[1]Korayem M, Templeman R, Chen D, et al. Enhancing lifelogging privacy by detecting screens[C] Proc of the 2016 CHI Conf on Human Factors in Computing Systems. San Jose, USA: CHI, 2016: 43094314[2]Sami S, Tan S R X, Sun B, et al. Lapd: Hidden spy camera detection using smartphone timeofflight sensors[C] Proc of the 19th ACM Conf on Embedded Networked Sensor Systems. New York: ACM, 2021: 288301[3]Noguchi H, Kataoka M, Yamato Y. Device identification based on communication analysis for the Internet of things[J]. IEEE Access, 2019, 7: 5290352912[4]Bezawada B, Bachani M, Peterson J, et al. Behavioral fingerprinting of IoT devices[C] Proc of the 2018 Workshop on Attacks and Solutions in Hardware Security. New York: ACM, 2018: 4150[5]Meidan Y, Bohadana M, Shabtai A, et al. Detection of unauthorized IoT devices using machine learning techniques[J]. arXiv preprint, arXiv: 1709.04647, 2017[6]Breiman L. Random forests[J]. Machine Learning, 2001, 45(1): 532[7]Cheng Y, Ji X, Lu T, et al. Dewicam: Detecting hidden wireless cameras via smartphones[C] Proc of the 2018 on Asia Conf on Computer and Communications Security (CCS’18). New York: ACM, 2018: 113[8]Dao D, Salman M, Noh Y. DeepDeSpy: A deep learningbased wireless spy camera detection system[J]. IEEE Access, 2021, 9: 145486145497[9]Sharma R A, Soltanaghaei E, Rowe A, et al. Lumos: Identifying and localizing diverse hidden {IoT} devices in an unfamiliar environment[C] Proc of the 31st USENIX Security Symposium (USENIX Security 22). Berkeley, CA: USENIX Security, 2022: 10951112[10]Heo J, Gil S, Jung Y, et al. Are there wireless hidden cameras spying on me[C] Proc of the 38th Annual Computer Security Applications Conference. Waikiki, USA: ACSAC, 2022: 714726[11]孙祥振, 王斌君. 基于随机MAC的WiFi取证技术研究[J]. 信息技术与信息化, 2022, 272(11): 1520[12]Mwakwata C B, Malik H, Mahtab Alam M, et al. Narrowband Internet of things (NBIoT): From physical (PHY) and media access control (MAC) layers perspectives[J]. Sensors, 2019, 19(11): 134[13]魏思佳, 李涛, 姜禹. 基于物理层的LoRa设备身份检测方法研究[J]. 信息安全研究, 2022, 8(1): 1927[14]张瑞嵩, 徐松艳, 李鑫, 等. 基于滑动窗口的自愈组密钥分发方案[J]. 信息安全研究, 2023, 9(2): 197203 |