1. [1] Anirudh Badam, Ranveer Chandra, Jon Dutra, Anthony Ferrese, Steve Hodges, Pan Hu, Julia Meinershagen, Thomas Moscibroda, Bodhi Priyantha, and Evangelia Skiani. 2015. Software Defined Batteries. In Proceedings of the 25th Symposium on Operating Systems Principles (SOSP ’15). ACM, New York, NY, USA, 215–229. https://doi.org/10.1145/2815400.281542910.1145/2815400.2815429
2. [2] Donald J Berndt and James Clifford. 1994. Using dynamic time warping to find patterns in time series. In KDD workshop, Vol. 10. Seattle, WA, 359–370.
3. [3] Bert den Boer, Kerstin Lemke, and Guntram Wicke. 2003. A DPA Attack Against the Modular Reduction Within a CRT Implementation of RSA. In Revised Papers from the 4th International Workshop on Cryptographic Hardware and Embedded Systems (CHES ’02). Springer-Verlag, London, UK, 228–243. http://dl.acm.org/citation.cfm?id=648255.752718
4. [4] Aaron Carroll and Gernot Heiser. 2010. An Analysis of Power Consumption in a Smartphone. In Proceedings of the 2010 USENIX Conference on USENIX Annual Technical Conference (USENIXATC’10), Vol. 14. USENIX Association, Berkeley, CA, USA, 21–21. http://dl.acm.org/citation.cfm? id=1855840.1855861
5. [5] Yimin Chen, Xiaocong Jin, Jingchao Sun, Rui Zhang, and Yanchao Zhang. 2017. POWERFUL: Mobile app fingerprinting via power analysis. In Conference on Computer Communications (INFOCOM). IEEE, 1–9.