iBet uBet web content aggregator. Adding the entire web to your favor.
iBet uBet web content aggregator. Adding the entire web to your favor.



Link to original content: https://api.crossref.org/works/10.1109/CNS.2017.8228624
{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,29]],"date-time":"2024-10-29T13:36:26Z","timestamp":1730208986133,"version":"3.28.0"},"reference-count":29,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017,10]]},"DOI":"10.1109\/cns.2017.8228624","type":"proceedings-article","created":{"date-parts":[[2017,12,21]],"date-time":"2017-12-21T19:55:49Z","timestamp":1513886149000},"page":"1-9","source":"Crossref","is-referenced-by-count":7,"title":["ViViSnoop: Someone is snooping your typing without seeing it!"],"prefix":"10.1109","author":[{"given":"Kun","family":"Jin","sequence":"first","affiliation":[]},{"given":"Si","family":"Fang","sequence":"additional","affiliation":[]},{"given":"Chunyi","family":"Peng","sequence":"additional","affiliation":[]},{"given":"Zhiyang","family":"Teng","sequence":"additional","affiliation":[]},{"given":"Xufei","family":"Mao","sequence":"additional","affiliation":[]},{"given":"Lan","family":"Zhang","sequence":"additional","affiliation":[]},{"given":"Xiangyang","family":"Li","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1145\/2046707.2046771"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/18.119725"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1023\/A:1026553619983"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1145\/2601097.2601119"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/TNN.2002.1031944"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1145\/2461912.2461966"},{"journal-title":"1\/f Noise A Pedagogical Review","year":"0","author":"milotti","key":"ref16"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1145\/2660267.2660296"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1145\/2594368.2594384"},{"volume":"1","journal-title":"Theory of vibration An introduction","year":"1995","author":"shabana","key":"ref19"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1145\/2185448.2185465"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2008.28"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1145\/2162081.2162095"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2009.20"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1145\/2508859.2516709"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1109\/SECPRI.2004.1301311"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1145\/2046707.2046769"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1145\/2660267.2660288"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1145\/2660267.2660360"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2008.25"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1145\/2757302.2757304"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2016.23060"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1007\/s13042-013-0226-9"},{"key":"ref22","first-page":"3","article-title":"Recurrent neural network based language model","volume":"2","author":"mikolov","year":"2010","journal-title":"InterSpeech"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1162\/neco.1997.9.8.1735"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1145\/1180405.1180436"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1162\/coli_a_00037"},{"journal-title":"Enron Email Dataset","year":"2015","key":"ref26"},{"journal-title":"Skullsecurity","year":"0","key":"ref25"}],"event":{"name":"2017 IEEE Conference on Communications and Network Security (CNS)","start":{"date-parts":[[2017,10,9]]},"location":"Las Vegas, NV","end":{"date-parts":[[2017,10,11]]}},"container-title":["2017 IEEE Conference on Communications and Network Security (CNS)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8170165\/8228604\/08228624.pdf?arnumber=8228624","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2018,1,29]],"date-time":"2018-01-29T17:14:06Z","timestamp":1517246046000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/8228624\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,10]]},"references-count":29,"URL":"http:\/\/dx.doi.org\/10.1109\/cns.2017.8228624","relation":{},"subject":[],"published":{"date-parts":[[2017,10]]}}}