{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,23]],"date-time":"2026-04-23T02:50:38Z","timestamp":1776912638961,"version":"3.51.2"},"publisher-location":"New York, NY, USA","reference-count":37,"publisher":"ACM","license":[{"start":{"date-parts":[[2018,5,29]],"date-time":"2018-05-29T00:00:00Z","timestamp":1527552000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61472358"],"award-info":[{"award-number":["61472358"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Fundamental Research Funds for the Central Universities","award":["2017QNA4017"],"award-info":[{"award-number":["2017QNA4017"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2018,5,29]]},"DOI":"10.1145\/3196494.3196509","type":"proceedings-article","created":{"date-parts":[[2018,5,31]],"date-time":"2018-05-31T13:18:28Z","timestamp":1527772708000},"page":"1-13","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":46,"title":["DeWiCam"],"prefix":"10.1145","author":[{"given":"Yushi","family":"Cheng","sequence":"first","affiliation":[{"name":"Zhejiang University &amp;Alibaba-Zhejiang University Joint Institute of Frontier Technologies, Hangzhou, China"}]},{"given":"Xiaoyu","family":"Ji","sequence":"additional","affiliation":[{"name":"Zhejiang University &amp;Alibaba-Zhejiang University Joint Institute of Frontier Technologies, Hangzhou, China"}]},{"given":"Tianyang","family":"Lu","sequence":"additional","affiliation":[{"name":"Zhejiang University, Hangzhou, China"}]},{"given":"Wenyuan","family":"Xu","sequence":"additional","affiliation":[{"name":"Zhejiang University, Hangzhou, China"}]}],"member":"320","published-online":{"date-parts":[[2018,5,29]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1023\/A:1019169010241"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1145\/2643164.2643168"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"crossref","unstructured":"Simon Birnbach Richard Baker and Ivan Martinovic. 2017. Wi-Fly?: Detecting Privacy Invasion Attacks by Consumer Drones. In NDSS.  Simon Birnbach Richard Baker and Ivan Martinovic. 2017. Wi-Fly?: Detecting Privacy Invasion Attacks by Consumer Drones. In NDSS.","DOI":"10.14722\/ndss.2017.23335"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1145\/1282427.1282386"},{"key":"e_1_3_2_1_5_1","first-page":"789","article-title":"ISO\/IEC MPEG-2 advanced audio coding","volume":"45","author":"Bosi Marina","year":"1997","unstructured":"Marina Bosi , Karlheinz Brandenburg , Schuyler Quackenbush , Louis Fielder , Kenzo Akagiri , Hendrik Fuchs , and Martin Dietz . 1997 . ISO\/IEC MPEG-2 advanced audio coding . Journal of the Audio engineering society 45 , 10 (1997), 789 -- 814 . Marina Bosi, Karlheinz Brandenburg, Schuyler Quackenbush, Louis Fielder, Kenzo Akagiri, Hendrik Fuchs, and Martin Dietz. 1997. ISO\/IEC MPEG-2 advanced audio coding. Journal of the Audio engineering society 45, 10 (1997), 789--814.","journal-title":"Journal of the Audio engineering society"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1016\/S1353-4858(11)70014-9"},{"key":"e_1_3_2_1_7_1","unstructured":"Antonio Castelan and John Treanor. 2016. Hidden cameras found inside a Las Vegas Airbnb rental recording naked people. https:\/\/tinyurl.com\/zrtysgx.  Antonio Castelan and John Treanor. 2016. Hidden cameras found inside a Las Vegas Airbnb rental recording naked people. https:\/\/tinyurl.com\/zrtysgx."},{"key":"e_1_3_2_1_8_1","first-page":"50","article-title":"Wireless LAN medium access control (MAC) and physical layer (PHY) specifications","volume":"802","author":"ICSLMS Committee et al.","year":"1997","unstructured":"ICSLMS Committee et al. 1997 . Wireless LAN medium access control (MAC) and physical layer (PHY) specifications . IEEE Std 802 (1997), 50 . ICSLMS Committee et al. 1997. Wireless LAN medium access control (MAC) and physical layer (PHY) specifications. IEEE Std 802 (1997), 50.","journal-title":"IEEE Std"},{"key":"e_1_3_2_1_9_1","unstructured":"Laura Connor. 2016. Airbnb host admits 'using hidden cameras to film guests and swaps sex videos with other users'. https:\/\/tinyurl.com\/y9kem8wm.  Laura Connor. 2016. Airbnb host admits 'using hidden cameras to film guests and swaps sex videos with other users'. https:\/\/tinyurl.com\/y9kem8wm."},{"key":"e_1_3_2_1_10_1","unstructured":"FutureApps. 2017. Hidden Camera Detector. https:\/\/tinyurl.com\/y7nlhbx8.  FutureApps. 2017. Hidden Camera Detector. https:\/\/tinyurl.com\/y7nlhbx8."},{"key":"e_1_3_2_1_11_1","unstructured":"GalaxyApp. 2016. Hidden Camera Detector Pro. https:\/\/tinyurl.com\/y745nqf7.  GalaxyApp. 2016. Hidden Camera Detector Pro. https:\/\/tinyurl.com\/y745nqf7."},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10994-006-6226-1"},{"key":"e_1_3_2_1_13_1","unstructured":"Jack Smith IV. 2015. Couple Wakes Up in Airbnb to Find Hidden Camera Watching Them. https:\/\/tinyurl.com\/yd556cwm.  Jack Smith IV. 2015. Couple Wakes Up in Airbnb to Find Hidden Camera Watching Them. https:\/\/tinyurl.com\/yd556cwm."},{"key":"e_1_3_2_1_14_1","volume-title":"Proceedings of the 2004 International Symposium on Circuits and Systems","volume":"3","author":"Jiang Minqiang","year":"2004","unstructured":"Minqiang Jiang , Xiaoquan Yi , and Nam Ling . 2004 . Improved frame-layer rate control for H. 264 using MAD ratio . In Proceedings of the 2004 International Symposium on Circuits and Systems , Vol. 3 . IEEE, III--813. Minqiang Jiang, Xiaoquan Yi, and Nam Ling. 2004. Improved frame-layer rate control for H. 264 using MAD ratio. In Proceedings of the 2004 International Symposium on Circuits and Systems, Vol. 3. IEEE, III--813."},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1145\/1090191.1080119"},{"key":"e_1_3_2_1_16_1","unstructured":"Randy Kenner. 2012. Man Sues After Finding Hidden Cam In Hotel Bathroom. http:\/\/www.rense.com\/general29\/msn.htm.  Randy Kenner. 2012. Man Sues After Finding Hidden Cam In Hotel Bathroom. http:\/\/www.rense.com\/general29\/msn.htm."},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1145\/2858036.2858417"},{"key":"e_1_3_2_1_18_1","unstructured":"KpopJoA. 2017. Korean couple discover a hidden camera inside Airbnb guesthouse in Japan. https:\/\/tinyurl.com\/y9ju55ut.  KpopJoA. 2017. Korean couple discover a hidden camera inside Airbnb guesthouse in Japan. https:\/\/tinyurl.com\/y9ju55ut."},{"key":"e_1_3_2_1_19_1","volume-title":"Proceedings of the 2nd International Conference on Computer Science and Information Technology. IEEE, 48--52","author":"Lashkari Arash Habibi","year":"2009","unstructured":"Arash Habibi Lashkari , Mir Mohammad Seyed Danesh , and Behrang Samadi . 2009 . A survey on wireless security protocols (WEP, WPA and WPA2\/802.11 . In Proceedings of the 2nd International Conference on Computer Science and Information Technology. IEEE, 48--52 . Arash Habibi Lashkari, Mir Mohammad Seyed Danesh, and Behrang Samadi. 2009. A survey on wireless security protocols (WEP, WPA and WPA2\/802.11 . In Proceedings of the 2nd International Conference on Computer Science and Information Technology. IEEE, 48--52."},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1080\/01621459.1967.10482916"},{"key":"e_1_3_2_1_21_1","unstructured":"LLC LSC. 2016. Hidden Camera Detector. https:\/\/itunes.apple.com\/us\/app\/ hidden-camera-detector\/id532882360?mt=8.  LLC LSC. 2016. Hidden Camera Detector. https:\/\/itunes.apple.com\/us\/app\/ hidden-camera-detector\/id532882360?mt=8."},{"key":"e_1_3_2_1_22_1","unstructured":"D. Wegemer M. Schulz. 2005. Nexmon. https:\/\/github.com\/seemoo-lab\/nexmon.  D. Wegemer M. Schulz. 2005. Nexmon. https:\/\/github.com\/seemoo-lab\/nexmon."},{"key":"e_1_3_2_1_23_1","unstructured":"News Corp Australia Network. 2016. Airbnb host admits to filming people having sex on hidden cameras. https:\/\/tinyurl.com\/j7cw2a5.  News Corp Australia Network. 2016. Airbnb host admits to filming people having sex on hidden cameras. https:\/\/tinyurl.com\/j7cw2a5."},{"key":"e_1_3_2_1_24_1","unstructured":"Circa News. 2016. Experts say that spy cameras in Airbnb rentals are becoming harder to detect. https:\/\/tinyurl.com\/y8q6khsm.  Circa News. 2016. Experts say that spy cameras in Airbnb rentals are becoming harder to detect. https:\/\/tinyurl.com\/y8q6khsm."},{"key":"e_1_3_2_1_25_1","unstructured":"Asher L. Poretz. 2017. Spy hidden camera Detector. https:\/\/itunes.apple.com\/us\/ app\/spy-hidden-camera-detector\/id925967783?mt=8.  Asher L. Poretz. 2017. Spy hidden camera Detector. https:\/\/itunes.apple.com\/us\/ app\/spy-hidden-camera-detector\/id925967783?mt=8."},{"key":"e_1_3_2_1_26_1","unstructured":"Brendan Saltaformaggio Hongjun Choi Kristen Johnson Yonghwi Kwon Qi Zhang Xiangyu Zhang Dongyan Xu and John Qian. 2016. Eavesdropping on Fine-Grained User Activities Within Smartphone Apps Over Encrypted Network Traffic. In WOOT.   Brendan Saltaformaggio Hongjun Choi Kristen Johnson Yonghwi Kwon Qi Zhang Xiangyu Zhang Dongyan Xu and John Qian. 2016. Eavesdropping on Fine-Grained User Activities Within Smartphone Apps Over Encrypted Network Traffic. In WOOT."},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1109\/TCSVT.2007.905532"},{"key":"e_1_3_2_1_28_1","unstructured":"Bunker Hill Security. 2017. Wireless Camera RF Detector. https:\/\/www. harborfreight.com\/wireless-camera-rf-detector-95053.html.  Bunker Hill Security. 2017. Wireless Camera RF Detector. https:\/\/www. harborfreight.com\/wireless-camera-rf-detector-95053.html."},{"key":"e_1_3_2_1_29_1","unstructured":"Technavio. 2017. Global Wireless Video Surveillance Market 2017--2021. https: \/\/tinyurl.com\/y7u9yfl4.  Technavio. 2017. Global Wireless Video Surveillance Market 2017--2021. https: \/\/tinyurl.com\/y7u9yfl4."},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"crossref","unstructured":"Robert Templeman Mohammed Korayem David J Crandall and Apu Kapadia. 2014. PlaceAvoider: Steering First-Person Cameras away from Sensitive Spaces. In NDSS. 23--26.  Robert Templeman Mohammed Korayem David J Crandall and Apu Kapadia. 2014. PlaceAvoider: Steering First-Person Cameras away from Sensitive Spaces. In NDSS. 23--26.","DOI":"10.14722\/ndss.2014.23014"},{"key":"e_1_3_2_1_31_1","unstructured":"UNIFORE Website. 2014. Introduction to Hisilicon IP Cameras. https:\/\/tinyurl. com\/yaolrcje.  UNIFORE Website. 2014. Introduction to Hisilicon IP Cameras. https:\/\/tinyurl. com\/yaolrcje."},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2011.34"},{"key":"e_1_3_2_1_33_1","unstructured":"Wikipedia. 2017. Closed-circuit television camera. https:\/\/en.wikipedia.org\/wiki\/ Closed-circuit_television_camera.  Wikipedia. 2017. Closed-circuit television camera. https:\/\/en.wikipedia.org\/wiki\/ Closed-circuit_television_camera."},{"key":"e_1_3_2_1_34_1","unstructured":"Wikipedia. 2017. CUSUM. https:\/\/en.wikipedia.org\/wiki\/CUSUM.  Wikipedia. 2017. CUSUM. https:\/\/en.wikipedia.org\/wiki\/CUSUM."},{"key":"e_1_3_2_1_35_1","unstructured":"Wikipedia. 2017. P-value. https:\/\/en.wikipedia.org\/wiki\/P-value.  Wikipedia. 2017. P-value. https:\/\/en.wikipedia.org\/wiki\/P-value."},{"key":"e_1_3_2_1_36_1","unstructured":"Workshop512. 2013. Glint Finder-Camera Detector. https:\/\/tinyurl.com\/pbnfnur.  Workshop512. 2013. Glint Finder-Camera Detector. https:\/\/tinyurl.com\/pbnfnur."},{"key":"e_1_3_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.1145\/2602204.2602206"}],"event":{"name":"ASIA CCS '18: ACM Asia Conference on Computer and Communications Security","location":"Incheon Republic of Korea","acronym":"ASIA CCS '18","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"]},"container-title":["Proceedings of the 2018 on Asia Conference on Computer and Communications Security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3196494.3196509","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3196494.3196509","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T01:39:05Z","timestamp":1750210745000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3196494.3196509"}},"subtitle":["Detecting Hidden Wireless Cameras via Smartphones"],"short-title":[],"issued":{"date-parts":[[2018,5,29]]},"references-count":37,"alternative-id":["10.1145\/3196494.3196509","10.1145\/3196494"],"URL":"https:\/\/doi.org\/10.1145\/3196494.3196509","relation":{},"subject":[],"published":{"date-parts":[[2018,5,29]]},"assertion":[{"value":"2018-05-29","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}