{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T19:29:05Z","timestamp":1750188545576,"version":"3.28.0"},"reference-count":18,"publisher":"IEEE","license":[{"start":{"date-parts":[[2020,5,1]],"date-time":"2020-05-01T00:00:00Z","timestamp":1588291200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2020,5,1]],"date-time":"2020-05-01T00:00:00Z","timestamp":1588291200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2020,5,1]],"date-time":"2020-05-01T00:00:00Z","timestamp":1588291200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2020,5]]},"DOI":"10.1109\/icassp40776.2020.9054006","type":"proceedings-article","created":{"date-parts":[[2020,4,9]],"date-time":"2020-04-09T16:21:13Z","timestamp":1586449273000},"page":"2862-2866","source":"Crossref","is-referenced-by-count":5,"title":["Cell-Phone Classification: A Convolutional Neural Network Approach Exploiting Electromagnetic Emanations"],"prefix":"10.1109","author":[{"given":"Baki Berkay","family":"Yilmaz","sequence":"first","affiliation":[]},{"given":"Elvan","family":"Mert Ugurlu","sequence":"additional","affiliation":[]},{"given":"Alenka","family":"Zajic","sequence":"additional","affiliation":[]},{"given":"Milos","family":"Prvulovic","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","first-page":"388","article-title":"Differential power analysis: leaking secrets","author":"kocher","year":"1999","journal-title":"Proc of CRYPTO"},{"doi-asserted-by":"publisher","key":"ref11","DOI":"10.1016\/j.compeleceng.2007.05.009"},{"key":"ref12","doi-asserted-by":"crossref","first-page":"885","DOI":"10.1109\/TEMC.2014.2300139","article-title":"Experimental demonstration of electromagnetic information leakage from modern processor-memory systems","volume":"56","author":"zaji?","year":"2014","journal-title":"IEEE Transactions on Electromagnetic Compatibility"},{"doi-asserted-by":"publisher","key":"ref13","DOI":"10.1109\/MILCOM.2017.8170812"},{"doi-asserted-by":"publisher","key":"ref14","DOI":"10.1109\/TIFS.2019.2929018"},{"doi-asserted-by":"publisher","key":"ref15","DOI":"10.1016\/0167-4048(85)90046-X"},{"year":"2002","author":"kuhn","journal-title":"Compromising emanations Eavesdropping risks of computer displays","key":"ref16"},{"doi-asserted-by":"publisher","key":"ref17","DOI":"10.1145\/2749469.2750394"},{"doi-asserted-by":"publisher","key":"ref18","DOI":"10.1109\/MILCOM47813.2019.9021060"},{"key":"ref4","article-title":"Remote Timing Attacks are Practical","author":"boneh","year":"2003","journal-title":"Proceedings of the USENIX Security Symposium"},{"doi-asserted-by":"publisher","key":"ref3","DOI":"10.1109\/MSP.2009.54"},{"doi-asserted-by":"publisher","key":"ref6","DOI":"10.1007\/3-540-44499-8_8"},{"doi-asserted-by":"publisher","key":"ref5","DOI":"10.1007\/3-540-68697-5_9"},{"doi-asserted-by":"publisher","key":"ref8","DOI":"10.1007\/978-3-540-45238-6_6"},{"doi-asserted-by":"publisher","key":"ref7","DOI":"10.1109\/SP.2011.22"},{"doi-asserted-by":"publisher","key":"ref2","DOI":"10.1007\/978-3-319-08302-5_15"},{"doi-asserted-by":"publisher","key":"ref9","DOI":"10.1007\/978-3-662-44371-2_25"},{"key":"ref1","first-page":"29","article-title":"The EM side-channel(s)","author":"agrawal","year":"2002","journal-title":"Cryptographic Hardware and Embedded Systems - CHES 2002"}],"event":{"name":"ICASSP 2020 - 2020 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP)","start":{"date-parts":[[2020,5,4]]},"location":"Barcelona, Spain","end":{"date-parts":[[2020,5,8]]}},"container-title":["ICASSP 2020 - 2020 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9040208\/9052899\/09054006.pdf?arnumber=9054006","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,6,27]],"date-time":"2022-06-27T20:09:00Z","timestamp":1656360540000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9054006\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,5]]},"references-count":18,"URL":"https:\/\/doi.org\/10.1109\/icassp40776.2020.9054006","relation":{},"subject":[],"published":{"date-parts":[[2020,5]]}}}