{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,14]],"date-time":"2026-03-14T17:55:15Z","timestamp":1773510915355,"version":"3.50.1"},"reference-count":52,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","license":[{"start":{"date-parts":[[2024,1,1]],"date-time":"2024-01-01T00:00:00Z","timestamp":1704067200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2024,1,1]],"date-time":"2024-01-01T00:00:00Z","timestamp":1704067200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2024,1,1]],"date-time":"2024-01-01T00:00:00Z","timestamp":1704067200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["62132013"],"award-info":[{"award-number":["62132013"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["62325207"],"award-info":[{"award-number":["62325207"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["62302298"],"award-info":[{"award-number":["62302298"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"Young Elite Scientists Sponsorship Program by China Association for Science and Technology","doi-asserted-by":"publisher","award":["YESS20230589"],"award-info":[{"award-number":["YESS20230589"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Startup Fund for Young Faculty at Shanghai Jiao Tong University","award":["23X010502192"],"award-info":[{"award-number":["23X010502192"]}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans.Inform.Forensic Secur."],"published-print":{"date-parts":[[2024]]},"DOI":"10.1109\/tifs.2024.3465026","type":"journal-article","created":{"date-parts":[[2024,9,20]],"date-time":"2024-09-20T17:23:49Z","timestamp":1726853029000},"page":"8892-8907","source":"Crossref","is-referenced-by-count":11,"title":["Dangers Behind Charging VR Devices: Hidden Side Channel Attacks via Charging Cables"],"prefix":"10.1109","volume":"19","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-4032-4459","authenticated-orcid":false,"given":"Jiachun","family":"Li","sequence":"first","affiliation":[{"name":"Department of Computer Science and Engineering, Shanghai Jiao Tong University, Shanghai, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-5445-0347","authenticated-orcid":false,"given":"Yan","family":"Meng","sequence":"additional","affiliation":[{"name":"Department of Computer Science and Engineering, Shanghai Jiao Tong University, Shanghai, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-3981-6034","authenticated-orcid":false,"given":"Yuxia","family":"Zhan","sequence":"additional","affiliation":[{"name":"Department of Computer Science and Engineering, Shanghai Jiao Tong University, Shanghai, China"}]},{"given":"Le","family":"Zhang","sequence":"additional","affiliation":[{"name":"Department of Computer Science and Engineering, Shanghai Jiao Tong University, Shanghai, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-5079-4556","authenticated-orcid":false,"given":"Haojin","family":"Zhu","sequence":"additional","affiliation":[{"name":"Department of Computer Science and Engineering, Shanghai Jiao Tong University, Shanghai, China"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/ISI49825.2020.9280516"},{"key":"ref2","volume-title":"Apple, Apple Vision Pro","year":"2024"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/VR50410.2021.00081"},{"key":"ref4","volume-title":"VR Therapy","author":"Beyond","year":"2020"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/JPROC.2016.2637878"},{"key":"ref6","volume-title":"Lightweight Library for Audio Feature Extraction","author":"Bullock","year":"2012"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2019.2907942"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1145\/3319535.3339810"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1002\/jcp.25117"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/JSEN.2021.3119766"},{"key":"ref11","first-page":"681","article-title":"Charger-surfing: Exploiting a power line side-channel for smartphone information leakage","volume-title":"Proc. 30th USENIX Security Symp.","author":"Cronin"},{"key":"ref12","volume-title":"Charging Lithium-ion Batteries: Not All Charging Systems Are Created Equal","author":"Dearborn","year":"2019"},{"key":"ref13","volume-title":"Charging Cable for VR Headset Gaming PC","year":"2024"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1145\/3460120.3485345"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/TMC.2018.2831709"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1145\/2976749.2978353"},{"key":"ref17","first-page":"521","article-title":"Parallel support vector machines: The cascade SVM","volume-title":"Proc. 17th Int. Conf. Neural Inf. Process. Syst.","author":"Graf"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.2986580"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1145\/2639108.2639130"},{"issue":"2","key":"ref20","first-page":"85","article-title":"A systematic review of virtual reality in education","volume":"10","author":"Kavanagh","year":"2017","journal-title":"Themes Sci. Technol. Educ."},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2023.23251"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1145\/3460120.3484733"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1145\/3491102.3517451"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1007\/s12652-011-0052-4"},{"key":"ref25","volume-title":"Pico 4 Pro","year":"2023"},{"key":"ref26","volume-title":"Apple Vision Pro Cable Requirements: What We Might Expect","year":"2023"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM53939.2023.10229062"},{"key":"ref28","volume-title":"Can I Use the Meta Quest 2 While Charging?","year":"2022"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1109\/VRW55335.2022.00193"},{"key":"ref30","volume-title":"A Guide To Understanding Battery Specifications","year":"2008"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2017.08.002"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1109\/TrustCom\/BigDataSE.2018.00145"},{"key":"ref33","volume-title":"Phone Charging?","year":"2020"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1145\/3447993.3483272"},{"key":"ref35","first-page":"159","article-title":"Going through the motions: AR\/VR keylogging from user head motions","volume-title":"Proc. 32nd USENIX Secur. Symp.","author":"Slocum"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2012.2199959"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1145\/2851581.2892449"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1109\/ICASSP.2019.8683861"},{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1109\/TBME.2021.3080123"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2022.24254"},{"key":"ref41","volume-title":"Htc Vive","year":"2022"},{"key":"ref42","volume-title":"Meta Quest Pro","year":"2022"},{"key":"ref43","volume-title":"Hall Effect","year":"2023"},{"key":"ref44","volume-title":"Biot-Savart Law","year":"2024"},{"key":"ref45","volume-title":"Short-Time Fourier Transform","year":"2024"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.1145\/3485832.3485839"},{"key":"ref47","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2015.02.024"},{"key":"ref48","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2018.05.018"},{"key":"ref49","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2016.2639446"},{"key":"ref50","doi-asserted-by":"publisher","DOI":"10.1145\/3339825.3391867"},{"key":"ref51","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-30115-8_46"},{"key":"ref52","first-page":"3979","article-title":"Its all in your head(set): Side-channel attacks on AR\/VR systems","volume-title":"Proc. 32nd USENIX Secur. Symp.","author":"Zhang"}],"container-title":["IEEE Transactions on Information Forensics and Security"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/10206\/10319981\/10684784.pdf?arnumber=10684784","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,10,3]],"date-time":"2024-10-03T05:29:02Z","timestamp":1727933342000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10684784\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024]]},"references-count":52,"URL":"https:\/\/doi.org\/10.1109\/tifs.2024.3465026","relation":{},"ISSN":["1556-6013","1556-6021"],"issn-type":[{"value":"1556-6013","type":"print"},{"value":"1556-6021","type":"electronic"}],"subject":[],"published":{"date-parts":[[2024]]}}}