{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,5,12]],"date-time":"2026-05-12T16:44:28Z","timestamp":1778604268826,"version":"3.51.4"},"reference-count":74,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"16","license":[{"start":{"date-parts":[[2025,8,15]],"date-time":"2025-08-15T00:00:00Z","timestamp":1755216000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2025,8,15]],"date-time":"2025-08-15T00:00:00Z","timestamp":1755216000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2025,8,15]],"date-time":"2025-08-15T00:00:00Z","timestamp":1755216000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"name":"Office of the Director of National Intelligence (ODNI) through the Intelligence Advanced Research Projects Activity","award":["2021-21062400006"],"award-info":[{"award-number":["2021-21062400006"]}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Internet Things J."],"published-print":{"date-parts":[[2025,8,15]]},"DOI":"10.1109\/jiot.2025.3578511","type":"journal-article","created":{"date-parts":[[2025,6,10]],"date-time":"2025-06-10T13:53:16Z","timestamp":1749563596000},"page":"32916-32931","source":"Crossref","is-referenced-by-count":2,"title":["A Computational Harmonic Detection Algorithm to Detect Data Leakage Through EM Emanation"],"prefix":"10.1109","volume":"12","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-0810-3202","authenticated-orcid":false,"given":"Md Faizul","family":"Bari","sequence":"first","affiliation":[{"name":"Elmore Family School of Electrical and Computer Engineering, Purdue University, West Lafayette, IN, USA"}]},{"ORCID":"https:\/\/orcid.org\/0009-0004-2948-2389","authenticated-orcid":false,"given":"Meghna","family":"Roy Chowdhury","sequence":"additional","affiliation":[{"name":"Elmore Family School of Electrical and Computer Engineering, Purdue University, West Lafayette, IN, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-5566-8946","authenticated-orcid":false,"given":"Shreyas","family":"Sen","sequence":"additional","affiliation":[{"name":"Elmore Family School of Electrical and Computer Engineering, Purdue University, West Lafayette, IN, USA"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1145\/3243734.3243802"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1145\/3465380"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1145\/3489517.3530437"},{"key":"ref4","first-page":"1","article-title":"Compromising electromagnetic emanations of wired and wireless keyboards","volume-title":"Proc. USENIX Security Symp.","volume":"8","author":"Vuagnoux"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1145\/3460120.3484549"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/icc45855.2022.9839155"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/spw54247.2022.9833894"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/icassp40776.2020.9054006"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.3390\/electronics13081579"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.23919\/eucap48036.2020.9135387"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/hpca47549.2020.00020"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/host55342.2024.10545402"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/temc.2018.2855448"},{"key":"ref14","first-page":"88","article-title":"Electromagnetic eavesdropping risks of flat-panel displays","volume-title":"Proc. Int. Workshop Privacy Enhanc. Technol.","author":"Kuhn"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/temc.2013.2252353"},{"key":"ref16","first-page":"24","article-title":"Eavesdropping attacks on computer displays","volume-title":"Proc. Inf. Security Summit","author":"Kuhn"},{"key":"ref17","volume-title":"Connected IoT devices tipped to approach 19B in 2024","author":"Carrol","year":"2024"},{"key":"ref18","volume-title":"SCISRS\u2014Securing compartmented information with smart radio systems","year":"2024"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.23919\/date56975.2023.10137263"},{"key":"ref20","volume-title":"TEMPEST","year":"2022"},{"key":"ref21","volume-title":"Tempest (Codename)","year":"2023"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1016\/0167-4048(85)90046-X"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/iscas46773.2023.10181751"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1145\/3596247"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/tmc.2024.3414992"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/ims37962.2022.9865347"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/access.2021.3104525"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1007\/s41635-021-00116-2"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1109\/npsc.2014.7103877"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1109\/61.915476"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1109\/icnc.2008.230"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1109\/tim.2007.910101"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijepes.2011.06.020"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1109\/csse.2008.18"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1080\/21642583.2018.1558420"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1109\/apec.2005.1453014"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1109\/pic.2015.7489891"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1109\/pess.2002.1043556"},{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.3390\/en12020232"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1109\/access.2021.3055553"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1109\/tie.2006.888685"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1109\/icassp.1990.115585"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1109\/taslp.2017.2667879"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1109\/icassp.2015.7178788"},{"key":"ref45","first-page":"2787","article-title":"Instantaneous pitch estimation based on RAPT framework","volume-title":"Proc. 20th Eur. Signal Process. Conf. (EUSIPCO)","author":"Azarov"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.1109\/tasl.2009.2034186"},{"key":"ref47","doi-asserted-by":"publisher","DOI":"10.1109\/icassp.2002.5744965"},{"key":"ref48","doi-asserted-by":"publisher","DOI":"10.1109\/icslp.1996.607843"},{"key":"ref49","volume-title":"Arduino Uno Rev3","year":"2021"},{"key":"ref50","volume-title":"32-bit PSoCTM 5 LP Arm\u00ae Cortex\u00ae-M3\u2014Infineon Technologies","year":"2024"},{"key":"ref51","volume-title":"Zigbee","year":"2019"},{"key":"ref52","volume-title":"ESP32 overview\u2014Espressif systems","year":"2023"},{"key":"ref53","volume-title":"What are the most popular computer monitor cable types?","author":"Knerl","year":"2024"},{"key":"ref54","volume-title":"Digital Signal Processing: Principles, Algorithms, and Applications","author":"Proakis","year":"2007"},{"key":"ref55","article-title":"Very deep convolutional networks for large-scale image recognition","volume-title":"arXiv:1409.1556","author":"Simonyan","year":"2014"},{"key":"ref56","doi-asserted-by":"publisher","DOI":"10.1145\/3065386"},{"key":"ref57","doi-asserted-by":"publisher","DOI":"10.1109\/cvpr.2015.7298594"},{"key":"ref58","doi-asserted-by":"publisher","DOI":"10.1109\/cvpr.2016.90"},{"key":"ref59","volume-title":"Transfer learning","year":"2022"},{"key":"ref60","doi-asserted-by":"publisher","DOI":"10.4018\/978-1-60566-766-9.ch011"},{"key":"ref61","volume-title":"Intuition behind residual neural networks","author":"Rajagopal","year":"2020"},{"key":"ref62","doi-asserted-by":"publisher","DOI":"10.1093\/bioinformatics\/btl355"},{"key":"ref63","volume-title":"scipy.signal.find_peaks_cwt SciPy v1.7.1 Manual","year":"2024"},{"key":"ref64","doi-asserted-by":"publisher","DOI":"10.1109\/temc.2012.2203602"},{"key":"ref65","doi-asserted-by":"publisher","DOI":"10.1145\/3522783.3529531"},{"key":"ref66","doi-asserted-by":"publisher","DOI":"10.1109\/isemc.2010.5711257"},{"key":"ref67","doi-asserted-by":"publisher","DOI":"10.1109\/tsmc.2018.2810305"},{"key":"ref68","doi-asserted-by":"publisher","DOI":"10.1145\/3569505"},{"key":"ref69","doi-asserted-by":"publisher","DOI":"10.1117\/12.2500234"},{"key":"ref70","doi-asserted-by":"publisher","DOI":"10.2528\/pierm12122406"},{"key":"ref71","doi-asserted-by":"publisher","DOI":"10.1117\/12.883223"},{"key":"ref72","doi-asserted-by":"publisher","DOI":"10.1109\/temc.2017.2773706"},{"key":"ref73","doi-asserted-by":"publisher","DOI":"10.1109\/wts.2013.6566247"},{"key":"ref74","doi-asserted-by":"publisher","DOI":"10.1109\/isemc.2005.1513508"}],"container-title":["IEEE Internet of Things Journal"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/6488907\/11121332\/11029453.pdf?arnumber=11029453","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,8,11]],"date-time":"2025-08-11T17:44:50Z","timestamp":1754934290000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/11029453\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,8,15]]},"references-count":74,"journal-issue":{"issue":"16"},"URL":"https:\/\/doi.org\/10.1109\/jiot.2025.3578511","relation":{},"ISSN":["2327-4662","2372-2541"],"issn-type":[{"value":"2327-4662","type":"electronic"},{"value":"2372-2541","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025,8,15]]}}}