{"id":"https://openalex.org/W1987710423","doi":"https://doi.org/10.1145/1514274.1514285","title":"Stealthy video capturer","display_name":"Stealthy video capturer","publication_year":2009,"publication_date":"2009-03-16","ids":{"openalex":"https://openalex.org/W1987710423","doi":"https://doi.org/10.1145/1514274.1514285","mag":"1987710423"},"language":"en","primary_location":{"id":"doi:10.1145/1514274.1514285","is_oa":false,"landing_page_url":"https://doi.org/10.1145/1514274.1514285","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the second ACM conference on Wireless network security","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5028125767","display_name":"Nan Xu","orcid":"https://orcid.org/0000-0003-1653-4149"},"institutions":[{"id":"https://openalex.org/I168719708","display_name":"City University of Hong Kong","ror":"https://ror.org/03q8dnn23","country_code":"HK","type":"education","lineage":["https://openalex.org/I168719708"]}],"countries":["HK"],"is_corresponding":true,"raw_author_name":"Nan Xu","raw_affiliation_strings":["City University of Hong Kong, Hong Kong, Hong Kong"],"affiliations":[{"raw_affiliation_string":"City University of Hong Kong, Hong Kong, Hong Kong","institution_ids":["https://openalex.org/I168719708"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100403380","display_name":"Fan Zhang","orcid":"https://orcid.org/0000-0001-6087-8243"},"institutions":[{"id":"https://openalex.org/I168719708","display_name":"City University of Hong Kong","ror":"https://ror.org/03q8dnn23","country_code":"HK","type":"education","lineage":["https://openalex.org/I168719708"]}],"countries":["HK"],"is_corresponding":false,"raw_author_name":"Fan Zhang","raw_affiliation_strings":["Huazhong University of Sci. &amp; Tech. &amp; City University of Hong Kong, Wuhan &amp; Hong Kong, China"],"affiliations":[{"raw_affiliation_string":"Huazhong University of Sci. &amp; Tech. &amp; City University of Hong Kong, Wuhan &amp; Hong Kong, China","institution_ids":["https://openalex.org/I168719708"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5072049487","display_name":"Yisha Luo","orcid":null},"institutions":[{"id":"https://openalex.org/I168719708","display_name":"City University of Hong Kong","ror":"https://ror.org/03q8dnn23","country_code":"HK","type":"education","lineage":["https://openalex.org/I168719708"]}],"countries":["HK"],"is_corresponding":false,"raw_author_name":"Yisha Luo","raw_affiliation_strings":["City University of Hong Kong, Hong Kong, Hong Kong"],"affiliations":[{"raw_affiliation_string":"City University of Hong Kong, Hong Kong, Hong Kong","institution_ids":["https://openalex.org/I168719708"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5051803761","display_name":"Weijia Jia","orcid":"https://orcid.org/0000-0002-0231-3196"},"institutions":[{"id":"https://openalex.org/I168719708","display_name":"City University of Hong Kong","ror":"https://ror.org/03q8dnn23","country_code":"HK","type":"education","lineage":["https://openalex.org/I168719708"]}],"countries":["HK"],"is_corresponding":false,"raw_author_name":"Weijia Jia","raw_affiliation_strings":["City University of Hong Kong, Hong Kong, Hong Kong"],"affiliations":[{"raw_affiliation_string":"City University of Hong Kong, Hong Kong, Hong Kong","institution_ids":["https://openalex.org/I168719708"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5101805063","display_name":"Dong Xuan","orcid":"https://orcid.org/0009-0008-5223-7428"},"institutions":[{"id":"https://openalex.org/I52357470","display_name":"The Ohio State University","ror":"https://ror.org/00rs6vg23","country_code":"US","type":"education","lineage":["https://openalex.org/I52357470"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Dong Xuan","raw_affiliation_strings":["The Ohio State University, Columbus, OH, USA","The Ohio State University, Columbus, OH, USA.;"],"affiliations":[{"raw_affiliation_string":"The Ohio State University, Columbus, OH, USA","institution_ids":["https://openalex.org/I52357470"]},{"raw_affiliation_string":"The Ohio State University, Columbus, OH, USA.;","institution_ids":["https://openalex.org/I52357470"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5103341479","display_name":"Jin Teng","orcid":null},"institutions":[{"id":"https://openalex.org/I168719708","display_name":"City University of Hong Kong","ror":"https://ror.org/03q8dnn23","country_code":"HK","type":"education","lineage":["https://openalex.org/I168719708"]}],"countries":["HK"],"is_corresponding":false,"raw_author_name":"Jin Teng","raw_affiliation_strings":["City University of Hong Kong, Hong Kong, Hong Kong"],"affiliations":[{"raw_affiliation_string":"City University of Hong Kong, Hong Kong, Hong Kong","institution_ids":["https://openalex.org/I168719708"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":6,"corresponding_author_ids":["https://openalex.org/A5028125767"],"corresponding_institution_ids":["https://openalex.org/I168719708"],"apc_list":null,"apc_paid":null,"fwci":6.6968,"has_fulltext":false,"cited_by_count":83,"citation_normalized_percentile":{"value":0.97206061,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":90,"max":100},"biblio":{"volume":null,"issue":null,"first_page":"69","last_page":"78"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11424","display_name":"Security and Verification in Computing","score":0.9941999912261963,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11598","display_name":"Internet Traffic Analysis and Secure E-voting","score":0.9934999942779541,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.6198434829711914}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6198434829711914}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1145/1514274.1514285","is_oa":false,"landing_page_url":"https://doi.org/10.1145/1514274.1514285","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the second ACM conference on Wireless network security","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":19,"referenced_works":["https://openalex.org/W165688198","https://openalex.org/W191098608","https://openalex.org/W1533814111","https://openalex.org/W1976978659","https://openalex.org/W1988194087","https://openalex.org/W1993112187","https://openalex.org/W2016346537","https://openalex.org/W2016763420","https://openalex.org/W2110695400","https://openalex.org/W2113755340","https://openalex.org/W2119330522","https://openalex.org/W2120900307","https://openalex.org/W2126734536","https://openalex.org/W2140807364","https://openalex.org/W2148865036","https://openalex.org/W2156449948","https://openalex.org/W2160321844","https://openalex.org/W2165357553","https://openalex.org/W3148518259"],"related_works":["https://openalex.org/W2899084033","https://openalex.org/W2748952813","https://openalex.org/W2390279801","https://openalex.org/W2358668433","https://openalex.org/W2376932109","https://openalex.org/W2382290278","https://openalex.org/W2350741829","https://openalex.org/W2130043461","https://openalex.org/W2530322880","https://openalex.org/W1596801655"],"abstract_inverted_index":{"In":[0],"this":[1,123],"paper,":[2],"we":[3,11],"investigate":[4],"video-based":[5,15,109],"vulnerabilities":[6,110],"in":[7,111],"3G":[8,48,112],"Smartphones.":[9,49,113],"Particularly,":[10],"design":[12],"a":[13],"new":[14],"spyware,":[16],"called":[17],"Stealthy":[18],"Video":[19],"Capturer":[20],"(SVC).":[21],"SVC":[22,77],"can":[23,57,78],"secretly":[24],"record":[25],"video":[26,60],"information":[27,61],"for":[28],"the":[29,39,55,96,104],"third":[30],"party,":[31],"greatly":[32],"compromising":[33],"Smartphone":[34,74],"users'":[35],"privacy.":[36],"We":[37,114],"implement":[38],"spyware":[40,56],"and":[41,67,91],"conduct":[42],"extensive":[43],"experiments":[44],"on":[45,122],"real":[46],"world":[47],"Our":[50],"experimental":[51],"results":[52],"show":[53],"that":[54],"capture":[58],"private":[59],"with":[62],"unremarkable":[63],"power":[64],"consumption,":[65],"CPU":[66],"memory":[68],"occupancy,":[69],"hence":[70],"being":[71],"stealthy":[72],"to":[73,82,107],"users.":[75],"Moreover,":[76],"naturally":[79],"be":[80],"resistant":[81],"almost":[83],"all":[84],"commercial":[85],"anti-virus":[86],"tools,":[87],"like":[88],"McAfee,":[89],"Kaspersky":[90],"F-Secure":[92],"mobile":[93],"version.":[94],"To":[95],"best":[97],"of":[98],"our":[99,101,116],"knowledge,":[100],"work":[102,117],"is":[103],"first":[105],"one":[106],"address":[108],"expect":[115],"will":[118],"prompt":[119],"serious":[120],"attentions":[121],"issue.":[124]},"counts_by_year":[{"year":2025,"cited_by_count":1},{"year":2024,"cited_by_count":1},{"year":2021,"cited_by_count":2},{"year":2020,"cited_by_count":2},{"year":2019,"cited_by_count":4},{"year":2018,"cited_by_count":4},{"year":2017,"cited_by_count":7},{"year":2016,"cited_by_count":7},{"year":2015,"cited_by_count":17},{"year":2014,"cited_by_count":11},{"year":2013,"cited_by_count":8},{"year":2012,"cited_by_count":7}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
