{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,1]],"date-time":"2025-10-01T16:24:51Z","timestamp":1759335891982,"version":"3.40.2"},"reference-count":20,"publisher":"IEEE","license":[{"start":{"date-parts":[[2023,12,4]],"date-time":"2023-12-04T00:00:00Z","timestamp":1701648000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2023,12,4]],"date-time":"2023-12-04T00:00:00Z","timestamp":1701648000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2023,12,4]]},"DOI":"10.1109\/gcwkshps58843.2023.10464769","type":"proceedings-article","created":{"date-parts":[[2024,3,21]],"date-time":"2024-03-21T17:52:58Z","timestamp":1711043578000},"page":"1123-1128","source":"Crossref","is-referenced-by-count":4,"title":["Keystroke Recognition using WiFi Sensing: An Empirical Study on Robustness"],"prefix":"10.1109","author":[{"given":"Haoming","family":"Wang","sequence":"first","affiliation":[{"name":"Cyber Security Cooperative Research Centre"}]},{"given":"Aryan","family":"Sharma","sequence":"additional","affiliation":[{"name":"Cyber Security Cooperative Research Centre"}]},{"given":"Deepak","family":"Mishra","sequence":"additional","affiliation":[{"name":"Cyber Security Cooperative Research Centre"}]},{"given":"Aruna","family":"Seneviratne","sequence":"additional","affiliation":[{"name":"Cyber Security Cooperative Research Centre"}]},{"given":"Eliathamby","family":"Ambikairajah","sequence":"additional","affiliation":[{"name":"Cyber Security Cooperative Research Centre"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2023.3269843"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1016\/j.comcom.2022.08.004"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1016\/j.patter.2023.100703"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/GLOBECOM46510.2021.9685183"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/ICCWorkshops50388.2021.9473673"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/EuCNC\/6GSummit58263.2023.10188284"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/GCWkshps50303.2020.9367400"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1145\/3349623.3355477"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/GLOBECOM42002.2020.9322463"},{"issue":"4","key":"ref10","article-title":"COVID-Safe Spatial Occupancy Monitoring Using OFDM-Based Features and Passive WiFi Samples","volume-title":"ACM Trans. Manage. Inf Syst.","volume":"12","author":"Li","year":"2021"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/RBME.2022.3156810"},{"key":"ref12","first-page":"1068","article-title":"When CSI Meets Public WiFi: Inferring Your Mobile Phone Password via WiFi Signals","volume-title":"Proc. ACM SIGSAC","author":"Li","year":"2016"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2017.2680998"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1145\/3310194"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1093\/jcde\/qwab003"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/ICPR48806.2021.9412230"},{"key":"ref17","article-title":"Deep transfer learning for WiFi localization","volume-title":"Proc. IEEE RadarConf","author":"Peizheng","year":"2021"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1080\/24751839.2021.1975425"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/GLOBECOM48099.2022.10001169"},{"key":"ref20","doi-asserted-by":"crossref","DOI":"10.1007\/978-981-16-8193-6","volume-title":"Machine Learning Toolbox","author":"Jang","year":"2022"}],"event":{"name":"2023 IEEE Globecom Workshops (GC Wkshps)","start":{"date-parts":[[2023,12,4]]},"location":"Kuala Lumpur, Malaysia","end":{"date-parts":[[2023,12,8]]}},"container-title":["2023 IEEE Globecom Workshops (GC Wkshps)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/10464388\/10464393\/10464769.pdf?arnumber=10464769","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,3,21]],"date-time":"2025-03-21T18:59:34Z","timestamp":1742583574000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10464769\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,12,4]]},"references-count":20,"URL":"https:\/\/doi.org\/10.1109\/gcwkshps58843.2023.10464769","relation":{},"subject":[],"published":{"date-parts":[[2023,12,4]]}}}