{"id":"https://openalex.org/W2803172334","doi":"https://doi.org/10.1145/3229316.3229327","title":"Backscatter as a Covert Channel in Mobile Devices","display_name":"Backscatter as a Covert Channel in Mobile Devices","publication_year":2018,"publication_date":"2018-05-25","ids":{"openalex":"https://openalex.org/W2803172334","doi":"https://doi.org/10.1145/3229316.3229327","mag":"2803172334"},"language":"en","primary_location":{"id":"doi:10.1145/3229316.3229327","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3229316.3229327","pdf_url":null,"source":{"id":"https://openalex.org/S4210227886","display_name":"GetMobile Mobile Computing and Communications","issn_l":"2375-0529","issn":["2375-0529","2375-0537"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319798","host_organization_name":"Association for Computing Machinery","host_organization_lineage":["https://openalex.org/P4310319798"],"host_organization_lineage_names":["Association for Computing Machinery"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"GetMobile: Mobile Computing and Communications","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5035951638","display_name":"Zhice Yang","orcid":"https://orcid.org/0000-0002-7900-0745"},"institutions":[{"id":"https://openalex.org/I30809798","display_name":"ShanghaiTech University","ror":"https://ror.org/030bhh786","country_code":"CN","type":"education","lineage":["https://openalex.org/I30809798"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Zhice Yang","raw_affiliation_strings":["ShanghaiTech University"],"affiliations":[{"raw_affiliation_string":"ShanghaiTech University","institution_ids":["https://openalex.org/I30809798"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5025353659","display_name":"Qianyi Huang","orcid":"https://orcid.org/0000-0001-9525-7754"},"institutions":[{"id":"https://openalex.org/I200769079","display_name":"Hong Kong University of Science and Technology","ror":"https://ror.org/00q4vv597","country_code":"HK","type":"education","lineage":["https://openalex.org/I200769079"]}],"countries":["HK"],"is_corresponding":false,"raw_author_name":"Qianyi Huang","raw_affiliation_strings":["Hong Kong University of Science and Technology"],"affiliations":[{"raw_affiliation_string":"Hong Kong University of Science and Technology","institution_ids":["https://openalex.org/I200769079"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5114378267","display_name":"Qian Zhang","orcid":"https://orcid.org/0000-0001-9205-1881"},"institutions":[{"id":"https://openalex.org/I200769079","display_name":"Hong Kong University of Science and Technology","ror":"https://ror.org/00q4vv597","country_code":"HK","type":"education","lineage":["https://openalex.org/I200769079"]}],"countries":["HK"],"is_corresponding":false,"raw_author_name":"Qian Zhang","raw_affiliation_strings":["Hong Kong University of Science and Technology"],"affiliations":[{"raw_affiliation_string":"Hong Kong University of Science and Technology","institution_ids":["https://openalex.org/I200769079"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5035951638"],"corresponding_institution_ids":["https://openalex.org/I30809798"],"apc_list":null,"apc_paid":null,"fwci":0.4954,"has_fulltext":false,"cited_by_count":10,"citation_normalized_percentile":{"value":0.6223563,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":97},"biblio":{"volume":"22","issue":"1","first_page":"31","last_page":"34"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11800","display_name":"User Authentication and Security Systems","score":0.9993000030517578,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9984999895095825,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/mobile-device","display_name":"Mobile device","score":0.6411641240119934},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.5859193205833435},{"id":"https://openalex.org/keywords/covert","display_name":"Covert","score":0.5111642479896545},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.49878716468811035},{"id":"https://openalex.org/keywords/wearable-computer","display_name":"Wearable computer","score":0.46995973587036133},{"id":"https://openalex.org/keywords/internet-privacy","display_name":"Internet privacy","score":0.46233317255973816},{"id":"https://openalex.org/keywords/information-leakage","display_name":"Information leakage","score":0.4607592225074768},{"id":"https://openalex.org/keywords/covert-channel","display_name":"Covert channel","score":0.45944133400917053},{"id":"https://openalex.org/keywords/backscatter","display_name":"Backscatter (email)","score":0.4350767135620117},{"id":"https://openalex.org/keywords/channel","display_name":"Channel (broadcasting)","score":0.4156706929206848},{"id":"https://openalex.org/keywords/embedded-system","display_name":"Embedded system","score":0.23423558473587036},{"id":"https://openalex.org/keywords/wireless","display_name":"Wireless","score":0.21888354420661926},{"id":"https://openalex.org/keywords/telecommunications","display_name":"Telecommunications","score":0.20905843377113342},{"id":"https://openalex.org/keywords/world-wide-web","display_name":"World Wide Web","score":0.18851915001869202},{"id":"https://openalex.org/keywords/cloud-computing","display_name":"Cloud computing","score":0.12156081199645996},{"id":"https://openalex.org/keywords/cloud-computing-security","display_name":"Cloud computing security","score":0.08546450734138489},{"id":"https://openalex.org/keywords/security-information-and-event-management","display_name":"Security information and event management","score":0.07417520880699158}],"concepts":[{"id":"https://openalex.org/C186967261","wikidata":"https://www.wikidata.org/wiki/Q5082128","display_name":"Mobile device","level":2,"score":0.6411641240119934},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.5859193205833435},{"id":"https://openalex.org/C2779338814","wikidata":"https://www.wikidata.org/wiki/Q5179285","display_name":"Covert","level":2,"score":0.5111642479896545},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.49878716468811035},{"id":"https://openalex.org/C150594956","wikidata":"https://www.wikidata.org/wiki/Q1334829","display_name":"Wearable computer","level":2,"score":0.46995973587036133},{"id":"https://openalex.org/C108827166","wikidata":"https://www.wikidata.org/wiki/Q175975","display_name":"Internet privacy","level":1,"score":0.46233317255973816},{"id":"https://openalex.org/C2779201187","wikidata":"https://www.wikidata.org/wiki/Q2775060","display_name":"Information leakage","level":2,"score":0.4607592225074768},{"id":"https://openalex.org/C29024540","wikidata":"https://www.wikidata.org/wiki/Q1476964","display_name":"Covert channel","level":5,"score":0.45944133400917053},{"id":"https://openalex.org/C30354325","wikidata":"https://www.wikidata.org/wiki/Q204667","display_name":"Backscatter (email)","level":3,"score":0.4350767135620117},{"id":"https://openalex.org/C127162648","wikidata":"https://www.wikidata.org/wiki/Q16858953","display_name":"Channel (broadcasting)","level":2,"score":0.4156706929206848},{"id":"https://openalex.org/C149635348","wikidata":"https://www.wikidata.org/wiki/Q193040","display_name":"Embedded system","level":1,"score":0.23423558473587036},{"id":"https://openalex.org/C555944384","wikidata":"https://www.wikidata.org/wiki/Q249","display_name":"Wireless","level":2,"score":0.21888354420661926},{"id":"https://openalex.org/C76155785","wikidata":"https://www.wikidata.org/wiki/Q418","display_name":"Telecommunications","level":1,"score":0.20905843377113342},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.18851915001869202},{"id":"https://openalex.org/C79974875","wikidata":"https://www.wikidata.org/wiki/Q483639","display_name":"Cloud computing","level":2,"score":0.12156081199645996},{"id":"https://openalex.org/C184842701","wikidata":"https://www.wikidata.org/wiki/Q370563","display_name":"Cloud computing security","level":3,"score":0.08546450734138489},{"id":"https://openalex.org/C103377522","wikidata":"https://www.wikidata.org/wiki/Q3493999","display_name":"Security information and event management","level":4,"score":0.07417520880699158},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.0},{"id":"https://openalex.org/C138885662","wikidata":"https://www.wikidata.org/wiki/Q5891","display_name":"Philosophy","level":0,"score":0.0},{"id":"https://openalex.org/C41895202","wikidata":"https://www.wikidata.org/wiki/Q8162","display_name":"Linguistics","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1145/3229316.3229327","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3229316.3229327","pdf_url":null,"source":{"id":"https://openalex.org/S4210227886","display_name":"GetMobile Mobile Computing and Communications","issn_l":"2375-0529","issn":["2375-0529","2375-0537"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319798","host_organization_name":"Association for Computing Machinery","host_organization_lineage":["https://openalex.org/P4310319798"],"host_organization_lineage_names":["Association for Computing Machinery"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"GetMobile: Mobile Computing and Communications","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[{"score":0.5099999904632568,"id":"https://metadata.un.org/sdg/16","display_name":"Peace, Justice and strong institutions"}],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":5,"referenced_works":["https://openalex.org/W1230022372","https://openalex.org/W2060692877","https://openalex.org/W2158090937","https://openalex.org/W2761188035","https://openalex.org/W3001044503"],"related_works":["https://openalex.org/W2409612194","https://openalex.org/W4224042389","https://openalex.org/W20460883","https://openalex.org/W174282171","https://openalex.org/W789579324","https://openalex.org/W1587013156","https://openalex.org/W2092798601","https://openalex.org/W4239080508","https://openalex.org/W4386075149","https://openalex.org/W2054093036"],"abstract_inverted_index":{"Mobile":[0],"devices,":[1],"including":[2],"laptops,":[3],"smartphones,":[4],"wearables,":[5],"etc.,":[6],"have":[7,48],"become":[8],"essential":[9],"tools":[10],"in":[11],"modern":[12],"life.":[13],"We":[14],"rely":[15],"on":[16],"them":[17],"for":[18,51],"social":[19],"activities,":[20],"document":[21],"processing,":[22],"and":[23,42],"health":[24],"status":[25],"monitoring.":[26],"As":[27],"these":[28],"devices":[29,53],"contain":[30],"sensitive":[31],"personal":[32],"information,":[33],"various":[34],"security":[35],"mechanisms,":[36],"such":[37],"as":[38],"firewalls,":[39],"traffic":[40],"monitors,":[41],"information":[43],"flow":[44],"control":[45],"systems":[46],"[1],":[47],"been":[49],"developed":[50],"mobile":[52],"to":[54],"prevent":[55],"unauthorized":[56],"data":[57],"leakage.":[58]},"counts_by_year":[{"year":2025,"cited_by_count":1},{"year":2024,"cited_by_count":2},{"year":2023,"cited_by_count":4},{"year":2021,"cited_by_count":1},{"year":2020,"cited_by_count":1},{"year":2019,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
