{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,21]],"date-time":"2025-11-21T11:33:06Z","timestamp":1763724786332,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":1,"publisher":"ACM","license":[{"start":{"date-parts":[[2026,6,29]],"date-time":"2026-06-29T00:00:00Z","timestamp":1782691200000},"content-version":"vor","delay-in-days":365,"URL":"http:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/100000001","name":"National Science Foundation","doi-asserted-by":"publisher","award":["022279"],"award-info":[{"award-number":["022279"]}],"id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100000002","name":"NIH (National Institutes of Health)","doi-asserted-by":"publisher","award":["1-R15-EB036778-01"],"award-info":[{"award-number":["1-R15-EB036778-01"]}],"id":[{"id":"10.13039\/100000002","id-type":"DOI","asserted-by":"publisher"}]},{"name":"New Hampshire-INBRE","award":["P20GM103506"],"award-info":[{"award-number":["P20GM103506"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2025,6,30]]},"DOI":"10.1145\/3716368.3735259","type":"proceedings-article","created":{"date-parts":[[2025,6,27]],"date-time":"2025-06-27T14:00:26Z","timestamp":1751032826000},"page":"397-398","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":1,"title":["Invisible Leaks: Covert Channel Exploitation in In-Sensor Computing System"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-6791-1675","authenticated-orcid":false,"given":"Mashrafi","family":"Kajol","sequence":"first","affiliation":[{"name":"Electrical and Computer Engineering, University of New Hampshire, Durham, NH, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-4413-7896","authenticated-orcid":false,"given":"Md Abdullah","family":"Al Rumon","sequence":"additional","affiliation":[{"name":"Electrical, Computer, and Biomedical Engineering, University of Rhode Island, Kingston, RI, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-4167-5202","authenticated-orcid":false,"given":"Shehjar","family":"Sadhu","sequence":"additional","affiliation":[{"name":"Electrical, Computer, and Biomedical Engineering, University of Rhode Island, Kingston, RI, USA"}]},{"ORCID":"https:\/\/orcid.org\/0009-0007-3039-744X","authenticated-orcid":false,"given":"Suparna","family":"Veeturi","sequence":"additional","affiliation":[{"name":"Electrical, Computer, and Biomedical Engineering, University of Rhode Island, Kingston, RI, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-6741-5559","authenticated-orcid":false,"given":"Dharma","family":"Rane","sequence":"additional","affiliation":[{"name":"Electrical, Computer, and Biomedical Engineering, University of Rhode Island, Kingston, RI, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-4039-4406","authenticated-orcid":false,"given":"Dhaval","family":"Solanki","sequence":"additional","affiliation":[{"name":"Electrical, Computer, and Biomedical Engineering, University of Rhode Island, Kingston, RI, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-6423-0823","authenticated-orcid":false,"given":"Kunal","family":"Mankodiya","sequence":"additional","affiliation":[{"name":"Electrical, Computer, and Biomedical Engineering, University of Rhode Island, Kingston, RI, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-4150-8674","authenticated-orcid":false,"given":"Wei","family":"Lu","sequence":"additional","affiliation":[{"name":"Computer Science, Keene State College, Keene, NH, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-7232-8529","authenticated-orcid":false,"given":"Qiaoyan","family":"Yu","sequence":"additional","affiliation":[{"name":"Electrical and Computer Engineering, University of New Hampshire, Durham, NH, USA"}]}],"member":"320","published-online":{"date-parts":[[2025,6,29]]},"reference":[{"key":"e_1_3_3_2_2_2","unstructured":"Mashrafi Kajol and Qiaoyan Yu. 2025. New Security Challenges Towards In-Sensor Computing Systems. arxiv:https:\/\/arXiv.org\/abs\/2502.05046\u00a0[cs.CR] https:\/\/arxiv.org\/abs\/2502.05046"}],"event":{"name":"GLSVLSI '25: Great Lakes Symposium on VLSI 2025","sponsor":["SIGDA ACM Special Interest Group on Design Automation"],"location":"New Orleans LA USA","acronym":"GLSVLSI '25"},"container-title":["Proceedings of the Great Lakes Symposium on VLSI 2025"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/abs\/10.1145\/3716368.3735259","content-type":"text\/html","content-version":"vor","intended-application":"syndication"}],"deposited":{"date-parts":[[2025,6,27]],"date-time":"2025-06-27T14:37:56Z","timestamp":1751035076000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3716368.3735259"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,6,29]]},"references-count":1,"alternative-id":["10.1145\/3716368.3735259","10.1145\/3716368"],"URL":"https:\/\/doi.org\/10.1145\/3716368.3735259","relation":{},"subject":[],"published":{"date-parts":[[2025,6,29]]},"assertion":[{"value":"2025-06-29","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}