Camradar: Hidden camera detection leveraging amplitude-modulated sensor images embedded in electromagnetic emanations

Z Liu, F Lin, C Wang, Y Shen, Z Ba, L Lu, W Xu… - Proceedings of the …, 2023 - dl.acm.org
Hidden cameras in sensitive locations have become an increasing threat to personal privacy
all over the world. Because the camera is small and camouflaged, it is difficult to detect the …

When Free Tier Becomes Free to Enter: A Non-Intrusive Way to Identify Security Cameras with no Cloud Subscription

Y He, Q He, S Fang, Y Liu - Proceedings of the 2023 ACM SIGSAC …, 2023 - dl.acm.org
Wireless security cameras may deter intruders. Accompanying the hardware, consumers
may pay recurring monthly fees for recording videos to the cloud, or use the free tier offering …

LocCams: An Efficient and Robust Approach for Detecting and Localizing Hidden Wireless Cameras via Commodity Devices

Y Gu, J Chen, C Wu, K He, Z Zhao, R Du - Proceedings of the ACM on …, 2024 - dl.acm.org
Unlawful wireless cameras are often hidden to secretly monitor private activities. However,
existing methods to detect and localize these cameras are interactively complex or require …

Revealing Hidden IoT Devices through Passive Detection, Fingerprinting, and Localization

W Sun, H Givehchian, D Bharadia - Proceedings on Privacy …, 2025 - petsymposium.org
Internet-of-things (IoT) devices (eg, micro camera and microphone) are usually small form
factor, low-cost, and low-power, which makes them easy to conceal and deploy in the indoor …

Phantom-CSI Attacks against Wireless Liveness Detection

Q He, S Fang - Proceedings of the 26th International Symposium on …, 2023 - dl.acm.org
All systems monitoring human behavior in real time are, by their nature, attractive targets for
spoofing. For example, misdirecting live-feed security cameras or voice-controllable Internet …

WiFi Sensing with Single-Antenna Devices for Ambient Assisted Living

R Schumann, F Li, M Grzegorzek - … of the 8th international Workshop on …, 2023 - dl.acm.org
The absolute coverage WiFi networks is higher than it has ever been and WiFi sensing
offers a device-free, contactless alternative to intrusive wearable devices for a variety of …

GPSBuster: Busting out Hidden GPS Trackers via MSoC Electromagnetic Radiations

Y Li, Z Yan, W Jin, Z Ning, D Liu, Z Qin, Y Liu… - Proceedings of the …, 2024 - dl.acm.org
The escalating threat of hidden GPS tracking devices poses significant risks to personal
privacy and security. Featured by their miniaturization and misleading appearances, GPS …

WiSOM: WiFi-enabled self-adaptive system for monitoring the occupancy in smart buildings

M Salman, LA Caceres-Najarro, YD Seo, Y Noh - Energy, 2024 - Elsevier
There has been extensive research on building energy saving (BES), which aims to reduce
energy consumption inside buildings. One of the key solutions for energy saving in buildings …

mmSpyVR: Exploiting mmWave Radar for Penetrating Obstacles to Uncover Privacy Vulnerability of Virtual Reality

L Mei, R Liu, Z Yin, Q Zhao, W Jiang, S Wang… - Proceedings of the …, 2024 - dl.acm.org
Virtual reality (VR), while enhancing user experiences, introduces significant privacy risks.
This paper reveals a novel vulnerability in VR systems that allows attackers to capture VR …

Extending EV Battery Lifetime: Digital Phenotyping Approach for Departure Time Prediction

Y Lee, W Song, J Song, Y Noh - Proceedings of the ACM on Interactive …, 2024 - dl.acm.org
Battery degradation, a gradual loss of usable capacity over time, is one of the major hurdles
for widespread adoption of electric vehicles (EVs). We introduce delayed full-charging (DFC) …