{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,14]],"date-time":"2026-03-14T17:59:41Z","timestamp":1773511181511,"version":"3.50.1"},"reference-count":28,"publisher":"IEEE","license":[{"start":{"date-parts":[[2023,5,17]],"date-time":"2023-05-17T00:00:00Z","timestamp":1684281600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2023,5,17]],"date-time":"2023-05-17T00:00:00Z","timestamp":1684281600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2023,5,17]]},"DOI":"10.1109\/infocom53939.2023.10229048","type":"proceedings-article","created":{"date-parts":[[2023,8,29]],"date-time":"2023-08-29T17:40:43Z","timestamp":1693330843000},"page":"1-10","source":"Crossref","is-referenced-by-count":13,"title":["Plug and Power: Fingerprinting USB Powered Peripherals via Power Side-channel"],"prefix":"10.1109","author":[{"given":"Riccardo","family":"Spolaor","sequence":"first","affiliation":[{"name":"Shandong University,School of Computer Science and Technology,Qingdao,China"}]},{"given":"Hao","family":"Liu","sequence":"additional","affiliation":[{"name":"Shandong University,School of Computer Science and Technology,Qingdao,China"}]},{"given":"Federico","family":"Turrin","sequence":"additional","affiliation":[{"name":"University of Padua,Department of Mathematics,Padua,Italy"}]},{"given":"Mauro","family":"Conti","sequence":"additional","affiliation":[{"name":"University of Padua,Department of Mathematics,Padua,Italy"}]},{"given":"Xiuzhen","family":"Cheng","sequence":"additional","affiliation":[{"name":"Shandong University,School of Computer Science and Technology,Qingdao,China"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1016\/j.hcc.2021.100007"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2018.00037"},{"key":"ref3","volume-title":"Please stop charging your phone in public ports","year":"2017"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2017.08.002"},{"issue":"6","key":"ref5","first-page":"29","article-title":"W32. stuxnet dossier","volume":"5","author":"Falliere","year":"2011","journal-title":"White paper, Symantec Corp., Security Response"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.3390\/fi4040971"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/DSN.2019.00041"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/SP46214.2022.9833595"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/SP46214.2022.9833612"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1145\/3422308"},{"key":"ref11","author":"Axelson","year":"2015","journal-title":"USB complete: the developer\u2019s guide."},{"key":"ref12","first-page":"1467","article-title":"Poisoning attacks against support vector machines","volume-title":"Proceedings of the 29th International Coference on International Conference on Machine Learning","author":"Biggio"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1177\/096228020301200205"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1016\/j.neucom.2018.03.067"},{"key":"ref15","first-page":"681","article-title":"Charger-Surfing: Exploiting a power line Side-Channel for smartphone information leakage","volume-title":"30th USENIX Security Symposium (USENIX Security 21)","author":"Cronin"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1145\/3460120.3484733"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2022.3173063"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1613\/jair.953"},{"key":"ref19","volume-title":"One-vs-Rest and One-vs-One for Multi-Class Classification","author":"Brownlee","year":"2020"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2017.2779824"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1145\/3565268"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1145\/2899007.2899009"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-61204-1_5"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2016.2639446"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2018.05.018"},{"key":"ref26","first-page":"1145","article-title":"USB snooping made easy: Crosstalk leakage attacks on USB hubs","volume-title":"26th USENIX Security Symposium (USENIX Security 17)","author":"Su"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-29485-8_14"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1145\/2976749.2978353"}],"event":{"name":"IEEE INFOCOM 2023 - IEEE Conference on Computer Communications","location":"New York City, NY, USA","start":{"date-parts":[[2023,5,17]]},"end":{"date-parts":[[2023,5,20]]}},"container-title":["IEEE INFOCOM 2023 - IEEE Conference on Computer Communications"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/10228851\/10228852\/10229048.pdf?arnumber=10229048","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,3,1]],"date-time":"2024-03-01T21:56:18Z","timestamp":1709330178000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10229048\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,5,17]]},"references-count":28,"URL":"https:\/\/doi.org\/10.1109\/infocom53939.2023.10229048","relation":{},"subject":[],"published":{"date-parts":[[2023,5,17]]}}}