{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,17]],"date-time":"2026-03-17T20:48:06Z","timestamp":1773780486764,"version":"3.50.1"},"reference-count":41,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"1","license":[{"start":{"date-parts":[[2026,1,1]],"date-time":"2026-01-01T00:00:00Z","timestamp":1767225600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2026,1,1]],"date-time":"2026-01-01T00:00:00Z","timestamp":1767225600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2026,1,1]],"date-time":"2026-01-01T00:00:00Z","timestamp":1767225600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"name":"Korea Government"},{"name":"university research fund support project"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans. Dependable and Secure Comput."],"published-print":{"date-parts":[[2026,1]]},"DOI":"10.1109\/tdsc.2025.3614253","type":"journal-article","created":{"date-parts":[[2025,9,24]],"date-time":"2025-09-24T17:36:05Z","timestamp":1758735365000},"page":"1148-1159","source":"Crossref","is-referenced-by-count":1,"title":["Charging Into Your Privacy: Indirect Privacy Leakage Attack Using a Laptop Charger"],"prefix":"10.1109","volume":"23","author":[{"ORCID":"https:\/\/orcid.org\/0009-0004-6700-5815","authenticated-orcid":false,"given":"Nahyun","family":"Kim","sequence":"first","affiliation":[{"name":"Seoul Women&#x2019;s University, Seoul, South Korea"}]},{"ORCID":"https:\/\/orcid.org\/0009-0002-8374-1279","authenticated-orcid":false,"given":"Hanseul","family":"Jung","sequence":"additional","affiliation":[{"name":"Seoul Women&#x2019;s University, Seoul, South Korea"}]},{"ORCID":"https:\/\/orcid.org\/0009-0001-4388-3769","authenticated-orcid":false,"given":"Minyoung","family":"Choi","sequence":"additional","affiliation":[{"name":"Seoul Women&#x2019;s University, Seoul, South Korea"}]},{"ORCID":"https:\/\/orcid.org\/0009-0003-7185-6121","authenticated-orcid":false,"given":"Jeongmin","family":"Bak","sequence":"additional","affiliation":[{"name":"Seoul Women&#x2019;s University, Seoul, South Korea"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-5216-0266","authenticated-orcid":false,"given":"Sun Woo","family":"Lee","sequence":"additional","affiliation":[{"name":"Seoul Women&#x2019;s University, Seoul, South Korea"}]}],"member":"263","reference":[{"key":"ref1","article-title":"American idle: Workers spend too much time waiting for something to do","year":"2018"},{"key":"ref2","article-title":"Case study: Top laptop-friendly coffee shops in nyc that have cracked the profit code","year":"2024"},{"key":"ref3","article-title":"Desktop operating system market share worldwide","year":"2024"},{"key":"ref4","article-title":"Favorite pc\/laptop activities in the u.s. as of December 2023","year":"2024"},{"key":"ref5","article-title":"Global top 10","year":"2024"},{"key":"ref6","article-title":"Most viewed","year":"2024"},{"key":"ref7","article-title":"Public wi-fi statistics: How do we use it and is it safe?","year":"2024"},{"key":"ref8","article-title":"The real risks of public Wi-Fi: Key statistics and usage data","year":"2024"},{"key":"ref9","article-title":"Research on unsecured Wi-Fi networks across the world","year":"2024"},{"key":"ref10","article-title":"Sensor logger (app store)","year":"2024"},{"key":"ref11","article-title":"Sensor logger (Google play)","year":"2024"},{"key":"ref12","article-title":"Should coffee shops ban laptops?","year":"2024"},{"key":"ref13","article-title":"Top 10 on Disney in the world on august 25, 2024","year":"2024"},{"key":"ref14","article-title":"Top 100 most visited websites in the world","year":"2024"},{"key":"ref15","article-title":"Top websites ranking","year":"2024"},{"key":"ref16","article-title":"What is fast charging: Principles and standards explained","year":"2024"},{"key":"ref17","article-title":"Why lithium-ion?","year":"2024"},{"key":"ref18","article-title":"The world\u2019s most popular network protocol analyzer","year":"2024"},{"key":"ref19","first-page":"585","article-title":"One&Done: A single-decryption EM-based attack on OpenSSL\u2019s constant-time blinded RSA","volume-title":"Proc. 27th USENIX Secur. Symp.","author":"Alam"},{"key":"ref20","first-page":"515","article-title":"CSINN: Reverse engineering of neural network architectures through electromagnetic side channel","volume-title":"Proc. 28th USENIX Secur. Symp.","author":"Batina"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-29485-8_14"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-47854-7_30"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.29172\/7c2a6982-6d72-4cd8-bba6-2fccb06a7011"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1145\/3321705.3329817"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-40203-6_39"},{"key":"ref26","first-page":"681","article-title":"$\\lbrace${Charger-Surfing $\\rbrace$}: Exploiting a power line $\\lbrace${ Side-Channel$\\rbrace$} for smartphone information leakage","volume-title":"Proc. 30th USENIX Secur. Symp.","author":"Cronin","year":"2021"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1145\/2976749.2978353"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1017\/9781009397735"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1145\/3133956.3134081"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1145\/3460120.3484733"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2022.3173063"},{"key":"ref32","first-page":"507","article-title":"Nonce@Once: A single-trace EM side channel attack on several constant-time elliptic curve implementations in mobile platforms","volume-title":"Proc. IEEE Eur. Symp. Secur. Privacy","author":"Monjur"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1145\/3079856.3080223"},{"key":"ref34","article-title":"Penetration vision through virtual reality headsets: Identifying 360-degree videos from head movements","author":"Nguyen","year":"2024"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1145\/3570361.3613293"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1145\/3570361.3613288"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1109\/SP46215.2023.10179322"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.17849\/insm-47-01-31-39.1"},{"key":"ref39","first-page":"1357","article-title":"Beauty and the burst: Remote identification of encrypted video streams","volume-title":"Proc. 26th USENIX Secur. Symp.","author":"Schuster"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1145\/3485832.3485839"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2016.2639446"}],"container-title":["IEEE Transactions on Dependable and Secure Computing"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/8858\/11354469\/11178204.pdf?arnumber=11178204","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,1,20]],"date-time":"2026-01-20T23:23:24Z","timestamp":1768951404000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/11178204\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2026,1]]},"references-count":41,"journal-issue":{"issue":"1"},"URL":"https:\/\/doi.org\/10.1109\/tdsc.2025.3614253","relation":{},"ISSN":["1545-5971","1941-0018","2160-9209"],"issn-type":[{"value":"1545-5971","type":"print"},{"value":"1941-0018","type":"electronic"},{"value":"2160-9209","type":"electronic"}],"subject":[],"published":{"date-parts":[[2026,1]]}}}