{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,8,21]],"date-time":"2025-08-21T17:45:27Z","timestamp":1755798327245,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":22,"publisher":"ACM","license":[{"start":{"date-parts":[[2014,9,7]],"date-time":"2014-09-07T00:00:00Z","timestamp":1410048000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2014,9,7]]},"DOI":"10.1145\/2639108.2639117","type":"proceedings-article","created":{"date-parts":[[2014,9,5]],"date-time":"2014-09-05T19:09:15Z","timestamp":1409944155000},"page":"225-236","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":12,"title":["Where are you from?"],"prefix":"10.1145","author":[{"given":"Song","family":"Fang","sequence":"first","affiliation":[{"name":"University of South Florida, Tampa, FL, USA"}]},{"given":"Yao","family":"Liu","sequence":"additional","affiliation":[{"name":"University of South Florida, Tampa, FL, USA"}]},{"given":"Wenbo","family":"Shen","sequence":"additional","affiliation":[{"name":"North Carolina State University, Raleigh, NC, USA"}]},{"given":"Haojin","family":"Zhu","sequence":"additional","affiliation":[{"name":"Shanghai Jiao Tong University, Shanghai, China"}]}],"member":"320","published-online":{"date-parts":[[2014,9,7]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1145\/1287853.1287867"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1145\/1409944.1409949"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2009.2026454"},{"key":"e_1_3_2_1_4_1","volume-title":"March","author":"Liu Y.","year":"2012","unstructured":"Y. Liu and P. Ning , \" Enhanced wireless channel authentication using time-synched link signature,\" in Proc. of IEEE INFOCOM '12 , March 2012 . Y. Liu and P. Ning, \"Enhanced wireless channel authentication using time-synched link signature,\" in Proc. of IEEE INFOCOM '12, March 2012."},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/1161289.1161297"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2010.24"},{"key":"e_1_3_2_1_7_1","volume-title":"April","author":"He X.","year":"2013","unstructured":"X. He , H. Dai , W. Shen , and P. Ning , \" Is link signature dependable for wireless security?\" in Proc. of IEEE INFOCOM '13 , April 2013 . X. He, H. Dai, W. Shen, and P. Ning, \"Is link signature dependable for wireless security?\" in Proc. of IEEE INFOCOM '13, April 2013."},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"crossref","DOI":"10.1017\/CBO9780511841224","volume-title":"Wireless Communications","author":"Goldsmith A.","year":"2005","unstructured":"A. Goldsmith , Wireless Communications . Cambridge University Press , 2005 . A. Goldsmith, Wireless Communications. Cambridge University Press, 2005."},{"key":"e_1_3_2_1_9_1","volume-title":"Wireless Communications","author":"Molisch A. F.","year":"2007","unstructured":"A. F. Molisch , Wireless Communications , 2 nd Edition. Wiley India Pvt . Limited, 2007 . A. F. Molisch, Wireless Communications, 2nd Edition. Wiley India Pvt. Limited, 2007.","edition":"2"},{"key":"e_1_3_2_1_10_1","volume-title":"University of Kansas","author":"Safaya R.","year":"2000","unstructured":"R. Safaya , \"A multipath channel estimation algorithm using a kalman filter,\" Thesis , University of Kansas , 2000 . R. Safaya, \"A multipath channel estimation algorithm using a kalman filter,\" Thesis, University of Kansas, 2000."},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSP.2005.863008"},{"key":"e_1_3_2_1_12_1","volume-title":"Random signals: detection, estimation, and data analysis","author":"Shanmugan K. S.","year":"1988","unstructured":"K. S. Shanmugan and A. M. Breipohl , Random signals: detection, estimation, and data analysis . Wiley , May 1988 . K. S. Shanmugan and A. M. Breipohl, Random signals: detection, estimation, and data analysis. Wiley, May 1988."},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1109\/26.701321"},{"key":"e_1_3_2_1_14_1","volume-title":"Wireless LANs","author":"IEEE","year":"2007","unstructured":"IEEE, \" IEEE 802.11 : Wireless LANs ,\" 2007 . IEEE, \"IEEE 802.11: Wireless LANs,\" 2007."},{"key":"e_1_3_2_1_15_1","unstructured":"SPAN \"Measured channel impulse response data set \" http:\/\/span.ece.utah.edu\/pmwiki\/pmwiki.php?n=Main.MeasuredCIRDataSet .  SPAN \"Measured channel impulse response data set \" http:\/\/span.ece.utah.edu\/pmwiki\/pmwiki.php?n=Main.MeasuredCIRDataSet ."},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1109\/78.575697"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1109\/LSP.2002.807864"},{"key":"e_1_3_2_1_18_1","unstructured":"ETTUS \"USRP-Universal Software Radio Peripheral \" http:\/\/www.ettus.com .  ETTUS \"USRP-Universal Software Radio Peripheral \" http:\/\/www.ettus.com ."},{"key":"e_1_3_2_1_19_1","unstructured":"\"GNU Radio Software \" http:\/\/gnuradio.org\/trac.  \"GNU Radio Software \" http:\/\/gnuradio.org\/trac."},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1145\/1972551.1972559"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1145\/2046707.2093497"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1145\/2500423.2500444"}],"event":{"name":"MobiCom'14: The 20th Annual International Conference on Mobile Computing and Networking","sponsor":["SIGMOBILE ACM Special Interest Group on Mobility of Systems, Users, Data and Computing"],"location":"Maui Hawaii USA","acronym":"MobiCom'14"},"container-title":["Proceedings of the 20th annual international conference on Mobile computing and networking"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2639108.2639117","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2639108.2639117","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T07:19:12Z","timestamp":1750231152000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2639108.2639117"}},"subtitle":["confusing location distinction using virtual multipath camouflage"],"short-title":[],"issued":{"date-parts":[[2014,9,7]]},"references-count":22,"alternative-id":["10.1145\/2639108.2639117","10.1145\/2639108"],"URL":"https:\/\/doi.org\/10.1145\/2639108.2639117","relation":{},"subject":[],"published":{"date-parts":[[2014,9,7]]},"assertion":[{"value":"2014-09-07","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}