{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,5,10]],"date-time":"2024-05-10T06:33:43Z","timestamp":1715322823950},"reference-count":20,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"4","license":[{"start":{"date-parts":[[2022,10,1]],"date-time":"2022-10-01T00:00:00Z","timestamp":1664582400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/legalcode"}],"funder":[{"DOI":"10.13039\/501100002341","name":"Academy of Finland","doi-asserted-by":"publisher","award":["339614"],"id":[{"id":"10.13039\/501100002341","id-type":"DOI","asserted-by":"publisher"}]},{"name":"European Social Fund via the IT Academy Programme"},{"DOI":"10.13039\/501100004181","name":"Nokia Foundation","doi-asserted-by":"publisher","award":["20220138"],"id":[{"id":"10.13039\/501100004181","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Pervasive Comput."],"published-print":{"date-parts":[[2022,10,1]]},"DOI":"10.1109\/mprv.2022.3187464","type":"journal-article","created":{"date-parts":[[2022,7,14]],"date-time":"2022-07-14T19:39:17Z","timestamp":1657827557000},"page":"33-42","source":"Crossref","is-referenced-by-count":2,"title":["See No Evil: Discovering Covert Surveillance Devices Using Thermal Imaging"],"prefix":"10.1109","volume":"21","author":[{"ORCID":"http:\/\/orcid.org\/0000-0002-6481-3559","authenticated-orcid":false,"given":"Agustin","family":"Zuniga","sequence":"first","affiliation":[{"name":"Department of Computer Science, University of Helsinki, Helsinki, Finland"}]},{"ORCID":"http:\/\/orcid.org\/0000-0001-9923-9879","authenticated-orcid":false,"given":"Naser Hossein","family":"Motlagh","sequence":"additional","affiliation":[{"name":"Department of Computer Science, University of Helsinki, Helsinki, Finland"}]},{"ORCID":"http:\/\/orcid.org\/0000-0002-6135-932X","authenticated-orcid":false,"given":"Mohammad A.","family":"Hoque","sequence":"additional","affiliation":[{"name":"Department of Computer Science, University of Helsinki, Helsinki, Finland"}]},{"ORCID":"http:\/\/orcid.org\/0000-0003-4220-3650","authenticated-orcid":false,"given":"Sasu","family":"Tarkoma","sequence":"additional","affiliation":[{"name":"Department of Computer Science, University of Helsinki, Helsinki, Finland"}]},{"ORCID":"http:\/\/orcid.org\/0000-0003-4551-629X","authenticated-orcid":false,"given":"Huber","family":"Flores","sequence":"additional","affiliation":[{"name":"Institute of Computer Science, University of Tartu and Estonia, Tartu, Estonia"}]},{"ORCID":"http:\/\/orcid.org\/0000-0001-8262-6434","authenticated-orcid":false,"given":"Petteri","family":"Nurmi","sequence":"additional","affiliation":[{"name":"Department of Computer Science, University of Helsinki, Helsinki, Finland"}]}],"member":"263","reference":[{"key":"ref1","article-title":"Airbnb hosts are recording their guests with hidden cameras","author":"Meza","year":"2022"},{"issue":"1","key":"ref2","first-page":"1","article-title":"Spy camera epidemic in Korea: A situational analysis","volume":"2","author":"Teshome","year":"2019","journal-title":"Asian J. Sociol. Res."},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1145\/2370216.2370224"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1145\/3313831.3376585"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1145\/3210240.3210332"},{"key":"ref6","article-title":"Hidden camera detectors tested","author":"Ward","year":"2022"},{"key":"ref7","article-title":"How to find hidden cameras","author":"Roessler","year":"2002"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/PERCOMW.2018.8480257"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/TMC.2019.2900919"},{"key":"ref10","first-page":"1829","article-title":"I always feel like somebody\u2019s sensing me! a framework to detect, identify, and localize clandestine wireless sensors","author":"Singh","year":"2021","journal-title":"Proc. USENIX Secur. Symp., USENIX Association"},{"key":"ref11","first-page":"55","article-title":"You are what you broadcast: Identification of mobile and IoT devices from (public) WiFi","author":"Yu","year":"2020","journal-title":"Proc. USENIX Secur. Symp., USENIX Association"},{"key":"ref12","article-title":"How to find hidden cameras","author":"Tung","year":"2022"},{"key":"ref13","article-title":"Thermal emissions spectrum analysis","year":"2022"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1145\/3301293.3302364"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1145\/3379092.3379094"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/PERCOM50583.2021.9439120"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/PERCOM.2019.8767423"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1145\/3474085.3475552"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1145\/2702123.2702290"},{"key":"ref20","first-page":"6","article-title":"Heat of the moment: Characterizing the efficacy of thermal camera-based attacks","author":"Mowery","year":"2011","journal-title":"Proc. 5th USENIX Conf. Offensive Technol."}],"container-title":["IEEE Pervasive Computing"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/7756\/10002256\/09830124.pdf?arnumber=9830124","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,2,1]],"date-time":"2024-02-01T06:33:34Z","timestamp":1706769214000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9830124\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,10,1]]},"references-count":20,"journal-issue":{"issue":"4"},"URL":"https:\/\/doi.org\/10.1109\/mprv.2022.3187464","relation":{},"ISSN":["1536-1268","1558-2590"],"issn-type":[{"value":"1536-1268","type":"print"},{"value":"1558-2590","type":"electronic"}],"subject":[],"published":{"date-parts":[[2022,10,1]]}}}