{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T04:28:30Z","timestamp":1750220910457,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":10,"publisher":"ACM","license":[{"start":{"date-parts":[[2020,4,25]],"date-time":"2020-04-25T00:00:00Z","timestamp":1587772800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"National Science Foundation","award":["CNS-1705042, CNS-1923778"],"award-info":[{"award-number":["CNS-1705042, CNS-1923778"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2020,4,25]]},"DOI":"10.1145\/3334480.3383171","type":"proceedings-article","created":{"date-parts":[[2020,5,28]],"date-time":"2020-05-28T12:22:36Z","timestamp":1590668556000},"page":"1-4","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":0,"title":["Demonstrating Wearable Microphone Jamming"],"prefix":"10.1145","author":[{"given":"Yuxin","family":"Chen","sequence":"first","affiliation":[{"name":"University of Chicago, Chicago, IL, USA"}]},{"given":"Huiying","family":"Li","sequence":"additional","affiliation":[{"name":"University of Chicago, Chicago, IL, USA"}]},{"given":"Shan-Yuan","family":"Teng","sequence":"additional","affiliation":[{"name":"University of Chicago, Chicago, IL, USA"}]},{"given":"Steven","family":"Nagels","sequence":"additional","affiliation":[{"name":"University of Chicago, Chicago, IL, USA"}]},{"given":"Zhijing","family":"Li","sequence":"additional","affiliation":[{"name":"Univerisity of Chicago, Chicago, IL, USA"}]},{"given":"Pedro","family":"Lopes","sequence":"additional","affiliation":[{"name":"University of Chicago, Chicago, IL, USA"}]},{"given":"Haitao","family":"Zheng","sequence":"additional","affiliation":[{"name":"University of Chicago, Chicago, IL, USA"}]},{"given":"Ben Y.","family":"Zhao","sequence":"additional","affiliation":[{"name":"University of Chicago, Chicago, IL, USA"}]}],"member":"320","published-online":{"date-parts":[[2020,4,25]]},"reference":[{"key":"e_1_3_2_2_1_1","doi-asserted-by":"publisher","DOI":"10.1109\/TEMC.2003.811312"},{"key":"e_1_3_2_2_2_1","doi-asserted-by":"publisher","DOI":"10.1145\/3313831.3376304"},{"key":"e_1_3_2_2_3_1","unstructured":"Silent Ultrasonic Microphone Defeater. 2019. https:\/\/www.uspystore.com\/ silent-ultrasonic-microphone-defeater. (2019)."},{"key":"e_1_3_2_2_4_1","unstructured":"Hidden Microphone dictaphone Bug Recording supressor ultrasonic + Noise Generator by i4 Technology. 2019. https:\/\/www.amazon.com\/ Microphone-dictaphone-Recording-supressor-ultrasonic\/ dp\/B01MG4WACJ\/. (2019)."},{"key":"e_1_3_2_2_5_1","unstructured":"Google is permanently nerfing all Home Minis because mine spied on everything I said 24\/7 [Update x2]. 2017. https:\/\/www.androidpolice.com\/2017\/10\/10\/ google-nerfing-home-minis-mine-spied-everything-said-247\/. (2017)."},{"key":"e_1_3_2_2_6_1","volume-title":"What Can You Hear? And What Will You Do With It? New York Times. (March","author":"Maheshwari Sapna","year":"2018","unstructured":"Sapna Maheshwari. 2018. Hey, Alexa, What Can You Hear? And What Will You Do With It? New York Times. (March 2018). https: \/\/mobile.nytimes.com\/2018\/03\/31\/business\/media\/ amazon-google-privacy-digital-assistants.html."},{"key":"e_1_3_2_2_7_1","unstructured":"New Generation of High Grade Smartphone Scrambler. 2019. https:\/\/www.globaltscmgroup-usa.com\/. (2019)."},{"key":"e_1_3_2_2_8_1","doi-asserted-by":"publisher","DOI":"10.1145\/3081333.3081366"},{"key":"e_1_3_2_2_9_1","volume-title":"Devices sprout ears: What do Alexa and Siri mean for privacy? Christian Science Monitor. (January","author":"Wood Charlie","year":"2017","unstructured":"Charlie Wood. 2017. Devices sprout ears: What do Alexa and Siri mean for privacy? Christian Science Monitor. (January 2017). https:\/\/www.csmonitor.com\/Technology\/2017\/0114\/ Devices-sprout-ears-What-do-Alexa-and-Siri-mean-for-privacy."},{"key":"e_1_3_2_2_10_1","volume-title":"Everything You Need to Know About the Security of Voice-Activated Smart Speakers. Symantec. (Nov","author":"Wueest Candid","year":"2017","unstructured":"Candid Wueest. 2017. Everything You Need to Know About the Security of Voice-Activated Smart Speakers. Symantec. (Nov. 2017). https: \/\/www.symantec.com\/blogs\/threat-intelligence\/ security-voice-activated-smart-speakers."}],"event":{"name":"CHI '20: CHI Conference on Human Factors in Computing Systems","sponsor":["SIGCHI ACM Special Interest Group on Computer-Human Interaction"],"location":"Honolulu HI USA","acronym":"CHI '20"},"container-title":["Extended Abstracts of the 2020 CHI Conference on Human Factors in Computing Systems"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3334480.3383171","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3334480.3383171","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T23:45:00Z","timestamp":1750203900000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3334480.3383171"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,4,25]]},"references-count":10,"alternative-id":["10.1145\/3334480.3383171","10.1145\/3334480"],"URL":"https:\/\/doi.org\/10.1145\/3334480.3383171","relation":{},"subject":[],"published":{"date-parts":[[2020,4,25]]},"assertion":[{"value":"2020-04-25","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}