{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,10]],"date-time":"2025-09-10T22:24:07Z","timestamp":1757543047903,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":14,"publisher":"ACM","license":[{"start":{"date-parts":[[2022,3,22]],"date-time":"2022-03-22T00:00:00Z","timestamp":1647907200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/501100006261","name":"Taif University","doi-asserted-by":"publisher","id":[{"id":"10.13039\/501100006261","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100000332","name":"Royal Society of Edinburgh","doi-asserted-by":"publisher","award":["65040"],"award-info":[{"award-number":["65040"]}],"id":[{"id":"10.13039\/501100000332","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100000266","name":"Engineering and Physical Sciences Research Council","doi-asserted-by":"publisher","award":["EP\/S035362\/1, EP\/V008870\/1"],"award-info":[{"award-number":["EP\/S035362\/1, EP\/V008870\/1"]}],"id":[{"id":"10.13039\/501100000266","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100012363","name":"Saudi Arabia Cultural Bureau in London","doi-asserted-by":"publisher","id":[{"id":"10.13039\/100012363","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2022,3,22]]},"DOI":"10.1145\/3490100.3516472","type":"proceedings-article","created":{"date-parts":[[2022,3,21]],"date-time":"2022-03-21T22:29:35Z","timestamp":1647901775000},"page":"18-21","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":3,"title":["Advanced Techniques for Preventing Thermal Imaging Attacks"],"prefix":"10.1145","author":[{"given":"Norah","family":"Alotaibi","sequence":"first","affiliation":[{"name":"University of Glasgow, United Kingdom"}]},{"given":"Md Shafiqul","family":"Islam","sequence":"additional","affiliation":[{"name":"School of Computing Science, University of Glasgow, United Kingdom"}]},{"given":"Karola","family":"Marky","sequence":"additional","affiliation":[{"name":"University of Glasgow, United Kingdom"}]},{"given":"Mohamed","family":"Khamis","sequence":"additional","affiliation":[{"name":"University of Glasgow, United Kingdom"}]}],"member":"320","published-online":{"date-parts":[[2022,3,22]]},"reference":[{"key":"e_1_3_2_2_1_1","doi-asserted-by":"publisher","DOI":"10.1145\/3025453.3025461"},{"key":"e_1_3_2_2_2_1","doi-asserted-by":"publisher","DOI":"10.1145\/3399715.3399819"},{"key":"e_1_3_2_2_3_1","volume-title":"Passphrases Beat Thermal Attacks: Evaluating Text Input Characteristics Against Thermal Attacks on Laptops and Smartphones. In IFIP Conference on Human-Computer Interaction. Springer, 712\u2013721","author":"Abdrabou Yasmeen","year":"2021","unstructured":"Yasmeen Abdrabou , Reem Hatem , Yomna Abdelrahman , Amr Elmougy , and Mohamed Khamis . 2021 . Passphrases Beat Thermal Attacks: Evaluating Text Input Characteristics Against Thermal Attacks on Laptops and Smartphones. In IFIP Conference on Human-Computer Interaction. Springer, 712\u2013721 . Yasmeen Abdrabou, Reem Hatem, Yomna Abdelrahman, Amr Elmougy, and Mohamed Khamis. 2021. Passphrases Beat Thermal Attacks: Evaluating Text Input Characteristics Against Thermal Attacks on Laptops and Smartphones. In IFIP Conference on Human-Computer Interaction. Springer, 712\u2013721."},{"key":"e_1_3_2_2_4_1","doi-asserted-by":"publisher","DOI":"10.1145\/3173574.3173621"},{"key":"e_1_3_2_2_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/3321705.3329846"},{"key":"e_1_3_2_2_6_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2018.2868219"},{"key":"e_1_3_2_2_7_1","volume-title":"DeepBlur: A simple and effective method for natural image obfuscation. arXiv preprint arXiv:2104.02655 1","author":"Li Tao","year":"2021","unstructured":"Tao Li and Min\u00a0Soo Choi . 2021. DeepBlur: A simple and effective method for natural image obfuscation. arXiv preprint arXiv:2104.02655 1 ( 2021 ). Tao Li and Min\u00a0Soo Choi. 2021. DeepBlur: A simple and effective method for natural image obfuscation. arXiv preprint arXiv:2104.02655 1 (2021)."},{"key":"e_1_3_2_2_8_1","doi-asserted-by":"publisher","DOI":"10.1145\/3134702"},{"key":"e_1_3_2_2_9_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-10602-1_48"},{"key":"e_1_3_2_2_10_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-46448-0_2"},{"key":"e_1_3_2_2_11_1","unstructured":"Richard McPherson Reza Shokri and Vitaly Shmatikov. 2016. Defeating Image Obfuscation with Deep Learning. arxiv:1609.00408\u00a0[cs.CR]  Richard McPherson Reza Shokri and Vitaly Shmatikov. 2016. Defeating Image Obfuscation with Deep Learning. arxiv:1609.00408\u00a0[cs.CR]"},{"key":"e_1_3_2_2_12_1","volume-title":"Proceedings of the 5th USENIX conference on Offensive technologies. 6\u20136.","author":"Mowery Keaton","year":"2011","unstructured":"Keaton Mowery , Sarah Meiklejohn , and Stefan Savage . 2011 . Heat of the moment: Characterizing the efficacy of thermal camera-based attacks . In Proceedings of the 5th USENIX conference on Offensive technologies. 6\u20136. Keaton Mowery, Sarah Meiklejohn, and Stefan Savage. 2011. Heat of the moment: Characterizing the efficacy of thermal camera-based attacks. In Proceedings of the 5th USENIX conference on Offensive technologies. 6\u20136."},{"key":"e_1_3_2_2_13_1","volume-title":"Retrieved","author":"Camera Thermal","year":"2021","unstructured":"Thermal Camera 2021 . Affordable thermal camera on amazon . Retrieved Dec 12, 2021 from https:\/\/www:amazon:co:uk\/dp\/ B07CMDCZGV Thermal Camera 2021. Affordable thermal camera on amazon. Retrieved Dec 12, 2021 from https:\/\/www:amazon:co:uk\/dp\/ B07CMDCZGV"},{"key":"e_1_3_2_2_14_1","doi-asserted-by":"crossref","unstructured":"Wojciech Wodo and Lucjan Hanzlik. 2016. Thermal Imaging Attacks on Keypad Security Systems.. In SECRYPT. 458\u2013464.  Wojciech Wodo and Lucjan Hanzlik. 2016. Thermal Imaging Attacks on Keypad Security Systems.. In SECRYPT. 458\u2013464.","DOI":"10.5220\/0005998404580464"}],"event":{"name":"IUI '22: 27th International Conference on Intelligent User Interfaces","sponsor":["SIGAI ACM Special Interest Group on Artificial Intelligence","SIGCHI ACM Special Interest Group on Computer-Human Interaction"],"location":"Helsinki Finland","acronym":"IUI '22"},"container-title":["27th International Conference on Intelligent User Interfaces"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3490100.3516472","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3490100.3516472","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T20:12:08Z","timestamp":1750191128000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3490100.3516472"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,3,22]]},"references-count":14,"alternative-id":["10.1145\/3490100.3516472","10.1145\/3490100"],"URL":"https:\/\/doi.org\/10.1145\/3490100.3516472","relation":{},"subject":[],"published":{"date-parts":[[2022,3,22]]},"assertion":[{"value":"2022-03-22","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}