{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,17]],"date-time":"2026-04-17T20:31:33Z","timestamp":1776457893300,"version":"3.51.2"},"publisher-location":"New York, NY, USA","reference-count":32,"publisher":"ACM","license":[{"start":{"date-parts":[[2014,6,4]],"date-time":"2014-06-04T00:00:00Z","timestamp":1401840000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/100000183","name":"Army Research Office","doi-asserted-by":"publisher","award":["W911NF-13-1-0288"],"award-info":[{"award-number":["W911NF-13-1-0288"]}],"id":[{"id":"10.13039\/100000183","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100000144","name":"Division of Computer and Network Systems","doi-asserted-by":"publisher","award":["CNS-1318751, CNS-1318748"],"award-info":[{"award-number":["CNS-1318751, CNS-1318748"]}],"id":[{"id":"10.13039\/100000144","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2014,6,4]]},"DOI":"10.1145\/2590296.2590321","type":"proceedings-article","created":{"date-parts":[[2014,5,30]],"date-time":"2014-05-30T18:18:31Z","timestamp":1401473911000},"page":"389-400","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":85,"title":["Practical user authentication leveraging channel state information (CSI)"],"prefix":"10.1145","author":[{"given":"Hongbo","family":"Liu","sequence":"first","affiliation":[{"name":"Indiana University Purdue University Indianapolis (IUPUI), Indianapolis, IN, USA"}]},{"given":"Yan","family":"Wang","sequence":"additional","affiliation":[{"name":"Stevens Institute of Technology, Hoboken, NJ, USA"}]},{"given":"Jian","family":"Liu","sequence":"additional","affiliation":[{"name":"Stevens Institute of Technology, Hoboken, NJ, USA"}]},{"given":"Jie","family":"Yang","sequence":"additional","affiliation":[{"name":"Oakland University, Rochester, MI, USA"}]},{"given":"Yingying","family":"Chen","sequence":"additional","affiliation":[{"name":"Stevens Institute of Technology, Hoboken, NJ, USA"}]}],"member":"320","published-online":{"date-parts":[[2014,6,4]]},"reference":[{"key":"e_1_3_2_1_1_1","volume-title":"Enhancements for higher throughput","author":"Std IEEE","year":"2009","unstructured":"IEEE Std . 802.11n-2009 : Enhancements for higher throughput , 2009 . Available at http:\/\/www.ieee802.org. IEEE Std. 802.11n-2009: Enhancements for higher throughput, 2009. Available at http:\/\/www.ieee802.org."},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1145\/1315245.1315295"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1145\/1409944.1409959"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1109\/TMC.2009.131"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1109\/AICCSA.2010.5586995"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2010.2044904"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.adhoc.2010.08.020"},{"issue":"1","key":"e_1_3_2_1_8_1","first-page":"136","article-title":"Secure privacy-preserving protocols for outsourcing continuous authentication of smartphone users with touch data.","volume":"8","author":"Govindarajan S.","year":"2013","unstructured":"S. Govindarajan , P. Gasti , and K. S. Balagani . Secure privacy-preserving protocols for outsourcing continuous authentication of smartphone users with touch data. IEEE Transactions on Information Forensics and Security , 8 ( 1 ): 136 -- 148 , 2013 . S. Govindarajan, P. Gasti, and K. S. Balagani. Secure privacy-preserving protocols for outsourcing continuous authentication of smartphone users with touch data.IEEE Transactions on Information Forensics and Security, 8(1):136--148, 2013.","journal-title":"IEEE Transactions on Information Forensics and Security"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1007\/11663812_16"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/1851275.1851203"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1145\/1851275.1851203"},{"key":"e_1_3_2_1_12_1","volume-title":"Data Mining Inference, and Prediction","author":"Hastie T.","year":"2001","unstructured":"T. Hastie , R. Tibshirani , and J. Friedman . The Elements of Statistical Learning , Data Mining Inference, and Prediction . Springer , 2001 . T. Hastie, R. Tibshirani, and J. Friedman. The Elements of Statistical Learning, Data Mining Inference, and Prediction. Springer, 2001."},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1109\/TMC.2009.145"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.2013.6567061"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1145\/1814433.1814466"},{"key":"e_1_3_2_1_16_1","volume-title":"Wireless network security.NIST special publication, 800:48","author":"Karygiannis T.","year":"2002","unstructured":"T. Karygiannis and L. Owens . Wireless network security.NIST special publication, 800:48 , 2002 . T. Karygiannis and L. Owens. Wireless network security.NIST special publication, 800:48, 2002."},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1145\/1860093.1860104"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2005.26"},{"key":"e_1_3_2_1_19_1","first-page":"4","volume-title":"MobiQuitous","author":"Krumm J.","year":"2004","unstructured":"J. Krumm and E. Horvitz . Locadio: Inferring motion and location from wi-fi signal strengths . In MobiQuitous , pages 4 -- 13 , 2004 . J. Krumm and E. Horvitz. Locadio: Inferring motion and location from wi-fi signal strengths. In MobiQuitous, pages 4--13, 2004."},{"key":"e_1_3_2_1_20_1","volume-title":"Proceedings of the Network and Distributed System Security Symposium (NDSS)","author":"Li L.","year":"2013","unstructured":"L. Li , X. Zhao , and G. Xue . Unobservable re-authentication for smartphones . In Proceedings of the Network and Distributed System Security Symposium (NDSS) , February 2013 . L. Li, X. Zhao, and G. Xue. Unobservable re-authentication for smartphones. In Proceedings of the Network and Distributed System Security Symposium (NDSS), February 2013."},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1145\/1999995.2000016"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1145\/1409944.1409960"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.2011.5934926"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1109\/JPROC.2003.819611"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1145\/1287853.1287866"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2013.130914"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11276-005-3522-9"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1109\/IPDPS.2005.393"},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.5555\/1687299.1687321"},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1109\/TPDS.2012.104"},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1109\/MWC.2010.5601959"},{"key":"e_1_3_2_1_32_1","volume-title":"InProceedings of the IEEE International Conference on Computer Communications.","author":"Zeng K.","unstructured":"K. Zeng , K. Govindan , D. Wu , and P. Mohapatra . Identity-based attack detection in mobile wireless networks . InProceedings of the IEEE International Conference on Computer Communications. K. Zeng, K. Govindan, D. Wu, and P. Mohapatra. Identity-based attack detection in mobile wireless networks. InProceedings of the IEEE International Conference on Computer Communications."}],"event":{"name":"ASIA CCS '14: 9th ACM Symposium on Information, Computer and Communications Security","location":"Kyoto Japan","acronym":"ASIA CCS '14","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"]},"container-title":["Proceedings of the 9th ACM symposium on Information, computer and communications security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2590296.2590321","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2590296.2590321","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T06:55:51Z","timestamp":1750229751000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2590296.2590321"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014,6,4]]},"references-count":32,"alternative-id":["10.1145\/2590296.2590321","10.1145\/2590296"],"URL":"https:\/\/doi.org\/10.1145\/2590296.2590321","relation":{},"subject":[],"published":{"date-parts":[[2014,6,4]]},"assertion":[{"value":"2014-06-04","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}