{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,2]],"date-time":"2026-01-02T07:51:06Z","timestamp":1767340266582,"version":"3.37.3"},"reference-count":55,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"4","license":[{"start":{"date-parts":[[2023,4,1]],"date-time":"2023-04-01T00:00:00Z","timestamp":1680307200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2023,4,1]],"date-time":"2023-04-01T00:00:00Z","timestamp":1680307200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2023,4,1]],"date-time":"2023-04-01T00:00:00Z","timestamp":1680307200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"name":"Romanian National Authority for Scientific Research and Innovation","award":["PN-III-P1-1.1.-TE-2016-1317"],"award-info":[{"award-number":["PN-III-P1-1.1.-TE-2016-1317"]}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans. on Mobile Comput."],"published-print":{"date-parts":[[2023,4,1]]},"DOI":"10.1109\/tmc.2021.3119987","type":"journal-article","created":{"date-parts":[[2021,10,15]],"date-time":"2021-10-15T13:38:55Z","timestamp":1634305135000},"page":"2417-2434","source":"Crossref","is-referenced-by-count":9,"title":["Sweep-to-Unlock: Fingerprinting Smartphones Based on Loudspeaker Roll-Off Characteristics"],"prefix":"10.1109","volume":"22","author":[{"given":"Adriana","family":"Berdich","sequence":"first","affiliation":[{"name":"Faculty of Automatics and Computers, Politehnica University of Timisoara, Timi&#x015F;oara, Romania"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-3078-3635","authenticated-orcid":false,"given":"Bogdan","family":"Groza","sequence":"additional","affiliation":[{"name":"Faculty of Automatics and Computers, Politehnica University of Timisoara, Timi&#x015F;oara, Romania"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-1566-4646","authenticated-orcid":false,"given":"Ren\u00e9","family":"Mayrhofer","sequence":"additional","affiliation":[{"name":"Institute of Networks and Security and LIT Secure and Correct Systems Lab, Johannes Kepler University Linz, Linz, Austria"}]},{"given":"Efrat","family":"Levy","sequence":"additional","affiliation":[{"name":"Faculty of Information Systems Engineering, Ben-Gurion University of the Negev, Beersheba, Israel"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-0630-4059","authenticated-orcid":false,"given":"Asaf","family":"Shabtai","sequence":"additional","affiliation":[{"name":"Faculty of Information Systems Engineering, Ben-Gurion University of the Negev, Beersheba, Israel"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-9641-128X","authenticated-orcid":false,"given":"Yuval","family":"Elovici","sequence":"additional","affiliation":[{"name":"Faculty of Information Systems Engineering, Ben-Gurion University of the Negev, Beersheba, Israel"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1145\/2435349.2435382"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-30921-2_13"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-66399-9_26"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.3003574"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/VETECS.2009.5073800"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/NCA.2015.25"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.32604\/jnm.2020.014309"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1145\/3458864.3467883"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1145\/2660267.2660300"},{"article-title":"Fingerprinting smart devices through embedded acoustic components","year":"2014","author":"Das","key":"ref10"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1145\/2660267.2660325"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.3390\/info9080205"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2950859"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/LSENS.2019.2923590"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.3390\/e22111235"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2019.2911175"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2018.2812185"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1016\/j.forsciint.2019.110100"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1016\/j.diin.2019.03.003"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/ICECA.2019.8822177"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/PAC.2017.16"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2016.23390"},{"article-title":"Exploring ways to mitigate sensor-based smartphone fingerprinting","year":"2015","author":"Das","key":"ref23"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2017.2708685"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2019.00072"},{"article-title":"Mobile device identification via sensor fingerprinting","year":"2014","author":"Bojinov","key":"ref26"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2017.2694487"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2017.2748278"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2016.2619679"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1109\/TNET.2018.2848262"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1109\/MWC.2018.1700365"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2018.2848099"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1109\/ICCCN.2019.8847081"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2014.2297998"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1504\/IJSN.2009.023426"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1145\/1999995.2000016"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1109\/CNS.2018.8433202"},{"key":"ref38","first-page":"1","article-title":"AdhocPairing: Spontaneous audio based secure device pairing for Android mobile devices","volume-title":"Proc. 4th Int. Workshop Security Privacy Spontaneous Interaction Mobile Phone Use","volume":"12","author":"Sigg"},{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1109\/TMC.2011.271"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1109\/PerComW.2012.6197527"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.2478\/aoa-2013-0032"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1109\/ICASSP.2007.366343"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1109\/TMC.2012.92"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1109\/TMC.2017.2772253"},{"key":"ref45","first-page":"14","article-title":"MVSec: Secure and easy-to-use pairing of mobile devices with vehicles","author":"Han","year":"2014"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.1155\/2018\/1935974"},{"key":"ref47","doi-asserted-by":"publisher","DOI":"10.1109\/TASLP.2015.2442417"},{"key":"ref48","doi-asserted-by":"publisher","DOI":"10.1145\/3081333.3081356"},{"key":"ref49","doi-asserted-by":"publisher","DOI":"10.3390\/s19112458"},{"key":"ref50","doi-asserted-by":"publisher","DOI":"10.1007\/s00779-019-01337-7"},{"key":"ref51","doi-asserted-by":"publisher","DOI":"10.1523\/JNEUROSCI.1759-12.2012"},{"key":"ref52","doi-asserted-by":"publisher","DOI":"10.1121\/1.3655174"},{"key":"ref53","doi-asserted-by":"publisher","DOI":"10.1109\/ICDSP.2014.6900732"},{"key":"ref54","article-title":"Thermal simulation of loudspeakers","author":"Chapman","year":"1998","journal-title":"Audio Engineering Society Convention 104. Audio Engineering Society"},{"key":"ref55","doi-asserted-by":"publisher","DOI":"10.3390\/nano8100833"}],"container-title":["IEEE Transactions on Mobile Computing"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/7755\/10061516\/09573339.pdf?arnumber=9573339","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,1,11]],"date-time":"2024-01-11T23:33:36Z","timestamp":1705016016000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9573339\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,4,1]]},"references-count":55,"journal-issue":{"issue":"4"},"URL":"https:\/\/doi.org\/10.1109\/tmc.2021.3119987","relation":{},"ISSN":["1536-1233","1558-0660","2161-9875"],"issn-type":[{"type":"print","value":"1536-1233"},{"type":"electronic","value":"1558-0660"},{"type":"electronic","value":"2161-9875"}],"subject":[],"published":{"date-parts":[[2023,4,1]]}}}