{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T04:35:01Z","timestamp":1750221301753,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":22,"publisher":"ACM","license":[{"start":{"date-parts":[[2017,11,28]],"date-time":"2017-11-28T00:00:00Z","timestamp":1511827200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["1254032"],"award-info":[{"award-number":["1254032"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"name":"NSF CNS","award":["1143685"],"award-info":[{"award-number":["1143685"]}]},{"DOI":"10.13039\/100000001","name":"National Science Foundation","doi-asserted-by":"publisher","award":["1547306"],"award-info":[{"award-number":["1547306"]}],"id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2017,11,28]]},"DOI":"10.1145\/3143361.3143396","type":"proceedings-article","created":{"date-parts":[[2017,11,22]],"date-time":"2017-11-22T16:30:38Z","timestamp":1511368238000},"page":"402-413","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":4,"title":["Channel Spoofer"],"prefix":"10.1145","author":[{"given":"Yue","family":"Qiao","sequence":"first","affiliation":[{"name":"Department of Computer Science and Engineering, The Ohio State University"}]},{"given":"Kannan","family":"Srinivasan","sequence":"additional","affiliation":[{"name":"Department of Computer Science and Engineering, The Ohio State University"}]},{"given":"Anish","family":"Arora","sequence":"additional","affiliation":[{"name":"Department of Computer Science and Engineering, The Ohio State University"}]}],"member":"320","published-online":{"date-parts":[[2017,11,28]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1109\/TAP.2005.858853"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1145\/2740070.2626327"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1145\/1409944.1409959"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1145\/2789168.2790114"},{"key":"e_1_3_2_1_5_1","first-page":"235","volume-title":"Computer Security-ESORICS","author":"Eberz S.","year":"2012","unstructured":"Eberz , S. , Strohmeier , M. , Wilhelm , M. , and Martinovic , I . A practical man-in-the-middle attack on signal-based key generation protocols . In Computer Security-ESORICS 2012 . Springer , 2012, pp. 235 -- 252 . Eberz, S., Strohmeier, M., Wilhelm, M., and Martinovic, I. A practical man-in-the-middle attack on signal-based key generation protocols. In Computer Security-ESORICS 2012. Springer, 2012, pp. 235--252."},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1145\/1972551.1972559"},{"key":"e_1_3_2_1_7_1","volume-title":"NDSS","author":"Gerdes R. M.","year":"2006","unstructured":"Gerdes , R. M. , Daniels , T. E. , Mina , M. , and Russell , S . Device identification via analog signal fingerprinting: A matched filter approach . In NDSS ( 2006 ). Gerdes, R. M., Daniels, T. E., Mina, M., and Russell, S. Device identification via analog signal fingerprinting: A matched filter approach. In NDSS (2006)."},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1145\/1614320.1614356"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1109\/VETECF.2008.291"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.2013.6567117"},{"key":"e_1_3_2_1_11_1","first-page":"927","volume-title":"INFOCOM, 2012 Proceedings IEEE","author":"Liu PL","year":"2012","unstructured":"Liu , PL , Yang , J. , Wang , Y. , and Chen , Y . Collaborative secret key extraction leveraging received signal strength in mobile wireless networks . In INFOCOM, 2012 Proceedings IEEE ( 2012 ), IEEE, pp. 927 -- 935 . Liu, PL, Yang, J., Wang, Y., and Chen, Y. Collaborative secret key extraction leveraging received signal strength in mobile wireless networks. In INFOCOM, 2012 Proceedings IEEE (2012), IEEE, pp. 927--935."},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2012.2206385"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1145\/1409944.1409960"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-11764-5_19"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1145\/2643614.2643618"},{"key":"e_1_3_2_1_16_1","first-page":"685","volume-title":"13th USENIX Symposium on Networked Systems Design and Implementation (NSDI 16)","author":"Qiao Y.","year":"2016","unstructured":"Qiao , Y. , Zhang , O. , Zhou , W. , Srinivasan , K. , and Arora , A . PhyCloak: Obfuscating sensing from communication signals . In 13th USENIX Symposium on Networked Systems Design and Implementation (NSDI 16) ( 2016 ), pp. 685 -- 699 . Qiao, Y., Zhang, O., Zhou, W., Srinivasan, K., and Arora, A. PhyCloak: Obfuscating sensing from communication signals. In 13th USENIX Symposium on Networked Systems Design and Implementation (NSDI 16) (2016), pp. 685--699."},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1109\/SECCOM.2007.4550352"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1109\/AusCTW.2012.6164912"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1109\/MILCOM.2001.985763"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1145\/2942358.2942361"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2010.2043187"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICCSE.2011.6028826"}],"event":{"name":"CoNEXT '17: The 13th International Conference on emerging Networking EXperiments and Technologies","sponsor":["SIGCOMM ACM Special Interest Group on Data Communication"],"location":"Incheon Republic of Korea","acronym":"CoNEXT '17"},"container-title":["Proceedings of the 13th International Conference on emerging Networking EXperiments and Technologies"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3143361.3143396","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3143361.3143396","content-type":"application\/pdf","content-version":"vor","intended-application":"syndication"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3143361.3143396","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T02:13:21Z","timestamp":1750212801000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3143361.3143396"}},"subtitle":["Defeating Channel Variability and Unpredictability"],"short-title":[],"issued":{"date-parts":[[2017,11,28]]},"references-count":22,"alternative-id":["10.1145\/3143361.3143396","10.1145\/3143361"],"URL":"https:\/\/doi.org\/10.1145\/3143361.3143396","relation":{},"subject":[],"published":{"date-parts":[[2017,11,28]]},"assertion":[{"value":"2017-11-28","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}