{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,4]],"date-time":"2025-12-04T10:06:27Z","timestamp":1764842787175,"version":"3.37.3"},"reference-count":37,"publisher":"IEEE","license":[{"start":{"date-parts":[[2023,9,11]],"date-time":"2023-09-11T00:00:00Z","timestamp":1694390400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2023,9,11]],"date-time":"2023-09-11T00:00:00Z","timestamp":1694390400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/501100012247","name":"Program of Shanghai Academic Research Leader","doi-asserted-by":"publisher","id":[{"id":"10.13039\/501100012247","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2023,9,11]]},"DOI":"10.1109\/secon58729.2023.10287495","type":"proceedings-article","created":{"date-parts":[[2023,10,23]],"date-time":"2023-10-23T17:57:08Z","timestamp":1698083828000},"page":"186-194","source":"Crossref","is-referenced-by-count":5,"title":["LeakThief: Stealing the Behavior Information of Laptop via Leakage Current"],"prefix":"10.1109","author":[{"given":"Dian","family":"Ding","sequence":"first","affiliation":[{"name":"Shanghai Jiao Tong University,Department of Computer Science and Engineering,China"}]},{"given":"Yi-Chao","family":"Chen","sequence":"additional","affiliation":[{"name":"Shanghai Jiao Tong University,Department of Computer Science and Engineering,China"}]},{"given":"Xiaoyu","family":"Ji","sequence":"additional","affiliation":[{"name":"Zhejiang University,Department of Electronic Information and Electrical Engineering,China"}]},{"given":"Guangtao","family":"Xue","sequence":"additional","affiliation":[{"name":"Shanghai Jiao Tong University,Department of Computer Science and Engineering,China"}]}],"member":"263","reference":[{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1145\/3340555.3353740"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1145\/3410530.3414385"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOMW.2018.8406879"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1145\/3126594.3126623"},{"year":"2021","key":"ref15"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1145\/2971763.2971765"},{"key":"ref14","first-page":"209","article-title":"Sia: Smartwatch-enabled inference attacks on physical keyboards using acoustic signals","author":"meteriz-y?ld?ran","year":"2021","journal-title":"ser WPES &#x2019;21"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1145\/2984511.2984582"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2016.90"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2017.113"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1145\/3321705.3329817"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1145\/2807442.2807458"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/SECON52354.2021.9491601"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOMW.2017.8116486"},{"key":"ref2","article-title":"Lamphone: Passive sound recovery from a desk lamp&#x2019;s light bulb vibrations","author":"nassi","year":"2022","journal-title":"USENIX Security 22"},{"journal-title":"Forecast number of mobile devices worldwide from 2020 to 2025","year":"2023","key":"ref1"},{"key":"ref17","article-title":"Estimation of optimum value of y-capacitor for reducing emi in switch mode power supplies","author":"jha","year":"2009","journal-title":"Electrical Power Quality and Utilisation Journal"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM41043.2020.9155534"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/PSES.2011.6088240"},{"key":"ref18","article-title":"Leakage or identification: Behavior-irrelevant user identification leveraging leakage current on laptops","volume":"5","author":"ding","year":"2022","journal-title":"PACM IMWUT"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/SECON52354.2021.9491615"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1145\/3458709.3458945"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-44709-3_14"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1145\/2046707.2046770"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1145\/3300061.3300118"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1145\/3356250.3360040"},{"year":"2021","key":"ref21"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1145\/3130984"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/94.326654"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1145\/3117811.3117824"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1145\/2742647.2742673"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1145\/2789168.2790109"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1145\/2789168.2790093"},{"key":"ref4","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1109\/TMC.2022.3208153","article-title":"Handwriting recognition system leveraging vibration signal on smartphones","author":"ding","year":"2022","journal-title":"IEEE Transactions on Mobile Computing"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1145\/3448300.3468499"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1145\/3397334"},{"key":"ref5","first-page":"1239","author":"bai","year":"2021","journal-title":"I Know Your Keyboard Input A Robust Keystroke Eavesdropper Based-on Acoustic Signals"}],"event":{"name":"2023 20th Annual IEEE International Conference on Sensing, Communication, and Networking (SECON)","start":{"date-parts":[[2023,9,11]]},"location":"Madrid, Spain","end":{"date-parts":[[2023,9,14]]}},"container-title":["2023 20th Annual IEEE International Conference on Sensing, Communication, and Networking (SECON)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/10287388\/10287413\/10287495.pdf?arnumber=10287495","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,12,24]],"date-time":"2023-12-24T16:16:37Z","timestamp":1703434597000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10287495\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,9,11]]},"references-count":37,"URL":"https:\/\/doi.org\/10.1109\/secon58729.2023.10287495","relation":{},"subject":[],"published":{"date-parts":[[2023,9,11]]}}}