{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,3]],"date-time":"2026-03-03T13:35:23Z","timestamp":1772544923284,"version":"3.50.1"},"reference-count":30,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"6","license":[{"start":{"date-parts":[[2022,6,1]],"date-time":"2022-06-01T00:00:00Z","timestamp":1654041600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2022,6,1]],"date-time":"2022-06-01T00:00:00Z","timestamp":1654041600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2022,6,1]],"date-time":"2022-06-01T00:00:00Z","timestamp":1654041600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/501100012166","name":"National Key Research and Development Program of China","doi-asserted-by":"publisher","award":["2019YFB1803400"],"award-info":[{"award-number":["2019YFB1803400"]}],"id":[{"id":"10.13039\/501100012166","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Science Foundation of China","doi-asserted-by":"publisher","award":["62071194"],"award-info":[{"award-number":["62071194"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100002920","name":"Research Grants Council of Hong Kong","doi-asserted-by":"publisher","award":["CERG 16204418"],"award-info":[{"award-number":["CERG 16204418"]}],"id":[{"id":"10.13039\/501100002920","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100002920","name":"Research Grants Council of Hong Kong","doi-asserted-by":"publisher","award":["16203719"],"award-info":[{"award-number":["16203719"]}],"id":[{"id":"10.13039\/501100002920","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100002920","name":"Research Grants Council of Hong Kong","doi-asserted-by":"publisher","award":["16204820"],"award-info":[{"award-number":["16204820"]}],"id":[{"id":"10.13039\/501100002920","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100002920","name":"Research Grants Council of Hong Kong","doi-asserted-by":"publisher","award":["R8015"],"award-info":[{"award-number":["R8015"]}],"id":[{"id":"10.13039\/501100002920","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Guangdong National Science Foundation","award":["2017A030312008"],"award-info":[{"award-number":["2017A030312008"]}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans. Wireless Commun."],"published-print":{"date-parts":[[2022,6]]},"DOI":"10.1109\/twc.2021.3129188","type":"journal-article","created":{"date-parts":[[2021,11,25]],"date-time":"2021-11-25T20:28:09Z","timestamp":1637872089000},"page":"4340-4349","source":"Crossref","is-referenced-by-count":14,"title":["Forgery Attack Detection in Surveillance Video Streams Using Wi-Fi Channel State Information"],"prefix":"10.1109","volume":"21","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-2252-9709","authenticated-orcid":false,"given":"Yong","family":"Huang","sequence":"first","affiliation":[{"name":"School of Electronic Information and Communications, Huazhong University of Science and Technology, Wuhan, China"}]},{"given":"Xiang","family":"Li","sequence":"additional","affiliation":[{"name":"Department of Electrical and Computer Engineering, Carnegie Mellon University, Pittsburgh, PA, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-2772-4856","authenticated-orcid":false,"given":"Wei","family":"Wang","sequence":"additional","affiliation":[{"name":"School of Electronic Information and Communications, Huazhong University of Science and Technology, Wuhan, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-8482-1046","authenticated-orcid":false,"given":"Tao","family":"Jiang","sequence":"additional","affiliation":[{"name":"School of Electronic Information and Communications, Huazhong University of Science and Technology, Wuhan, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-9205-1881","authenticated-orcid":false,"given":"Qian","family":"Zhang","sequence":"additional","affiliation":[{"name":"Department of Computer Science and Engineering, The Hong Kong University of Science and Technology, Hong Kong, China"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM42981.2021.9488798"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2013.2255616"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/TWC.2017.2700379"},{"key":"ref4","volume-title":"Exploiting Network Surveillance Cameras Like a Hollywood Hacker","year":"2013"},{"key":"ref5","volume-title":"Looping Surveillance Cameras Through Live Editing","year":"2015"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1007\/s11042-019-08236-2"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1007\/s11042-014-2374-7"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/TCSVT.2015.2473436"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1049\/iet-ipr.2016.0321"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1145\/1288869.1288876"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1145\/3317549.3324928"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/TWC.2018.2883443"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/TNET.2020.2966112"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/TPAMI.2019.2929257"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV.2017.322"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/TWC.2020.2991111"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1145\/3230543.3230579"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1145\/3372224.3380900"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV.2019.00555"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/TWC.2014.2377172"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1145\/2816795.2818072"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1145\/2789168.2790093"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1145\/3310194"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1145\/2971648.2971670"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/TPAMI.2016.2577031"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2017.106"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2016.90"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/TPAMI.2012.59"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2015.7298965"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1145\/1925861.1925870"}],"container-title":["IEEE Transactions on Wireless Communications"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/7693\/9792472\/09627593.pdf?arnumber=9627593","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,3,1]],"date-time":"2024-03-01T19:19:06Z","timestamp":1709320746000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9627593\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,6]]},"references-count":30,"journal-issue":{"issue":"6"},"URL":"https:\/\/doi.org\/10.1109\/twc.2021.3129188","relation":{},"ISSN":["1536-1276","1558-2248"],"issn-type":[{"value":"1536-1276","type":"print"},{"value":"1558-2248","type":"electronic"}],"subject":[],"published":{"date-parts":[[2022,6]]}}}