{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,17]],"date-time":"2026-03-17T08:00:20Z","timestamp":1773734420801,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":33,"publisher":"ACM","license":[{"start":{"date-parts":[[2015,9,7]],"date-time":"2015-09-07T00:00:00Z","timestamp":1441584000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"CNS-1343363"},{"name":"CNS-1318292"},{"name":"CNS-1350039"},{"name":"CNS-1404613"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2015,9,7]]},"DOI":"10.1145\/2789168.2790119","type":"proceedings-article","created":{"date-parts":[[2015,8,27]],"date-time":"2015-08-27T20:08:52Z","timestamp":1440706132000},"page":"130-141","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":107,"title":["Acoustic Eavesdropping through Wireless Vibrometry"],"prefix":"10.1145","author":[{"given":"Teng","family":"Wei","sequence":"first","affiliation":[{"name":"University of Wisconsin - Madison, Madison, WI, USA"}]},{"given":"Shu","family":"Wang","sequence":"additional","affiliation":[{"name":"University of Wisconsin - Madison, Madison, WI, USA"}]},{"given":"Anfu","family":"Zhou","sequence":"additional","affiliation":[{"name":"ICT, Chinese Academy of Sciences, China &amp; University of Wisconsin - Madison, Madison, WI, USA"}]},{"given":"Xinyu","family":"Zhang","sequence":"additional","affiliation":[{"name":"University of Wisconsin - Madison, Madison, WI, USA"}]}],"member":"320","published-online":{"date-parts":[[2015,9,7]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1145\/1878431.1878439"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1145\/1609956.1609959"},{"key":"e_1_3_2_1_3_1","volume-title":"Acoustic Side-channel Attacks on Printers,\" in Proc. of USENIX Security","author":"Backes M.","year":"2010"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-44371-2_25"},{"key":"e_1_3_2_1_5_1","volume-title":"Laser Doppler Vibrometry: Development of Advanced Solutions Answering to Technology's Needs,\" Mechanical Systems and Signal Processing","author":"Castellini P."},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1145\/2307636.2307654"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/2500423.2500436"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1145\/2639108.2639112"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1145\/2601097.2601119"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.5555\/1111206"},{"key":"e_1_3_2_1_11_1","volume-title":"Measurement and Visualization of Loudspeaker Cone Vibration","author":"Klippel W.","year":"2006"},{"key":"e_1_3_2_1_12_1","article-title":"Noise: methods for estimating detectability and threshold","author":"Stuart J. R.","year":"1994","journal-title":"Journal of the Audio Engineering Society"},{"key":"e_1_3_2_1_13_1","volume-title":"Modelling, Simulation, Algorithms and Acoustic Virtual Reality","author":"Vorlander M.","year":"2008"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1145\/2030613.2030637"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1145\/2737095.2737099"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSP.2008.2007101"},{"key":"e_1_3_2_1_17_1","unstructured":"\"ARP Request Replay Attack \" http:\/\/www.aircrack-ng.org\/doku.php?id=arp-request_reinjection 2010.  \"ARP Request Replay Attack \" http:\/\/www.aircrack-ng.org\/doku.php?id=arp-request_reinjection 2010."},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1145\/2426656.2426685"},{"key":"e_1_3_2_1_19_1","unstructured":"\"Introduction to Wi-Fi Wireless Antennas \" http:\/\/compnetworking.about.com\/od\/homenetworkhardware\/a\/introduction-to-wifi-wireless-antennas.htm 2015.  \"Introduction to Wi-Fi Wireless Antennas \" http:\/\/compnetworking.about.com\/od\/homenetworkhardware\/a\/introduction-to-wifi-wireless-antennas.htm 2015."},{"key":"e_1_3_2_1_20_1","unstructured":"\"WiFi Signal Attenuation \" http:\/\/www.liveport.com\/wifi-signal-attenuation 2015.  \"WiFi Signal Attenuation \" http:\/\/www.liveport.com\/wifi-signal-attenuation 2015."},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1145\/1282221.1282238"},{"key":"e_1_3_2_1_22_1","unstructured":"Rice University \"Wireless Open-Access Research Platform \" http:\/\/warp.rice.edu\/trac\/wiki 2013.  Rice University \"Wireless Open-Access Research Platform \" http:\/\/warp.rice.edu\/trac\/wiki 2013."},{"key":"e_1_3_2_1_23_1","unstructured":"Volo Wireless LLC. \"Wideband UHF Daughter Card (WURC) \" 2014.  Volo Wireless LLC. \"Wideband UHF Daughter Card (WURC) \" 2014."},{"key":"e_1_3_2_1_24_1","unstructured":"\"WARPLab 7_3_0 Benchmarks \" http:\/\/warpproject.org\/trac\/wiki\/WARPLab\/Benchmarks\/WARPLAB_7_3_0 2014.  \"WARPLab 7_3_0 Benchmarks \" http:\/\/warpproject.org\/trac\/wiki\/WARPLab\/Benchmarks\/WARPLAB_7_3_0 2014."},{"key":"e_1_3_2_1_25_1","unstructured":"R. P. Muscatell \"Laser microphone \" 1984 uS Patent 4 479 265.  R. P. Muscatell \"Laser microphone \" 1984 uS Patent 4 479 265."},{"key":"e_1_3_2_1_26_1","unstructured":"W. McGrath \"Technique and device for through-the-wall audio surveillance \" 2005 uS Patent App. 11\/095 122.  W. McGrath \"Technique and device for through-the-wall audio surveillance \" 2005 uS Patent App. 11\/095 122."},{"key":"e_1_3_2_1_27_1","volume-title":"Microwave and millimeter-wave remote sensing for security applications","author":"Nanzer J.","year":"2012"},{"key":"e_1_3_2_1_28_1","volume-title":"Sonar and Navigation","volume":"150","author":"Chen V."},{"key":"e_1_3_2_1_29_1","volume-title":"3D Tracking via Body Radio Reflections,\" in Proc. of USENIX NSDI","author":"Adib F.","year":"2014"},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1145\/2486001.2486039"},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1145\/2627393.2627417"},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1145\/2046707.2046771"},{"key":"e_1_3_2_1_33_1","volume-title":"23rd USENIX Security Symposium, USENIX Association","author":"Michalevsky Y.","year":"2014"}],"event":{"name":"MobiCom'15: The 21th Annual International Conference on Mobile Computing and Networking","location":"Paris France","acronym":"MobiCom'15","sponsor":["SIGMOBILE ACM Special Interest Group on Mobility of Systems, Users, Data and Computing"]},"container-title":["Proceedings of the 21st Annual International Conference on Mobile Computing and Networking"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2789168.2790119","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2789168.2790119","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T05:42:51Z","timestamp":1750225371000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2789168.2790119"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015,9,7]]},"references-count":33,"alternative-id":["10.1145\/2789168.2790119","10.1145\/2789168"],"URL":"https:\/\/doi.org\/10.1145\/2789168.2790119","relation":{},"subject":[],"published":{"date-parts":[[2015,9,7]]},"assertion":[{"value":"2015-09-07","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}