{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,1,26]],"date-time":"2024-01-26T00:11:40Z","timestamp":1706227900592},"reference-count":64,"publisher":"Association for Computing Machinery (ACM)","issue":"4","funder":[{"DOI":"10.13039\/501100012166","name":"National Key R&D Program of China","doi-asserted-by":"crossref","award":["2021YFB2700200"],"id":[{"id":"10.13039\/501100012166","id-type":"DOI","asserted-by":"crossref"}]},{"DOI":"10.13039\/https:\/\/doi.org\/10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["U1836202, 61772383, 62076187, 61802214, 62172303"],"id":[{"id":"10.13039\/https:\/\/doi.org\/10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":["Proc. ACM Interact. Mob. Wearable Ubiquitous Technol."],"published-print":{"date-parts":[[2023,12,19]]},"abstract":"Unlawful wireless cameras are often hidden to secretly monitor private activities. However, existing methods to detect and localize these cameras are interactively complex or require expensive specialized hardware. In this paper, we present LocCams, an efficient and robust approach for hidden camera detection and localization using only a commodity device (e.g., a smartphone). By analyzing data packets in the wireless local area network, LocCams passively detects hidden cameras based on the packet transmission rate. Camera localization is achieved by identifying whether the physical channel between our detector and the hidden camera is a Line-of-Sight (LOS) propagation path based on the distribution of channel state information subcarriers, and utilizing a feature extraction approach based on a Convolutional Neural Network (CNN) model for reliable localization. Our extensive experiments, involving various subjects, cameras, distances, user positions, and room configurations, demonstrate LocCams' effectiveness. Additionally, to evaluate the performance of the method in real life, we use subjects, cameras, and rooms that do not appear in the training set to evaluate the transferability of the model. With an overall accuracy of 95.12% within 30 seconds of detection, LocCams provides robust detection and localization of hidden cameras.<\/jats:p>","DOI":"10.1145\/3631432","type":"journal-article","created":{"date-parts":[[2024,1,12]],"date-time":"2024-01-12T17:52:04Z","timestamp":1705081924000},"page":"1-24","update-policy":"http:\/\/dx.doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":0,"title":["LocCams"],"prefix":"10.1145","volume":"7","author":[{"ORCID":"http:\/\/orcid.org\/0000-0002-3733-945X","authenticated-orcid":false,"given":"Yangyang","family":"Gu","sequence":"first","affiliation":[{"name":"Wuhan University, Wuhan, Hubei, China"}]},{"ORCID":"http:\/\/orcid.org\/0000-0002-7212-5297","authenticated-orcid":false,"given":"Jing","family":"Chen","sequence":"additional","affiliation":[{"name":"Wuhan University, Wuhan, Hubei, China"}]},{"ORCID":"http:\/\/orcid.org\/0000-0002-0930-0283","authenticated-orcid":false,"given":"Cong","family":"Wu","sequence":"additional","affiliation":[{"name":"Nanyang Technological University, Singapore, Singapore"}]},{"ORCID":"http:\/\/orcid.org\/0000-0003-3472-419X","authenticated-orcid":false,"given":"Kun","family":"He","sequence":"additional","affiliation":[{"name":"Wuhan University, Wuhan, Hubei, China"}]},{"ORCID":"http:\/\/orcid.org\/0000-0002-4930-5556","authenticated-orcid":false,"given":"Ziming","family":"Zhao","sequence":"additional","affiliation":[{"name":"University at Buffalo, Buffalo, United States"}]},{"ORCID":"http:\/\/orcid.org\/0000-0002-3634-3385","authenticated-orcid":false,"given":"Ruiying","family":"Du","sequence":"additional","affiliation":[{"name":"Wuhan University, Wuhan, Hubei, China"}]}],"member":"320","published-online":{"date-parts":[[2024,1,12]]},"reference":[{"key":"e_1_2_2_1_1","unstructured":"Jeffrey P. Bigham. 2019. A Camera is Watching You in Your AirBnB: And you consented to it. https:\/\/jeffreybigham.com\/blog\/2019\/who-is-watching-you-in-your-airbnb.html."},{"key":"e_1_2_2_2_1","unstructured":"Minyi Chai. 2021. CCTV reveals the black industrial chain of hotel sneak shots: there are hidden cameras in rooms and bathroom hooks.https:\/\/www.thepaper.cn\/newsDetail_forward_12482186."},{"key":"e_1_2_2_3_1","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2020.2990314"},{"key":"e_1_2_2_4_1","doi-asserted-by":"publisher","DOI":"10.1145\/3196494.3196509"},{"key":"e_1_2_2_5_1","doi-asserted-by":"publisher","DOI":"10.1109\/TMC.2019.2900919"},{"key":"e_1_2_2_6_1","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2017.2780121"},{"key":"e_1_2_2_7_1","unstructured":"David Coleman. 2022. Wi-Fi 6 & 6E for Dummies. John Wiley & Sons Inc."},{"key":"e_1_2_2_8_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2021.3121254"},{"key":"e_1_2_2_9_1","doi-asserted-by":"publisher","DOI":"10.1109\/JSEN.2021.3119234"},{"key":"e_1_2_2_10_1","unstructured":"Sidney Fussell. 2019. Airbnb Has a Hidden-Camera Problem. https:\/\/www.theatlantic.com\/technology\/archive\/2019\/03\/what-happens-when-you-find-cameras-your-airbnb\/585007\/."},{"key":"e_1_2_2_11_1","doi-asserted-by":"publisher","DOI":"10.1145\/3349623.3355477"},{"key":"e_1_2_2_12_1","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2021.3108850"},{"key":"e_1_2_2_13_1","doi-asserted-by":"publisher","DOI":"10.1109\/TWC.2021.3114614"},{"key":"e_1_2_2_14_1","doi-asserted-by":"publisher","DOI":"10.1145\/1925861.1925870"},{"key":"e_1_2_2_15_1","volume-title":"Simplifying the Configuration of 802.11 Wireless Networks with Effective SNR. CoRR abs\/1301.6644","author":"Halperin Daniel Chaim","year":"2013","unstructured":"Daniel Chaim Halperin. 2013. Simplifying the Configuration of 802.11 Wireless Networks with Effective SNR. CoRR abs\/1301.6644 (2013). arXiv:1301.6644 http:\/\/arxiv.org\/abs\/1301.6644"},{"key":"e_1_2_2_16_1","doi-asserted-by":"publisher","DOI":"10.1145\/3458864.3467683"},{"key":"e_1_2_2_17_1","doi-asserted-by":"publisher","DOI":"10.1145\/3564625.3564632"},{"key":"e_1_2_2_18_1","unstructured":"JIM DALRYMPLE II. 2019. More than 1 in 10 Airbnb guests have found hidden cameras: Survey. https:\/\/www.inman.com\/2019\/06\/07\/more-than-1-in-10-airbnb-guest-have-found-cameras-in-rentals-survey\/."},{"key":"e_1_2_2_19_1","volume-title":"Proceedings of the 32nd International Conference on Machine Learning. 448--456","author":"Ioffe Sergey","year":"2015","unstructured":"Sergey Ioffe and Christian Szegedy. 2015. Batch normalization: Accelerating deep network training by reducing internal covariate shift. In Proceedings of the 32nd International Conference on Machine Learning. 448--456."},{"key":"e_1_2_2_20_1","unstructured":"ipchecktool. 2021. MAC manufacture search. https:\/\/www.ipchecktool.com\/tool\/macfinder."},{"key":"e_1_2_2_21_1","volume-title":"Survey: Do Airbnb Guests Trust Their Hosts? https:\/\/www.ipx1031.com\/airbnb-guests-trust-hosts\/.","year":"2019","unstructured":"IPX1031. 2019. Survey: Do Airbnb Guests Trust Their Hosts? https:\/\/www.ipx1031.com\/airbnb-guests-trust-hosts\/."},{"key":"e_1_2_2_22_1","unstructured":"David Janssen. 2023. Many Airbnbs have cameras installed especially in the US Canada and Singapore. https:\/\/vpnoverview.com\/news\/camera-presence-airbnb-accommodations\/."},{"key":"e_1_2_2_23_1","unstructured":"Sophie Jeong and James Griffiths. 2019. Hundreds of motel guests were secretly filmed and live-streamed online. https:\/\/edition.cnn.com\/2019\/03\/20\/asia\/south-korea-hotel-spy-cam-intl\/."},{"key":"e_1_2_2_24_1","doi-asserted-by":"publisher","DOI":"10.3390\/s18113987"},{"key":"e_1_2_2_25_1","doi-asserted-by":"publisher","DOI":"10.1145\/3210240.3210332"},{"key":"e_1_2_2_26_1","doi-asserted-by":"publisher","DOI":"10.1145\/3569505"},{"key":"e_1_2_2_27_1","unstructured":"LLC LSC. 2023. Hidden camera detector. https:\/\/apps.apple.com\/us\/app\/hidden-camera-detector\/id532882360."},{"key":"e_1_2_2_28_1","doi-asserted-by":"publisher","DOI":"10.1145\/3310194"},{"key":"e_1_2_2_29_1","unstructured":"Aanron Mak. 2019. How to Scan Your Airbnb for Hidden Cameras. https:\/\/slate.com\/technology\/2019\/04\/how-to-scan-airbnb-hidden-camera-apps.html."},{"key":"e_1_2_2_30_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICDCS.2017.283"},{"key":"e_1_2_2_31_1","doi-asserted-by":"publisher","DOI":"10.1145\/3302505.3310073"},{"key":"e_1_2_2_32_1","doi-asserted-by":"publisher","DOI":"10.1145\/2993422.2993579"},{"key":"e_1_2_2_33_1","doi-asserted-by":"publisher","DOI":"10.1145\/3084041.3084067"},{"key":"e_1_2_2_34_1","doi-asserted-by":"publisher","DOI":"10.1145\/3210240.3210314"},{"key":"e_1_2_2_35_1","unstructured":"Qiluyidian. 2022. 1 man Controls 180 000 cameras: Why crime cameras are So Hard to Stop? https:\/\/baijiahao.baidu.com\/s?id=1731865882372619380&wfr=spider&for=pc."},{"key":"e_1_2_2_36_1","doi-asserted-by":"publisher","DOI":"10.1145\/3534593"},{"key":"e_1_2_2_37_1","doi-asserted-by":"publisher","DOI":"10.1145\/3485730.3485941"},{"key":"e_1_2_2_38_1","unstructured":"seemoo lab. 2019. Nexmon_csi. https:\/\/github.com\/seemoo-lab\/nexmon_csi."},{"key":"e_1_2_2_39_1","doi-asserted-by":"publisher","DOI":"10.1145\/2162081.2162099"},{"key":"e_1_2_2_40_1","volume-title":"31st USENIX Security Symposium (USENIX Security 22)","author":"Sharma Rahul Anand","year":"2022","unstructured":"Rahul Anand Sharma, Elahe Soltanaghaei, Anthony Rowe, and Vyas Sekar. 2022. Lumos: Identifying and Localizing Diverse Hidden IoT Devices in an Unfamiliar Environment. In 31st USENIX Security Symposium (USENIX Security 22). Boston, MA, 1095--1112. https:\/\/www.usenix.org\/conference\/usenixsecurity22\/presentation\/sharma-rahul"},{"key":"e_1_2_2_41_1","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2020.2993901"},{"key":"e_1_2_2_42_1","volume-title":"30th USENIX Security Symposium, USENIX Security 2021","author":"Singh Akash Deep","year":"2021","unstructured":"Akash Deep Singh, Luis Garcia, Joseph Noor, and Mani B Srivastava. 2021. I Always Feel Like Somebody's Sensing Me! A Framework to Detect, Identify, and Localize Clandestine Wireless Sensors. In 30th USENIX Security Symposium, USENIX Security 2021, August 11-13, 2021. 1829--1846. https:\/\/www.usenix.org\/conference\/usenixsecurity21\/presentation\/singh"},{"key":"e_1_2_2_43_1","doi-asserted-by":"publisher","DOI":"10.1109\/TMC.2018.2866249"},{"key":"e_1_2_2_44_1","unstructured":"SpyGuy. 2022. Airbnb Hidden Cameras: Here's How to Find Them. https:\/\/www.spyguy.com\/a\/blog\/airbnb-hidden-cameras-four-ways-to-find-them."},{"key":"e_1_2_2_45_1","unstructured":"Jakobi Teknik. 2023. Spy hidden camera Detector. https:\/\/apps.apple.com\/us\/app\/spy-hidden-cameradetector\/id925967783?mt=8."},{"key":"e_1_2_2_46_1","unstructured":"Monica Torres. 2019. 4 Ways To Tell If There Are Hidden Cameras In Your Airbnb. https:\/\/www.huffpost.com\/entry\/airbnb-hidden-cameras-how-to-find_l_5cad177de4b01bf96007085c?guccounter=1."},{"key":"e_1_2_2_47_1","volume-title":"Fundamentals of wireless communication","author":"Tse David","unstructured":"David Tse and Pramod Viswanath. 2005. Fundamentals of wireless communication. Cambridge university press."},{"key":"e_1_2_2_48_1","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2008.4689260"},{"key":"e_1_2_2_49_1","doi-asserted-by":"publisher","DOI":"10.1109\/TMC.2016.2629473"},{"key":"e_1_2_2_50_1","doi-asserted-by":"publisher","DOI":"10.1145\/2789168.2790093"},{"key":"e_1_2_2_51_1","doi-asserted-by":"publisher","DOI":"10.1145\/2639108.2639143"},{"key":"e_1_2_2_52_1","unstructured":"Workshop512. 2023. Glint finder - camera detector. https:\/\/play.google.com\/store\/apps\/details?id=com.workshop512.glintfinder."},{"key":"e_1_2_2_53_1","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2015.2430294"},{"key":"e_1_2_2_54_1","doi-asserted-by":"publisher","DOI":"10.1109\/PERCOM.2019.8767411"},{"key":"e_1_2_2_55_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICC.2017.7997068"},{"key":"e_1_2_2_56_1","doi-asserted-by":"publisher","DOI":"10.1145\/2789168.2790124"},{"key":"e_1_2_2_57_1","doi-asserted-by":"publisher","DOI":"10.1145\/3548606.3560669"},{"key":"e_1_2_2_58_1","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2019.2893330"},{"key":"e_1_2_2_59_1","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2020.3040782"},{"key":"e_1_2_2_60_1","doi-asserted-by":"publisher","DOI":"10.1145\/3517244"},{"key":"e_1_2_2_61_1","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2022.3210378"},{"key":"e_1_2_2_62_1","doi-asserted-by":"publisher","DOI":"10.1109\/TWC.2015.2448540"},{"key":"e_1_2_2_63_1","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2020.23053"},{"key":"e_1_2_2_64_1","doi-asserted-by":"publisher","DOI":"10.1109\/MPRV.2022.3187464"}],"container-title":["Proceedings of the ACM on Interactive, Mobile, Wearable and Ubiquitous Technologies"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3631432","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,1,25]],"date-time":"2024-01-25T23:29:43Z","timestamp":1706225383000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3631432"}},"subtitle":["An Efficient and Robust Approach for Detecting and Localizing Hidden Wireless Cameras via Commodity Devices"],"short-title":[],"issued":{"date-parts":[[2023,12,19]]},"references-count":64,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2023,12,19]]}},"alternative-id":["10.1145\/3631432"],"URL":"https:\/\/doi.org\/10.1145\/3631432","relation":{},"ISSN":["2474-9567"],"issn-type":[{"value":"2474-9567","type":"electronic"}],"subject":[],"published":{"date-parts":[[2023,12,19]]},"assertion":[{"value":"2024-01-12","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}