{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,6]],"date-time":"2026-02-06T00:01:44Z","timestamp":1770336104321,"version":"3.49.0"},"reference-count":34,"publisher":"IEEE","license":[{"start":{"date-parts":[[2021,5,10]],"date-time":"2021-05-10T00:00:00Z","timestamp":1620604800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2021,5,10]],"date-time":"2021-05-10T00:00:00Z","timestamp":1620604800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2021,5,10]],"date-time":"2021-05-10T00:00:00Z","timestamp":1620604800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100004835","name":"Zhejiang University","doi-asserted-by":"publisher","id":[{"id":"10.13039\/501100004835","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100004835","name":"Zhejiang University","doi-asserted-by":"publisher","id":[{"id":"10.13039\/501100004835","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2021,5,10]]},"DOI":"10.1109\/infocom42981.2021.9488737","type":"proceedings-article","created":{"date-parts":[[2021,7,27]],"date-time":"2021-07-27T00:07:32Z","timestamp":1627344452000},"page":"1-10","source":"Crossref","is-referenced-by-count":41,"title":["RFace: Anti-Spoofing Facial Authentication Using COTS RFID"],"prefix":"10.1109","author":[{"given":"Weiye","family":"Xu","sequence":"first","affiliation":[]},{"given":"Jianwei","family":"Liu","sequence":"additional","affiliation":[]},{"given":"Shimin","family":"Zhang","sequence":"additional","affiliation":[]},{"given":"Yuanqing","family":"Zheng","sequence":"additional","affiliation":[]},{"given":"Feng","family":"Lin","sequence":"additional","affiliation":[]},{"given":"Jinsong","family":"Han","sequence":"additional","affiliation":[]},{"given":"Fu","family":"Xiao","sequence":"additional","affiliation":[]},{"given":"Kui","family":"Ren","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2019.2921529"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.3390\/s20092731"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1145\/3341163.3347724"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1587\/transinf.2018DAP0010"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1109\/TMC.2018.2877985"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2014.2322255"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/GLOBECOM38437.2019.9014226"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1145\/3230543.3230565"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1145\/2789168.2790100"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM.2018.8486346"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1145\/2639108.2639111"},{"key":"ref16","article-title":"R420 readers","year":"2010"},{"key":"ref17","article-title":"Face unlock on many android smartphones falls for a photo","author":"folt\u00fdn","year":"2019"},{"key":"ref18","article-title":"Hackers say they&#x2019;ve broken face id a week after","author":"greenberg","year":"0"},{"key":"ref19","article-title":"Theory of microwave remote sensing","author":"tsang","year":"1985"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1145\/3351239"},{"key":"ref4","first-page":"904","article-title":"UTP: a novel PIN number based user authentication scheme","volume":"16","author":"rajarajan","year":"2019","journal-title":"International Arab Journal of Information Technology"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1145\/3241539.3241575"},{"key":"ref3","doi-asserted-by":"crossref","DOI":"10.14722\/ndss.2018.23176","article-title":"Face flashing: a secure liveness detection protocol based on light reflections","author":"tang","year":"2018","journal-title":"the Symposium on Network and Distributed System Security NDSS-95"},{"key":"ref6","article-title":"A study of authentication in daily life","author":"mare","year":"2016","journal-title":"USENIX Symposium on Usable Privacy and Security SOUPS"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1109\/IWQoS49365.2020.9212855"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1145\/3386901.3388939"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1016\/j.imavis.2007.05.004"},{"key":"ref7","article-title":"Galaxy s8 face recognition already defeated with a simple picture","author":"amadeo","year":"2017"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1145\/3241539.3241575"},{"key":"ref9","article-title":"What exactly is the dot projector? why it is used in iphone x?","author":"wyatt","year":"0"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2019.2959203"},{"key":"ref20","article-title":"Rfmehndi: A fingertip profiled RF identifier","author":"zhao","year":"2019","journal-title":"IEEE International Conference on Computer Communications INFOCOM"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/TNET.2017.2769138"},{"key":"ref21","author":"lei","year":"2016","journal-title":"RFID technology -- principle protocol and system design"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2019.2959203"},{"key":"ref23","article-title":"How does face recognition work on galaxy s20, s20+, s20 ultra, and z flip?","year":"0"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1016\/j.optcom.2015.01.017"},{"key":"ref25","article-title":"Your face your heart: Secure mobile face authentication with photoplethys-mograms","author":"chen","year":"2017","journal-title":"IEEE International Conference on Computer Communications INFOCOM"}],"event":{"name":"IEEE INFOCOM 2021 - IEEE Conference on Computer Communications","location":"Vancouver, BC, Canada","start":{"date-parts":[[2021,5,10]]},"end":{"date-parts":[[2021,5,13]]}},"container-title":["IEEE INFOCOM 2021 - IEEE Conference on Computer Communications"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9488422\/9488423\/09488737.pdf?arnumber=9488737","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,5,10]],"date-time":"2022-05-10T15:43:38Z","timestamp":1652197418000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9488737\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,5,10]]},"references-count":34,"URL":"https:\/\/doi.org\/10.1109\/infocom42981.2021.9488737","relation":{},"subject":[],"published":{"date-parts":[[2021,5,10]]}}}