{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,5,2]],"date-time":"2025-05-02T23:44:30Z","timestamp":1746229470471,"version":"3.37.3"},"publisher-location":"New York, NY, USA","reference-count":62,"publisher":"ACM","funder":[{"DOI":"10.13039\/501100012659","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61872285"],"id":[{"id":"10.13039\/501100012659","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2020,9,21]]},"DOI":"10.1145\/3372224.3419210","type":"proceedings-article","created":{"date-parts":[[2020,9,19]],"date-time":"2020-09-19T02:16:25Z","timestamp":1600481785000},"page":"1-13","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":21,"title":["Deaf-aid"],"prefix":"10.1145","author":[{"given":"Ming","family":"Gao","sequence":"first","affiliation":[{"name":"Zhejiang University"}]},{"given":"Feng","family":"Lin","sequence":"additional","affiliation":[{"name":"Zhejiang University"}]},{"given":"Weiye","family":"Xu","sequence":"additional","affiliation":[{"name":"Zhejiang University"}]},{"given":"Muertikepu","family":"Nuermaimaiti","sequence":"additional","affiliation":[{"name":"Zhejiang University"}]},{"given":"Jinsong","family":"Han","sequence":"additional","affiliation":[{"name":"Zhejiang University"}]},{"given":"Wenyao","family":"Xu","sequence":"additional","affiliation":[{"name":"SUNY Buffalo"}]},{"given":"Kui","family":"Ren","sequence":"additional","affiliation":[{"name":"Zhejiang University"}]}],"member":"320","published-online":{"date-parts":[[2020,9,18]]},"reference":[{"volume-title":"Proceedings of the Network and Distributed System Security Symposium.","author":"Abdullah H.","key":"e_1_3_2_1_1_1","unstructured":"H. Abdullah , W. Garcia , C. Peeters , P. Traynor , K. R. B. Butler , and J. Wilson . 2019. Practical Hidden Voice Attacks against Speech and Speaker Recognition Systems . In Proceedings of the Network and Distributed System Security Symposium. H. Abdullah, W. Garcia, C. Peeters, P. Traynor, K. R. B. Butler, and J. Wilson. 2019. Practical Hidden Voice Attacks against Speech and Speaker Recognition Systems. In Proceedings of the Network and Distributed System Security Symposium."},{"volume-title":"Proceedings of the IEEE Symposium on Security and Privacy.","author":"Anand S.","key":"e_1_3_2_1_2_1","unstructured":"S. Anand and N. Saxena . 2018. Speechless: Analyzing the Threat to Speech Privacy from Smartphone Motion Sensors . In Proceedings of the IEEE Symposium on Security and Privacy. S. Anand and N. Saxena. 2018. Speechless: Analyzing the Threat to Speech Privacy from Smartphone Motion Sensors. In Proceedings of the IEEE Symposium on Security and Privacy."},{"volume-title":"Proceedings of the Network and Distributed System Security Symposium.","author":"Ba Z.","key":"e_1_3_2_1_3_1","unstructured":"Z. Ba , T. Zheng , X. Zhang , Z. Qin , B. Li , X. Liu , and K. Ren . 2020. Learning-based Practical Smartphone Eavesdropping with Built-in Accelerometer . In Proceedings of the Network and Distributed System Security Symposium. Z. Ba, T. Zheng, X. Zhang, Z. Qin, B. Li, X. Liu, and K. Ren. 2020. Learning-based Practical Smartphone Eavesdropping with Built-in Accelerometer. In Proceedings of the Network and Distributed System Security Symposium."},{"volume-title":"Proceedings of the Eleventh European Conference on Computer Systems.","author":"Bartolini D. B.","key":"e_1_3_2_1_4_1","unstructured":"D. B. Bartolini , P. Miedl , and L. Thiele . 2016. On the capacity of thermal covert channels in multicores . In Proceedings of the Eleventh European Conference on Computer Systems. D. B. Bartolini, P. Miedl, and L. Thiele. 2016. On the capacity of thermal covert channels in multicores. In Proceedings of the Eleventh European Conference on Computer Systems."},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1109\/26.539767"},{"volume-title":"Proceedings of the 10th ACM Conference on Security and Privacy in Wireless and Mobile Networks.","author":"Block K.","key":"e_1_3_2_1_6_1","unstructured":"K. Block , S. Narain , and G. Noubir . 2017. An Autonomic and Permissionless Android Covert Channel . In Proceedings of the 10th ACM Conference on Security and Privacy in Wireless and Mobile Networks. K. Block, S. Narain, and G. Noubir. 2017. An Autonomic and Permissionless Android Covert Channel. In Proceedings of the 10th ACM Conference on Security and Privacy in Wireless and Mobile Networks."},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1109\/mic.2012.29"},{"key":"e_1_3_2_1_8_1","unstructured":"Bosch. 2018. BMI160 Datasheet. https:\/\/www.bosch-sensortec.com\/products\/motion-sensors\/imus\/bmi160.html. Bosch. 2018. BMI160 Datasheet. https:\/\/www.bosch-sensortec.com\/products\/motion-sensors\/imus\/bmi160.html."},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"crossref","unstructured":"L. Cai and H. Chen. 2012. On the Practicality of Motion Based Keystroke Inference Attack. In Trust and Trustworthy Computing - 5th International Conference. L. Cai and H. Chen. 2012. On the Practicality of Motion Based Keystroke Inference Attack. In Trust and Trustworthy Computing - 5th International Conference.","DOI":"10.1007\/978-3-642-30921-2_16"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIE.2010.2070772"},{"volume-title":"On the Degradation of MEMS Gyroscope Performance in the Presence of High Power Acoustic Noise. In IEEE International Symposium on Industrial Electronics.","author":"Dean R. N.","key":"e_1_3_2_1_11_1","unstructured":"R. N. Dean , G. T. Flowers , A. S. Hodel , G. Roth , S. Castro , R. Zhou , A. Moreira , A. Ahmed , R. Rifki , B. E. Grantham , D. Bittle , and J. Brunsch . 2007 . On the Degradation of MEMS Gyroscope Performance in the Presence of High Power Acoustic Noise. In IEEE International Symposium on Industrial Electronics. R. N. Dean, G. T. Flowers, A. S. Hodel, G. Roth, S. Castro, R. Zhou, A. Moreira, A. Ahmed, R. Rifki, B. E. Grantham, D. Bittle, and J. Brunsch. 2007. On the Degradation of MEMS Gyroscope Performance in the Presence of High Power Acoustic Noise. In IEEE International Symposium on Industrial Electronics."},{"volume-title":"AccelPrint: Imperfections of Accelerometers Make Smartphones Trackable. In Network and Distributed System Security Symposium.","author":"Dey S.","key":"e_1_3_2_1_12_1","unstructured":"S. Dey , N. Roy , W. Xu , R. R. Choudhury , and S. Nelakuditi . 2014 . AccelPrint: Imperfections of Accelerometers Make Smartphones Trackable. In Network and Distributed System Security Symposium. S. Dey, N. Roy, W. Xu, R. R. Choudhury, and S. Nelakuditi. 2014. AccelPrint: Imperfections of Accelerometers Make Smartphones Trackable. In Network and Distributed System Security Symposium."},{"volume-title":"10th USENIX Workshop on Offensive Technologies.","author":"Farshteindiker B.","key":"e_1_3_2_1_13_1","unstructured":"B. Farshteindiker , N. Hasidim , A. Grosz , and Y. Oren . 2016. How to Phone Home with Someone Else's Phone: Information Exfiltration Using Intentional Sound Noise on Gyroscopic Sensors . In 10th USENIX Workshop on Offensive Technologies. B. Farshteindiker, N. Hasidim, A. Grosz, and Y. Oren. 2016. How to Phone Home with Someone Else's Phone: Information Exfiltration Using Intentional Sound Noise on Gyroscopic Sensors. In 10th USENIX Workshop on Offensive Technologies."},{"key":"e_1_3_2_1_14_1","unstructured":"GSMArena. 2017. Mobile Release Date Price Specs Features Review News. https:\/\/www.gsmarena.com. GSMArena. 2017. Mobile Release Date Price Specs Features Review News. https:\/\/www.gsmarena.com."},{"key":"e_1_3_2_1_15_1","unstructured":"GSMArena. 2017. Samsung Galaxy S8. https:\/\/www.gsmarena.com\/samsung_galaxy_s8-8161.php. GSMArena. 2017. Samsung Galaxy S8. https:\/\/www.gsmarena.com\/samsung_galaxy_s8-8161.php."},{"volume-title":"9th International Conference on Malicious and Unwanted Software.","author":"Guri M.","key":"e_1_3_2_1_16_1","unstructured":"M. Guri , G. Kedma , A. Kachlon , and Y. Elovici . 2014. AirHopper: Bridging the air-gap between isolated networks and mobile phones using radio frequencies . In 9th International Conference on Malicious and Unwanted Software. M. Guri, G. Kedma, A. Kachlon, and Y. Elovici. 2014. AirHopper: Bridging the air-gap between isolated networks and mobile phones using radio frequencies. In 9th International Conference on Malicious and Unwanted Software."},{"volume-title":"IEEE 28th Computer Security Foundations Symposium.","author":"Guri M.","key":"e_1_3_2_1_17_1","unstructured":"M. Guri , M. Monitz , Y. Mirski , and Y. Elovici . 2015. BitWhisper: Covert Signaling Channel between Air-Gapped Computers Using Thermal Manipulations . In IEEE 28th Computer Security Foundations Symposium. M. Guri, M. Monitz, Y. Mirski, and Y. Elovici. 2015. BitWhisper: Covert Signaling Channel between Air-Gapped Computers Using Thermal Manipulations. In IEEE 28th Computer Security Foundations Symposium."},{"volume-title":"16th ACM\/IEEE International Conference on Information Processing in Sensor Networks.","author":"Han J.","key":"e_1_3_2_1_18_1","unstructured":"J. Han , A. J. Chung , and P. Tague . 2017. PitchIn: Eavesdropping via Intelligible Speech Reconstruction Using Non-acoustic Sensor Fusion . In 16th ACM\/IEEE International Conference on Information Processing in Sensor Networks. J. Han, A. J. Chung, and P. Tague. 2017. PitchIn: Eavesdropping via Intelligible Speech Reconstruction Using Non-acoustic Sensor Fusion. In 16th ACM\/IEEE International Conference on Information Processing in Sensor Networks."},{"key":"e_1_3_2_1_19_1","unstructured":"Harman. 2019. JBL STADIUM GTO750T. https:\/\/www.onlinecarstereo.com\/CarAudio\/p_51143_JBL_STADIUMGTO750T.aspx. Harman. 2019. JBL STADIUM GTO750T. https:\/\/www.onlinecarstereo.com\/CarAudio\/p_51143_JBL_STADIUMGTO750T.aspx."},{"key":"e_1_3_2_1_20_1","unstructured":"HiVi. 2013. SS1II. http:\/\/www.hivi.com\/products\/detail.aspx?pid=100000443464649. HiVi. 2013. SS1II. http:\/\/www.hivi.com\/products\/detail.aspx?pid=100000443464649."},{"key":"e_1_3_2_1_21_1","volume-title":"Proceedings of the Royal Society of London 454, 1971","author":"Huang N. E.","year":"1998","unstructured":"N. E. Huang , Z. Shen , S. R. Long , M. C. Wu , H. H. Shih , Q. Zheng , N.-C. Yen , C. C. Tung , and H. H. Liu . 1998. The empirical mode decomposition and the Hilbert spectrum for nonlinear and non-stationary time series analysis . Proceedings of the Royal Society of London 454, 1971 ( 1998 ), 903--995. N. E. Huang, Z. Shen, S. R. Long, M. C. Wu, H. H. Shih, Q. Zheng, N.-C. Yen, C. C. Tung, and H. H. Liu. 1998. The empirical mode decomposition and the Hilbert spectrum for nonlinear and non-stationary time series analysis. Proceedings of the Royal Society of London 454, 1971 (1998), 903--995."},{"volume-title":"3rd International Conference on Communication Systems Software and Middleware and Workshops.","author":"Hunkeler U.","key":"e_1_3_2_1_22_1","unstructured":"U. Hunkeler , H. L. Truong , and A. Stanford-Clark . 2008. MQTT-S --- A publish\/subscribe protocol for Wireless Sensor Networks . In 3rd International Conference on Communication Systems Software and Middleware and Workshops. U. Hunkeler, H. L. Truong, and A. Stanford-Clark. 2008. MQTT-S --- A publish\/subscribe protocol for Wireless Sensor Networks. In 3rd International Conference on Communication Systems Software and Middleware and Workshops."},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1109\/72.761722"},{"key":"e_1_3_2_1_24_1","volume-title":"Worldwide Internet of Things Forecast","author":"DC.","year":"2019","unstructured":"I DC. 2019. Worldwide Internet of Things Forecast , 2019 --2023. https:\/\/www.idc.com\/getdoc.jsp?containerId=US45373120. IDC. 2019. Worldwide Internet of Things Forecast, 2019--2023. https:\/\/www.idc.com\/getdoc.jsp?containerId=US45373120."},{"key":"e_1_3_2_1_25_1","unstructured":"Invensense. 2015. MPU-6050 Datasheet. https:\/\/www.invensense.com\/wp-content\/uploads\/2015\/02\/MPU-6000-Datasheet1.pdf. Invensense. 2015. MPU-6050 Datasheet. https:\/\/www.invensense.com\/wp-content\/uploads\/2015\/02\/MPU-6000-Datasheet1.pdf."},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1016\/0734-189X(85)90125-2"},{"volume-title":"33rd Annual Conference of the IEEE Industrial Electronics Society.","author":"Lee J.","key":"e_1_3_2_1_27_1","unstructured":"J. Lee , Y. Su , and C. Shen . 2007. A Comparative Study of Wireless Protocols: Bluetooth, UWB, ZigBee, and Wi-Fi . In 33rd Annual Conference of the IEEE Industrial Electronics Society. J. Lee, Y. Su, and C. Shen. 2007. A Comparative Study of Wireless Protocols: Bluetooth, UWB, ZigBee, and Wi-Fi. In 33rd Annual Conference of the IEEE Industrial Electronics Society."},{"volume-title":"Proceedings of the 11th USENIX Symposium on Networked Systems Design and Implementation.","author":"Lee K.","key":"e_1_3_2_1_28_1","unstructured":"K. Lee , H. Wang , and H. Weatherspoon . 2014. PHY Covert Channels: Can you see the Idles? . In Proceedings of the 11th USENIX Symposium on Networked Systems Design and Implementation. K. Lee, H. Wang, and H. Weatherspoon. 2014. PHY Covert Channels: Can you see the Idles?. In Proceedings of the 11th USENIX Symposium on Networked Systems Design and Implementation."},{"volume-title":"Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security.","author":"Liu X.","key":"e_1_3_2_1_29_1","unstructured":"X. Liu , Z. Zhou , W. Diao , Z. Li , and K. Zhang . 2015. When Good Becomes Evil: Keystroke Inference with Smartwatch . In Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security. X. Liu, Z. Zhou, W. Diao, Z. Li, and K. Zhang. 2015. When Good Becomes Evil: Keystroke Inference with Smartwatch. In Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security."},{"volume-title":"Elements of Information Theory","author":"C. T. M.","key":"e_1_3_2_1_30_1","unstructured":"C. T. M. 2017. Elements of Information Theory (Wiley Series in Telecommunications and Signal Processing). Wiley-Interscience . C. T. M. 2017. Elements of Information Theory (Wiley Series in Telecommunications and Signal Processing). Wiley-Interscience."},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1109\/MPRV.2005.50"},{"key":"e_1_3_2_1_32_1","first-page":"3","volume-title":"Proceedings of the ACM on Interactive, Mobile, Wearable and Ubiquitous Technologies 3","author":"Maiti A.","year":"2019","unstructured":"A. Maiti and M. Jadliwala . 2019. Light Ears: Information Leakage via Smart Lights . Proceedings of the ACM on Interactive, Mobile, Wearable and Ubiquitous Technologies 3 , 3 ( 2019 ), 98:1--98:27. A. Maiti and M. Jadliwala. 2019. Light Ears: Information Leakage via Smart Lights. Proceedings of the ACM on Interactive, Mobile, Wearable and Ubiquitous Technologies 3, 3 (2019), 98:1--98:27."},{"volume-title":"Proceedings of the 23rd USENIX Security Symposium.","author":"Michalevsky Y.","key":"e_1_3_2_1_33_1","unstructured":"Y. Michalevsky , D. Boneh , and G. Nakibly . 2014. Gyrophone: Recognizing Speech from Gyroscope Signals . In Proceedings of the 23rd USENIX Security Symposium. Y. Michalevsky, D. Boneh, and G. Nakibly. 2014. Gyrophone: Recognizing Speech from Gyroscope Signals. In Proceedings of the 23rd USENIX Security Symposium."},{"key":"e_1_3_2_1_34_1","volume-title":"Source separation from single-channel recordings by combining empirical-mode decomposition and independent component analysis","author":"Mijovic B.","year":"2010","unstructured":"B. Mijovic , M. De Vos , I. Gligorijevic , J. Taelman , and S. Van Huffel . 2010. Source separation from single-channel recordings by combining empirical-mode decomposition and independent component analysis . IEEE transactions on biomedical engineering 57, 9 ( 2010 ), 2188--2196. B. Mijovic, M. De Vos, I. Gligorijevic, J. Taelman, and S. Van Huffel. 2010. Source separation from single-channel recordings by combining empirical-mode decomposition and independent component analysis. IEEE transactions on biomedical engineering 57, 9 (2010), 2188--2196."},{"volume-title":"The 10th International Conference on Mobile Systems, Applications, and Services.","author":"Miluzzo E.","key":"e_1_3_2_1_35_1","unstructured":"E. Miluzzo , A. Varshavsky , S. Balakrishnan , and R. R. Choudhury . 2012. Tapprints: your finger taps have fingerprints . In The 10th International Conference on Mobile Systems, Applications, and Services. E. Miluzzo, A. Varshavsky, S. Balakrishnan, and R. R. Choudhury. 2012. Tapprints: your finger taps have fingerprints. In The 10th International Conference on Mobile Systems, Applications, and Services."},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1145\/2534169.2486037"},{"volume-title":"Proceedings of the Twelfth Workshop on Mobile Computing Systems & Applications.","author":"Owusu E.","key":"e_1_3_2_1_37_1","unstructured":"E. Owusu , J. Han , S. Das , A. Perrig , and J. Zhang . 2012. Accessory: password inference using accelerometers on smartphones . In Proceedings of the Twelfth Workshop on Mobile Computing Systems & Applications. E. Owusu, J. Han, S. Das, A. Perrig, and J. Zhang. 2012. Accessory: password inference using accelerometers on smartphones. In Proceedings of the Twelfth Workshop on Mobile Computing Systems & Applications."},{"volume-title":"IEEE 15th Conference on Emerging Technologies Factory Automation.","author":"Ploennigs J.","key":"e_1_3_2_1_38_1","unstructured":"J. Ploennigs , U. Ryssel , and K. Kabitzsch . 2010. Performance analysis of the EnOcean wireless sensor network protocol . In IEEE 15th Conference on Emerging Technologies Factory Automation. J. Ploennigs, U. Ryssel, and K. Kabitzsch. 2010. Performance analysis of the EnOcean wireless sensor network protocol. In IEEE 15th Conference on Emerging Technologies Factory Automation."},{"key":"e_1_3_2_1_39_1","volume-title":"Fourteenth European Conference on Optical Communication","volume":"1","author":"Prucnal P. R.","unstructured":"P. R. Prucnal and P. A. Perrier . 1988. Optical self-routing in a self-clocked photonic switch using pulse-interval encoding . In Fourteenth European Conference on Optical Communication , Vol. 1 . 259--263. P. R. Prucnal and P. A. Perrier. 1988. Optical self-routing in a self-clocked photonic switch using pulse-interval encoding. In Fourteenth European Conference on Optical Communication, Vol. 1. 259--263."},{"volume-title":"13th USENIX Symposium on Networked Systems Design and Implementation.","author":"Roy N.","key":"e_1_3_2_1_40_1","unstructured":"N. Roy and R. R. Choudhury . 2016. Ripple II: Faster Communication through Physical Vibration . In 13th USENIX Symposium on Networked Systems Design and Implementation. N. Roy and R. R. Choudhury. 2016. Ripple II: Faster Communication through Physical Vibration. In 13th USENIX Symposium on Networked Systems Design and Implementation."},{"volume-title":"12th USENIX Symposium on Networked Systems Design and Implementation.","author":"Roy N.","key":"e_1_3_2_1_41_1","unstructured":"N. Roy , M. Gowda , and R. R. Choudhury . 2015. Ripple: Communicating through Physical Vibration . In 12th USENIX Symposium on Networked Systems Design and Implementation. N. Roy, M. Gowda, and R. R. Choudhury. 2015. Ripple: Communicating through Physical Vibration. In 12th USENIX Symposium on Networked Systems Design and Implementation."},{"volume-title":"Proceedings of 24th USENIX Security Symposium.","author":"Son Y.","key":"e_1_3_2_1_42_1","unstructured":"Y. Son , H. Shin , D. Kim , Y. Park , J. Noh , K. Choi , J. Choi , and Y. Kim . 2015. Rocking Drones with Intentional Sound Noise on Gyroscopic Sensors . In Proceedings of 24th USENIX Security Symposium. Y. Son, H. Shin, D. Kim, Y. Park, J. Noh, K. Choi, J. Choi, and Y. Kim. 2015. Rocking Drones with Intentional Sound Noise on Gyroscopic Sensors. In Proceedings of 24th USENIX Security Symposium."},{"volume-title":"Proceedings of the IEEE\/ION Position, Location and Navigation Symposium.","author":"Stebler Y.","key":"e_1_3_2_1_43_1","unstructured":"Y. Stebler , S. Guerrier , J. Skaloud , and M. Victoria-Feser . 2012. A framework for inertial sensor calibration using complex stochastic error models . In Proceedings of the IEEE\/ION Position, Location and Navigation Symposium. Y. Stebler, S. Guerrier, J. Skaloud, and M. Victoria-Feser. 2012. A framework for inertial sensor calibration using complex stochastic error models. In Proceedings of the IEEE\/ION Position, Location and Navigation Symposium."},{"key":"e_1_3_2_1_44_1","volume-title":"Light Commands: Laser-Based Audio Injection Attacks on Voice-Controllable Systems. arXiv:2006.11946","author":"Sugawara T.","year":"2019","unstructured":"T. Sugawara , B. Cyr , S. Rampazzi , D. Genkin , and K. Fu . 2019 . Light Commands: Laser-Based Audio Injection Attacks on Voice-Controllable Systems. arXiv:2006.11946 T. Sugawara, B. Cyr, S. Rampazzi, D. Genkin, and K. Fu. 2019. Light Commands: Laser-Based Audio Injection Attacks on Voice-Controllable Systems. arXiv:2006.11946"},{"volume-title":"Error Control Coding: From Theory to Practice","author":"Sweeney P.","key":"e_1_3_2_1_45_1","unstructured":"P. Sweeney . 2002. Error Control Coding: From Theory to Practice . John Wiley Sons, Inc. P. Sweeney. 2002. Error Control Coding: From Theory to Practice. John Wiley Sons, Inc."},{"volume-title":"Theory of vibration with applications","author":"Thomson W. T.","key":"e_1_3_2_1_46_1","unstructured":"W. T. Thomson . 1981. Theory of vibration with applications . Prentice Hall . W. T. Thomson. 1981. Theory of vibration with applications. Prentice Hall."},{"volume-title":"WALNUT: Waging Doubt on the Integrity of MEMS Accelerometers with Acoustic Injection Attacks. In IEEE European Symposium on Security and Privacy.","author":"Trippel T.","key":"e_1_3_2_1_47_1","unstructured":"T. Trippel , O. Weisse , W. Xu , P. Honeyman , and K. Fu . 2017 . WALNUT: Waging Doubt on the Integrity of MEMS Accelerometers with Acoustic Injection Attacks. In IEEE European Symposium on Security and Privacy. T. Trippel, O. Weisse, W. Xu, P. Honeyman, and K. Fu. 2017. WALNUT: Waging Doubt on the Integrity of MEMS Accelerometers with Acoustic Injection Attacks. In IEEE European Symposium on Security and Privacy."},{"volume-title":"Proceedings of 27th USENIX Security Symposium.","author":"Tu Y.","key":"e_1_3_2_1_48_1","unstructured":"Y. Tu , Z. Lin , I. Lee , and X. Hei . 2018. Injected and Delivered: Fabricating Implicit Control over Actuation Systems by Spoofing Inertial Sensors . In Proceedings of 27th USENIX Security Symposium. Y. Tu, Z. Lin, I. Lee, and X. Hei. 2018. Injected and Delivered: Fabricating Implicit Control over Actuation Systems by Spoofing Inertial Sensors. In Proceedings of 27th USENIX Security Symposium."},{"key":"e_1_3_2_1_49_1","doi-asserted-by":"publisher","DOI":"10.1109\/mic.2006.116"},{"volume-title":"Proceedings of the 11th ACM on Asia Conference on Computer and Communications Security.","author":"Wang C.","key":"e_1_3_2_1_50_1","unstructured":"C. Wang , X. Guo , Y. Wang , Y. Chen , and B. Liu . 2016. Friend or Foe?: Your Wearable Devices Reveal Your Personal PIN . In Proceedings of the 11th ACM on Asia Conference on Computer and Communications Security. C. Wang, X. Guo, Y. Wang, Y. Chen, and B. Liu. 2016. Friend or Foe?: Your Wearable Devices Reveal Your Personal PIN. In Proceedings of the 11th ACM on Asia Conference on Computer and Communications Security."},{"key":"e_1_3_2_1_51_1","doi-asserted-by":"crossref","unstructured":"Z. Wang W. Zhu J. Miao H. Zhu C. Chao and O. K. Tan. 2005. Micromachined thick film piezoelectric ultrasonic transducer array. Sensors Actuators A Physical 130--131 (2005) 485--490. Z. Wang W. Zhu J. Miao H. Zhu C. Chao and O. K. Tan. 2005. Micromachined thick film piezoelectric ultrasonic transducer array. Sensors Actuators A Physical 130--131 (2005) 485--490.","DOI":"10.1016\/j.sna.2005.10.054"},{"key":"e_1_3_2_1_52_1","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2007.343615"},{"key":"e_1_3_2_1_53_1","unstructured":"Wikipedia. 2020. Gyroscope. https:\/\/en.wikipedia.org\/wiki\/Gyroscope. Wikipedia. 2020. Gyroscope. https:\/\/en.wikipedia.org\/wiki\/Gyroscope."},{"key":"e_1_3_2_1_54_1","unstructured":"Wikipedia. 2020. Hi-Fi. https:\/\/en.wikipedia.org\/wiki\/High_fidelity. Wikipedia. 2020. Hi-Fi. https:\/\/en.wikipedia.org\/wiki\/High_fidelity."},{"key":"e_1_3_2_1_55_1","doi-asserted-by":"crossref","unstructured":"Z. Wu and N. E. Huang. 2009. Ensemble empirical mode decomposition: a noise-assisted data analysis method. Advances in adaptive data analysis 1 1 (2009) 1--41. Z. Wu and N. E. Huang. 2009. Ensemble empirical mode decomposition: a noise-assisted data analysis method. Advances in adaptive data analysis 1 1 (2009) 1--41.","DOI":"10.1142\/S1793536909000047"},{"volume-title":"Proceedings of the 21th USENIX Security Symposium.","author":"Wu Z.","key":"e_1_3_2_1_56_1","unstructured":"Z. Wu , Z. Xu , and H. Wang . 2012. Whispers in the Hyper-space: High-speed Covert Channel Attacks in the Cloud . In Proceedings of the 21th USENIX Security Symposium. Z. Wu, Z. Xu, and H. Wang. 2012. Whispers in the Hyper-space: High-speed Covert Channel Attacks in the Cloud. In Proceedings of the 21th USENIX Security Symposium."},{"key":"e_1_3_2_1_57_1","doi-asserted-by":"publisher","DOI":"10.1109\/TNET.2014.2304439"},{"volume-title":"Proceedings of the Fifth ACM Conference on Security and Privacy in Wireless and Mobile Networks.","author":"Xu Z.","key":"e_1_3_2_1_58_1","unstructured":"Z. Xu , K. Bai , and S. Zhu . 2012. TapLogger: inferring user inputs on smartphone touchscreens using on-board motion sensors . In Proceedings of the Fifth ACM Conference on Security and Privacy in Wireless and Mobile Networks. Z. Xu, K. Bai, and S. Zhu. 2012. TapLogger: inferring user inputs on smartphone touchscreens using on-board motion sensors. In Proceedings of the Fifth ACM Conference on Security and Privacy in Wireless and Mobile Networks."},{"volume-title":"The 9th International Conference on Advanced Communication Technology.","author":"Yum C.","key":"e_1_3_2_1_59_1","unstructured":"C. Yum , Y. Beun , S. Kang , Y. Lee , and J. Song . 2007. Methods to use 6LoWPAN in IPv4 network . In The 9th International Conference on Advanced Communication Technology. C. Yum, Y. Beun, S. Kang, Y. Lee, and J. Song. 2007. Methods to use 6LoWPAN in IPv4 network. In The 9th International Conference on Advanced Communication Technology."},{"volume-title":"SensorID: Sensor Calibration Fingerprinting for Smartphones. In IEEE Symposium on Security and Privacy.","author":"Zhang J.","key":"e_1_3_2_1_60_1","unstructured":"J. Zhang , A. R. Beresford , and I. Sheret . 2019 . SensorID: Sensor Calibration Fingerprinting for Smartphones. In IEEE Symposium on Security and Privacy. J. Zhang, A. R. Beresford, and I. Sheret. 2019. SensorID: Sensor Calibration Fingerprinting for Smartphones. In IEEE Symposium on Security and Privacy."},{"key":"e_1_3_2_1_61_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.patrec.2008.04.014"},{"key":"e_1_3_2_1_62_1","volume-title":"Wireless Security: Technical Challenges, Recent Advances, and Future Trends. Proc","author":"Zou Y.","year":"2016","unstructured":"Y. Zou , J. Zhu , X. Wang , and L. Hanzo . 2016 . A Survey on Wireless Security: Technical Challenges, Recent Advances, and Future Trends. Proc . IEEE ( 2016). Y. Zou, J. Zhu, X. Wang, and L. Hanzo. 2016. A Survey on Wireless Security: Technical Challenges, Recent Advances, and Future Trends. Proc. IEEE (2016)."}],"event":{"name":"MobiCom '20: The 26th Annual International Conference on Mobile Computing and Networking","sponsor":["SIGMOBILE ACM Special Interest Group on Mobility of Systems, Users, Data and Computing"],"location":"London United Kingdom","acronym":"MobiCom '20"},"container-title":["Proceedings of the 26th Annual International Conference on Mobile Computing and Networking"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3372224.3419210","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,1,9]],"date-time":"2023-01-09T04:12:07Z","timestamp":1673237527000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3372224.3419210"}},"subtitle":["mobile IoT communication exploiting stealthy speaker-to-gyroscope channel"],"short-title":[],"issued":{"date-parts":[[2020,9,18]]},"references-count":62,"alternative-id":["10.1145\/3372224.3419210","10.1145\/3372224"],"URL":"https:\/\/doi.org\/10.1145\/3372224.3419210","relation":{},"subject":[],"published":{"date-parts":[[2020,9,18]]},"assertion":[{"value":"2020-09-18","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}