{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,7,16]],"date-time":"2025-07-16T13:39:07Z","timestamp":1752673147463,"version":"3.37.3"},"reference-count":50,"publisher":"IEEE","license":[{"start":{"date-parts":[[2023,5,17]],"date-time":"2023-05-17T00:00:00Z","timestamp":1684281600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2023,5,17]],"date-time":"2023-05-17T00:00:00Z","timestamp":1684281600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/501100014219","name":"National Science Fund for Distinguished Young Scholars","doi-asserted-by":"publisher","id":[{"id":"10.13039\/501100014219","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100004835","name":"Zhejiang University","doi-asserted-by":"publisher","id":[{"id":"10.13039\/501100004835","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2023,5,17]]},"DOI":"10.1109\/infocom53939.2023.10228859","type":"proceedings-article","created":{"date-parts":[[2023,8,29]],"date-time":"2023-08-29T17:40:43Z","timestamp":1693330843000},"page":"1-10","source":"Crossref","is-referenced-by-count":3,"title":["Expelliarmus: Command Cancellation Attacks on Smartphones using Electromagnetic Interference"],"prefix":"10.1109","author":[{"given":"Ming","family":"Gao","sequence":"first","affiliation":[{"name":"Zhejiang University,School of Cyber Science and Technology,China"}]},{"given":"Fu","family":"Xiao","sequence":"additional","affiliation":[{"name":"Nanjing University of Posts and Telecommunications,School of Computer Science,China"}]},{"given":"Weiran","family":"Liu","sequence":"additional","affiliation":[{"name":"Zhejiang University,School of Cyber Science and Technology,China"}]},{"given":"Wentao","family":"Guo","sequence":"additional","affiliation":[{"name":"Zhejiang University,School of Cyber Science and Technology,China"}]},{"given":"Yangtao","family":"Huang","sequence":"additional","affiliation":[{"name":"Zhejiang University,School of Cyber Science and Technology,China"}]},{"given":"Yajie","family":"Liu","sequence":"additional","affiliation":[{"name":"Zhejiang University,School of Cyber Science and Technology,China"}]},{"given":"Jinsong","family":"Han","sequence":"additional","affiliation":[{"name":"Zhejiang University,School of Cyber Science and Technology,China"}]}],"member":"263","reference":[{"doi-asserted-by":"publisher","key":"ref13","DOI":"10.1145\/3319535.3354195"},{"doi-asserted-by":"publisher","key":"ref12","DOI":"10.1145\/3196494.3196556"},{"year":"2022","author":"demos","article-title":"A video demonstration of expelliarmus - cancelling touch commands on smartphones","key":"ref15"},{"doi-asserted-by":"publisher","key":"ref14","DOI":"10.1109\/JSTSP.2010.2042414"},{"doi-asserted-by":"publisher","key":"ref11","DOI":"10.1109\/SP.2013.20"},{"doi-asserted-by":"publisher","key":"ref10","DOI":"10.1109\/TEMC.2015.2463089"},{"year":"2021","article-title":"Tesla model s","key":"ref17"},{"year":"2021","article-title":"Industrial capacitive touch screen","key":"ref16"},{"doi-asserted-by":"publisher","key":"ref19","DOI":"10.1109\/ISIAS.2011.6122840"},{"year":"2019","article-title":"Touch screens for use in medical instrument displays","key":"ref18"},{"key":"ref50","article-title":"Rocking drones with intentional sound noise on gyroscopic sensors","author":"son","year":"2015","journal-title":"Proceedings of USENIX Security"},{"key":"ref46","article-title":"Sign-speaker: A real-time, high-precision smartwatch-based sign language translator","author":"hou","year":"2019","journal-title":"Proceedings of ACM MOBICOM"},{"doi-asserted-by":"publisher","key":"ref45","DOI":"10.1145\/3241539.3241568"},{"doi-asserted-by":"publisher","key":"ref48","DOI":"10.1145\/3287043"},{"doi-asserted-by":"publisher","key":"ref47","DOI":"10.1109\/SECON55815.2022.9918594"},{"doi-asserted-by":"publisher","key":"ref42","DOI":"10.1109\/TMC.2020.3032278"},{"doi-asserted-by":"publisher","key":"ref41","DOI":"10.1109\/SP40000.2020.00001"},{"doi-asserted-by":"publisher","key":"ref44","DOI":"10.1109\/COMST.2022.3145856"},{"doi-asserted-by":"publisher","key":"ref43","DOI":"10.1109\/INFOCOM48880.2022.9796731"},{"doi-asserted-by":"publisher","key":"ref49","DOI":"10.1109\/JIOT.2022.3181607"},{"year":"2022","journal-title":"Proceedings of USENIX Security","article-title":"GhostTouch: Targeted attacks on touchscreens without physical touch","key":"ref8"},{"doi-asserted-by":"publisher","key":"ref7","DOI":"10.1080\/09205071.2016.1211559"},{"doi-asserted-by":"publisher","key":"ref9","DOI":"10.1109\/SP46214.2022.9833718"},{"doi-asserted-by":"publisher","key":"ref4","DOI":"10.1145\/3474368"},{"key":"ref3","article-title":"Commandersong: A systematic approach for practical adversarial voice recognition","author":"yuan","year":"2018","journal-title":"Proceedings of USENIX Security"},{"doi-asserted-by":"publisher","key":"ref6","DOI":"10.1145\/3121049"},{"doi-asserted-by":"publisher","key":"ref5","DOI":"10.1109\/TMC.2013.116"},{"doi-asserted-by":"publisher","key":"ref40","DOI":"10.1145\/2810103.2813679"},{"doi-asserted-by":"publisher","key":"ref35","DOI":"10.1109\/INFOCOM.2019.8737419"},{"doi-asserted-by":"publisher","key":"ref34","DOI":"10.1109\/ICAECT49130.2021.9392577"},{"year":"2022","article-title":"Vulnerable devices against expelliarmus","key":"ref37"},{"year":"2012","article-title":"How to dismiss the dialog with click on outside of the dialog?","key":"ref36"},{"year":"2021","article-title":"Apple stylus pen","key":"ref31"},{"doi-asserted-by":"publisher","key":"ref30","DOI":"10.14722\/ndss.2020.23055"},{"doi-asserted-by":"publisher","key":"ref33","DOI":"10.1109\/JSSC.2016.2559508"},{"year":"2022","article-title":"Screen test pro","key":"ref32"},{"doi-asserted-by":"publisher","key":"ref2","DOI":"10.1145\/3133956.3134052"},{"doi-asserted-by":"publisher","key":"ref1","DOI":"10.1109\/SP.2019.00037"},{"doi-asserted-by":"publisher","key":"ref39","DOI":"10.1109\/TEMC.2007.908845"},{"doi-asserted-by":"publisher","key":"ref38","DOI":"10.1109\/URSIGASS.2011.6050718"},{"doi-asserted-by":"publisher","key":"ref24","DOI":"10.1145\/3386901.3389030"},{"doi-asserted-by":"publisher","key":"ref23","DOI":"10.1109\/SP40000.2020.00004"},{"doi-asserted-by":"publisher","key":"ref26","DOI":"10.1109\/INFOCOM48880.2022.9796940"},{"key":"ref25","article-title":"Push the limit of millimeter-wave radar localization","author":"zhang","year":"2022","journal-title":"accepted to appear at ACM Trans Sen Netw"},{"doi-asserted-by":"publisher","key":"ref20","DOI":"10.1145\/3460120.3484549"},{"doi-asserted-by":"publisher","key":"ref22","DOI":"10.1109\/SP.2019.00074"},{"doi-asserted-by":"publisher","key":"ref21","DOI":"10.1145\/2660267.2660292"},{"key":"ref28","article-title":"Inaudible voice commands: The long-range attack and defense","author":"roy","year":"2018","journal-title":"Proceedings of USENIX NSDI"},{"doi-asserted-by":"publisher","key":"ref27","DOI":"10.1145\/3300061.3345429"},{"doi-asserted-by":"publisher","key":"ref29","DOI":"10.1145\/3460120.3485389"}],"event":{"name":"IEEE INFOCOM 2023 - IEEE Conference on Computer Communications","start":{"date-parts":[[2023,5,17]]},"location":"New York City, NY, USA","end":{"date-parts":[[2023,5,20]]}},"container-title":["IEEE INFOCOM 2023 - IEEE Conference on Computer Communications"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/10228851\/10228852\/10228859.pdf?arnumber=10228859","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,9,18]],"date-time":"2023-09-18T17:44:18Z","timestamp":1695059058000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10228859\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,5,17]]},"references-count":50,"URL":"https:\/\/doi.org\/10.1109\/infocom53939.2023.10228859","relation":{},"subject":[],"published":{"date-parts":[[2023,5,17]]}}}