{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,26]],"date-time":"2025-11-26T13:09:08Z","timestamp":1764162548266,"version":"3.46.0"},"publisher-location":"Cham","reference-count":16,"publisher":"Springer Nature Switzerland","isbn-type":[{"value":"9783032117670","type":"print"},{"value":"9783032117687","type":"electronic"}],"license":[{"start":{"date-parts":[[2025,11,27]],"date-time":"2025-11-27T00:00:00Z","timestamp":1764201600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2025,11,27]],"date-time":"2025-11-27T00:00:00Z","timestamp":1764201600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2026]]},"DOI":"10.1007\/978-3-032-11768-7_7","type":"book-chapter","created":{"date-parts":[[2025,11,26]],"date-time":"2025-11-26T13:02:42Z","timestamp":1764162162000},"page":"85-92","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Anti-ESIA: Analyzing and\u00a0Mitigating Impacts of\u00a0Electromagnetic Signal Injection Attacks on\u00a0Image Sensing"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0009-0009-6927-9453","authenticated-orcid":false,"given":"Denglin","family":"Kang","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-0907-7998","authenticated-orcid":false,"given":"Youqian","family":"Zhang","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-3913-0243","authenticated-orcid":false,"given":"Wai Cheong","family":"Tam","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-9082-3208","authenticated-orcid":false,"given":"Xiapu","family":"Luo","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-1048-1904","authenticated-orcid":false,"given":"Eugene Yujun","family":"Fu","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,11,27]]},"reference":[{"key":"7_CR1","unstructured":"Bayer, B.: Color Imaging Array. United States Patent, no. 3971065 (1976)"},{"key":"7_CR2","unstructured":"Dosovitskiy, A.: An Image Is Worth 16x16 Words: Transformers for Image Recognition at Scale. arXiv preprint arXiv:2010.11929 (2020)"},{"key":"7_CR3","unstructured":"Jiang, Q., Ji, X., Yan, C., Xie, Z., Lou, H., Xu, W.: GlitchHiker: uncovering vulnerabilities of image signal transmission with IEMI. In: The 32nd USENIX Security Symposium (2023)"},{"key":"7_CR4","doi-asserted-by":"crossref","unstructured":"K\u00f6hler, S., Baker, R., Martinovic, I.: Signal injection attacks against CCD image sensors. In: Proceedings of the 2022 ACM on Asia Conference on Computer and Communications Security, pp. 294\u2013308 (2022)","DOI":"10.1145\/3488932.3497771"},{"key":"7_CR5","doi-asserted-by":"crossref","unstructured":"Kune, D.F., et al.: Ghost talk: mitigating EMI signal injection attacks against analog sensors. In: 2013 IEEE Symposium on Security and Privacy, pp. 145\u2013159. IEEE (2013)","DOI":"10.1109\/SP.2013.20"},{"key":"7_CR6","doi-asserted-by":"crossref","unstructured":"Liao, W., Yan, S., Zhang, Y., Zhai, X., Wang, Y., Fu, E.: Is your autonomous vehicle safe? Understanding the threat of electromagnetic signal injection attacks on traffic scene perception. In: Proceedings of the AAAI Conference on Artificial Intelligence. vol.\u00a039, pp. 27464\u201327472 (2025)","DOI":"10.1609\/aaai.v39i26.34958"},{"key":"7_CR7","unstructured":"Liu, Z., et al.: Swin transformer V2: Scaling up capacity and resolution. arXiv preprint arXiv:2111.09883 (2022). https:\/\/arxiv.org\/abs\/2111.09883"},{"key":"7_CR8","doi-asserted-by":"crossref","unstructured":"Liu, Z., Lin, F., Ba, Z., Lu, L., Ren, K.: MagShadow: physical adversarial example attacks via electromagnetic injection. IEEE Transactions on Dependable and Secure Computing (2025)","DOI":"10.1109\/TDSC.2025.3529197"},{"key":"7_CR9","unstructured":"Paul, C.R., Scully, R.C., Steffka, M.A.: Introduction to Electromagnetic Compatibility. John Wiley & Sons (2022)"},{"key":"7_CR10","doi-asserted-by":"crossref","unstructured":"Ren, Y., Jiang, Q., Yan, C., Ji, X., Xu, W.: GhostShot: manipulating the image of CCD cameras with electromagnetic interference. In: NDSS (2025)","DOI":"10.14722\/ndss.2025.242065"},{"issue":"3","key":"7_CR11","doi-asserted-by":"publisher","first-page":"211","DOI":"10.1007\/s11263-015-0816-y","volume":"115","author":"O Russakovsky","year":"2015","unstructured":"Russakovsky, O., et al.: ImageNet large scale visual recognition challenge. Int. J. Comput. Vision 115(3), 211\u2013252 (2015). https:\/\/doi.org\/10.1007\/s11263-015-0816-y","journal-title":"Int. J. Comput. Vision"},{"key":"7_CR12","doi-asserted-by":"crossref","unstructured":"Wilson, P.F.: Radiation patterns of unintentional antennas: estimates, simulations, and measurements. In: 2010 Asia-Pacific International Symposium on Electromagnetic Compatibility, pp. 985\u2013989. IEEE (2010)","DOI":"10.1109\/APEMC.2010.5475702"},{"key":"7_CR13","doi-asserted-by":"crossref","unstructured":"Xie, S., Girshick, R., Doll\u00e1r, P., Tu, Z., He, K.: Aggregated residual transformations for deep neural networks. arXiv preprint arXiv:1611.05431 (2017). https:\/\/arxiv.org\/abs\/1611.05431","DOI":"10.1109\/CVPR.2017.634"},{"key":"7_CR14","unstructured":"Zhang, Y., et al.: Modeling Electromagnetic Signal Injection Attacks on Camera-based Smart Systems: Applications and Mitigation. arXiv preprint arXiv:2408.05124 (2024)"},{"key":"7_CR15","unstructured":"Zhang, Y., Ji, X., Wang, Z., Jiang, Q.: Rainbow artifacts from electromagnetic signal injection attacks on image sensors. In: 2025 IEEE International Workshop on Signal Processing Systems (2025)"},{"key":"7_CR16","doi-asserted-by":"crossref","unstructured":"Zhang, Y., et al.: Understanding impacts of electromagnetic signal injection attacks on object detection. In: IEEE International Conference on Multimedia and Expo. IEEE (2024)","DOI":"10.1109\/ICME57554.2024.10688003"}],"container-title":["Lecture Notes in Computer Science","Advances in Mobile Computing and Multimedia Intelligence"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-032-11768-7_7","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,11,26]],"date-time":"2025-11-26T13:02:44Z","timestamp":1764162164000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-032-11768-7_7"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,11,27]]},"ISBN":["9783032117670","9783032117687"],"references-count":16,"URL":"https:\/\/doi.org\/10.1007\/978-3-032-11768-7_7","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025,11,27]]},"assertion":[{"value":"27 November 2025","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"MoMM","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Advances in Mobile Computing and Multimedia Intelligence","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Matsue","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Japan","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2025","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"8 December 2025","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"10 December 2025","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"23","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"momm2025","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/www.iiwas.org\/conferences\/momm2025\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}