{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,10]],"date-time":"2026-02-10T16:38:10Z","timestamp":1770741490428,"version":"3.49.0"},"reference-count":60,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"11","license":[{"start":{"date-parts":[[2024,11,1]],"date-time":"2024-11-01T00:00:00Z","timestamp":1730419200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2024,11,1]],"date-time":"2024-11-01T00:00:00Z","timestamp":1730419200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2024,11,1]],"date-time":"2024-11-01T00:00:00Z","timestamp":1730419200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"name":"Key Program of the National Natural Science Foundation of China","award":["62232007"],"award-info":[{"award-number":["62232007"]}]},{"name":"National Key Research and Development Program of China","award":["2023YFB3001805"],"award-info":[{"award-number":["2023YFB3001805"]}]},{"name":"National Key Research and Development Program of China","award":["2023YFC3321601"],"award-info":[{"award-number":["2023YFC3321601"]}]},{"DOI":"10.13039\/501100005230","name":"Natural Science Foundation of Chongqing Municipality","doi-asserted-by":"publisher","award":["cstc2021jcyj-msxm4115"],"award-info":[{"award-number":["cstc2021jcyj-msxm4115"]}],"id":[{"id":"10.13039\/501100005230","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Special Key Projects for Technological Innovation and Application Development of Chongqing","award":["CSTB2022TIAD-DEX0016"],"award-info":[{"award-number":["CSTB2022TIAD-DEX0016"]}]},{"name":"Key Research and Development Program of Hunan Province","award":["2024AQ2032"],"award-info":[{"award-number":["2024AQ2032"]}]},{"name":"Cultivation Project of Yuelu Mountain Industrial Innovation Center","award":["2023YCII0123"],"award-info":[{"award-number":["2023YCII0123"]}]},{"name":"Natural Science Foundation Project of Chongqing","award":["CSTB2024NSCQ-MSX0920"],"award-info":[{"award-number":["CSTB2024NSCQ-MSX0920"]}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["62372166"],"award-info":[{"award-number":["62372166"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"Hunan Provincial Natural Science Foundation of China","doi-asserted-by":"publisher","award":["2023JJ30164"],"award-info":[{"award-number":["2023JJ30164"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans. Intell. Transport. Syst."],"published-print":{"date-parts":[[2024,11]]},"DOI":"10.1109\/tits.2024.3432977","type":"journal-article","created":{"date-parts":[[2024,8,5]],"date-time":"2024-08-05T18:03:47Z","timestamp":1722881027000},"page":"18978-18991","source":"Crossref","is-referenced-by-count":4,"title":["E-Argus: Drones Detection by Side-Channel Signatures via Electromagnetic Radiation"],"prefix":"10.1109","volume":"25","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-7725-2722","authenticated-orcid":false,"given":"Qibo","family":"Zhang","sequence":"first","affiliation":[{"name":"College of Computer Science and Electronic Engineering, Hunan University, Changsha, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-4262-5223","authenticated-orcid":false,"given":"Fanzi","family":"Zeng","sequence":"additional","affiliation":[{"name":"College of Computer Science and Electronic Engineering, Hunan University, Changsha, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-7560-7913","authenticated-orcid":false,"given":"Jingyang","family":"Hu","sequence":"additional","affiliation":[{"name":"College of Computer Science and Electronic Engineering, Hunan University, Changsha, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-8268-2951","authenticated-orcid":false,"given":"Daibo","family":"Liu","sequence":"additional","affiliation":[{"name":"College of Computer Science and Electronic Engineering, Hunan University, Changsha, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-6821-7041","authenticated-orcid":false,"given":"Ling","family":"Kuang","sequence":"additional","affiliation":[{"name":"College of Computer Science and Electronic Engineering, Hunan University, Changsha, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-5645-160X","authenticated-orcid":false,"given":"Zhu","family":"Xiao","sequence":"additional","affiliation":[{"name":"College of Computer Science and Electronic Engineering, Hunan University, Changsha, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-7372-2539","authenticated-orcid":false,"given":"Hongbo","family":"Jiang","sequence":"additional","affiliation":[{"name":"College of Computer Science and Electronic Engineering, Hunan University, Changsha, China"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1145\/3001836"},{"key":"ref2","volume-title":"Drone Industry Research Report","author":"Sullivan","year":"2021"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1016\/j.iot.2020.100218"},{"key":"ref4","volume-title":"Ukraine Conflict: How Are Drones Being Used?","year":"2022"},{"key":"ref5","volume-title":"Obama London Visit: Drones to be Banned in the Capital","year":"2016"},{"key":"ref6","volume-title":"Drone Maker DJI Bans Washington Flights After White House Crash","year":"2016"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1145\/3448115"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1145\/3081333.3081354"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/ICICCS48265.2020.9121150"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/jiot.2022.3204267"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/jiot.2021.3051293"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/jiot.2022.3176310"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/HST47167.2019.9032916"},{"key":"ref14","volume-title":"C-UAS Key Considerations","year":"2016"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1049\/iet-rsn.2016.0063"},{"key":"ref16","volume-title":"Detection of low observable objects in clutter using non-coherent radars","author":"Abileah","year":"2016"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1145\/2789168.2795177"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/ITNEC.2017.8284767"},{"key":"ref19","first-page":"873","article-title":"EarFisher: Detecting wireless eavesdroppers by stimulating and sensing memory EMR","volume-title":"Proc. 18th USENIX Symp. Netw. Syst. Design Implement.","author":"Shen"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1145\/3478084"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1049\/el.2017.4317"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1145\/2987354.2987356"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1145\/3485730.3485932"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/JSTSP.2009.2038977"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/TAES.2012.6129656"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2022.3227027"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/TMC.2023.3298643"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2019.2940412"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1109\/TAES.2009.5089551"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1145\/3084041.3084067"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1145\/3210240.3210314"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2020.3001566"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1109\/TITS.2021.3105550"},{"key":"ref34","volume-title":"Spy Hidden Camera Detector","year":"2017"},{"key":"ref35","first-page":"1","article-title":"Towards detection and control of civilian unmanned aerial vehicles","volume-title":"Proc. 14th Austral. Inf. Warfare Conf.","author":"Peacock"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1145\/2935620.2935632"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1145\/3498361.3538937"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1109\/CNS53000.2021.9705032"},{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1145\/3372297.3417241"},{"key":"ref40","first-page":"849","article-title":"GSMem: Data exfiltration from air-gapped computers over GSM frequencies","volume-title":"Proc. 24th USENIX Security Symp.","author":"Guri"},{"key":"ref41","first-page":"681","article-title":"Charger-surfing: Exploiting a power line side-channel for smartphone information leakage","volume-title":"Proc. 30th USENIX Security Symp. (USENIX Security)","author":"Cronin"},{"key":"ref42","first-page":"661","article-title":"Hiding in plain sight? On the efficacy of power side channel-based control flow monitoring","volume-title":"Proc. 31th USENIX Security Symp.","author":"Han"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1109\/9780470544426"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1109\/SP40001.2021.00031"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1007\/978-94-017-7144-3"},{"key":"ref46","volume-title":"Time-Frequency Signal Analysis and Processing: A Comprehensive Reference","author":"Boashash","year":"2015"},{"key":"ref47","volume-title":"DDR3 1600 PC3-12800\u2014Memory Best Practices","year":"2016"},{"key":"ref48","doi-asserted-by":"publisher","DOI":"10.2514\/6.2007-6461"},{"key":"ref49","doi-asserted-by":"publisher","DOI":"10.1109\/ROBOT.2009.5152561"},{"key":"ref50","doi-asserted-by":"publisher","DOI":"10.1007\/s10291-010-0171-y"},{"key":"ref51","doi-asserted-by":"publisher","DOI":"10.1016\/j.ymssp.2005.08.004"},{"key":"ref52","article-title":"Vibration analysis of the SA349\/2 helicopter","author":"Heffernan","year":"1991"},{"key":"ref53","doi-asserted-by":"publisher","DOI":"10.1109\/7.249114"},{"key":"ref54","doi-asserted-by":"publisher","DOI":"10.1109\/TAES.2021.3074208"},{"key":"ref55","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-24797-2_4"},{"key":"ref56","doi-asserted-by":"publisher","DOI":"10.48550\/ARXIV.1706.03762"},{"key":"ref57","doi-asserted-by":"publisher","DOI":"10.4324\/9781410605337-29"},{"key":"ref58","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2016.90"},{"key":"ref59","volume-title":"Standards & Documents Search","year":"2020"},{"key":"ref60","first-page":"1","article-title":"Eye of Sauron: Long-range hidden spy camera detection and positioning with inbuilt memory EM radiation","volume-title":"Proc. 33th USENIX Security Symp.","author":"Zhang"}],"container-title":["IEEE Transactions on Intelligent Transportation Systems"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/6979\/10742224\/10623530.pdf?arnumber=10623530","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,11,27]],"date-time":"2024-11-27T00:14:29Z","timestamp":1732666469000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10623530\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,11]]},"references-count":60,"journal-issue":{"issue":"11"},"URL":"https:\/\/doi.org\/10.1109\/tits.2024.3432977","relation":{},"ISSN":["1524-9050","1558-0016"],"issn-type":[{"value":"1524-9050","type":"print"},{"value":"1558-0016","type":"electronic"}],"subject":[],"published":{"date-parts":[[2024,11]]}}}