Recognition of Information Leakage of Computer via Conducted Emanations on the Power Line.

Shanjing YangXiaoyong LiaoJianlin HuWeiqing Huang
Published in: BigDataSecurity/HPSC/IDS (2017)
Keyphrases
  • power line
  • information leakage
  • pattern recognition
  • personal information
  • feature extraction
  • low voltage
  • image reconstruction
  • secret information