{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,1]],"date-time":"2026-01-01T09:49:34Z","timestamp":1767260974135,"version":"3.28.0"},"reference-count":20,"publisher":"IEEE","license":[{"start":{"date-parts":[[2023,10,30]],"date-time":"2023-10-30T00:00:00Z","timestamp":1698624000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2023,10,30]],"date-time":"2023-10-30T00:00:00Z","timestamp":1698624000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2023,10,30]]},"DOI":"10.1109\/milcom58377.2023.10356226","type":"proceedings-article","created":{"date-parts":[[2023,12,25]],"date-time":"2023-12-25T19:37:01Z","timestamp":1703533021000},"page":"716-721","source":"Crossref","is-referenced-by-count":1,"title":["Do Programs Dream of Electromagnetic Signals? Towards GAN-based Code-to-Signal Synthesis"],"prefix":"10.1109","author":[{"given":"Kurt A.","family":"Vedros","sequence":"first","affiliation":[{"name":"University of Idaho,Computer Science Department,Idaho Falls,Idaho"}]},{"given":"Constantinos","family":"Kolias","sequence":"additional","affiliation":[{"name":"University of Idaho,Computer Science Department,Idaho Falls,Idaho"}]},{"given":"Robert C.","family":"Ivans","sequence":"additional","affiliation":[{"name":"Idaho National Labs,Idaho Falls,Idaho"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/ICCAD.2017.8203769"},{"article-title":"The em side-channel(s):attacks and assessment methodologies","year":"2008","author":"Agrawal","key":"ref2"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1145\/2976749.2978299"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/HST.2019.8740838"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1117\/12.2304382"},{"issue":"1","key":"ref6","first-page":"519","article-title":"Malware detection in critical infrastructures using the electromagnetic emissions of plcs","volume":"121","author":"Kolias","year":"2019","journal-title":"Transactions"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/SPW50608.2020.00040"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1145\/3422308"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/HST.2018.8383884"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/TAP.2020.3037659"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/RWS52686.2021.9611805"},{"key":"ref12","article-title":"Detecting code injections in noisy environments through em signal analysis and svd denoising","volume-title":"Master\u2019s thesis","author":"Miller","year":"2022"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.5121\/csit.2023.130507"},{"article-title":"Diffgan-tts: High-fidelity and efficient text-to-speech with denoising diffusion gans","year":"2022","author":"Liu","key":"ref14"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-01270-0_13"},{"key":"ref16","first-page":"1060","article-title":"Generative adversarial text to image synthesis","volume-title":"ICML","volume":"48","author":"Reed"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1145\/1150402.1150413"},{"author":"Kolias","key":"ref18","article-title":"Online resouces of this manuscript"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1155\/2008\/583162"},{"issue":"1-23","key":"ref20","first-page":"40","volume-title":"Dynamic time warping algorithm review","volume":"855","author":"Senin","year":"2008"}],"event":{"name":"MILCOM 2023 - 2023 IEEE Military Communications Conference (MILCOM)","start":{"date-parts":[[2023,10,30]]},"location":"Boston, MA, USA","end":{"date-parts":[[2023,11,3]]}},"container-title":["MILCOM 2023 - 2023 IEEE Military Communications Conference (MILCOM)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/10356123\/10356124\/10356226.pdf?arnumber=10356226","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,1,12]],"date-time":"2024-01-12T20:31:40Z","timestamp":1705091500000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10356226\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,10,30]]},"references-count":20,"URL":"https:\/\/doi.org\/10.1109\/milcom58377.2023.10356226","relation":{},"subject":[],"published":{"date-parts":[[2023,10,30]]}}}