{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,31]],"date-time":"2025-12-31T12:14:15Z","timestamp":1767183255335,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":40,"publisher":"ACM","license":[{"start":{"date-parts":[[2022,10,14]],"date-time":"2022-10-14T00:00:00Z","timestamp":1665705600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"NSFC Excellent Young Scientists Fund (Hong Kong and Macau)","award":["62022003"],"award-info":[{"award-number":["62022003"]}]},{"name":"NSFC General Program","award":["61972331"],"award-info":[{"award-number":["61972331"]}]},{"name":"National Key R&D Program of China","award":["2019YFB2103000"],"award-info":[{"award-number":["2019YFB2103000"]}]},{"name":"UGC\/GRF","award":["15204820, 15215421"],"award-info":[{"award-number":["15204820, 15215421"]}]},{"name":"NSFC Key Program","award":["61932017"],"award-info":[{"award-number":["61932017"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2022,10,14]]},"DOI":"10.1145\/3495243.3517028","type":"proceedings-article","created":{"date-parts":[[2022,10,14]],"date-time":"2022-10-14T15:38:33Z","timestamp":1665761913000},"page":"419-431","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":20,"title":["RF-DNA"],"prefix":"10.1145","author":[{"given":"Qingrui","family":"Pan","sequence":"first","affiliation":[{"name":"The Hong Kong Polytechnic University"}]},{"given":"Zhenlin","family":"An","sequence":"additional","affiliation":[{"name":"The Hong Kong Polytechnic University"}]},{"given":"Xueyuan","family":"Yang","sequence":"additional","affiliation":[{"name":"The Hong Kong Polytechnic University"}]},{"given":"Xiaopeng","family":"Zhao","sequence":"additional","affiliation":[{"name":"The Hong Kong Polytechnic University"}]},{"given":"Lei","family":"Yang","sequence":"additional","affiliation":[{"name":"The Hong Kong Polytechnic University"}]}],"member":"320","published-online":{"date-parts":[[2022,10,14]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"\"RFID Forecasts Players and Opportunities 2019--2029 \" https:\/\/www.idtechex.com\/en\/research-report\/rfid-forecasts-players-and-opportunities-2019-2029\/700 accessed on 2021-7-10.  \"RFID Forecasts Players and Opportunities 2019--2029 \" https:\/\/www.idtechex.com\/en\/research-report\/rfid-forecasts-players-and-opportunities-2019-2029\/700 accessed on 2021-7-10."},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1109\/TNET.2020.2964290"},{"volume-title":"A new ultralightweight rfid authentication protocol providing strong authentication and strong integrity,\" IEEE transactions on dependable and secure computing","author":"Chien H.-Y.","key":"e_1_3_2_1_3_1","unstructured":"H.-Y. Chien , \"Sasi : A new ultralightweight rfid authentication protocol providing strong authentication and strong integrity,\" IEEE transactions on dependable and secure computing , vol. 4 , no. 4, pp. 337--340, 2007. H.-Y. Chien, \"Sasi: A new ultralightweight rfid authentication protocol providing strong authentication and strong integrity,\" IEEE transactions on dependable and secure computing, vol. 4, no. 4, pp. 337--340, 2007."},{"key":"e_1_3_2_1_4_1","first-page":"140","article-title":"Rfid authentication protocol for low-cost tags","author":"Song B.","year":"2008","unstructured":"B. Song and C. J. Mitchell , \" Rfid authentication protocol for low-cost tags ,\" in Proc. of ACM WiSec , 2008 , pp. 140 -- 147 . B. Song and C. J. Mitchell, \"Rfid authentication protocol for low-cost tags,\" in Proc. of ACM WiSec, 2008, pp. 140--147.","journal-title":"Proc. of ACM WiSec"},{"key":"e_1_3_2_1_5_1","first-page":"75","volume-title":"Unidirectional key distribution across time and space with applications to rfid security.\" in Proc. of USENIX security symposium","author":"Juels A.","year":"2008","unstructured":"A. Juels , R. Pappu , and B. Parno , \" Unidirectional key distribution across time and space with applications to rfid security.\" in Proc. of USENIX security symposium , 2008 , pp. 75 -- 90 . A. Juels, R. Pappu, and B. Parno, \"Unidirectional key distribution across time and space with applications to rfid security.\" in Proc. of USENIX security symposium, 2008, pp. 75--90."},{"key":"e_1_3_2_1_6_1","first-page":"65","article-title":"Privacy preservation in the publication of trajectories","author":"Terrovitis M.","year":"2008","unstructured":"M. Terrovitis and N. Mamoulis , \" Privacy preservation in the publication of trajectories ,\" in Proc. of IEEE MDM. IEEE , 2008 , pp. 65 -- 72 . M. Terrovitis and N. Mamoulis, \"Privacy preservation in the publication of trajectories,\" in Proc. of IEEE MDM. IEEE, 2008, pp. 65--72.","journal-title":"Proc. of IEEE MDM. IEEE"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/2379776.2379782"},{"key":"e_1_3_2_1_8_1","first-page":"353","article-title":"Physical-layer identification of uhf rfid tags","author":"Zanetti D.","year":"2010","unstructured":"D. Zanetti , B. Danev , and S. sapkun , \" Physical-layer identification of uhf rfid tags ,\" in Proc. of ACM MobiCom , 2010 , pp. 353 -- 364 . D. Zanetti, B. Danev, and S. sapkun, \"Physical-layer identification of uhf rfid tags,\" in Proc. of ACM MobiCom, 2010, pp. 353--364.","journal-title":"Proc. of ACM MobiCom"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1109\/TNET.2015.2391300"},{"key":"e_1_3_2_1_10_1","first-page":"1966","article-title":"Anti-counterfeiting via federated rfid tags' fingerprints and geometric relationships","author":"Yang L.","year":"2015","unstructured":"L. Yang , P. Peng , F. Dang , C. Wang , X.-Y. Li , and Y. Liu , \" Anti-counterfeiting via federated rfid tags' fingerprints and geometric relationships ,\" in Proc. of IEEE INFOCOM. IEEE , 2015 , pp. 1966 -- 1974 . L. Yang, P. Peng, F. Dang, C. Wang, X.-Y. Li, and Y. Liu, \"Anti-counterfeiting via federated rfid tags' fingerprints and geometric relationships,\" in Proc. of IEEE INFOCOM. IEEE, 2015, pp. 1966--1974.","journal-title":"Proc. of IEEE INFOCOM. IEEE"},{"key":"e_1_3_2_1_11_1","unstructured":"\"EPC Gen2 EPCglobal.\" 2021 accessed on 2021-5-18. [Online]. Available: www.gs1.org\/epcglobal  \"EPC Gen2 EPCglobal.\" 2021 accessed on 2021-5-18. [Online]. Available: www.gs1.org\/epcglobal"},{"key":"e_1_3_2_1_12_1","first-page":"1101","article-title":"Eingerprint: Robust energy-related fingerprinting for passive rfid tags","author":"Chen X.","year":"2020","unstructured":"X. Chen , J. Liu , X. Wang , H. Liu , D. Jiang , and L. Chen , \" Eingerprint: Robust energy-related fingerprinting for passive rfid tags ,\" in Proc. of USENIX NSDI , 2020 , pp. 1101 -- 1113 . X. Chen, J. Liu, X. Wang, H. Liu, D. Jiang, and L. Chen, \"Eingerprint: Robust energy-related fingerprinting for passive rfid tags,\" in Proc. of USENIX NSDI, 2020, pp. 1101--1113.","journal-title":"Proc. of USENIX NSDI"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1145\/3117811.3117833"},{"key":"e_1_3_2_1_14_1","first-page":"623","article-title":"Cross-frequency communication: Near-field identification of uhf rfids with wifi!","author":"An Z.","year":"2018","unstructured":"Z. An , Q. Lin , and L. Yang , \" Cross-frequency communication: Near-field identification of uhf rfids with wifi! \" in Proc. of ACM MobiCom , 2018 , pp. 623 -- 638 . Z. An, Q. Lin, and L. Yang, \"Cross-frequency communication: Near-field identification of uhf rfids with wifi!\" in Proc. of ACM MobiCom, 2018, pp. 623--638.","journal-title":"Proc. of ACM MobiCom"},{"key":"e_1_3_2_1_15_1","unstructured":"Global Frequencies Regulations for RFID. https:\/\/tagitsolutions.com\/knowledge-base\/global-frequency-regulations-for-rfid\/.  Global Frequencies Regulations for RFID. https:\/\/tagitsolutions.com\/knowledge-base\/global-frequency-regulations-for-rfid\/."},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1145\/2240276.2240278"},{"issue":"4","key":"e_1_3_2_1_17_1","first-page":"1","article-title":"Butterfly: Environment-independent physical-layer authentication for passive rfid","volume":"2","author":"Han J.","year":"2018","unstructured":"J. Han , C. Qian , Y. Yang , G. Wang , H. Ding , X. Li , and K. Ren , \" Butterfly: Environment-independent physical-layer authentication for passive rfid ,\" Proc. of ACM on IMWUT , vol. 2 , no. 4 , pp. 1 -- 21 , 2018 . J. Han, C. Qian, Y. Yang, G. Wang, H. Ding, X. Li, and K. Ren, \"Butterfly: Environment-independent physical-layer authentication for passive rfid,\" Proc. of ACM on IMWUT, vol. 2, no. 4, pp. 1--21, 2018.","journal-title":"Proc. of ACM on IMWUT"},{"key":"e_1_3_2_1_18_1","first-page":"97","volume-title":"On the practicality of uhf rfid fingerprinting: How real is the rfid tracking problem?\" in International Symposium on Privacy Enhancing Technologies Symposium","author":"Zanetti D.","year":"2011","unstructured":"D. Zanetti , P. Sachs , and S. Capkun , \" On the practicality of uhf rfid fingerprinting: How real is the rfid tracking problem?\" in International Symposium on Privacy Enhancing Technologies Symposium . Springer , 2011 , pp. 97 -- 116 . D. Zanetti, P. Sachs, and S. Capkun, \"On the practicality of uhf rfid fingerprinting: How real is the rfid tracking problem?\" in International Symposium on Privacy Enhancing Technologies Symposium. Springer, 2011, pp. 97--116."},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2010.56"},{"key":"e_1_3_2_1_20_1","first-page":"7","article-title":"Replay-resilient physical-layer authentication for battery-free iot devices","author":"Wang G.","year":"2017","unstructured":"G. Wang , C. Qian , H. Cai , J. Han , H. Ding , and J. Zhao , \" Replay-resilient physical-layer authentication for battery-free iot devices ,\" in Proc. of ACM HotWireless , 2017 , pp. 7 -- 11 . G. Wang, C. Qian, H. Cai, J. Han, H. Ding, and J. Zhao, \"Replay-resilient physical-layer authentication for battery-free iot devices,\" in Proc. of ACM HotWireless, 2017, pp. 7--11.","journal-title":"Proc. of ACM HotWireless"},{"key":"e_1_3_2_1_21_1","first-page":"89","article-title":"Attacks on physical-layer identification","author":"Danev B.","year":"2010","unstructured":"B. Danev , H. Luecken , S. Capkun , and K. El Defrawy , \" Attacks on physical-layer identification ,\" in Proc. of ACM WiSec , 2010 , pp. 89 -- 98 . B. Danev, H. Luecken, S. Capkun, and K. El Defrawy, \"Attacks on physical-layer identification,\" in Proc. of ACM WiSec, 2010, pp. 89--98.","journal-title":"Proc. of ACM WiSec"},{"key":"e_1_3_2_1_22_1","first-page":"385","article-title":"Towards replay-resilient rfid authentication","author":"Wang G.","year":"2018","unstructured":"G. Wang , H. Cai , C. Qian , J. Han , X. Li , H. Ding , and J. Zhao , \" Towards replay-resilient rfid authentication ,\" in Proc. of ACM MobiCom , 2018 , pp. 385 -- 399 . G. Wang, H. Cai, C. Qian, J. Han, X. Li, H. Ding, and J. Zhao, \"Towards replay-resilient rfid authentication,\" in Proc. of ACM MobiCom, 2018, pp. 385--399.","journal-title":"Proc. of ACM MobiCom"},{"key":"e_1_3_2_1_23_1","first-page":"765","article-title":"3d backscatter localization for fine-grained robotics","author":"Luo Z.","year":"2019","unstructured":"Z. Luo , Q. Zhang , Y. Ma , M. Singh , and F. Adib , \" 3d backscatter localization for fine-grained robotics ,\" in Proc. of USENIX NSDI , 2019 , pp. 765 -- 782 . Z. Luo, Q. Zhang, Y. Ma, M. Singh, and F. Adib, \"3d backscatter localization for fine-grained robotics,\" in Proc. of USENIX NSDI, 2019, pp. 765--782.","journal-title":"Proc. of USENIX NSDI"},{"key":"e_1_3_2_1_24_1","first-page":"1083","article-title":"Food and liquid sensing in practical environments using rfids","author":"Ha U.","year":"2020","unstructured":"U. Ha , J. Leng , A. Khaddaj , and F. Adib , \" Food and liquid sensing in practical environments using rfids ,\" in Proc. of USENIX NSDI , 2020 , pp. 1083 -- 1100 . U. Ha, J. Leng, A. Khaddaj, and F. Adib, \"Food and liquid sensing in practical environments using rfids,\" in Proc. of USENIX NSDI, 2020, pp. 1083--1100.","journal-title":"Proc. of USENIX NSDI"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2016.2552146"},{"key":"e_1_3_2_1_26_1","first-page":"1","volume-title":"IEEE","author":"Elmaghbub A.","year":"2020","unstructured":"A. Elmaghbub , B. Hamdaoui , and A. Natarajan , \" Widescan: Exploiting out-of-band distortion for device classification using deep learning,\" in GLOBECOM 2020-2020 IEEE Global Communications Conference . IEEE , 2020 , pp. 1 -- 6 . A. Elmaghbub, B. Hamdaoui, and A. Natarajan, \"Widescan: Exploiting out-of-band distortion for device classification using deep learning,\" in GLOBECOM 2020-2020 IEEE Global Communications Conference. IEEE, 2020, pp. 1--6."},{"key":"e_1_3_2_1_27_1","first-page":"21","article-title":"Development and validation of an equivalent circuit model for uhf rfid ic based on wireless tag measurements","volume":"6","author":"Bj\u00f6rninen T.","year":"2012","unstructured":"T. Bj\u00f6rninen , L. Syd\u00e4nheimo , and L. Ukkonen , \" Development and validation of an equivalent circuit model for uhf rfid ic based on wireless tag measurements ,\" in Proc. of AMTA Symp , vol. 6 , 2012 , pp. 21 -- 26 . T. Bj\u00f6rninen, L. Syd\u00e4nheimo, and L. Ukkonen, \"Development and validation of an equivalent circuit model for uhf rfid ic based on wireless tag measurements,\" in Proc. of AMTA Symp, vol. 6, 2012, pp. 21--26.","journal-title":"Proc. of AMTA Symp"},{"key":"e_1_3_2_1_28_1","unstructured":"\"Deep Construction of RFID Tags.\" https:\/\/rfid4u.com\/dig-deep-construction-of-rfid-tags\/ accessed on 2021-05-13.  \"Deep Construction of RFID Tags.\" https:\/\/rfid4u.com\/dig-deep-construction-of-rfid-tags\/ accessed on 2021-05-13."},{"key":"e_1_3_2_1_29_1","unstructured":"\"Impinj Monza 4 Datasheet \" https:\/\/support.impinj.com\/hc\/en-us\/articles\/202756908-Monza-4-Datasheet accessed on 2021-7-2.  \"Impinj Monza 4 Datasheet \" https:\/\/support.impinj.com\/hc\/en-us\/articles\/202756908-Monza-4-Datasheet accessed on 2021-7-2."},{"key":"e_1_3_2_1_30_1","first-page":"471","article-title":"Deep face recognition: A survey","author":"Masi I.","year":"2018","unstructured":"I. Masi , Y. Wu , T. Hassner , and P. Natarajan , \" Deep face recognition: A survey ,\" in Proc. of SBC SIBGRAPI. IEEE , 2018 , pp. 471 -- 478 . I. Masi, Y. Wu, T. Hassner, and P. Natarajan, \"Deep face recognition: A survey,\" in Proc. of SBC SIBGRAPI. IEEE, 2018, pp. 471--478.","journal-title":"Proc. of SBC SIBGRAPI. IEEE"},{"key":"e_1_3_2_1_31_1","first-page":"523","volume-title":"Deep learning networks for off-line handwritten signature recognition,\" in Iberoamerican Congress on Pattern Recognition","author":"Ribeiro B.","year":"2011","unstructured":"B. Ribeiro , I. Gon\u00e7alves , S. Santos , and A. Kovacec , \" Deep learning networks for off-line handwritten signature recognition,\" in Iberoamerican Congress on Pattern Recognition . Springer , 2011 , pp. 523 -- 532 . B. Ribeiro, I. Gon\u00e7alves, S. Santos, and A. Kovacec, \"Deep learning networks for off-line handwritten signature recognition,\" in Iberoamerican Congress on Pattern Recognition. Springer, 2011, pp. 523--532."},{"key":"e_1_3_2_1_32_1","first-page":"770","article-title":"Deep residual learning for image recognition","author":"He K.","year":"2016","unstructured":"K. He , X. Zhang , S. Ren , and J. Sun , \" Deep residual learning for image recognition ,\" in Proc. of IEEE CVPR , 2016 , pp. 770 -- 778 . K. He, X. Zhang, S. Ren, and J. Sun, \"Deep residual learning for image recognition,\" in Proc. of IEEE CVPR, 2016, pp. 770--778.","journal-title":"Proc. of IEEE CVPR"},{"key":"e_1_3_2_1_33_1","first-page":"1735","volume-title":"Of IEEE CVPR","author":"Hadsell R.","year":"2006","unstructured":"R. Hadsell , S. Chopra , and Y. LeCun , \"Dimensionality reduction by learning an invariant mapping,\" in Proc. Of IEEE CVPR , vol. 2 . IEEE , 2006 , pp. 1735 -- 1742 . R. Hadsell, S. Chopra, and Y. LeCun, \"Dimensionality reduction by learning an invariant mapping,\" in Proc. Of IEEE CVPR, vol. 2. IEEE, 2006, pp. 1735--1742."},{"volume-title":"One-shot learning of object categories,\" IEEE transactions on pattern analysis and machine intelligence","author":"Fei-Fei L.","key":"e_1_3_2_1_34_1","unstructured":"L. Fei-Fei , R. Fergus , and P. Perona , \" One-shot learning of object categories,\" IEEE transactions on pattern analysis and machine intelligence , vol. 28 , no. 4, pp. 594--611, 2006. L. Fei-Fei, R. Fergus, and P. Perona, \"One-shot learning of object categories,\" IEEE transactions on pattern analysis and machine intelligence, vol. 28, no. 4, pp. 594--611, 2006."},{"key":"e_1_3_2_1_35_1","unstructured":"\"Keonn advanreader-10 usb rfid reader (1-port) (fcc) [clearance] \" accessed on 2022-1-2. [Online]. Available: https:\/\/www.atlasrfidstore.com\/keonn-advanreader-10-usb-rfid-reader-1-port-fcc-clearance\/  \"Keonn advanreader-10 usb rfid reader (1-port) (fcc) [clearance] \" accessed on 2022-1-2. [Online]. Available: https:\/\/www.atlasrfidstore.com\/keonn-advanreader-10-usb-rfid-reader-1-port-fcc-clearance\/"},{"key":"e_1_3_2_1_36_1","unstructured":"\"Analog devices inc. eval-adf4351eb1z \" accessed on 2022-1-3. [Online]. Available: https:\/\/www.digikey.hk\/products\/zh?keywords=Analog%20Devices%20Inc.%20EVAL-ADF4351EB1Z  \"Analog devices inc. eval-adf4351eb1z \" accessed on 2022-1-3. [Online]. Available: https:\/\/www.digikey.hk\/products\/zh?keywords=Analog%20Devices%20Inc.%20EVAL-ADF4351EB1Z"},{"key":"e_1_3_2_1_37_1","volume-title":"Understanding the fcc regulations for low-power, non-licensed transmitters,\" Office of Engineering and Technology","author":"F. C. Commission et al.","year":"1993","unstructured":"F. C. Commission et al. , \" Understanding the fcc regulations for low-power, non-licensed transmitters,\" Office of Engineering and Technology , vol. 34 , 1993 . F. C. Commission et al., \"Understanding the fcc regulations for low-power, non-licensed transmitters,\" Office of Engineering and Technology, vol. 34, 1993."},{"key":"e_1_3_2_1_38_1","unstructured":"\"Relative permittivity - wikipedia 2022 \" 2022 accessed on 2022-1-3. [Online]. Available: https:\/\/en.wikipedia.org\/wiki\/Relative_permittivity  \"Relative permittivity - wikipedia 2022 \" 2022 accessed on 2022-1-3. [Online]. Available: https:\/\/en.wikipedia.org\/wiki\/Relative_permittivity"},{"key":"e_1_3_2_1_39_1","first-page":"1","volume-title":"Dielectric properties of poly(methyl methacrylate) (pmma)\/cacu3ti4o12 composites,\" in 2012 IEEE 10th International Conference on the Properties and Applications of Dielectric Materials","author":"Thomas P.","year":"2012","unstructured":"P. Thomas , R. E. Ravindran , and K. Varma , \" Dielectric properties of poly(methyl methacrylate) (pmma)\/cacu3ti4o12 composites,\" in 2012 IEEE 10th International Conference on the Properties and Applications of Dielectric Materials , 2012 , pp. 1 -- 4 . P. Thomas, R. E. Ravindran, and K. Varma, \"Dielectric properties of poly(methyl methacrylate) (pmma)\/cacu3ti4o12 composites,\" in 2012 IEEE 10th International Conference on the Properties and Applications of Dielectric Materials, 2012, pp. 1--4."},{"key":"e_1_3_2_1_40_1","volume-title":"variation with frequency, moisture content and grain orientation,\" USDA for Serv. Res. Pap. FPL-245","author":"James W.","year":"1975","unstructured":"W. James , \"Dielectric properties of wood and hardboard : variation with frequency, moisture content and grain orientation,\" USDA for Serv. Res. Pap. FPL-245 , Madison, WI , 1975 . W. James, \"Dielectric properties of wood and hardboard: variation with frequency, moisture content and grain orientation,\" USDA for Serv. Res. Pap. FPL-245, Madison, WI, 1975."}],"event":{"name":"ACM MobiCom '22: The 28th Annual International Conference on Mobile Computing and Networking","sponsor":["SIGMOBILE ACM Special Interest Group on Mobility of Systems, Users, Data and Computing"],"location":"Sydney NSW Australia","acronym":"ACM MobiCom '22"},"container-title":["Proceedings of the 28th Annual International Conference on Mobile Computing And Networking"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3495243.3517028","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3495243.3517028","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T20:12:03Z","timestamp":1750191123000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3495243.3517028"}},"subtitle":["large-scale physical-layer identifications of RFIDs via dual natural attributes"],"short-title":[],"issued":{"date-parts":[[2022,10,14]]},"references-count":40,"alternative-id":["10.1145\/3495243.3517028","10.1145\/3495243"],"URL":"https:\/\/doi.org\/10.1145\/3495243.3517028","relation":{},"subject":[],"published":{"date-parts":[[2022,10,14]]},"assertion":[{"value":"2022-10-14","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}