Hidden cameras in sensitive locations have become an increasing threat to personal privacy all over the world. Because the camera is small and camouflaged, it is difficult to detect the …
R Ceccio, S Stephenson, V Chadha… - 32nd USENIX Security …, 2023 - usenix.org
Recent anecdotal evidence suggests that abusers have begun to use covert spy devices such as nanny cameras, item trackers, and audio recorders to spy on and stalk their …
T Ni, X Zhang, C Zuo, J Li, Z Yan… - … IEEE Symposium on …, 2023 - ieeexplore.ieee.org
Today, there is an increasing number of smartphones supporting wireless charging that leverages electromagnetic induction to transmit power from a wireless charger to the …
AZ Kouzani - IEEE Access, 2023 - ieeexplore.ieee.org
Domestic violence is an issue of great importance that exceeds socioeconomic backgrounds and cultural boundaries. It stems from factors such as power struggle, mental health issue …
Y He, Q He, S Fang, Y Liu - Proceedings of the 2023 ACM SIGSAC …, 2023 - dl.acm.org
Wireless security cameras may deter intruders. Accompanying the hardware, consumers may pay recurring monthly fees for recording videos to the cloud, or use the free tier offering …
The proliferation of IoT devices has created risks of their abuse for unauthorized sensing/monitoring of our daily activities. Especially, the leakage of images taken by …
Y Gu, J Chen, C Wu, K He, Z Zhao, R Du - Proceedings of the ACM on …, 2024 - dl.acm.org
Unlawful wireless cameras are often hidden to secretly monitor private activities. However, existing methods to detect and localize these cameras are interactively complex or require …
Y He, Q He, S Fang, Y Liu - IEEE Transactions on Mobile …, 2023 - ieeexplore.ieee.org
Wireless cameras nowadays commonly employ motion sensors to identify that something is occurring in their fields of vision before starting to record and notifying the property owner of …
H Wang, J Hu, T Zheng, J Hu, Z Chen… - IEEE Transactions …, 2024 - ieeexplore.ieee.org
The contact-free sensing nature of Wi-Fi has been leveraged to achieve privacy breaches such as keystroke inference (KI). However, the use of channel state information (CSI) in …