[1] 刘泰康,李咏梅,等.电磁信息泄漏及防护技术[M].北京:国防工业出版社,2015:11-125.LIU T K,LI Y M,et al.Electromagnetic information leakage and countermeasure technique[M].Beijing:National Defense Industry Press,2015:11-125(in Chinese). [2] VAN ECK W.Electromagnetic radiation from video display units:An eavesdropping risk?[J].Computers and Security,1985,4(4):269-286. [3] KUHN M G.Eavesdropping attacks on computer displays[C]//Proceedings of Information Security Summit,2006:1-10. [4] KUHN M G.Optical time-domain eavesdropping risks of CRT displays[C]//Proceedings of IEEE Symposium on Security & Privacy.Piscataway:IEEE Press,2002:3-18. [5] KUHN M G.Security limits for compromising emanations[C]//International Workshop on Cryptographic Hardware and Embedded Systems.Berlin:Springer,2005,3659:265-279. [6] KUHN M G.Compromising emanations of LCD TV sets[J].IEEE Transactions on Electromagnetic Compatibility,2013,55(3):564-570. [7] KUHN M G.Electromagnetic eavesdropping risks of flat-panel displays:Lecture notes in computer science[C]//Proceedings of the 4th International Conference on Privacy Enhancing Technologies.Berlin:Springer,2005,3424:88-107. [8] SEKIGUCHI H.Information leakage of input operation on touch screen monitors caused by electromagnetic noise[C]//Proceedings of IEEE International Symposium on Electromagnetic Compatibility.Piscataway:IEEE Press,2010:127-131. [9] SHI J,YONGACOGLU A,SUN D,et al.A novel wavelet based independent component analysis method for pre-processing computer video leakage signal[C]//Proceedings of IEEE Symposium on Computers and Communications.Piscataway:IEEE Press,2016:334-339. [10] SUN D,SHI J,WEI D,et al.A low-cost and efficient method of determining the best frequency band for video leaking signal reconstruction[C]//Proceedings of International Conference on Systems and Informatics.Piscataway:IEEE Press,2015:624-628. [11] TOSAKA T,YAMANAKA Y,FUKUNAGA K.Method for determining whether or not information is contained in electromagnetic disturbance radiated from a PC display[J].IEEE Transactions on Electromagnetic Compatibility,2011,53(2):318-324. [12] MAO J,LIU P,LIU J,et al.Method for detecting electromagnetic information leakage from computer monitor[J].Control and Intelligent Systems,2017,45(1):37-42. [13] KRIZHEVSKY A,SUTSKEVER I,HINTON G E.ImageNet classification with deep convolutional neural networks[C]//Annual Conference on Neural Information Processing Systems,2012:1097-1105. [14] CHO S I,KANG S.Gradient prior-aided CNN denoiser with separable convolution-based optimization of feature dimension[J].IEEE Transactions on Multimedia,2019,21(2):484-493. [15] DENG Z,SUN H,ZHOU S,et al.Multi-scale object detection in remote sensing imagery with convolutional neural networks[J].ISPRS Journal of Photogrammetry and Remote Sensing,2018,145:3-22. [16] CHEN S,XU L,MA L,et al.Convolutional neural network for classification of solar radio spectrum[C]//Proceedings of IEEE International Conference on Multimedia and Expo Workshops.Piscataway:IEEE Press,2017:198-201. [17] ZHANG X,LIN T,XU J,et al.DeepSpectra:An end-to-end deep learning approach for quantitative spectral analysis[J].Analytica Chimica Acta,2019,1058:48-57. [18] SELVARAJU R R,COGSWELL M,DAS A,et al.Grad-CAM:Visual explanations from deep networks via gradient-based localization[C]//Proceedings of the IEEE International Conference on Computer Vision.Piscataway:IEEE Press,2017:618-626. [19] CAO J,PANG Y,LI X,et al.Randomly translational activation inspired by the input distributions of ReLU[J].Neuro Computing,2018,275:859-868. [20] SRIVASTAVA N,HINTON G,KRIZHEVSKY A,et al.Dropout:A simple way to prevent neural networks from overfitting[J].Journal of Machine Learning Research,2014,15(1):1929-1958. [21] VESA.VESA and industry standards and guidelines for computer display monitor timing (DMT)[S].San Jose:VESA,2013. |