{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,11,28]],"date-time":"2024-11-28T05:27:43Z","timestamp":1732771663588,"version":"3.29.0"},"reference-count":8,"publisher":"IEEE","license":[{"start":{"date-parts":[[2024,10,3]],"date-time":"2024-10-03T00:00:00Z","timestamp":1727913600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2024,10,3]],"date-time":"2024-10-03T00:00:00Z","timestamp":1727913600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2024,10,3]]},"DOI":"10.1109\/comm62355.2024.10741490","type":"proceedings-article","created":{"date-parts":[[2024,11,6]],"date-time":"2024-11-06T18:37:59Z","timestamp":1730918279000},"page":"1-6","source":"Crossref","is-referenced-by-count":0,"title":["Determine electronic devices vulnerabilities using artificial intelligence"],"prefix":"10.1109","author":[{"given":"Alexandru-M\u0103d\u0103lin","family":"Vizitiu","sequence":"first","affiliation":[{"name":"National University of Sciences and Technologies Politehnica Bucharest,Faculty of Electronics, Telecommunications and Information Technology,Bucharest,Romania"}]},{"given":"Lidia","family":"Dobrescu","sequence":"additional","affiliation":[{"name":"National University of Sciences and Technologies Politehnica Bucharest,Faculty of Electronics, Telecommunications and Information Technology,Bucharest,Romania"}]},{"given":"Cristian","family":"Molder","sequence":"additional","affiliation":[{"name":"\"Ferdinand I\" Military Technical Academy,Center of Excellence in Robotics and Autonomous Systems&#x2014;CERAS,Bucharest,Romania"}]},{"given":"Bogdan","family":"Sebacher","sequence":"additional","affiliation":[{"name":"Military Technical Academy \"Ferdinand I\",Department of Applied Informatics,Bucharest,Romania"}]},{"given":"Bogdan C\u0103t\u0103lin","family":"Trip","sequence":"additional","affiliation":[{"name":"National University of Sciences and Technologies Politehnica Bucharest,Faculty of Electronics, Telecommunications and Information Technology,Bucharest,Romania"}]},{"given":"Vlad Florian","family":"Butnariu","sequence":"additional","affiliation":[{"name":"National University of Sciences and Technologies Politehnica Bucharest,Faculty of Electronics, Telecommunications and Information Technology,Bucharest,Romania"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/EMCSIPI50001.2023.10241678"},{"key":"ref2","first-page":"1","article-title":"SnoreDetect: Automatic Snoring Detection Using Audio Recordings and Machine Learning","volume-title":"Conference: 8th International Sleep Update 2024","author":"Amit"},{"volume-title":"Data for explosion monitoring: acoustic explosion signatures signatures collected on infrasound microphones and smart-phones","year":"2024","author":"Samuel Kei","key":"ref3"},{"key":"ref4","first-page":"479","article-title":"Analysis of the unintended propagation of audio signal emitted by wireless headphones","volume-title":"Revue roumaine des sciences techniques\u2014s\u00e9rie \u00e9lectrotechnique et \u00e9nerg\u00e9tique","author":"Vizitiu"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.3390\/sym16020209"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/TMI.2016.2528162"},{"volume-title":"Deep Learning","year":"2016","author":"Goodfellow","key":"ref7"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.4236\/jdaip.2019.74012"}],"event":{"name":"2024 15th International Conference on Communications (COMM)","start":{"date-parts":[[2024,10,3]]},"location":"Bucharest, Romania","end":{"date-parts":[[2024,10,4]]}},"container-title":["2024 15th International Conference on Communications (COMM)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/10741366\/10741389\/10741490.pdf?arnumber=10741490","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,11,27]],"date-time":"2024-11-27T12:11:28Z","timestamp":1732709488000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10741490\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,10,3]]},"references-count":8,"URL":"https:\/\/doi.org\/10.1109\/comm62355.2024.10741490","relation":{},"subject":[],"published":{"date-parts":[[2024,10,3]]}}}