{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,4]],"date-time":"2026-02-04T17:26:43Z","timestamp":1770226003401,"version":"3.49.0"},"reference-count":44,"publisher":"IEEE","license":[{"start":{"date-parts":[[2022,5,2]],"date-time":"2022-05-02T00:00:00Z","timestamp":1651449600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2022,5,2]],"date-time":"2022-05-02T00:00:00Z","timestamp":1651449600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/100006190","name":"Research and Development","doi-asserted-by":"publisher","id":[{"id":"10.13039\/100006190","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100015804","name":"China Computer Federation","doi-asserted-by":"publisher","id":[{"id":"10.13039\/100015804","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100003399","name":"Science and Technology Commission of Shanghai Municipality","doi-asserted-by":"publisher","id":[{"id":"10.13039\/501100003399","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100012226","name":"Fundamental Research Funds for the Central Universities","doi-asserted-by":"publisher","id":[{"id":"10.13039\/501100012226","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2022,5,2]]},"DOI":"10.1109\/infocom48880.2022.9796740","type":"proceedings-article","created":{"date-parts":[[2022,6,20]],"date-time":"2022-06-20T21:18:49Z","timestamp":1655759929000},"page":"410-419","source":"Crossref","is-referenced-by-count":17,"title":["Push the Limit of WiFi-based User Authentication towards Undefined Gestures"],"prefix":"10.1109","author":[{"given":"Hao","family":"Kong","sequence":"first","affiliation":[{"name":"Shanghai Jiao Tong University,Department of Computer Science and Engineering,Shanghai,P.R.China"}]},{"given":"Li","family":"Lu","sequence":"additional","affiliation":[{"name":"Zhejiang University,School of Cyber Science and Technology and Key Laboratory of Blockchain and Cyberspace Governance of Zhejiang Province,Hangzhou,P.R.China"}]},{"given":"Jiadi","family":"Yu","sequence":"additional","affiliation":[{"name":"Shanghai Jiao Tong University,Department of Computer Science and Engineering,Shanghai,P.R.China"}]},{"given":"Yanmin","family":"Zhu","sequence":"additional","affiliation":[{"name":"Shanghai Jiao Tong University,Department of Computer Science and Engineering,Shanghai,P.R.China"}]},{"given":"Feilong","family":"Tang","sequence":"additional","affiliation":[{"name":"Shanghai Jiao Tong University,Department of Computer Science and Engineering,Shanghai,P.R.China"}]},{"given":"Yi-Chao","family":"Chen","sequence":"additional","affiliation":[{"name":"Shanghai Jiao Tong University,Department of Computer Science and Engineering,Shanghai,P.R.China"}]},{"given":"Linghe","family":"Kong","sequence":"additional","affiliation":[{"name":"Shanghai Jiao Tong University,Department of Computer Science and Engineering,Shanghai,P.R.China"}]},{"given":"Feng","family":"Lyu","sequence":"additional","affiliation":[{"name":"Central South University,School of Computer Science and Engineering,Changsha,P.R.China"}]}],"member":"263","reference":[{"key":"ref39","first-page":"350","article-title":"Widar2. 0: Passive human tracking with a single wi-fi link","author":"qian","year":"2018","journal-title":"ACM Proc MobiSys"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1145\/3084041.3084067"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1145\/2789168.2790093"},{"key":"ref32","article-title":"An indirect eavesdropping attack of keystrokes on touch screen through acoustic sensing","author":"yu","year":"2019","journal-title":"IEEE Transactions on Mobile Computing"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1145\/3384419.3430735"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1109\/TMC.2021.3073969"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1109\/TNET.2017.2752367"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1145\/3377553"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1145\/2942358.2942393"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1145\/2639108.2639143"},{"key":"ref10","first-page":"361","article-title":"Walk the walk: attacking gait biometrics by imitation","author":"mjaaland","year":"2010","journal-title":"Proc ISC&#x2019;10"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1145\/3290605.3300766"},{"key":"ref11","article-title":"Physiology","year":"2019"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1145\/1925861.1925870"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/79.317924"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1145\/2785956.2787487"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1145\/3241539.3241548"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1145\/3323679.3326518"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/ICASSP.2015.7178776"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1016\/j.patcog.2014.05.021"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2015.7298682"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM42981.2021.9488693"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.3390\/s18103265"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/GLOCOM.2017.8255034"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/ICASSP.2013.6638079"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM41043.2020.9155539"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2016.2545523"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1145\/3084041.3084061"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1145\/3264944"},{"key":"ref7","article-title":"Continuous authentication through finger gesture interaction for smart homes using wifi","author":"kong","year":"2020","journal-title":"IEEE Transactions on Mobile Computing"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOMW.2018.8406912"},{"key":"ref9","article-title":"Coronavirus disease (covid-19) pandemic","year":"2021"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1145\/2750858.2804263"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1038\/1961253a0"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM.2018.8486283"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/ICASSP.2016.7471800"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1145\/3241539.3241570"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM41043.2020.9155380"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1145\/2746285.2746303"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/TMC.2021.3133275"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1145\/3081333.3081340"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/DCOSS.2016.30"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1145\/3307334.3326081"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/IPSN.2016.7460727"}],"event":{"name":"IEEE INFOCOM 2022 - IEEE Conference on Computer Communications","location":"London, United Kingdom","start":{"date-parts":[[2022,5,2]]},"end":{"date-parts":[[2022,5,5]]}},"container-title":["IEEE INFOCOM 2022 - IEEE Conference on Computer Communications"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9796607\/9796652\/09796740.pdf?arnumber=9796740","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,7,11]],"date-time":"2022-07-11T20:01:09Z","timestamp":1657569669000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9796740\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,5,2]]},"references-count":44,"URL":"https:\/\/doi.org\/10.1109\/infocom48880.2022.9796740","relation":{},"subject":[],"published":{"date-parts":[[2022,5,2]]}}}