{"id":"https://openalex.org/W2807035766","doi":"https://doi.org/10.1145/3196494.3196509","title":"DeWiCam","display_name":"DeWiCam","publication_year":2018,"publication_date":"2018-05-29","ids":{"openalex":"https://openalex.org/W2807035766","doi":"https://doi.org/10.1145/3196494.3196509","mag":"2807035766"},"language":"en","primary_location":{"id":"doi:10.1145/3196494.3196509","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3196494.3196509","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 2018 on Asia Conference on Computer and Communications Security","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5063893376","display_name":"Yushi Cheng","orcid":"https://orcid.org/0000-0002-0888-2322"},"institutions":[{"id":"https://openalex.org/I45928872","display_name":"Alibaba Group (China)","ror":"https://ror.org/00k642b80","country_code":"CN","type":"company","lineage":["https://openalex.org/I45928872"]},{"id":"https://openalex.org/I76130692","display_name":"Zhejiang University","ror":"https://ror.org/00a2xv884","country_code":"CN","type":"education","lineage":["https://openalex.org/I76130692"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Yushi Cheng","raw_affiliation_strings":["Zhejiang University &amp;Alibaba-Zhejiang University Joint Institute of Frontier Technologies, Hangzhou, China"],"affiliations":[{"raw_affiliation_string":"Zhejiang University &amp;Alibaba-Zhejiang University Joint Institute of Frontier Technologies, Hangzhou, China","institution_ids":["https://openalex.org/I45928872","https://openalex.org/I76130692"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5017116027","display_name":"Xiaoyu Ji","orcid":"https://orcid.org/0000-0002-1101-0007"},"institutions":[{"id":"https://openalex.org/I76130692","display_name":"Zhejiang University","ror":"https://ror.org/00a2xv884","country_code":"CN","type":"education","lineage":["https://openalex.org/I76130692"]},{"id":"https://openalex.org/I45928872","display_name":"Alibaba Group (China)","ror":"https://ror.org/00k642b80","country_code":"CN","type":"company","lineage":["https://openalex.org/I45928872"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Xiaoyu Ji","raw_affiliation_strings":["Zhejiang University &amp;Alibaba-Zhejiang University Joint Institute of Frontier Technologies, Hangzhou, China"],"affiliations":[{"raw_affiliation_string":"Zhejiang University &amp;Alibaba-Zhejiang University Joint Institute of Frontier Technologies, Hangzhou, China","institution_ids":["https://openalex.org/I45928872","https://openalex.org/I76130692"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5058686343","display_name":"Tianyang Lu","orcid":null},"institutions":[{"id":"https://openalex.org/I76130692","display_name":"Zhejiang University","ror":"https://ror.org/00a2xv884","country_code":"CN","type":"education","lineage":["https://openalex.org/I76130692"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Tianyang Lu","raw_affiliation_strings":["Zhejiang University, Hangzhou, China"],"affiliations":[{"raw_affiliation_string":"Zhejiang University, Hangzhou, China","institution_ids":["https://openalex.org/I76130692"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5060351020","display_name":"Wenyuan Xu","orcid":"https://orcid.org/0000-0002-5043-9148"},"institutions":[{"id":"https://openalex.org/I76130692","display_name":"Zhejiang University","ror":"https://ror.org/00a2xv884","country_code":"CN","type":"education","lineage":["https://openalex.org/I76130692"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Wenyuan Xu","raw_affiliation_strings":["Zhejiang University, Hangzhou, China"],"affiliations":[{"raw_affiliation_string":"Zhejiang University, Hangzhou, China","institution_ids":["https://openalex.org/I76130692"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5063893376"],"corresponding_institution_ids":["https://openalex.org/I45928872","https://openalex.org/I76130692"],"apc_list":null,"apc_paid":null,"fwci":3.2154,"has_fulltext":false,"cited_by_count":49,"citation_normalized_percentile":{"value":0.93518219,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":96,"max":100},"biblio":{"volume":null,"issue":null,"first_page":"1","last_page":"13"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11598","display_name":"Internet Traffic Analysis and Secure E-voting","score":0.9997000098228455,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11598","display_name":"Internet Traffic Analysis and Secure E-voting","score":0.9997000098228455,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10388","display_name":"Advanced Steganography and Watermarking Techniques","score":0.9983999729156494,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10331","display_name":"Video Surveillance and Tracking Methods","score":0.9973999857902527,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.82582688331604},{"id":"https://openalex.org/keywords/wireless","display_name":"Wireless","score":0.5875800848007202},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.574151337146759},{"id":"https://openalex.org/keywords/android","display_name":"Android (operating system)","score":0.5437563061714172},{"id":"https://openalex.org/keywords/network-packet","display_name":"Network packet","score":0.43194615840911865},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.3921665549278259},{"id":"https://openalex.org/keywords/real-time-computing","display_name":"Real-time computing","score":0.3889378011226654},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.38684940338134766},{"id":"https://openalex.org/keywords/computer-vision","display_name":"Computer vision","score":0.344113826751709},{"id":"https://openalex.org/keywords/telecommunications","display_name":"Telecommunications","score":0.11262750625610352}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.82582688331604},{"id":"https://openalex.org/C555944384","wikidata":"https://www.wikidata.org/wiki/Q249","display_name":"Wireless","level":2,"score":0.5875800848007202},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.574151337146759},{"id":"https://openalex.org/C557433098","wikidata":"https://www.wikidata.org/wiki/Q94","display_name":"Android (operating system)","level":2,"score":0.5437563061714172},{"id":"https://openalex.org/C158379750","wikidata":"https://www.wikidata.org/wiki/Q214111","display_name":"Network packet","level":2,"score":0.43194615840911865},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.3921665549278259},{"id":"https://openalex.org/C79403827","wikidata":"https://www.wikidata.org/wiki/Q3988","display_name":"Real-time computing","level":1,"score":0.3889378011226654},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.38684940338134766},{"id":"https://openalex.org/C31972630","wikidata":"https://www.wikidata.org/wiki/Q844240","display_name":"Computer vision","level":1,"score":0.344113826751709},{"id":"https://openalex.org/C76155785","wikidata":"https://www.wikidata.org/wiki/Q418","display_name":"Telecommunications","level":1,"score":0.11262750625610352},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1145/3196494.3196509","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3196494.3196509","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 2018 on Asia Conference on Computer and Communications Security","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"display_name":"Peace, Justice and strong institutions","score":0.5,"id":"https://metadata.un.org/sdg/16"}],"awards":[{"id":"https://openalex.org/G6539836586","display_name":null,"funder_award_id":"61472358","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"}],"funders":[{"id":"https://openalex.org/F4320321001","display_name":"National Natural Science Foundation of China","ror":"https://ror.org/01h0zpd94"}],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":23,"referenced_works":["https://openalex.org/W1523644733","https://openalex.org/W1990701202","https://openalex.org/W2011593588","https://openalex.org/W2056132907","https://openalex.org/W2067006636","https://openalex.org/W2080182726","https://openalex.org/W2099129595","https://openalex.org/W2108223826","https://openalex.org/W2122226347","https://openalex.org/W2149698389","https://openalex.org/W2150779517","https://openalex.org/W2162102632","https://openalex.org/W2163383242","https://openalex.org/W2172073677","https://openalex.org/W2396049964","https://openalex.org/W2409433878","https://openalex.org/W2506891351","https://openalex.org/W2603178913","https://openalex.org/W2613902046","https://openalex.org/W3160447194","https://openalex.org/W4236506014","https://openalex.org/W4239953570","https://openalex.org/W6631257896"],"related_works":["https://openalex.org/W2100090372","https://openalex.org/W4361205702","https://openalex.org/W1991580985","https://openalex.org/W2385965183","https://openalex.org/W2013342653","https://openalex.org/W2901818815","https://openalex.org/W4289281780","https://openalex.org/W2165251242","https://openalex.org/W4237598585","https://openalex.org/W2359552542"],"abstract_inverted_index":{"Wireless":[0],"cameras":[1,31,105,148],"are":[2,19,32],"widely":[3],"deployed":[4],"in":[5,91,114],"surveillance":[6],"systems":[7],"for":[8,28],"security":[9],"guarding.":[10],"However,":[11],"the":[12,65,88,92,98,128],"privacy":[13],"concerns":[14],"associated":[15],"with":[16,75,134,149],"unauthorized":[17,29],"videotaping,":[18],"drawing":[20],"an":[21,115,150],"increasing":[22],"attention":[23],"recently.":[24],"Existing":[25],"detection":[26,37,53],"methods":[27],"wireless":[30,72,104],"either":[33],"limited":[34],"by":[35],"their":[36],"accuracy":[38,151],"or":[39],"requiring":[40],"dedicated":[41],"devices.":[42],"In":[43],"this":[44],"paper,":[45],"we":[46,118],"propose":[47,119],"DeWiCam,":[48],"a":[49,111,120],"lightweight":[50],"and":[51,100,131],"effective":[52],"mechanism":[54],"using":[55],"smartphones.":[56],"The":[57,140],"basic":[58],"idea":[59],"of":[60,69,152],"DeWiCam":[61,80,96,126,145],"is":[62,81,113],"to":[63],"utilize":[64],"intrinsic":[66],"traffic":[67,77],"patterns":[68],"flows":[70],"from":[71],"cameras.":[73,139],"Compared":[74],"traditional":[76],"pattern":[78],"analysis,":[79],"more":[82],"challenging":[83],"because":[84],"it":[85,133],"cannot":[86],"access":[87],"encrypted":[89],"information":[90],"data":[93],"packets.":[94],"Yet,":[95],"overcomes":[97],"difficulty":[99],"can":[101,146],"detect":[102,147],"nearby":[103],"reliably.":[106],"To":[107],"further":[108],"identify":[109],"whether":[110],"camera":[112],"interested":[116],"room,":[117],"human-assisted":[121],"identification":[122],"model.":[123],"We":[124],"implement":[125],"on":[127,137],"Android":[129],"platform":[130],"evaluate":[132],"extensive":[135],"experiments":[136],"20":[138],"evaluation":[141],"results":[142],"show":[143],"that":[144],"99%":[153],"within":[154],"2.7":[155],"s.":[156]},"counts_by_year":[{"year":2026,"cited_by_count":1},{"year":2025,"cited_by_count":5},{"year":2024,"cited_by_count":4},{"year":2023,"cited_by_count":15},{"year":2022,"cited_by_count":5},{"year":2021,"cited_by_count":7},{"year":2020,"cited_by_count":7},{"year":2019,"cited_by_count":5}],"updated_date":"2026-04-23T09:07:50.710637","created_date":"2018-06-13T00:00:00"}
