Cited By
View all- Zhang GFu HXiang ZZhou XHu PCheng XYang Y(2025)Ambient Light Reflection-Based Eavesdropping Enhanced With cGANIEEE Transactions on Mobile Computing10.1109/TMC.2024.346039224:1(72-85)Online publication date: Jan-2025
- Nassi BIluz ECohen OVayner ONassi DZadov BElovici Y(2024)Video-Based Cryptanalysis: Extracting Cryptographic Keys from Video Footage of a Device’s Power LED Captured by Standard Video Cameras2024 IEEE Symposium on Security and Privacy (SP)10.1109/SP54263.2024.00163(2422-2440)Online publication date: 19-May-2024
- Qiao HWang KHuang TXu XLiu SChen J(2024)A TEMPEST Attack Implementation based on Hidden Markov model in Smart GridJournal of Physics: Conference Series10.1088/1742-6596/2774/1/0120092774:1(012009)Online publication date: 1-Jul-2024
- Show More Cited By