{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,13]],"date-time":"2025-11-13T07:17:27Z","timestamp":1763018247563,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":4,"publisher":"ACM","license":[{"start":{"date-parts":[[2020,9,18]],"date-time":"2020-09-18T00:00:00Z","timestamp":1600387200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"National Key R&D Program of China","award":["2018YFB2101102"],"award-info":[{"award-number":["2018YFB2101102"]}]},{"name":"NSFC under Grants and Startup Fund for Youngman Research at SJTU","award":["61936015"],"award-info":[{"award-number":["61936015"]}]},{"name":"the Joint Key Project of the NSFC","award":["U1736207"],"award-info":[{"award-number":["U1736207"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2020,9,21]]},"DOI":"10.1145\/3372224.3418165","type":"proceedings-article","created":{"date-parts":[[2020,9,19]],"date-time":"2020-09-19T02:16:25Z","timestamp":1600481785000},"page":"1-3","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":2,"title":["Toward a secure QR code system by fingerprinting screens"],"prefix":"10.1145","author":[{"given":"Yijie","family":"Li","sequence":"first","affiliation":[{"name":"Shanghai Jiao Tong University, Shanghai, China"}]},{"given":"Yi-Chao","family":"Chen","sequence":"additional","affiliation":[{"name":"Shanghai Jiao Tong University, Shanghai, China"}]},{"given":"Xiaoyu","family":"Ji","sequence":"additional","affiliation":[{"name":"Zhejiang University, Hangzhou, China"}]},{"given":"Hao","family":"Pan","sequence":"additional","affiliation":[{"name":"Shanghai Jiao Tong University, Shanghai, China"}]},{"given":"Lanqing","family":"Yang","sequence":"additional","affiliation":[{"name":"Shanghai Jiao Tong University, Shanghai, China"}]},{"given":"Guangtao","family":"Xue","sequence":"additional","affiliation":[{"name":"Shanghai Jiao Tong University, Shanghai, China"}]},{"given":"Jiadi","family":"Yu","sequence":"additional","affiliation":[{"name":"Shanghai Jiao Tong University, Shanghai, China"}]}],"member":"320","published-online":{"date-parts":[[2020,9,18]]},"reference":[{"volume-title":"26th {USENIX} Security Symposium ({USENIX} Security 17). 593--608.","author":"Bai Xiaolong","key":"e_1_3_2_1_1_1","unstructured":"Xiaolong Bai , Zhe Zhou , XiaoFeng Wang , Zhou Li , Xianghang Mi , Nan Zhang , Tongxin Li , Shi-Min Hu , and Kehuan Zhang . 2017. Picking up my tab: Understanding and mitigating synchronized token lifting and spending in mobile payment . In 26th {USENIX} Security Symposium ({USENIX} Security 17). 593--608. Xiaolong Bai, Zhe Zhou, XiaoFeng Wang, Zhou Li, Xianghang Mi, Nan Zhang, Tongxin Li, Shi-Min Hu, and Kehuan Zhang. 2017. Picking up my tab: Understanding and mitigating synchronized token lifting and spending in mobile payment. In 26th {USENIX} Security Symposium ({USENIX} Security 17). 593--608."},{"key":"e_1_3_2_1_2_1","first-page":"103","article-title":"Pulse width modulation","volume":"14","author":"Barr Michael","year":"2001","unstructured":"Michael Barr . 2001 . Pulse width modulation . Embedded Systems Programming 14 , 10 (2001), 103 -- 104 . Michael Barr. 2001. Pulse width modulation. Embedded Systems Programming 14, 10 (2001), 103--104.","journal-title":"Embedded Systems Programming"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIP.2008.925384"},{"key":"e_1_3_2_1_4_1","unstructured":"NotebookCheck. 2019. PWM Ranking - The Best Displays for the Eyes. https:\/\/www.notebookcheck.net\/PWM-Ranking-Notebooks-Smartphones-and-Tablets-with-PWM.163979.0.html  NotebookCheck. 2019. PWM Ranking - The Best Displays for the Eyes. https:\/\/www.notebookcheck.net\/PWM-Ranking-Notebooks-Smartphones-and-Tablets-with-PWM.163979.0.html"}],"event":{"name":"MobiCom '20: The 26th Annual International Conference on Mobile Computing and Networking","sponsor":["SIGMOBILE ACM Special Interest Group on Mobility of Systems, Users, Data and Computing"],"location":"London United Kingdom","acronym":"MobiCom '20"},"container-title":["Proceedings of the 26th Annual International Conference on Mobile Computing and Networking"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3372224.3418165","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3372224.3418165","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T21:32:09Z","timestamp":1750195929000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3372224.3418165"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,9,18]]},"references-count":4,"alternative-id":["10.1145\/3372224.3418165","10.1145\/3372224"],"URL":"https:\/\/doi.org\/10.1145\/3372224.3418165","relation":{},"subject":[],"published":{"date-parts":[[2020,9,18]]},"assertion":[{"value":"2020-09-18","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}