									 Discussion Comments:
										0
									 
									
										Verification:
										Authors have
										not verified
										information
									 
									
								 | 
							
| 
									 ReCon: Revealing and Controlling PII Leaks in Mobile Network Traffic Jingjing Ren, Ashwin Rao, Martina Lindorfer, Arnaud Legout, David R. Choffnes  | 
								
								
									 ReCon: Revealing and Controlling PII Leaks in Mobile Network Traffic Details | 
								
									 Author Comments:
									 
									Discussion Comments:
										0
									 
									
										Sharing:
										Research produced artifacts
									 
									
										Verification:
										Authors have
										verified
										information
									 
									
								 | 
							|
| 
									 Expansion of Human-Phone Interface By Sensing Structure-Borne Sound Propagation Yu-Chih Tung, Kang G. Shin  | 
								
								
									 Expansion of Human-Phone Interface By Sensing Structure-Borne Sound Propagation Details | 
								
									 | 
								
									 Discussion Comments:
										0
									 
									
										Verification:
										Authors have
										not verified
										information
									 
									
								 | 
							
| 
									
									 Tobias Grosse-Puppendahl, Xavier Dellangnol, Christian Hatzfeld, Biying Fu, Mario Kupnik, Arjan Kuijper, Matthias R. Hastall, James Scott, Marco Gruteser  | 
								
								Details | 
									 | 
								
									 Discussion Comments:
										0
									 
									
										Verification:
										Authors have
										not verified
										information
									 
									
								 | 
							
| 
									 I-Pic: A Platform for Privacy-Compliant Image Capture Paarijaat Aditya, Rijurekha Sen, Peter Druschel, Seong Joon Oh, Rodrigo Benenson, Mario Fritz, Bernt Schiele, Bobby Bhattacharjee, Tong Tong Wu  | 
								
								
									 I-Pic: A Platform for Privacy-Compliant Image Capture Details | 
								
									 | 
								
									 Discussion Comments:
										0
									 
									
										Verification:
										Authors have
										not verified
										information
									 
									
								 | 
							
| 
									 TransitLabel: A Crowd-Sensing System for Automatic Labeling of Transit Stations Semantics Moustafa Elhamshary, Moustafa Youssef, Akira Uchiyama, Hirozumi Yamaguchi, Teruo Higashino  | 
								
								
									 TransitLabel: A Crowd-Sensing System for Automatic Labeling of Transit Stations Semantics Details | 
								
									 | 
								
									 Discussion Comments:
										0
									 
									
										Verification:
										Authors have
										not verified
										information
									 
									
								 | 
							
| 
									 CASE: Comprehensive Application Security Enforcement on COTS Mobile Devices Suwen Zhu, Long Lu, Kapil Singh  | 
								
								
									 CASE: Comprehensive Application Security Enforcement on COTS Mobile Devices Details | 
								
									 | 
								
									 Discussion Comments:
										0
									 
									
										Verification:
										Authors have
										not verified
										information
									 
									
								 | 
							
| 
									 FlashBack: Immersive Virtual Reality on Mobile Devices via Rendering Memoization Kevin Boos, David Chu, Eduardo Cuervo  | 
								
								
									 FlashBack: Immersive Virtual Reality on Mobile Devices via Rendering Memoization Details | 
								
									 Discussion Comments:
										0
									 
									
										Verification:
										Authors have
										not verified
										information
									 
									
								 | 
							|
| 
									 TaskFolder: Dynamic and Fine-Grained Workload Consolidation for Mobile Devices Yuyang Du, Sebastien Haezebrouck, Jin Cui, Rajeev Muralidhar, Harinarayanan Seshadri, Vishwesh Rudramuni, Nicole Chalhoub, YongTong Chua, Richard Quinzio  | 
								
								
									 TaskFolder: Dynamic and Fine-Grained Workload Consolidation for Mobile Devices Details | 
								
									 | 
								
									 Discussion Comments:
										0
									 
									
										Verification:
										Authors have
										not verified
										information
									 
									
								 | 
							
| 
									 Understanding the Characteristics of Android Wear OS Renju Liu, Felix Xiaozhu Lin  | 
								
								
									 Understanding the Characteristics of Android Wear OS Details | 
								
									 Author Comments:
									 
									Discussion Comments:
										0
									 
									
										Sharing:
										Research produced artifacts
									 
									
										Verification:
										Authors have
										verified
										information
									 
									
								 | 
							|
| 
									 Defending against Sybil Devices in Crowdsourced Mapping Services Gang Wang, Bolun Wang, Tianyi Wang, Ana Nika, Haitao Zheng, Ben Y. Zhao  | 
								
								
									 Defending against Sybil Devices in Crowdsourced Mapping Services Details | 
								
									 | 
								
									 Author Comments:
									 
									Discussion Comments:
										0
									 
									
										Sharing:
										Not able to share produced artifacts
									 
									
										Verification:
										Authors have
										verified
										information
									 
									
								 | 
							
| 
									 The Design and Implementation of a Mobile RFID Tag Sorting Robot Longfei Shangguan, Kyle Jamieson  | 
								
								
									 The Design and Implementation of a Mobile RFID Tag Sorting Robot Details | 
								
									 | 
								
									 Discussion Comments:
										0
									 
									
										Verification:
										Authors have
										not verified
										information
									 
									
								 | 
							
| 
									 What You Mark is What Apps See Nisarg Raval, Animesh Srivastava, Ali Razeen, Kiron Lebeck, Ashwin Machanavajjhala, Landon P. Cox  | 
								
								
									 What You Mark is What Apps See Details | 
								
									 | 
								
									 Discussion Comments:
										0
									 
									
										Verification:
										Authors have
										not verified
										information
									 
									
								 | 
							
| 
									 Privacy Capsules: Preventing Information Leaks by Mobile Apps Raul Herbster, Scott DellaTorre, Peter Druschel, Bobby Bhattacharjee  | 
								
								
									 Privacy Capsules: Preventing Information Leaks by Mobile Apps Details | 
								
									 | 
								
									 Discussion Comments:
										0
									 
									
										Verification:
										Authors have
										not verified
										information
									 
									
								 | 
							
| 
									 Practical Human Sensing in the Light Tianxing Li, Qiang Liu, Xia Zhou  | 
								
								
									 Practical Human Sensing in the Light Details | 
								
									 | 
								
									 Discussion Comments:
										0
									 
									
										Verification:
										Authors have
										not verified
										information
									 
									
								 | 
							
| 
									 Idea: A System for Efficient Failure Management in Smart IoT Environments Palanivel A. Kodeswaran, Ravi Kokku, Sayandeep Sen, Mudhakar Srivatsa  | 
								
								
									 Idea: A System for Efficient Failure Management in Smart IoT Environments Details | 
								
									 | 
								
									 Discussion Comments:
										0
									 
									
										Verification:
										Authors have
										not verified
										information
									 
									
								 | 
							
| 
									 Targeted Mimicry Attacks on Touch Input Based Implicit Authentication Schemes Hassan Khan, Urs Hengartner, Daniel Vogel  | 
								
								
									 Targeted Mimicry Attacks on Touch Input Based Implicit Authentication Schemes Details | 
								
									 Discussion Comments:
										0
									 
									
										Verification:
										Authors have
										not verified
										information
									 
									
								 | 
							|
| 
									 Characterizing and Improving WiFi Latency in Large-Scale Operational Networks Kaixin Sui, Mengyu Zhou, Dapeng Liu, Minghua Ma, Dan Pei, Youjian Zhao, Zimu Li, Thomas Moscibroda  | 
								
								
									 Characterizing and Improving WiFi Latency in Large-Scale Operational Networks Details | 
								
									 | 
								
									 Author Comments:
									 
									Discussion Comments:
										0
									 
									
										Sharing:
										Not able to share produced artifacts
									 
									
										Verification:
										Authors have
										verified
										information
									 
									
								 | 
							
| 
									 FOCUS: Robust Visual Codes for Everyone Frederik Hermans, Liam McNamara, Gábor Sörös, Christian Rohner, Thiemo Voigt, Edith C. H. Ngai  | 
								
								
									 FOCUS: Robust Visual Codes for Everyone Details | 
								
									 Discussion Comments:
										0
									 
									
										Verification:
										Authors have
										not verified
										information
									 
									
								 | 
							|
| 
									 LiveLabs: Building In-Situ Mobile Sensing & Behavioural Experimentation TestBeds Kasthuri Jayarajah, Rajesh Krishna Balan, Meera Radhakrishnan, Archan Misra, Youngki Lee  | 
								
								
									 LiveLabs: Building In-Situ Mobile Sensing & Behavioural Experimentation TestBeds Details | 
								
									 Discussion Comments:
										0
									 
									
										Verification:
										Authors have
										not verified
										information
									 
									
								 | 
							|
| 
									 Listening through a Vibration Motor Nirupam Roy, Romit Roy Choudhury  | 
								
								
									 Listening through a Vibration Motor Details | 
								
									 | 
								
									 Discussion Comments:
										0
									 
									
										Verification:
										Authors have
										not verified
										information
									 
									
								 | 
							
| 
									 Reactive Control of Autonomous Drones Endri Bregu, Nicola Casamassima, Daniel Cantoni, Luca Mottola, Kamin Whitehouse  | 
								
								
									 Reactive Control of Autonomous Drones Details | 
								
									 | 
								
									 Discussion Comments:
										0
									 
									
										Verification:
										Authors have
										not verified
										information
									 
									
								 | 
							
| 
									 Mobility Modeling and Prediction in Bike-Sharing Systems Zidong Yang, Ji Hu, Yuanchao Shu, Peng Cheng, Jiming Chen, Thomas Moscibroda  | 
								
								
									 Mobility Modeling and Prediction in Bike-Sharing Systems Details | 
								
									 | 
								
									 Discussion Comments:
										0
									 
									
										Verification:
										Authors have
										not verified
										information
									 
									
								 | 
							
| 
									 uLink: Enabling User-Defined Deep Linking to App Content Tanzirul Azim, Oriana Riva, Suman Nath  | 
								
								
									 uLink: Enabling User-Defined Deep Linking to App Content Details | 
								
									 | 
								
									 Discussion Comments:
										0
									 
									
										Verification:
										Authors have
										not verified
										information
									 
									
								 |