{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,5,9]],"date-time":"2026-05-09T04:36:43Z","timestamp":1778301403298,"version":"3.51.4"},"reference-count":45,"publisher":"IEEE","license":[{"start":{"date-parts":[[2022,5,2]],"date-time":"2022-05-02T00:00:00Z","timestamp":1651449600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2022,5,2]],"date-time":"2022-05-02T00:00:00Z","timestamp":1651449600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/100006190","name":"Research and Development","doi-asserted-by":"publisher","id":[{"id":"10.13039\/100006190","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2022,5,2]]},"DOI":"10.1109\/infocom48880.2022.9796940","type":"proceedings-article","created":{"date-parts":[[2022,6,20]],"date-time":"2022-06-20T21:18:49Z","timestamp":1655759929000},"page":"11-20","source":"Crossref","is-referenced-by-count":54,"title":["MILLIEAR: Millimeter-wave Acoustic Eavesdropping with Unconstrained Vocabulary"],"prefix":"10.1109","author":[{"given":"Pengfei","family":"Hu","sequence":"first","affiliation":[{"name":"Shandong University,China"}]},{"given":"Yifan","family":"Ma","sequence":"additional","affiliation":[{"name":"Shandong University,China"}]},{"given":"Panneer Selvam","family":"Santhalingam","sequence":"additional","affiliation":[{"name":"George Mason University,USA"}]},{"given":"Parth H","family":"Pathak","sequence":"additional","affiliation":[{"name":"George Mason University,USA"}]},{"given":"Xiuzhen","family":"Cheng","sequence":"additional","affiliation":[{"name":"Shandong University,China"}]}],"member":"263","reference":[{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1109\/TASSP.1984.1164317"},{"key":"ref38","article-title":"Adam: A method for stochastic optimization","author":"kingma","year":"2017"},{"key":"ref33","article-title":"Deep learning using rectified linear units (relu)","author":"agarap","year":"2019"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-24574-4_28"},{"key":"ref31","article-title":"Conditional generative adversarial nets","author":"mirza","year":"2014"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2017.632"},{"key":"ref37","article-title":"L1 norm","year":"0"},{"key":"ref36","article-title":"Binary cross entropy","year":"0"},{"key":"ref35","first-page":"2672","article-title":"Generative adversarial nets","author":"goodfellow","year":"2014","journal-title":"Proceedings of the 27th International Conference on Neural Information Processing Systems - Volume 2"},{"key":"ref34","first-page":"448","article-title":"Batch normalization: Accelerating deep network training by reducing internal covariate shift","volume":"37","author":"ioffe","year":"0"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1145\/3055031.3055088"},{"key":"ref40","year":"0"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1145\/2906388.2906415"},{"key":"ref12","article-title":"Speake (a) r: Turn speakers to microphones for fun and profit","author":"guri","year":"2017","journal-title":"11th USENIX Workshop on Offensive Technologies (WOOT 17)"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2019.00008"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1145\/3384419.3430772"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1145\/3307334.3326073"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM48880.2022.9796806"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/SP40000.2020.00004"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1145\/3372224.3419202"},{"key":"ref19","article-title":"Iwr1642 single-chip 76- to 81-ghz mmwave sensor datasheet (rev. b)","year":"0"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2013.04.014"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1145\/2742647.2742658"},{"key":"ref27","first-page":"588","article-title":"M3: Multipath Assisted Wi-Fi Localization with a Single Access Point","volume":"20","author":"chen","year":"2021","journal-title":"IEEE Transactions on Mobile Computing"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2018.00004"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1121\/1.391370"},{"key":"ref29","article-title":"Melgan: Generative adversarial networks for conditional waveform synthesis","author":"kumar","year":"2019"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1145\/2601097.2601119"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/TMC.2016.2517630"},{"key":"ref7","first-page":"708","article-title":"Lamphone: Real-time passive sound recovery from light bulb vibrations","volume":"2020","author":"nassi","year":"2020","journal-title":"IACR Cryptol ePrint Arch"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2020.24076"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1145\/2789168.2790119"},{"key":"ref1","first-page":"1053","article-title":"Gyrophone: Recognizing speech from gyroscope signals","author":"michalevsky","year":"2014","journal-title":"23rd USENIX Security Symposium ( USENIX Security 14)"},{"key":"ref20","article-title":"Generative model","year":"0"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1109\/EuCAP.2014.6901885"},{"key":"ref22","first-page":"1857","article-title":"Learning to discover cross-domain relations with generative adversarial networks","volume":"70","author":"kim","year":"0"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2018.00986"},{"key":"ref42","article-title":"Synthesizer voice quality of new languages calibrated with mean mel cepstral distortion","author":"kominek","year":"2008","journal-title":"Spoken Language Technologies for Under-resoured Languages"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/ICIP.2017.8296650"},{"key":"ref41","article-title":"Common noise levels","year":"0"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2019.00453"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1109\/WNCMF.1994.529141"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1145\/2668332.2668345"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2019.2906165"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/TPAMI.2018.2856256"}],"event":{"name":"IEEE INFOCOM 2022 - IEEE Conference on Computer Communications","location":"London, United Kingdom","start":{"date-parts":[[2022,5,2]]},"end":{"date-parts":[[2022,5,5]]}},"container-title":["IEEE INFOCOM 2022 - IEEE Conference on Computer Communications"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9796607\/9796652\/09796940.pdf?arnumber=9796940","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,7,18]],"date-time":"2022-07-18T20:46:30Z","timestamp":1658177190000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9796940\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,5,2]]},"references-count":45,"URL":"https:\/\/doi.org\/10.1109\/infocom48880.2022.9796940","relation":{},"subject":[],"published":{"date-parts":[[2022,5,2]]}}}