{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,25]],"date-time":"2026-01-25T00:16:41Z","timestamp":1769300201821,"version":"3.49.0"},"reference-count":31,"publisher":"IEEE","license":[{"start":{"date-parts":[[2024,10,2]],"date-time":"2024-10-02T00:00:00Z","timestamp":1727827200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2024,10,2]],"date-time":"2024-10-02T00:00:00Z","timestamp":1727827200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2024,10,2]]},"DOI":"10.1109\/mmsp61759.2024.10743575","type":"proceedings-article","created":{"date-parts":[[2024,11,12]],"date-time":"2024-11-12T18:35:35Z","timestamp":1731436535000},"page":"1-6","source":"Crossref","is-referenced-by-count":1,"title":["An Exploration of Human Pose Estimation Based Cheating Tools for FPS Video Game and its Defense Solution"],"prefix":"10.1109","author":[{"given":"Chang","family":"Liu","sequence":"first","affiliation":[{"name":"Miami University,Department of Computer Science &#x0026; Software Engineering,Oxford,USA"}]},{"given":"Zichun","family":"Gao","sequence":"additional","affiliation":[{"name":"Miami University,Department of Computer Science &#x0026; Software Engineering,Oxford,USA"}]},{"given":"Zhenyu","family":"Liao","sequence":"additional","affiliation":[{"name":"Miami University,Department of Computer Science &#x0026; Software Engineering,Oxford,USA"}]},{"given":"Yue","family":"Sun","sequence":"additional","affiliation":[{"name":"Miami University,Department of Computer Science &#x0026; Software Engineering,Oxford,USA"}]},{"given":"Xianglong","family":"Feng","sequence":"additional","affiliation":[{"name":"Miami University,Department of Computer Science &#x0026; Software Engineering,Oxford,USA"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/IROS.2006.282245"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/CVPRW.2018.00062"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/TIE.2020.2982096"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2016.91"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-46448-0_2"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.18280\/ts.390111"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2014.214"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1016\/j.ergon.2021.103164"},{"key":"ref9","article-title":"Image denoising and inpainting with deep neural networks","volume":"25","author":"Xie","year":"2012","journal-title":"Advances in neural information processing systems"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/TPAMI.2018.2873610"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/TGRS.2019.2926772"},{"key":"ref12","volume-title":"Google, Next-Generation Pose Detection with MoveNet and TensorFlow.js"},{"key":"ref13","article-title":"Faster r-cnn: Towards real-time object detection with region proposal networks","volume":"28","author":"Ren","year":"2015","journal-title":"Advances in neural information processing systems"},{"key":"ref14","volume-title":"DeepMind","year":"2022"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1145\/3126686.3126713"},{"key":"ref16","article-title":"Trustworthy and portable emulation platform for digital preservation","author":"Tarkhani","year":"2017","journal-title":"iPRES"},{"issue":"7","key":"ref17","first-page":"9","article-title":"Data encryption and decryption using rsa algorithm in a network environment","volume":"13","author":"Goshwe","year":"2013","journal-title":"International Journal of Computer Science and Network Security (IJCSNS)"},{"key":"ref18","volume-title":"AI Learns To Play CS:GO By Watching Humans Play!","year":"2022"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2016.282"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-55187-2_3"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2017.49"},{"key":"ref22","author":"Huang","year":"2017","journal-title":"Adversarial attacks on neural network policies"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1145\/3394171.3413639"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1145\/3287624.3288752"},{"key":"ref25","first-page":"1","article-title":"Masker: Adaptive mobile security enhancement against automatic speech recognition in eavesdropping","volume-title":"Proceedings of the 56th Annual Design Automation Conference 2019","author":"Yu","year":"2019"},{"key":"ref26","volume-title":"TensorFlow Hub","volume":"22"},{"key":"ref27","volume-title":"COCO dataset","volume":"22"},{"key":"ref28","volume-title":"Counter-Strike: Global Offensive","year":"2022"},{"key":"ref29","volume-title":"Tom Clancy\u2019s Rainbow Six Siege","year":"2022"},{"key":"ref30","volume-title":"PUBG","year":"2022"},{"key":"ref31","volume-title":"Home Page CrossFire","year":"2022"}],"event":{"name":"2024 IEEE 26th International Workshop on Multimedia Signal Processing (MMSP)","location":"West Lafayette, IN, USA","start":{"date-parts":[[2024,10,2]]},"end":{"date-parts":[[2024,10,4]]}},"container-title":["2024 IEEE 26th International Workshop on Multimedia Signal Processing (MMSP)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/10743173\/10743194\/10743575.pdf?arnumber=10743575","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,11,27]],"date-time":"2024-11-27T16:34:00Z","timestamp":1732725240000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10743575\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,10,2]]},"references-count":31,"URL":"https:\/\/doi.org\/10.1109\/mmsp61759.2024.10743575","relation":{},"subject":[],"published":{"date-parts":[[2024,10,2]]}}}