{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,5,9]],"date-time":"2026-05-09T16:49:48Z","timestamp":1778345388297,"version":"3.51.4"},"publisher-location":"New York, NY, USA","reference-count":8,"publisher":"ACM","license":[{"start":{"date-parts":[[2024,12,4]],"date-time":"2024-12-04T00:00:00Z","timestamp":1733270400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2024,12,4]]},"DOI":"10.1145\/3636534.3698834","type":"proceedings-article","created":{"date-parts":[[2024,12,4]],"date-time":"2024-12-04T23:13:18Z","timestamp":1733353998000},"page":"1710-1712","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":6,"title":["Hidden WiFi Camera Localization via Signal Propagation Path Analysis"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-0413-6135","authenticated-orcid":false,"given":"Xiang","family":"Zhang","sequence":"first","affiliation":[{"name":"University of Science andTechnology of China, Hefei, Anhui, CN"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-8153-341X","authenticated-orcid":false,"given":"Zehua","family":"Ma","sequence":"additional","affiliation":[{"name":"University of Science andTechnology of China, Hefei, CN"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-5483-2812","authenticated-orcid":false,"given":"Jinyang","family":"Huang","sequence":"additional","affiliation":[{"name":"Hefei University of Technology, Hefei, China"}]},{"ORCID":"https:\/\/orcid.org\/0009-0008-1810-4920","authenticated-orcid":false,"given":"Huan","family":"Yan","sequence":"additional","affiliation":[{"name":"Guizhou Normal University, Guiyang, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-3553-0813","authenticated-orcid":false,"given":"Meng","family":"Li","sequence":"additional","affiliation":[{"name":"Hefei University of Technology, Hefei, CN"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-0537-4522","authenticated-orcid":false,"given":"Zhi","family":"Liu","sequence":"additional","affiliation":[{"name":"The University of Electro-Communications, Tokyo, JP"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-3977-8800","authenticated-orcid":false,"given":"Bin","family":"Liu","sequence":"additional","affiliation":[{"name":"University of Science and Technology of China, Hefei, CN"}]}],"member":"320","published-online":{"date-parts":[[2024,12,4]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1145\/3349623.3355477"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1145\/3631432"},{"key":"e_1_3_2_1_3_1","volume-title":"Type, Connectivity, End-User - Forecast till","author":"Gupta Ankit","year":"2030","unstructured":"Ankit Gupta. 2024. Wireless Monitoring and Surveillance Market, by Component, Type, Connectivity, End-User - Forecast till 2030. https:\/\/www.marketresearchfuture.com\/reports\/wireless-monitoring-surveillance-market-975."},{"key":"e_1_3_2_1_4_1","volume-title":"Lumos: Identifying and localizing diverse hidden IoT devices in an unfamiliar environment. In USENIX Security 22. 1095--1112.","author":"Sharma Rahul Anand","year":"2022","unstructured":"Rahul Anand Sharma, Elahe Soltanaghaei, Anthony Rowe, and Vyas Sekar. 2022. Lumos: Identifying and localizing diverse hidden IoT devices in an unfamiliar environment. In USENIX Security 22. 1095--1112."},{"key":"e_1_3_2_1_5_1","volume-title":"30th USENIX Security Symposium (USENIX Security 21)","author":"Singh Akash Deep","year":"2021","unstructured":"Akash Deep Singh, Luis Garcia, Joseph Noor, and Mani Srivastava. 2021. I always feel like somebody's sensing me! A framework to detect, identify, and localize clandestine wireless sensors. In 30th USENIX Security Symposium (USENIX Security 21). 1829--1846."},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1109\/TMC.2024.3377708"},{"key":"e_1_3_2_1_7_1","first-page":"1","article-title":"Towards a diffraction-based sensing approach on human activity recognition","volume":"3","author":"Zhang Fusang","year":"2019","unstructured":"Fusang Zhang, Kai Niu, Jie Xiong, Beihong Jin, Tao Gu, Yuhang Jiang, and Daqing Zhang. 2019. Towards a diffraction-based sensing approach on human activity recognition. IMWUT\/Ubicomp 3, 1 (2019), 1--25.","journal-title":"IMWUT\/Ubicomp"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1109\/THMS.2023.3264247"}],"event":{"name":"ACM MobiCom '24: 30th Annual International Conference on Mobile Computing and Networking","location":"Washington D.C. DC USA","acronym":"ACM MobiCom '24","sponsor":["SIGMOBILE ACM Special Interest Group on Mobility of Systems, Users, Data and Computing"]},"container-title":["Proceedings of the 30th Annual International Conference on Mobile Computing and Networking"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3636534.3698834","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3636534.3698834","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T01:10:00Z","timestamp":1750295400000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3636534.3698834"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,12,4]]},"references-count":8,"alternative-id":["10.1145\/3636534.3698834","10.1145\/3636534"],"URL":"https:\/\/doi.org\/10.1145\/3636534.3698834","relation":{},"subject":[],"published":{"date-parts":[[2024,12,4]]},"assertion":[{"value":"2024-12-04","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}