{"id":"https://openalex.org/W4309156386","doi":"https://doi.org/10.1109/apcc55198.2022.9943725","title":"Detection and Localization of Hidden Wi-Fi Cameras","display_name":"Detection and Localization of Hidden Wi-Fi Cameras","publication_year":2022,"publication_date":"2022-10-19","ids":{"openalex":"https://openalex.org/W4309156386","doi":"https://doi.org/10.1109/apcc55198.2022.9943725"},"language":"en","primary_location":{"id":"doi:10.1109/apcc55198.2022.9943725","is_oa":false,"landing_page_url":"https://doi.org/10.1109/apcc55198.2022.9943725","pdf_url":null,"source":{"id":"https://openalex.org/S4363608215","display_name":"2022 27th Asia Pacific Conference on Communications (APCC)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"conference"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2022 27th Asia Pacific Conference on Communications (APCC)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"green","oa_url":"https://research-repository.griffith.edu.au/bitstreams/14a67fbb-fa77-49c9-aa4e-d38f7679d652/download","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5064685280","display_name":"Rhys Cunningham","orcid":null},"institutions":[{"id":"https://openalex.org/I11701301","display_name":"Griffith University","ror":"https://ror.org/02sc3r913","country_code":"AU","type":"education","lineage":["https://openalex.org/I11701301"]}],"countries":["AU"],"is_corresponding":true,"raw_author_name":"Rhys Cunningham","raw_affiliation_strings":["Griffith University,School of ICT,Australia","School of ICT, Griffith University, Australia"],"affiliations":[{"raw_affiliation_string":"Griffith University,School of ICT,Australia","institution_ids":["https://openalex.org/I11701301"]},{"raw_affiliation_string":"School of ICT, Griffith University, Australia","institution_ids":["https://openalex.org/I11701301"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5049913208","display_name":"Wee Lum Tan","orcid":"https://orcid.org/0000-0002-9105-5722"},"institutions":[{"id":"https://openalex.org/I11701301","display_name":"Griffith University","ror":"https://ror.org/02sc3r913","country_code":"AU","type":"education","lineage":["https://openalex.org/I11701301"]}],"countries":["AU"],"is_corresponding":false,"raw_author_name":"Wee Lum Tan","raw_affiliation_strings":["Griffith University,School of ICT,Australia","School of ICT, Griffith University, Australia"],"affiliations":[{"raw_affiliation_string":"Griffith University,School of ICT,Australia","institution_ids":["https://openalex.org/I11701301"]},{"raw_affiliation_string":"School of ICT, Griffith University, Australia","institution_ids":["https://openalex.org/I11701301"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5064685280"],"corresponding_institution_ids":["https://openalex.org/I11701301"],"apc_list":null,"apc_paid":null,"fwci":0.9667,"has_fulltext":true,"cited_by_count":3,"citation_normalized_percentile":{"value":0.70564925,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":96},"biblio":{"volume":"19","issue":null,"first_page":"12","last_page":"17"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10326","display_name":"Indoor and Outdoor Localization Technologies","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10326","display_name":"Indoor and Outdoor Localization Technologies","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11158","display_name":"Wireless Networks and Protocols","score":0.9930999875068665,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10860","display_name":"Speech and Audio Processing","score":0.992900013923645,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7674657702445984},{"id":"https://openalex.org/keywords/extortion","display_name":"Extortion","score":0.5832772850990295},{"id":"https://openalex.org/keywords/signal","display_name":"SIGNAL (programming language)","score":0.5600919127464294},{"id":"https://openalex.org/keywords/signal-strength","display_name":"Signal strength","score":0.522059440612793},{"id":"https://openalex.org/keywords/lpwan","display_name":"LPWAN","score":0.4772850573062897},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.45755115151405334},{"id":"https://openalex.org/keywords/mobile-device","display_name":"Mobile device","score":0.450943261384964},{"id":"https://openalex.org/keywords/real-time-computing","display_name":"Real-time computing","score":0.4005810618400574},{"id":"https://openalex.org/keywords/internet-of-things","display_name":"Internet of Things","score":0.3974454700946808},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.38817107677459717},{"id":"https://openalex.org/keywords/wireless","display_name":"Wireless","score":0.2927287817001343},{"id":"https://openalex.org/keywords/telecommunications","display_name":"Telecommunications","score":0.28461211919784546}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7674657702445984},{"id":"https://openalex.org/C2779066997","wikidata":"https://www.wikidata.org/wiki/Q6452087","display_name":"Extortion","level":2,"score":0.5832772850990295},{"id":"https://openalex.org/C2779843651","wikidata":"https://www.wikidata.org/wiki/Q7390335","display_name":"SIGNAL (programming language)","level":2,"score":0.5600919127464294},{"id":"https://openalex.org/C176808163","wikidata":"https://www.wikidata.org/wiki/Q17105794","display_name":"Signal strength","level":3,"score":0.522059440612793},{"id":"https://openalex.org/C2776445043","wikidata":"https://www.wikidata.org/wiki/Q20706829","display_name":"LPWAN","level":3,"score":0.4772850573062897},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.45755115151405334},{"id":"https://openalex.org/C186967261","wikidata":"https://www.wikidata.org/wiki/Q5082128","display_name":"Mobile device","level":2,"score":0.450943261384964},{"id":"https://openalex.org/C79403827","wikidata":"https://www.wikidata.org/wiki/Q3988","display_name":"Real-time computing","level":1,"score":0.4005810618400574},{"id":"https://openalex.org/C81860439","wikidata":"https://www.wikidata.org/wiki/Q251212","display_name":"Internet of Things","level":2,"score":0.3974454700946808},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.38817107677459717},{"id":"https://openalex.org/C555944384","wikidata":"https://www.wikidata.org/wiki/Q249","display_name":"Wireless","level":2,"score":0.2927287817001343},{"id":"https://openalex.org/C76155785","wikidata":"https://www.wikidata.org/wiki/Q418","display_name":"Telecommunications","level":1,"score":0.28461211919784546},{"id":"https://openalex.org/C199539241","wikidata":"https://www.wikidata.org/wiki/Q7748","display_name":"Law","level":1,"score":0.0},{"id":"https://openalex.org/C17744445","wikidata":"https://www.wikidata.org/wiki/Q36442","display_name":"Political science","level":0,"score":0.0},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.0},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.0}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1109/apcc55198.2022.9943725","is_oa":false,"landing_page_url":"https://doi.org/10.1109/apcc55198.2022.9943725","pdf_url":null,"source":{"id":"https://openalex.org/S4363608215","display_name":"2022 27th Asia Pacific Conference on Communications (APCC)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"conference"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2022 27th Asia Pacific Conference on Communications (APCC)","raw_type":"proceedings-article"},{"id":"pmh:oai:research-repository.griffith.edu.au:10072/420297","is_oa":true,"landing_page_url":"http://hdl.handle.net/10072/420297","pdf_url":"https://research-repository.griffith.edu.au/bitstreams/14a67fbb-fa77-49c9-aa4e-d38f7679d652/download","source":{"id":"https://openalex.org/S4306402548","display_name":"Griffith Research Online (Griffith University, Queensland, Australia)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I11701301","host_organization_name":"Griffith University","host_organization_lineage":["https://openalex.org/I11701301"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"","raw_type":"Conference output"}],"best_oa_location":{"id":"pmh:oai:research-repository.griffith.edu.au:10072/420297","is_oa":true,"landing_page_url":"http://hdl.handle.net/10072/420297","pdf_url":"https://research-repository.griffith.edu.au/bitstreams/14a67fbb-fa77-49c9-aa4e-d38f7679d652/download","source":{"id":"https://openalex.org/S4306402548","display_name":"Griffith Research Online (Griffith University, Queensland, Australia)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I11701301","host_organization_name":"Griffith University","host_organization_lineage":["https://openalex.org/I11701301"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"","raw_type":"Conference output"},"sustainable_development_goals":[{"display_name":"Peace, Justice and strong institutions","id":"https://metadata.un.org/sdg/16","score":0.4099999964237213}],"awards":[],"funders":[],"has_content":{"pdf":true,"grobid_xml":true},"content_urls":{"pdf":"https://content.openalex.org/works/W4309156386.pdf","grobid_xml":"https://content.openalex.org/works/W4309156386.grobid-xml"},"referenced_works_count":14,"referenced_works":["https://openalex.org/W2005059864","https://openalex.org/W2062742351","https://openalex.org/W2156424290","https://openalex.org/W2554864015","https://openalex.org/W2911205424","https://openalex.org/W2917005499","https://openalex.org/W2917909748","https://openalex.org/W3084212472","https://openalex.org/W3098323645","https://openalex.org/W3134263667","https://openalex.org/W3163581237","https://openalex.org/W3167841101","https://openalex.org/W6893883941","https://openalex.org/W7073899554"],"related_works":["https://openalex.org/W2888892063","https://openalex.org/W2740439328","https://openalex.org/W3088070213","https://openalex.org/W2901309327","https://openalex.org/W3125356464","https://openalex.org/W2802871295","https://openalex.org/W2902629385","https://openalex.org/W3036702517","https://openalex.org/W4313556219","https://openalex.org/W2980804067"],"abstract_inverted_index":{"The":[0,132],"widespread":[1],"availability":[2],"of":[3,28,49,80,92,100,109,134,145,157,201],"Wi-Fi":[4,34,135,175,204,215,233],"networks":[5],"in":[6,65,137,246],"our":[7],"workplaces,":[8,70],"schools,":[9,71],"hotels,":[10],"and":[11,72,82,148,159,172,192,229,238,250],"public":[12],"spaces":[13],"provides":[14],"us":[15],"with":[16,33,235,248],"access":[17,149],"to":[18,85,117,170,197,212,227,252],"the":[19,101,107,151,199,202,210,213,236,243,253],"Internet":[20],"from":[21],"just":[22],"about":[23],"anywhere.":[24],"An":[25],"increasing":[26],"range":[27],"devices":[29,37],"are":[30],"being":[31,59],"developed":[32],"capabilities":[35],"including":[36,67],"such":[38,181],"as":[39,182,206,208],"surveillance":[40],"or":[41,62,88,106,126],"\"spy\"":[42],"cameras":[43,58,95,112],"that":[44,113,220],"allow":[45],"for":[46,130,150],"remote":[47,146],"viewing":[48,147],"a":[50,77,155,231],"live":[51],"feed.":[52],"News":[53],"reports":[54],"have":[55],"shown":[56],"hidden":[57,94,174,214,232,254],"placed":[60,140],"illegally,":[61],"without":[63],"consent,":[64],"places":[66],"hotel":[68],"rooms,":[69],"rental":[73],"homes.":[74],"This":[75],"is":[76],"malicious":[78],"invasion":[79],"privacy":[81],"has":[83],"potential":[84,167],"facilitate":[86],"extortion":[87],"blackmail.":[89],"Current":[90],"methods":[91,121],"finding":[93],"typically":[96],"involve":[97],"manual":[98],"surveying":[99],"environment,":[102],"radio":[103],"frequency":[104],"detectors,":[105],"use":[108,178],"some":[110],"smartphone":[111],"cause":[114],"infrared":[115],"light":[116],"become":[118],"visible.":[119],"These":[120],"can":[122,224],"be":[123,225],"ineffective,":[124],"unreliable,":[125],"incur":[127],"extra":[128],"costs":[129],"hardware.":[131],"addition":[133],"functionality":[136],"these":[138,221],"maliciously":[139],"devices,":[141],"while":[142],"enabling":[143],"ease":[144],"intruder,":[152],"also":[153],"creates":[154],"means":[156],"identifying":[158],"localizing":[160],"them.":[161],"In":[162],"this":[163],"paper,":[164],"we":[165],"investigate":[166],"signal":[168,179,205,222,240],"metrics":[169,180,223,241],"detect":[171,228],"localize":[173,230],"cameras.":[176],"We":[177],"Received":[183],"Signal":[184],"Strength":[185],"Indicator":[186],"(RSSI),":[187],"Channel":[188],"State":[189],"Information":[190],"(CSI)":[191],"Power":[193],"Delay":[194],"Profile":[195],"(PDP)":[196],"determine":[198],"direction":[200],"received":[203],"well":[207],"estimate":[209],"distance":[211],"camera.":[216,255],"Our":[217],"results":[218],"show":[219],"used":[226],"device,":[234],"CSI":[237],"PDP":[239],"achieving":[242],"best":[244],"performance":[245],"scenarios":[247],"line-of-sight":[249],"non-line-of-sight":[251]},"counts_by_year":[{"year":2024,"cited_by_count":2},{"year":2023,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
