{"id":"https://openalex.org/W2917909748","doi":"https://doi.org/10.1109/tmc.2019.2900919","title":"On Detecting Hidden Wireless Cameras: A Traffic Pattern-based Approach","display_name":"On Detecting Hidden Wireless Cameras: A Traffic Pattern-based Approach","publication_year":2019,"publication_date":"2019-02-21","ids":{"openalex":"https://openalex.org/W2917909748","doi":"https://doi.org/10.1109/tmc.2019.2900919","mag":"2917909748"},"language":"en","primary_location":{"id":"doi:10.1109/tmc.2019.2900919","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tmc.2019.2900919","pdf_url":null,"source":{"id":"https://openalex.org/S69141925","display_name":"IEEE Transactions on Mobile Computing","issn_l":"1536-1233","issn":["1536-1233","1558-0660","2161-9875"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310320439","host_organization_name":"IEEE Computer Society","host_organization_lineage":["https://openalex.org/P4310320439","https://openalex.org/P4310319808"],"host_organization_lineage_names":["IEEE Computer Society","Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Mobile Computing","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5063893376","display_name":"Yushi Cheng","orcid":"https://orcid.org/0000-0002-0888-2322"},"institutions":[{"id":"https://openalex.org/I76130692","display_name":"Zhejiang University","ror":"https://ror.org/00a2xv884","country_code":"CN","type":"education","lineage":["https://openalex.org/I76130692"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Yushi Cheng","raw_affiliation_strings":["Ubiquitous System Security Lab (USSLAB), Zhejiang University, Hangzhou, China"],"affiliations":[{"raw_affiliation_string":"Ubiquitous System Security Lab (USSLAB), Zhejiang University, Hangzhou, China","institution_ids":["https://openalex.org/I76130692"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5017116027","display_name":"Xiaoyu Ji","orcid":"https://orcid.org/0000-0002-1101-0007"},"institutions":[{"id":"https://openalex.org/I76130692","display_name":"Zhejiang University","ror":"https://ror.org/00a2xv884","country_code":"CN","type":"education","lineage":["https://openalex.org/I76130692"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Xiaoyu Ji","raw_affiliation_strings":["Ubiquitous System Security Lab (USSLAB), Zhejiang University, Hangzhou, China"],"affiliations":[{"raw_affiliation_string":"Ubiquitous System Security Lab (USSLAB), Zhejiang University, Hangzhou, China","institution_ids":["https://openalex.org/I76130692"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5058686343","display_name":"Tianyang Lu","orcid":null},"institutions":[{"id":"https://openalex.org/I76130692","display_name":"Zhejiang University","ror":"https://ror.org/00a2xv884","country_code":"CN","type":"education","lineage":["https://openalex.org/I76130692"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Tianyang Lu","raw_affiliation_strings":["Ubiquitous System Security Lab (USSLAB), Zhejiang University, Hangzhou, China"],"affiliations":[{"raw_affiliation_string":"Ubiquitous System Security Lab (USSLAB), Zhejiang University, Hangzhou, China","institution_ids":["https://openalex.org/I76130692"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5060351020","display_name":"Wenyuan Xu","orcid":"https://orcid.org/0000-0002-5043-9148"},"institutions":[{"id":"https://openalex.org/I76130692","display_name":"Zhejiang University","ror":"https://ror.org/00a2xv884","country_code":"CN","type":"education","lineage":["https://openalex.org/I76130692"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Wenyuan Xu","raw_affiliation_strings":["Ubiquitous System Security Lab (USSLAB), Zhejiang University, Hangzhou, China"],"affiliations":[{"raw_affiliation_string":"Ubiquitous System Security Lab (USSLAB), Zhejiang University, Hangzhou, China","institution_ids":["https://openalex.org/I76130692"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5063893376"],"corresponding_institution_ids":["https://openalex.org/I76130692"],"apc_list":null,"apc_paid":null,"fwci":2.1699,"has_fulltext":false,"cited_by_count":38,"citation_normalized_percentile":{"value":0.90469682,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":97,"max":99},"biblio":{"volume":"19","issue":"4","first_page":"907","last_page":"921"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11598","display_name":"Internet Traffic Analysis and Secure E-voting","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11598","display_name":"Internet Traffic Analysis and Secure E-voting","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10388","display_name":"Advanced Steganography and Watermarking Techniques","score":0.9994999766349792,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9969000220298767,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8732006549835205},{"id":"https://openalex.org/keywords/wireless","display_name":"Wireless","score":0.6219165921211243},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.5633699893951416},{"id":"https://openalex.org/keywords/android","display_name":"Android (operating system)","score":0.5302412509918213},{"id":"https://openalex.org/keywords/network-packet","display_name":"Network packet","score":0.441790372133255},{"id":"https://openalex.org/keywords/inference","display_name":"Inference","score":0.4361104667186737},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.41481178998947144},{"id":"https://openalex.org/keywords/real-time-computing","display_name":"Real-time computing","score":0.40625569224357605},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.39508676528930664},{"id":"https://openalex.org/keywords/computer-vision","display_name":"Computer vision","score":0.35780197381973267},{"id":"https://openalex.org/keywords/telecommunications","display_name":"Telecommunications","score":0.12487617135047913}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8732006549835205},{"id":"https://openalex.org/C555944384","wikidata":"https://www.wikidata.org/wiki/Q249","display_name":"Wireless","level":2,"score":0.6219165921211243},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.5633699893951416},{"id":"https://openalex.org/C557433098","wikidata":"https://www.wikidata.org/wiki/Q94","display_name":"Android (operating system)","level":2,"score":0.5302412509918213},{"id":"https://openalex.org/C158379750","wikidata":"https://www.wikidata.org/wiki/Q214111","display_name":"Network packet","level":2,"score":0.441790372133255},{"id":"https://openalex.org/C2776214188","wikidata":"https://www.wikidata.org/wiki/Q408386","display_name":"Inference","level":2,"score":0.4361104667186737},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.41481178998947144},{"id":"https://openalex.org/C79403827","wikidata":"https://www.wikidata.org/wiki/Q3988","display_name":"Real-time computing","level":1,"score":0.40625569224357605},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.39508676528930664},{"id":"https://openalex.org/C31972630","wikidata":"https://www.wikidata.org/wiki/Q844240","display_name":"Computer vision","level":1,"score":0.35780197381973267},{"id":"https://openalex.org/C76155785","wikidata":"https://www.wikidata.org/wiki/Q418","display_name":"Telecommunications","level":1,"score":0.12487617135047913},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/tmc.2019.2900919","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tmc.2019.2900919","pdf_url":null,"source":{"id":"https://openalex.org/S69141925","display_name":"IEEE Transactions on Mobile Computing","issn_l":"1536-1233","issn":["1536-1233","1558-0660","2161-9875"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310320439","host_organization_name":"IEEE Computer Society","host_organization_lineage":["https://openalex.org/P4310320439","https://openalex.org/P4310319808"],"host_organization_lineage_names":["IEEE Computer Society","Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Mobile Computing","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/16","score":0.550000011920929,"display_name":"Peace, Justice and strong institutions"}],"awards":[{"id":"https://openalex.org/G899972020","display_name":null,"funder_award_id":"61702451","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"}],"funders":[{"id":"https://openalex.org/F4320321001","display_name":"National Natural Science Foundation of China","ror":"https://ror.org/01h0zpd94"}],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":24,"referenced_works":["https://openalex.org/W1523644733","https://openalex.org/W1990701202","https://openalex.org/W2011593588","https://openalex.org/W2056132907","https://openalex.org/W2067006636","https://openalex.org/W2073089243","https://openalex.org/W2080182726","https://openalex.org/W2102859083","https://openalex.org/W2108223826","https://openalex.org/W2122192957","https://openalex.org/W2149698389","https://openalex.org/W2150779517","https://openalex.org/W2162102632","https://openalex.org/W2163383242","https://openalex.org/W2172073677","https://openalex.org/W2396049964","https://openalex.org/W2409433878","https://openalex.org/W2613902046","https://openalex.org/W2762743075","https://openalex.org/W2807035766","https://openalex.org/W2833690542","https://openalex.org/W6631257896","https://openalex.org/W6682068638","https://openalex.org/W6684133396"],"related_works":["https://openalex.org/W2100090372","https://openalex.org/W4361205702","https://openalex.org/W1991580985","https://openalex.org/W2055243143","https://openalex.org/W2385965183","https://openalex.org/W2013342653","https://openalex.org/W2901818815","https://openalex.org/W4289281780","https://openalex.org/W2165251242","https://openalex.org/W4237598585"],"abstract_inverted_index":{"Wireless":[0],"cameras":[1,30,104,164],"are":[2,19,31],"widely":[3],"deployed":[4],"in":[5,90,113],"surveillance":[6],"systems":[7],"for":[8,27],"security":[9],"guarding.":[10],"However,":[11],"the":[12,64,87,91,97,129,144],"privacy":[13],"concerns":[14],"associated":[15],"with":[16,74,150,165],"unauthorized":[17,28],"videotaping,":[18],"drawing":[20],"increasing":[21],"attention":[22],"recently.":[23],"Existing":[24],"detection":[25,36,52],"methods":[26],"wireless":[29,71,103],"either":[32],"limited":[33],"by":[34],"their":[35],"accuracy":[37,167],"or":[38],"requiring":[39],"dedicated":[40],"devices.":[41],"In":[42],"this":[43],"paper,":[44],"we":[45,117],"propose":[46,118],"DeWiCam,":[47],"a":[48,110,119],"lightweight":[49],"and":[50,99,132,147],"effective":[51],"mechanism":[53],"using":[54],"smartphones.":[55],"The":[56,156],"basic":[57],"idea":[58],"of":[59,68,125,168],"DeWiCam":[60,79,95,126,142,161],"is":[61,80,112],"to":[62,136],"utilize":[63],"intrinsic":[65],"traffic":[66,76],"patterns":[67],"flows":[69],"from":[70],"cameras.":[72,155],"Compared":[73],"traditional":[75],"pattern":[77],"analysis,":[78],"more":[81],"challenging":[82],"because":[83],"it":[84,149],"cannot":[85],"access":[86],"encrypted":[88],"information":[89],"data":[92],"packets.":[93],"Yet,":[94],"overcomes":[96],"difficulty":[98],"can":[100,162],"detect":[101,163],"nearby":[102],"reliably.":[105],"To":[106],"further":[107,127],"identify":[108],"whether":[109],"camera":[111],"an":[114,166],"interested":[115],"room,":[116],"human-assisted":[120],"identification":[121],"model.":[122],"Extension":[123],"functions":[124],"enable":[128],"video":[130],"resolution":[131],"audio":[133],"channel":[134],"inference":[135],"provide":[137],"extra":[138],"protection.":[139],"We":[140],"implemented":[141],"on":[143,153],"Android":[145],"platform":[146],"evaluated":[148],"extensive":[151],"experiments":[152],"20":[154],"evaluation":[157],"results":[158],"show":[159],"that":[160],"99":[169],"percent":[170],"within":[171],"2:7":[172],"s.":[173]},"counts_by_year":[{"year":2026,"cited_by_count":1},{"year":2025,"cited_by_count":7},{"year":2024,"cited_by_count":7},{"year":2023,"cited_by_count":8},{"year":2022,"cited_by_count":7},{"year":2021,"cited_by_count":4},{"year":2020,"cited_by_count":4}],"updated_date":"2026-03-20T23:20:44.827607","created_date":"2025-10-10T00:00:00"}
