{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,5]],"date-time":"2026-02-05T22:59:38Z","timestamp":1770332378125,"version":"3.49.0"},"reference-count":50,"publisher":"IEEE","license":[{"start":{"date-parts":[[2022,5,2]],"date-time":"2022-05-02T00:00:00Z","timestamp":1651449600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2022,5,2]],"date-time":"2022-05-02T00:00:00Z","timestamp":1651449600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2022,5,2]]},"DOI":"10.1109\/infocom48880.2022.9796653","type":"proceedings-article","created":{"date-parts":[[2022,6,20]],"date-time":"2022-06-20T21:18:49Z","timestamp":1655759929000},"page":"31-40","source":"Crossref","is-referenced-by-count":13,"title":["Thwarting Unauthorized Voice Eavesdropping via Touch Sensing in Mobile Systems"],"prefix":"10.1109","author":[{"given":"Wenbin","family":"Huang","sequence":"first","affiliation":[{"name":"Hunan University,College of Computer Science and Electronic Engineering"}]},{"given":"Wenjuan","family":"Tang","sequence":"additional","affiliation":[{"name":"Hunan University,College of Computer Science and Electronic Engineering"}]},{"given":"Kuan","family":"Zhang","sequence":"additional","affiliation":[{"name":"University of Nebraska&#x2013;Lincoln,Department of Electrical and Computer Engineering"}]},{"given":"Haojin","family":"Zhu","sequence":"additional","affiliation":[{"name":"Shanghai Jiao Tong University,Department of Computer Science and Engineering"}]},{"given":"Yaoxue","family":"Zhang","sequence":"additional","affiliation":[{"name":"BNRist, Tsinghua University,Department of Computer Science and Technology"}]}],"member":"263","reference":[{"key":"ref39","year":"0"},{"key":"ref38","year":"0"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.2478\/popets-2021-0021"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1109\/ICDCS51616.2021.00101"},{"key":"ref31","article-title":"An indirect eavesdropping attack of keystrokes on touch screen through acoustic sensing","author":"yu","year":"2019","journal-title":"IEEE TMC"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2018.00004"},{"key":"ref37","year":"0"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1109\/ICTAS.2017.7920660"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4419-5951-5_4"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1145\/3313831.3376304"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1145\/3411806"},{"key":"ref27","first-page":"555","article-title":"Android APP reinforcement method with function Nativeization","volume":"53","author":"song","year":"2019","journal-title":"Engineering Science"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2020.24076"},{"key":"ref2","year":"0","journal-title":"Baidu Voice biometric on smartphone"},{"key":"ref1","article-title":"Mobile operating system market share worldwide","year":"2019","journal-title":"Dostopno prek"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1007\/s00779-018-1174-x"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2016.30"},{"key":"ref21","first-page":"7394","article-title":"Automatic Permission Optimization Framework for Privacy Enhancement of Mobile Applications","volume":"8","author":"qu","year":"2020","journal-title":"IEEE IoT"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2016.23118"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/SP40000.2020.00072"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1016\/j.jss.2020.110671"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2016.2523912"},{"key":"ref50","article-title":"Hearing your touch: A new acoustic side channel on smartphones","author":"shumailov","year":"2019","journal-title":"arXiv preprint arXiv 1903 11593"},{"key":"ref10","article-title":"Is Facebook Listening (And So What If They Are)?","author":"khatibloo","year":"2017"},{"key":"ref11","article-title":"Tapping your cell phone","author":"segall","year":"2014","journal-title":"WTHR13 News (NBC)"},{"key":"ref40","article-title":"UNIX VISION","author":"constantinescu","year":"0"},{"key":"ref12","year":"0"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2020.3021407"},{"key":"ref14","article-title":"1 in 5 Aussies convinced their smart-phone is spying on them","author":"hassan","year":"2018"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2021.102181"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.9734\/ajrcos\/2021\/v7i430189"},{"key":"ref17","article-title":"Net Losses: Estimating the Global Cost of Cybercrime","year":"2014","journal-title":"CSIS"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1145\/3427228.3427277"},{"key":"ref19","article-title":"A smart home is no castle: Privacy vulnerabilities of encrypted iot traffic","author":"apthorpe","year":"2017"},{"key":"ref4","year":"0"},{"key":"ref3","year":"0"},{"key":"ref6","article-title":"Stop Deceiving! An effective Defense Scheme against Voice Impersonation Attacks on Smart Devices","author":"huang","year":"2021","journal-title":"IEEE IoT"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1088\/1757-899X\/420\/1\/012046"},{"key":"ref8","year":"2017","journal-title":"Anonymous YouTube user demonstrating how Facebook listens to conversations to serve ads"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-22479-0_6"},{"key":"ref49","doi-asserted-by":"publisher","DOI":"10.1177\/1536867X20909688"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2019.2923261"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.1109\/ISIT44484.2020.9173936"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1214\/aoms\/1177704472"},{"key":"ref48","doi-asserted-by":"publisher","DOI":"10.1016\/j.neucom.2019.10.118"},{"key":"ref47","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2018.08.021"},{"key":"ref42","year":"0","journal-title":"EdXposed Manager"},{"key":"ref41","year":"0","journal-title":"Magisk"},{"key":"ref44","year":"0"},{"key":"ref43","year":"0"}],"event":{"name":"IEEE INFOCOM 2022 - IEEE Conference on Computer Communications","location":"London, United Kingdom","start":{"date-parts":[[2022,5,2]]},"end":{"date-parts":[[2022,5,5]]}},"container-title":["IEEE INFOCOM 2022 - IEEE Conference on Computer Communications"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9796607\/9796652\/09796653.pdf?arnumber=9796653","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,7,11]],"date-time":"2022-07-11T20:01:00Z","timestamp":1657569660000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9796653\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,5,2]]},"references-count":50,"URL":"https:\/\/doi.org\/10.1109\/infocom48880.2022.9796653","relation":{},"subject":[],"published":{"date-parts":[[2022,5,2]]}}}