{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,2]],"date-time":"2025-12-02T22:30:57Z","timestamp":1764714657540,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":30,"publisher":"ACM","license":[{"start":{"date-parts":[[2014,7,23]],"date-time":"2014-07-23T00:00:00Z","timestamp":1406073600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/100000001","name":"National Science Foundation","doi-asserted-by":"publisher","award":["0748206 0855261"],"award-info":[{"award-number":["0748206 0855261"]}],"id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100006754","name":"U.S. Army Research Laboratory","doi-asserted-by":"publisher","award":["W911NF-07-0318"],"award-info":[{"award-number":["W911NF-07-0318"]}],"id":[{"id":"10.13039\/100006754","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2014,7,23]]},"DOI":"10.1145\/2627393.2627418","type":"proceedings-article","created":{"date-parts":[[2014,7,22]],"date-time":"2014-07-22T15:08:30Z","timestamp":1406041710000},"page":"69-80","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":24,"title":["Violating privacy through walls by passive monitoring of radio windows"],"prefix":"10.1145","author":[{"given":"Arijit","family":"Banerjee","sequence":"first","affiliation":[{"name":"University of Utah, Salt Lake City, UT, USA"}]},{"given":"Dustin","family":"Maas","sequence":"additional","affiliation":[{"name":"Xandem Technology, Salt Lake City, UT, USA"}]},{"given":"Maurizio","family":"Bocca","sequence":"additional","affiliation":[{"name":"Politecnico di Milano, Milano, Italy"}]},{"given":"Neal","family":"Patwari","sequence":"additional","affiliation":[{"name":"University of Utah &amp; Xandem Technology, Salt Lake City, UT, USA"}]},{"given":"Sneha","family":"Kasera","sequence":"additional","affiliation":[{"name":"Univeristy of Utah, Salt Lake City, UT, USA"}]}],"member":"320","published-online":{"date-parts":[[2014,7,23]]},"reference":[{"key":"e_1_3_2_1_1_1","volume-title":"Presented as part of the 11th USENIX Symposium on Networked Systems Design and Implementation (NSDI 14)","author":"Adib F.","year":"2014","unstructured":"F. Adib , Z. Kabelac , D. Katabi , and R. C. Miller . 3d tracking via body radio reflections . In Presented as part of the 11th USENIX Symposium on Networked Systems Design and Implementation (NSDI 14) , Seattle, WA , 2014 . USENIX. F. Adib, Z. Kabelac, D. Katabi, and R. C. Miller. 3d tracking via body radio reflections. In Presented as part of the 11th USENIX Symposium on Networked Systems Design and Implementation (NSDI 14), Seattle, WA, 2014. USENIX."},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1145\/2486001.2486039"},{"key":"e_1_3_2_1_3_1","volume-title":"Enhancements to the radar user location and tracking system. Technical report","author":"Bahl P.","year":"2000","unstructured":"P. Bahl , V. N. Padmanabhan , and A. Balachandran . Enhancements to the radar user location and tracking system. Technical report , 2000 . P. Bahl, V. N. Padmanabhan, and A. Balachandran. Enhancements to the radar user location and tracking system. Technical report, 2000."},{"key":"e_1_3_2_1_4_1","volume-title":"ACM\/IEEE Information Processing in Sensor Networks (IPSN)","author":"Chen X.","year":"2011","unstructured":"X. Chen , A. Edelstein , Y. Li , M. Coates , M. Rabbat , and M. Aidong . Sequential Monte Carlo for simultaneous passive device-free tracking and sensor localization using received signal strength measurements . In ACM\/IEEE Information Processing in Sensor Networks (IPSN) , April 2011 . X. Chen, A. Edelstein, Y. Li, M. Coates, M. Rabbat, and M. Aidong. Sequential Monte Carlo for simultaneous passive device-free tracking and sensor localization using received signal strength measurements. In ACM\/IEEE Information Processing in Sensor Networks (IPSN), April 2011."},{"issue":"4","key":"e_1_3_2_1_5_1","first-page":"1218","article-title":"Through-the-wall sensing of personnel using passive bistatic wifi radar at standoff distances. Geoscience and Remote Sensing","volume":"50","author":"Chetty K.","year":"2012","unstructured":"K. Chetty , G. Smith , and K. Woodbridge . Through-the-wall sensing of personnel using passive bistatic wifi radar at standoff distances. Geoscience and Remote Sensing , IEEE Transactions on , 50 ( 4 ): 1218 -- 1226 , april 2012 . K. Chetty, G. Smith, and K. Woodbridge. Through-the-wall sensing of personnel using passive bistatic wifi radar at standoff distances. Geoscience and Remote Sensing, IEEE Transactions on, 50(4):1218 --1226, april 2012.","journal-title":"IEEE Transactions on"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1145\/2379776.2379782"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.5555\/1361397.1361407"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11036-005-6425-1"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1145\/1925861.1925870"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/1247660.1247689"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1109\/RTCSA.2011.38"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1109\/LCNW.2012.6424092"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-02085-8_13"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1109\/PerCom.2012.6199865"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1109\/CAMSAP.2011.6136030"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.2003.1209196"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1145\/345910.345917"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1145\/2500423.2500436"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1109\/TMC.2012.106"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.6028\/NIST.IR.6055"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4615-6237-5_13"},{"key":"e_1_3_2_1_22_1","unstructured":"Texas Instruments. A USB-enabled system-on-chip solution for 2.4 GHz IEEE 802.15.4 and ZigBee applications.  Texas Instruments. A USB-enabled system-on-chip solution for 2.4 GHz IEEE 802.15.4 and ZigBee applications."},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1088\/0266-5611\/26\/7\/074003"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1109\/TMC.2009.174"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1109\/TMC.2010.175"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1145\/2185677.2185734"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1145\/1287853.1287880"},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1109\/PERCOM.2009.4912777"},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1109\/PERCOM.2007.8"},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1109\/WCNC.2012.6214374"}],"event":{"name":"WiSec'14: 7th ACM Conference on Security & Privacy in Wireless and Mobile Networks","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control","SIGMOBILE ACM Special Interest Group on Mobility of Systems, Users, Data and Computing"],"location":"Oxford United Kingdom","acronym":"WiSec'14"},"container-title":["Proceedings of the 2014 ACM conference on Security and privacy in wireless &amp; mobile networks"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2627393.2627418","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2627393.2627418","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T07:01:35Z","timestamp":1750230095000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2627393.2627418"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014,7,23]]},"references-count":30,"alternative-id":["10.1145\/2627393.2627418","10.1145\/2627393"],"URL":"https:\/\/doi.org\/10.1145\/2627393.2627418","relation":{},"subject":[],"published":{"date-parts":[[2014,7,23]]},"assertion":[{"value":"2014-07-23","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}