{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,21]],"date-time":"2025-02-21T09:59:12Z","timestamp":1740131952168,"version":"3.37.3"},"reference-count":41,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"9","license":[{"start":{"date-parts":[[2021,9,1]],"date-time":"2021-09-01T00:00:00Z","timestamp":1630454400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["U1836209","61802413"],"award-info":[{"award-number":["U1836209","61802413"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100012226","name":"Fundamental Research Funds for the Central Universities","doi-asserted-by":"publisher","id":[{"id":"10.13039\/501100012226","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Research Funds of Renmin University of China","award":["19XNLG02"],"award-info":[{"award-number":["19XNLG02"]}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans. Comput."],"published-print":{"date-parts":[[2021,9,1]]},"DOI":"10.1109\/tc.2020.3009374","type":"journal-article","created":{"date-parts":[[2020,7,15]],"date-time":"2020-07-15T21:08:36Z","timestamp":1594847316000},"page":"1374-1387","source":"Crossref","is-referenced-by-count":0,"title":["Detecting the Capacitance-Based Gamepad for Protecting Mobile Game Fairness"],"prefix":"10.1109","volume":"70","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-8627-9027","authenticated-orcid":false,"given":"Shilei","family":"Bai","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-4818-7164","authenticated-orcid":false,"given":"Bin","family":"Liang","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-4403-0060","authenticated-orcid":false,"given":"Jianjun","family":"Huang","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-1009-6627","authenticated-orcid":false,"given":"Wei","family":"You","sequence":"additional","affiliation":[]},{"given":"Jiachun","family":"Li","sequence":"additional","affiliation":[]},{"given":"Yaping","family":"Li","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-5160-1223","authenticated-orcid":false,"given":"Wenchang","family":"Shi","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref39","first-page":"50","article-title":"Resilient decentralized android application repackaging detection using logic bombs","author":"zeng","year":"2018","journal-title":"Proc Int Symp Code Generation Optim"},{"doi-asserted-by":"publisher","key":"ref38","DOI":"10.1109\/ICSME.2018.00041"},{"doi-asserted-by":"publisher","key":"ref33","DOI":"10.1145\/1501750.1501770"},{"doi-asserted-by":"publisher","key":"ref32","DOI":"10.1145\/1653662.1653694"},{"doi-asserted-by":"publisher","key":"ref31","DOI":"10.1145\/1326257.1326258"},{"year":"0","article-title":"Playerunknown&#x2019;s battlegrounds","key":"ref30"},{"key":"ref37","first-page":"317","article-title":"Detecting repackaged smartphone applications in third-party android marketplaces","author":"wu","year":"2012","journal-title":"Proc ACM Conf Data Appl Secur Privacy"},{"year":"2018","author":"wijman","article-title":"Mobile revenues account for more than 50% of the global games market as it reaches $137.9 billion in 2018","key":"ref36"},{"doi-asserted-by":"publisher","key":"ref35","DOI":"10.1145\/2590296.2590325"},{"doi-asserted-by":"publisher","key":"ref34","DOI":"10.1145\/2590296.2590325"},{"year":"0","article-title":"Priciple of mutual capacitive touch screen","key":"ref10"},{"doi-asserted-by":"publisher","key":"ref40","DOI":"10.1145\/2627393.2627395"},{"year":"0","article-title":"The state of mobile games","key":"ref11"},{"year":"0","key":"ref12"},{"doi-asserted-by":"publisher","key":"ref13","DOI":"10.1145\/235815.235821"},{"doi-asserted-by":"publisher","key":"ref14","DOI":"10.1007\/978-3-319-40667-1_11"},{"doi-asserted-by":"publisher","key":"ref15","DOI":"10.1109\/ROBOT.1997.606761"},{"doi-asserted-by":"publisher","key":"ref16","DOI":"10.1002\/j.1538-7305.1948.tb01338.x"},{"key":"ref17","first-page":"94","article-title":"Game bot detection based on avatar trajectory","author":"chen","year":"2011","journal-title":"Proc Int Conf Entertainment Comput"},{"doi-asserted-by":"publisher","key":"ref18","DOI":"10.1145\/1517494.1517498"},{"key":"ref19","first-page":"177","article-title":"Towards an understanding of anti-virtualization and anti-debugging behavior in modern malware","author":"chen","year":"2015","journal-title":"Proc IEEE\/IFIP Int Conf Dependable Syst Netw"},{"doi-asserted-by":"publisher","key":"ref28","DOI":"10.1109\/ICPC.2017.16"},{"year":"0","article-title":"Why is a gamepad worthwhile for games?","key":"ref4"},{"year":"0","author":"luo","article-title":"Anti-plugin: Don&#x2019;t let your app play as an android plugin","key":"ref27"},{"year":"0","article-title":"Flydigi Wasp2 gamepad","key":"ref3"},{"year":"0","article-title":"Ride out heroes","key":"ref6"},{"year":"0","author":"platt","article-title":"Sequential minimal optimization: A fast algorithm for training support vector machines","key":"ref29"},{"year":"0","article-title":"Game for peace","key":"ref5"},{"year":"0","article-title":"Struggle of snake","key":"ref8"},{"year":"0","article-title":"Strike of kings","key":"ref7"},{"year":"0","article-title":"Flydigi FC gamepad","key":"ref2"},{"year":"0","article-title":"Checking device compatibility with safetynet","key":"ref9"},{"year":"0","article-title":"Banned for using a controller","key":"ref1"},{"doi-asserted-by":"publisher","key":"ref20","DOI":"10.1016\/S0167-8655(00)00102-1"},{"doi-asserted-by":"publisher","key":"ref22","DOI":"10.1145\/3106237.3106305"},{"doi-asserted-by":"publisher","key":"ref21","DOI":"10.1017\/CBO9780511801389"},{"doi-asserted-by":"publisher","key":"ref24","DOI":"10.1016\/j.future.2016.05.021"},{"doi-asserted-by":"publisher","key":"ref41","DOI":"10.1007\/978-3-662-43936-4_9"},{"doi-asserted-by":"publisher","key":"ref23","DOI":"10.1007\/978-3-319-30806-7_6"},{"year":"2015","author":"liu","article-title":"Method and system for detecting android cheating plug-in feature","key":"ref26"},{"doi-asserted-by":"publisher","key":"ref25","DOI":"10.1145\/2664243.2664250"}],"container-title":["IEEE Transactions on Computers"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/12\/9508207\/09141389.pdf?arnumber=9141389","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,1,12]],"date-time":"2022-01-12T16:05:01Z","timestamp":1642003501000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9141389\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,9,1]]},"references-count":41,"journal-issue":{"issue":"9"},"URL":"https:\/\/doi.org\/10.1109\/tc.2020.3009374","relation":{},"ISSN":["0018-9340","1557-9956","2326-3814"],"issn-type":[{"type":"print","value":"0018-9340"},{"type":"electronic","value":"1557-9956"},{"type":"electronic","value":"2326-3814"}],"subject":[],"published":{"date-parts":[[2021,9,1]]}}}