{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,5,9]],"date-time":"2026-05-09T16:46:04Z","timestamp":1778345164966,"version":"3.51.4"},"reference-count":37,"publisher":"IEEE","license":[{"start":{"date-parts":[[2022,5,1]],"date-time":"2022-05-01T00:00:00Z","timestamp":1651363200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-009"},{"start":{"date-parts":[[2022,5,1]],"date-time":"2022-05-01T00:00:00Z","timestamp":1651363200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-001"}],"funder":[{"DOI":"10.13039\/100010002","name":"Ministry of Education","doi-asserted-by":"publisher","id":[{"id":"10.13039\/100010002","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001659","name":"Deutsche Forschungsgemeinschaft","doi-asserted-by":"publisher","id":[{"id":"10.13039\/501100001659","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2022,5]]},"DOI":"10.1109\/sp46214.2022.9833676","type":"proceedings-article","created":{"date-parts":[[2022,7,27]],"date-time":"2022-07-27T19:28:05Z","timestamp":1658950085000},"page":"1705-1721","source":"Crossref","is-referenced-by-count":58,"title":["IRShield: A Countermeasure Against Adversarial Physical-Layer Wireless Sensing"],"prefix":"10.1109","author":[{"given":"Paul","family":"Staat","sequence":"first","affiliation":[{"name":"Max Planck Institute for Security and Privacy,Bochum,Germany"}]},{"given":"Simon","family":"Mulzer","sequence":"additional","affiliation":[{"name":"Ruhr University Bochum,Bochum,Germany"}]},{"given":"Stefan","family":"Roth","sequence":"additional","affiliation":[{"name":"Ruhr University Bochum,Bochum,Germany"}]},{"given":"Veelasha","family":"Moonsamy","sequence":"additional","affiliation":[{"name":"Ruhr University Bochum,Bochum,Germany"}]},{"given":"Markus","family":"Heinrichs","sequence":"additional","affiliation":[{"name":"TH K&#x00F6;ln &#x2013; University of Applied Sciences,Cologne,Germany"}]},{"given":"Rainer","family":"Kronberger","sequence":"additional","affiliation":[{"name":"TH K&#x00F6;ln &#x2013; University of Applied Sciences,Cologne,Germany"}]},{"given":"Aydin","family":"Sezgin","sequence":"additional","affiliation":[{"name":"Ruhr University Bochum,Bochum,Germany"}]},{"given":"Christof","family":"Paar","sequence":"additional","affiliation":[{"name":"Max Planck Institute for Security and Privacy,Bochum,Germany"}]}],"member":"263","reference":[{"key":"ref13","doi-asserted-by":"crossref","first-page":"6693","DOI":"10.1038\/srep06693","article-title":"Shaping complex microwave fields in reverberating media with binary tunable metasurfaces","volume":"4","author":"kaina","year":"2015","journal-title":"Scientific Reports"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1145\/3243734.3243820"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1145\/3448300.3468255"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2017.1700082"},{"key":"ref15","year":"2021","journal-title":"Linksys aware"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2020.23053"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1145\/2897845.2897909"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1109\/LWC.2019.2961357"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1109\/TCOMM.2021.3051897"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.001.1900107"},{"key":"ref11","author":"jiao","year":"2019","journal-title":"Open-Source IEEE802 11\/Wi-Fi Baseband Chip\/FPGA Design"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM.2018.8485883"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1145\/2668332.2668344"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1145\/2789168.2790124"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM.2015.7218525"},{"key":"ref1","year":"0"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1145\/3471621.3471856"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1145\/2746285.2746303"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1145\/3310194"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2021.3077737"},{"key":"ref24","year":"2016","journal-title":"Internet of Things - Number of Connected Devices Worldwide 2015-2025"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1186\/s13638-019-1438-9"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2020.24097"},{"key":"ref25","year":"2021","journal-title":"TL-WDR4300 &#x2014; N750 Wireless Dual Band Gigabit Router"},{"key":"ref20","year":"2020","journal-title":"Wireless Connectivity Market by Connectivity Technology (Wi-Fi Bluetooth NFC ZigBee GNSS LTE CAT-M1 NBIoT LoRa SigFox) Type (WLAN WPAN LPWAN) End-use (Wearables Consumer Electronics Healthcare) and Region - Global Forecast to 2025"},{"key":"ref22","first-page":"685","article-title":"PhyCloak: Obfuscating Sensing from Communication Signals","author":"qiao","year":"2016","journal-title":"Proceedings of the 13th Usenix Conference on Networked Systems Design and Implementation ser NSDI&#x2019;16"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/LWC.2019.2960779"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/TMC.2018.2812746"},{"key":"ref27","author":"verg\u00e8s","year":"2021","journal-title":"MCS Index Modulation and Coding Index 11n and 11ac"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1145\/3395351.3399368"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1017\/CBO9780511841224"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1145\/3243734.3243802"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.23919\/ISAP47053.2021.9391243"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1145\/2789168.2790109"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1145\/3395351.3399421"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1145\/2627393.2627418"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-02641-7_19"}],"event":{"name":"2022 IEEE Symposium on Security and Privacy (SP)","location":"San Francisco, CA, USA","start":{"date-parts":[[2022,5,22]]},"end":{"date-parts":[[2022,5,26]]}},"container-title":["2022 IEEE Symposium on Security and Privacy (SP)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9833550\/9833558\/09833676.pdf?arnumber=9833676","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,11,8]],"date-time":"2023-11-08T23:19:16Z","timestamp":1699485556000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9833676\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,5]]},"references-count":37,"URL":"https:\/\/doi.org\/10.1109\/sp46214.2022.9833676","relation":{},"subject":[],"published":{"date-parts":[[2022,5]]}}}