{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,7,15]],"date-time":"2025-07-15T03:35:50Z","timestamp":1752550550244,"version":"3.41.0"},"reference-count":61,"publisher":"Association for Computing Machinery (ACM)","issue":"6","license":[{"start":{"date-parts":[[2024,11,23]],"date-time":"2024-11-23T00:00:00Z","timestamp":1732320000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"crossref","award":["61925109, 62071428, 62222114, 62201503"],"award-info":[{"award-number":["61925109, 62071428, 62222114, 62201503"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"crossref"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":["ACM Trans. Sen. Netw."],"published-print":{"date-parts":[[2024,11,30]]},"abstract":"<jats:p>\n            Unauthorized covert voice recording presents a significant threat to privacy-sensitive scenarios, such as confidential meetings and private conversations. Due to their miniaturization and disguise characteristics, hidden voice recorders are difficult to notice. In this article, we present\n            <jats:monospace>DeHiREC<\/jats:monospace>\n            , the first proof-of-concept system capable of detecting offline hidden voice recorders from their electromagnetic radiations (EMR). We first characterize the unique patterns of the emanated EMR signals and then locate the EMR source, i.e., the analog-to-digital converter module embedded in the mixed signal system-on-chips. Since these unintentional EMR signals can be extremely noisy and weak, accurately detecting them can be challenging. To address this challenge, we design an EMR Catalyzing method to actively stimulate the EMR signals and then employ an adaptive-folding algorithm to improve the signal-to-noise ratio of the sensed EMRs. We evaluate the performance of\n            <jats:monospace>DeHiREC<\/jats:monospace>\n            on 18 commercial voice recorders under various impacts, including interference from other devices. Experimental results reveal that\n            <jats:monospace>DeHiREC<\/jats:monospace>\n            is effective in detecting all 18 voice recorders and achieves an overall success rate of 94.72% and a recall rate of 92.03% at a distance of 0.2\u00a0m.\n          <\/jats:p>","DOI":"10.1145\/3700595","type":"journal-article","created":{"date-parts":[[2024,10,22]],"date-time":"2024-10-22T10:06:08Z","timestamp":1729591568000},"page":"1-26","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":2,"title":["Detecting Hidden Voice Recorders via ADC Electromagnetic Radiation"],"prefix":"10.1145","volume":"20","author":[{"ORCID":"https:\/\/orcid.org\/0009-0006-4510-2571","authenticated-orcid":false,"given":"Ruochen","family":"Zhou","sequence":"first","affiliation":[{"name":"College of Electrical Engineering, Zhejiang University, Hangzhou, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-1101-0007","authenticated-orcid":false,"given":"Xiaoyu","family":"Ji","sequence":"additional","affiliation":[{"name":"Zhejiang University College of Electrical Engineering, Hangzhou, China"}]},{"ORCID":"https:\/\/orcid.org\/0009-0007-9032-1041","authenticated-orcid":false,"given":"Han","family":"Chen","sequence":"additional","affiliation":[{"name":"College of Electrical Engineering, Zhejiang University, Hangzhou, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-4430-5263","authenticated-orcid":false,"given":"Chen","family":"Yan","sequence":"additional","affiliation":[{"name":"College of Electrical Engineering, Zhejiang University, Hangzhou, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-5043-9148","authenticated-orcid":false,"given":"Wenyuan","family":"Xu","sequence":"additional","affiliation":[{"name":"Electrical Engineering, Zhejiang University, Hangzhou, China"}]}],"member":"320","published-online":{"date-parts":[[2024,11,23]]},"reference":[{"key":"e_1_3_2_2_2","unstructured":"Actions. 2010. ATJ331x Datasheet. Retrieved from https:\/\/datasheetspdf.com\/pdf-file\/774998\/Actions\/ATJ331x\/1"},{"key":"e_1_3_2_3_2","unstructured":"Actions. 2012. ATJ2127 Datasheet. Retrieved from http:\/\/www.datasheetcafe.com\/atj2127-datasheet-pdf\/"},{"issue":"10","key":"e_1_3_2_4_2","doi-asserted-by":"crossref","first-page":"40","DOI":"10.1109\/MMM.2015.2465591","article-title":"Getting the bugs out: A portable harmonic radar system for electronic countersurveillance applications","volume":"16","author":"Aniktar Huseyin","year":"2015","unstructured":"Huseyin Aniktar, Dursun Baran, Enes Karav, Eren Akkaya, Y. Serdar Birecik, and Mehmet Sezgin. 2015. Getting the bugs out: A portable harmonic radar system for electronic countersurveillance applications. IEEE Microw. Mag. 16, 10 (2015), 40\u201352.","journal-title":"IEEE Microw. Mag."},{"key":"e_1_3_2_5_2","unstructured":"Matt Blaze. 2021. Testing Phone-Sized Faraday Bags. Retrieved from https:\/\/www.mattblaze.org\/blog\/faraday\/"},{"key":"e_1_3_2_6_2","first-page":"163","volume-title":"Proceedings of the ACM SIGSAC Conference on Computer and Communications Security","author":"Camurati Giovanni","year":"2018","unstructured":"Giovanni Camurati, Sebastian Poeplau, Marius Muench, Tom Hayes, and Aur\u00e9lien Francillon. 2018. Screaming channels: When electromagnetic side channels meet radio transceivers. In Proceedings of the ACM SIGSAC Conference on Computer and Communications Security. 163\u2013177."},{"key":"e_1_3_2_7_2","doi-asserted-by":"publisher","DOI":"10.1145\/3241539.3241580"},{"key":"e_1_3_2_8_2","first-page":"1","volume-title":"Proceedings of the Asia Conference on Computer and Communications Security","author":"Cheng Yushi","year":"2018","unstructured":"Yushi Cheng, Xiaoyu Ji, Tianyang Lu, and Wenyuan Xu. 2018. Dewicam: Detecting hidden wireless cameras via smartphones. In Proceedings of the Asia Conference on Computer and Communications Security. 1\u201313."},{"key":"e_1_3_2_9_2","doi-asserted-by":"publisher","DOI":"10.1109\/TMC.2019.2900919"},{"key":"e_1_3_2_10_2","first-page":"1085","volume-title":"Proceedings of the ACM SIGSAC Conference on Computer and Communications Security","author":"Choi Jieun","year":"2020","unstructured":"Jieun Choi, Hae-Yong Yang, and Dong-Ho Cho. 2020. TEMPEST comeback: A realistic audio eavesdropping threat on mixed-signal SoCs. In Proceedings of the ACM SIGSAC Conference on Computer and Communications Security. 1085\u20131101."},{"key":"e_1_3_2_11_2","unstructured":"D. Drab. 2003. Economic Espionage and Trade Secret Theft: Defending against the Pickpockets of the New Millennium. Retrieved from https:\/\/www.xerox.com\/downloads\/wpaper\/x\/xgs_business_insight_economic_espionage.pdf"},{"key":"e_1_3_2_12_2","unstructured":"Ettus Research. 2004. USRP B200\/B210 Networked Series. Retrieved from https:\/\/www.ettus.com\/wp-content\/uploads\/2019\/01\/b200-b210_spec_sheet.pdf"},{"key":"e_1_3_2_13_2","unstructured":"Ettus Research. 2017. USRP N200\/N210 Networked Series. Retrieved from https:\/\/www.ettus.com\/wp-content\/uploads\/2019\/01\/07495_Ettus_N200-210_DS_Flyer_HR_1.pdf"},{"key":"e_1_3_2_14_2","volume-title":"Adaptive Techniques for Mixed Signal System on Chip","author":"Fayed Ayman","year":"2006","unstructured":"Ayman Fayed and Mohammed Ismail. 2006. Adaptive Techniques for Mixed Signal System on Chip. Vol. 872. Springer Science & Business Media."},{"key":"e_1_3_2_15_2","unstructured":"Granite Island Group. 2002. Non Linear Junction Detector Review and Tutorial. Retrieved from http:\/\/www.tscm.com\/tmdenljd.html"},{"key":"e_1_3_2_16_2","first-page":"954","volume-title":"Proceedings of the ACM SIGSAC Conference on Computer and Communications Security","author":"Hayashi Yuichi","year":"2014","unstructured":"Yuichi Hayashi, Naofumi Homma, Mamoru Miura, Takafumi Aoki, and Hideaki Sone. 2014. A threat for tablet pcs in public space: Remote visualization of screen images using em emanation. In Proceedings of the ACM SIGSAC Conference on Computer and Communications Security. 954\u2013965."},{"key":"e_1_3_2_17_2","first-page":"215","volume-title":"Proceedings of the 19th Annual International Conference on Mobile Systems, Applications, and Services","author":"He Yan","year":"2021","unstructured":"Yan He, Qiuye He, Song Fang, and Yao Liu. 2021. MotionCompass: Pinpointing wireless camera via motion-activated traffic. In Proceedings of the 19th Annual International Conference on Mobile Systems, Applications, and Services. 215\u2013227."},{"key":"e_1_3_2_18_2","unstructured":"ITU. 2020. Radio Regulations. Retrieved from https:\/\/orarilokaljakartapusat.com\/wp-content\/uploads\/2020\/09\/Radio-Regulations-2020-00013-Vol.I-EA5.pdf"},{"key":"e_1_3_2_19_2","first-page":"1","volume-title":"Proceedings of the 1st ACM Conference on Embedded Systems for Energy-efficient Buildings","author":"Jin Ming","year":"2014","unstructured":"Ming Jin, Ruoxi Jia, Zhaoyi Kang, Ioannis C. Konstantakopoulos, and Costas J. Spanos. 2014. Presencesense: Zero-training algorithm for individual presence detection based on power monitoring. In Proceedings of the 1st ACM Conference on Embedded Systems for Energy-efficient Buildings. 1\u201310."},{"key":"e_1_3_2_20_2","volume-title":"Compromising Emanations: Eavesdropping Risks of Computer Displays","author":"Kuhn Markus Guenther","year":"2002","unstructured":"Markus Guenther Kuhn. 2002. Compromising Emanations: Eavesdropping Risks of Computer Displays. Ph. D. Dissertation. Citeseer."},{"key":"e_1_3_2_21_2","doi-asserted-by":"publisher","DOI":"10.5555\/829514.830537"},{"key":"e_1_3_2_22_2","first-page":"88","volume-title":"Proceedings of the International Workshop on Privacy Enhancing Technologies","author":"Kuhn Markus G.","year":"2004","unstructured":"Markus G. Kuhn. 2004. Electromagnetic eavesdropping risks of flat-panel displays. In Proceedings of the International Workshop on Privacy Enhancing Technologies. Springer, 88\u2013107."},{"key":"e_1_3_2_23_2","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2013.20"},{"key":"e_1_3_2_24_2","doi-asserted-by":"publisher","DOI":"10.1145\/3210240.3210332"},{"issue":"4","key":"e_1_3_2_25_2","first-page":"1","article-title":"CamRadar: Hidden camera detection leveraging amplitude-modulated sensor images embedded in electromagnetic emanations","volume":"6","author":"Liu Ziwei","year":"2023","unstructured":"Ziwei Liu, Feng Lin, Chao Wang, Yijie Shen, Zhongjie Ba, Li Lu, Wenyao Xu, and Kui Ren. 2023. CamRadar: Hidden camera detection leveraging amplitude-modulated sensor images embedded in electromagnetic emanations. Proc. ACM Interact. Mob. Wear. Ubiq. Technol. 6, 4 (2023), 1\u201325.","journal-title":"Proc. ACM Interact. Mob. Wear. Ubiq. Technol."},{"key":"e_1_3_2_26_2","article-title":"Screen gleaning: A screen reading TEMPEST attack on mobile devices exploiting an electromagnetic side channel","author":"Liu Zhuoran","year":"2020","unstructured":"Zhuoran Liu, Niels Samwel, Leo Weissbart, Zhengyu Zhao, Dirk Lauret, Lejla Batina, and Martha Larson. 2020. Screen gleaning: A screen reading TEMPEST attack on mobile devices exploiting an electromagnetic side channel. arXiv:2011.09877. Retrieved from https:\/\/arxiv.org\/abs\/2011.09877","journal-title":"arXiv:2011.09877"},{"key":"e_1_3_2_27_2","volume-title":"Proceedings of the Network and Distributed Systems Security Symposium (NDSS\u201924)","author":"Long Yan","year":"2024","unstructured":"Yan Long, Qinhong Jiang, Chen Yan, Tobias Alam, Xiaoyu Ji, Wenyuan Xu, and Kevin Fu. 2024. EM Eye: Characterizing electromagnetic side-channel eavesdropping on embedded cameras. In Proceedings of the Network and Distributed Systems Security Symposium (NDSS\u201924)."},{"issue":"3","key":"e_1_3_2_28_2","doi-asserted-by":"crossref","first-page":"109","DOI":"10.1049\/ecej:19900029","article-title":"Passive intermodulation interference in communication systems","volume":"2","author":"Lui P. L.","year":"1990","unstructured":"P. L. Lui. 1990. Passive intermodulation interference in communication systems. Electr. Commun. Eng. J. 2, 3 (1990), 109\u2013118.","journal-title":"Electr. Commun. Eng. J."},{"key":"e_1_3_2_29_2","first-page":"654","volume-title":"Proceedings of the IEEE International Radar Conference (RADAR\u201920)","author":"Mazzaro Gregory J.","year":"2020","unstructured":"Gregory J. Mazzaro. 2020. Nonlinear junction detection vs. electronics: System design and improved linearity. In Proceedings of the IEEE International Radar Conference (RADAR\u201920). IEEE, 654\u2013658."},{"key":"e_1_3_2_30_2","unstructured":"MediaTek. 2017. MT2523 Series Datasheet. Retrieved from https:\/\/datasheetspdf.com\/pdf-file\/1343677\/MediaTek\/MT2523\/1"},{"key":"e_1_3_2_31_2","first-page":"2809","volume-title":"Proceedings of the IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP\u201912)","author":"Mukherjee Amitav","year":"2012","unstructured":"Amitav Mukherjee and A. Lee Swindlehurst. 2012. Detecting passive eavesdroppers in the MIMO wiretap channel. In Proceedings of the IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP\u201912). IEEE, 2809\u20132812."},{"key":"e_1_3_2_32_2","doi-asserted-by":"publisher","DOI":"10.1145\/3570361.3613288"},{"key":"e_1_3_2_33_2","first-page":"253","volume-title":"Proceedings of the ACM SIGSAC Conference on Computer and Communications Security","author":"Ni Tao","year":"2023","unstructured":"Tao Ni, Xiaokuan Zhang, and Qingchuan Zhao. 2023. Recovering fingerprints from in-display fingerprint sensors via electromagnetic side channel. In Proceedings of the ACM SIGSAC Conference on Computer and Communications Security. 253\u2013267."},{"key":"e_1_3_2_34_2","first-page":"3399","volume-title":"Proceedings of the IEEE Symposium on Security and Privacy (SP\u201923)","author":"Ni Tao","year":"2023","unstructured":"Tao Ni, Xiaokuan Zhang, Chaoshun Zuo, Jianfeng Li, Zhenyu Yan, Wubing Wang, Weitao Xu, Xiapu Luo, and Qingchuan Zhao. 2023. Uncovering user interactions on smartphones via contactless wireless charging side channels. In Proceedings of the IEEE Symposium on Security and Privacy (SP\u201923). IEEE, 3399\u20133415."},{"key":"e_1_3_2_35_2","first-page":"417","volume-title":"Proceedings of the IEEE International Conference on Ultra-Wideband","author":"Park Sanghoon","year":"2006","unstructured":"Sanghoon Park, Lawrence E. Larson, and Laurence B. Milstein. 2006. Hidden mobile terminal device discovery in a UWB environment. In Proceedings of the IEEE International Conference on Ultra-Wideband. IEEE, 417\u2013421."},{"key":"e_1_3_2_36_2","doi-asserted-by":"publisher","DOI":"10.1109\/TCSII.2010.2050955"},{"key":"e_1_3_2_37_2","first-page":"1","volume-title":"Proceedings of the United States National Committee of URSI National Radio Science Meeting (USNC-URSI NRSM\u201918)","author":"Peng Zhengyu","year":"2018","unstructured":"Zhengyu Peng and Changzhi Li. 2018. Intermodulation FMCW (IM-FMCW) radar for nonlinear wearable targets detection. In Proceedings of the United States National Committee of URSI National Radio Science Meeting (USNC-URSI NRSM\u201918). IEEE, 1\u20132."},{"key":"e_1_3_2_38_2","unstructured":"Radiocommunication Sector of ITU. 2021. Technical and Operating Parameters and Spectrum use for Short-range Radiocommunication Devices. Retrieved from https:\/\/www.itu.int\/dms_pub\/itu-r\/opb\/rep\/R-REP-SM.2153-8-2021-PDF-E.pdf"},{"key":"e_1_3_2_39_2","first-page":"2475","volume-title":"Proceedings of the ACM SIGSAC Conference on Computer and Communications Security","author":"Ramesh Soundarya","year":"2022","unstructured":"Soundarya Ramesh, Ghozali Suhariyanto Hadi, Sihun Yang, Mun Choon Chan, and Jun Han. 2022. TickTock: Detecting microphone status in laptops leveraging electromagnetic leakage of clock signals. In Proceedings of the ACM SIGSAC Conference on Computer and Communications Security. 2475\u20132489."},{"key":"e_1_3_2_40_2","first-page":"273","volume-title":"Proceedings of the 15th European Radar Conference (EuRAD\u201918)","author":"Raoult J\u00e9r\u00e9my","year":"2018","unstructured":"J\u00e9r\u00e9my Raoult, Alexandre Martorell, Laurent Chusseau, and Christian Carel. 2018. Intermodulation radar for RF receiver detections. In Proceedings of the 15th European Radar Conference (EuRAD\u201918). IEEE, 273\u2013276."},{"key":"e_1_3_2_41_2","unstructured":"REALTEK. 2019. General Description of RTL8722CSM. Retrieved from https:\/\/www.realtek.com\/en\/products\/communications-network-ics\/item\/rtl8722csm"},{"key":"e_1_3_2_42_2","volume-title":"EMC of Analog Integrated Circuits","author":"Redout\u00e9 Jean-Michel","year":"2009","unstructured":"Jean-Michel Redout\u00e9 and Michiel Steyaert. 2009. EMC of Analog Integrated Circuits. Springer Science & Business Media."},{"key":"e_1_3_2_43_2","unstructured":"RF BAY Inc.2018. LNA-650: 30KHz\u2013600MHz Low Noise Amplifier. Retrieved from https:\/\/www.rfbayinc.com\/upload\/files\/lna\/lna-650.pdf"},{"key":"e_1_3_2_44_2","unstructured":"RF BAY Inc.2021. RF Amplifier MPA-10-40. Retrieved from http:\/\/mpl.jp\/amplifier\/MPA-10-40.pdf"},{"issue":"6","key":"e_1_3_2_45_2","doi-asserted-by":"crossref","first-page":"669","DOI":"10.1016\/j.bushor.2015.07.004","article-title":"The secret to protecting trade secrets: How to create positive secrecy climates in organizations","volume":"58","author":"Robertson Kirsten M.","year":"2015","unstructured":"Kirsten M. Robertson, David R. Hannah, and Brenda A. Lautsch. 2015. The secret to protecting trade secrets: How to create positive secrecy climates in organizations. Bus. Horiz. 58, 6 (2015), 669\u2013677.","journal-title":"Bus. Horiz."},{"key":"e_1_3_2_46_2","volume-title":"How to Find Hidden Cameras","author":"Roessler Marc","year":"2002","unstructured":"Marc Roessler. 2002. How to Find Hidden Cameras. March."},{"key":"e_1_3_2_47_2","doi-asserted-by":"crossref","first-page":"407","DOI":"10.1007\/978-0-387-71817-0_15","article-title":"Electromagnetic attacks and countermeasures","author":"Rohatgi Pankaj","year":"2009","unstructured":"Pankaj Rohatgi. 2009. Electromagnetic attacks and countermeasures. Cryptogr. Eng. (2009), 407\u2013430.","journal-title":"Cryptogr. Eng."},{"key":"e_1_3_2_48_2","doi-asserted-by":"crossref","unstructured":"Dinesh Sathyamoorthy Mohd Jalis Md Jelas and Shalini Shafii. 2014. Wireless spy devices: A review of technologies and detection methods. Editorial Board 7 11 (2014) 130.","DOI":"10.1016\/S2211-1220(15)00016-X"},{"key":"e_1_3_2_49_2","first-page":"123","volume-title":"Proceedings of the IEEE International Symposium on High Performance Computer Architecture (HPCA\u201920)","author":"Sehatbakhsh Nader","year":"2020","unstructured":"Nader Sehatbakhsh, Baki Berkay Yilmaz, Alenka Zajic, and Milos Prvulovic. 2020. A new side-channel vulnerability on modern computers by exploiting electromagnetic emanations from the power management unit. In Proceedings of the IEEE International Symposium on High Performance Computer Architecture (HPCA\u201920). IEEE, 123\u2013138."},{"key":"e_1_3_2_50_2","volume-title":"Proceedings of the 31st USENIX Security Symposium (USENIX Security\u201922)","author":"Sharma Rahul Anand","year":"2022","unstructured":"Rahul Anand Sharma, Elahe Soltanaghaei, Anthony Rowe, and Vyas Sekar. 2022. Lumos: Identifying and localizing diverse hidden IoT devices in an unfamiliar environment. In Proceedings of the 31st USENIX Security Symposium (USENIX Security\u201922)."},{"key":"e_1_3_2_51_2","first-page":"873","volume-title":"Proceedings of the 18th USENIX Symposium on Networked Systems Design and Implementation (NSDI\u201921)","author":"Shen Cheng","year":"2021","unstructured":"Cheng Shen and Jun Huang. 2021. EarFisher: Detecting wireless eavesdroppers by stimulating and sensing memory EMR. In Proceedings of the 18th USENIX Symposium on Networked Systems Design and Implementation (NSDI\u201921). 873\u2013886."},{"key":"e_1_3_2_52_2","article-title":"Electromagnetic fingerprinting of memory heartbeats: System and applications","author":"Shen Cheng","year":"2022","unstructured":"Cheng Shen, Jun Huang, Guangyu Sun, and Jingshu Chen. 2022. Electromagnetic fingerprinting of memory heartbeats: System and applications. Proc. ACM Interact. Mob. Wear. Ubiq. Technol. 6, 3 (2022), 1\u201323.","journal-title":"Proc. ACM Interact. Mob. Wear. Ubiq. Technol."},{"key":"e_1_3_2_53_2","first-page":"1829","volume-title":"Proceedings of the 30th USENIX Security Symposium (USENIX Security\u201921)","author":"Singh Akash Deep","year":"2021","unstructured":"Akash Deep Singh, Luis Garcia, Joseph Noor, and Mani Srivastava. 2021. I always feel like somebody\u2019s sensing me! A framework to detect, identify, and localize clandestine wireless sensors. In Proceedings of the 30th USENIX Security Symposium (USENIX Security\u201921). 1829\u20131846."},{"key":"e_1_3_2_54_2","unstructured":"Spyguy. 2020. Best Hidden Voice Recorders for 2021. Retrieved from https:\/\/www.spyguy.com\/a\/blog\/best-hidden-voice-recorders"},{"key":"e_1_3_2_55_2","doi-asserted-by":"publisher","DOI":"10.1109\/PROC.1969.7051"},{"key":"e_1_3_2_56_2","first-page":"630","volume-title":"Proceedings of the 17th International Zurich Symposium on Electromagnetic Compatibility","author":"Tosaka Toshihide","year":"2006","unstructured":"Toshihide Tosaka, Kazumasa Taira, Yukio Yamanaka, Atsuhiro Nishikata, and Mitsuo Hattori. 2006. Feasibility study for reconstruction of information from near field observations of the magnetic field of laser printer. In Proceedings of the 17th International Zurich Symposium on Electromagnetic Compatibility. IEEE, 630\u2013633."},{"key":"e_1_3_2_57_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2016.02.001"},{"key":"e_1_3_2_58_2","first-page":"1","volume-title":"Proceedings of the IEEE International Conference on Pervasive Computing and Communications (PerCom\u201919)","author":"Wu Kevin","year":"2019","unstructured":"Kevin Wu and Brent Lagesse. 2019. Do you see what I see? Detecting hidden streaming cameras through similarity of simultaneous observation. In Proceedings of the IEEE International Conference on Pervasive Computing and Communications (PerCom\u201919). IEEE, 1\u201310."},{"key":"e_1_3_2_59_2","volume-title":"University Physics","author":"Young Hugh D.","year":"1996","unstructured":"Hugh D. Young, Roger A. Freedman, T. R. Sandin, and A. Lewis Ford. 1996. University Physics. Vol. 9. Addison-Wesley Reading, MA."},{"key":"e_1_3_2_60_2","doi-asserted-by":"publisher","DOI":"10.1145\/3133956.3134052"},{"key":"e_1_3_2_61_2","volume-title":"Proceedings of the 33st USENIX Security Symposium (USENIX Security\u201924)","author":"Zhang Qibo","year":"2024","unstructured":"Qibo Zhang, Daibo Liu, Xinyu Zhang, Zhichao Cao, Fanzi Zeng, Hongbo Jiang, and Wenqiang Jin. 2024. Eye of sauron: Long-range hidden spy camera detection and positioning with inbuilt memory EM radiation. In Proceedings of the 33st USENIX Security Symposium (USENIX Security\u201924)."},{"key":"e_1_3_2_62_2","first-page":"658","volume-title":"Proceedings of the IEEE Symposium on Security and Privacy (SP\u201922)","author":"Zhou Ruochen","year":"2022","unstructured":"Ruochen Zhou, Xiaoyu Ji, Chen Yan, Yi-Chao Chen, Wenyuan Xu, and Chaohao Li. 2022. DeHiREC: Detecting hidden voice recorders via ADC electromagnetic radiation. In Proceedings of the IEEE Symposium on Security and Privacy (SP\u201922). IEEE Computer Society, 658\u2013673."}],"container-title":["ACM Transactions on Sensor Networks"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3700595","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3700595","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T01:17:28Z","timestamp":1750295848000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3700595"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,11,23]]},"references-count":61,"journal-issue":{"issue":"6","published-print":{"date-parts":[[2024,11,30]]}},"alternative-id":["10.1145\/3700595"],"URL":"https:\/\/doi.org\/10.1145\/3700595","relation":{},"ISSN":["1550-4859","1550-4867"],"issn-type":[{"type":"print","value":"1550-4859"},{"type":"electronic","value":"1550-4867"}],"subject":[],"published":{"date-parts":[[2024,11,23]]},"assertion":[{"value":"2024-03-20","order":0,"name":"received","label":"Received","group":{"name":"publication_history","label":"Publication History"}},{"value":"2024-09-17","order":2,"name":"accepted","label":"Accepted","group":{"name":"publication_history","label":"Publication History"}},{"value":"2024-11-23","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}