{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,26]],"date-time":"2026-03-26T15:50:36Z","timestamp":1774540236308,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":57,"publisher":"ACM","license":[{"start":{"date-parts":[[2023,11,12]],"date-time":"2023-11-12T00:00:00Z","timestamp":1699747200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2023,11,12]]},"DOI":"10.1145\/3625687.3625790","type":"proceedings-article","created":{"date-parts":[[2024,4,26]],"date-time":"2024-04-26T12:07:18Z","timestamp":1714133238000},"page":"195-208","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":6,"title":["RIStealth: Practical and Covert Physical-Layer Attack against WiFi-based Intrusion Detection via Reconfigurable Intelligent Surface"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-5091-4431","authenticated-orcid":false,"given":"Yuxuan","family":"Zhou","sequence":"first","affiliation":[{"name":"The Hong Kong University of Science and Technology, Hong Kong, Hong Kong"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-8109-5213","authenticated-orcid":false,"given":"Chenggao","family":"Li","sequence":"additional","affiliation":[{"name":"The Hong Kong University of Science and Technology, Hong Kong, Hong Kong"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-0313-4421","authenticated-orcid":false,"given":"Huangxun","family":"Chen","sequence":"additional","affiliation":[{"name":"Huawei, Hong Kong, Hong Kong"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-9205-1881","authenticated-orcid":false,"given":"Qian","family":"Zhang","sequence":"additional","affiliation":[{"name":"The Hong Kong University of Science and Technology, Hong Kong, Hong Kong"}]}],"member":"320","published-online":{"date-parts":[[2024,4,26]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"Venkat Arun and Hari Balakrishnan. 2020. RFocus: Beamforming Using Thousands of Passive Antennas.. In NSDI. 1047--1061."},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"crossref","first-page":"1780","DOI":"10.1049\/cmu2.12190","article-title":"Direction-based jamming detection and suppression in mmWave massive MIMO networks","volume":"15","author":"Bagherinejad Saeed","year":"2021","unstructured":"Saeed Bagherinejad and S Mohammad Razavizadeh. 2021. Direction-based jamming detection and suppression in mmWave massive MIMO networks. IET Communications 15, 14 (2021), 1780--1790.","journal-title":"IET Communications"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1145\/2799650.2799653"},{"key":"e_1_3_2_1_4_1","unstructured":"Lili Chen Wenjun Hu Kyle Jamieson Xiaojiang Chen Dingyi Fang and Jeremy Gummeson. 2021. Pushing the Physical Limits of IoT Devices with Programmable Metasurfaces.. In NSDI. 425--438."},{"key":"e_1_3_2_1_5_1","volume-title":"IEEE INFOCOM 2017-IEEE Conference on Computer Communications. IEEE, 1--9.","author":"Chen Xi","year":"2017","unstructured":"Xi Chen, Chen Ma, Michel Allegue, and Xue Liu. 2017. Taming the inconsistency of Wi-Fi fingerprints for device-free passive indoor localization. In IEEE INFOCOM 2017-IEEE Conference on Computer Communications. IEEE, 1--9."},{"key":"e_1_3_2_1_6_1","volume-title":"IEEE INFOCOM 2007-26th IEEE International Conference on Computer Communications. IEEE","author":"Chen Yingying","year":"2007","unstructured":"Yingying Chen, Wade Trappe, and Richard P Martin. 2007. Attack detection in wireless localization. In IEEE INFOCOM 2007-26th IEEE International Conference on Computer Communications. IEEE, 1964--1972."},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1109\/JPROC.2022.3170498"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.comcom.2021.12.019"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"crossref","first-page":"3644","DOI":"10.1039\/C7TC00548B","article-title":"Information metamaterials and metasurfaces","volume":"5","author":"Cui Tie Jun","year":"2017","unstructured":"Tie Jun Cui, Shuo Liu, and Lei Zhang. 2017. Information metamaterials and metasurfaces. Journal of materials chemistry C 5, 15 (2017), 3644--3668.","journal-title":"Journal of materials chemistry C"},{"key":"e_1_3_2_1_10_1","volume-title":"Xiang Wan, Jie Zhao, and Qiang Cheng.","author":"Cui Tie Jun","year":"2014","unstructured":"Tie Jun Cui, Mei Qing Qi, Xiang Wan, Jie Zhao, and Qiang Cheng. 2014. Coding metamaterials, digital metamaterials and programmable metamaterials. Light: science & applications 3, 10 (2014), e218--e218."},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"crossref","first-page":"1104","DOI":"10.3390\/electronics8101104","article-title":"An ultra-wide band polarization-independent random coding Metasurface for RCS reduction","volume":"8","author":"Dai Huijuan","year":"2019","unstructured":"Huijuan Dai, Yongjiu Zhao, Huangyan Li, Jiaqing Chen, Zheng He, and Wenjun Qi. 2019. An ultra-wide band polarization-independent random coding Metasurface for RCS reduction. Electronics 8, 10 (2019), 1104.","journal-title":"Electronics"},{"key":"e_1_3_2_1_12_1","volume-title":"Marco Di Renzo, et al","author":"Dai Linglong","year":"2020","unstructured":"Linglong Dai, Bichai Wang, Min Wang, Xue Yang, Jingbo Tan, Shuangkaisheng Bi, Shenheng Xu, Fan Yang, Zhi Chen, Marco Di Renzo, et al. 2020. Reconfigurable intelligent surface-based wireless communications: Antenna design, prototyping, and experimental results. IEEE access 8 (2020), 45913--45923."},{"key":"e_1_3_2_1_13_1","volume-title":"A robust passive intrusion detection system with commodity WiFi devices. Journal of Sensors 2018","author":"Ding Enjie","year":"2018","unstructured":"Enjie Ding, Xiansheng Li, Tong Zhao, Lei Zhang, and Yanjun Hu. 2018. A robust passive intrusion detection system with commodity WiFi devices. Journal of Sensors 2018 (2018)."},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1145\/3372224.3380887"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1145\/3447993.3483238"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1109\/SAHCN.2011.5984919"},{"key":"e_1_3_2_1_17_1","first-page":"1","article-title":"Pixelated checkerboard metasurface for ultra-wideband radar cross section reduction","volume":"7","author":"Haji-Ahmadi Mohammad-Javad","year":"2017","unstructured":"Mohammad-Javad Haji-Ahmadi, Vahid Nayyeri, Mohammad Soleimani, and Omar M Ramahi. 2017. Pixelated checkerboard metasurface for ultra-wideband radar cross section reduction. Scientific Reports 7, 1 (2017), 1--12.","journal-title":"Scientific Reports"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1145\/1925861.1925870"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1109\/ISCC47284.2019.8969707"},{"key":"e_1_3_2_1_20_1","first-page":"6221","article-title":"Robust Passive Proximity Detection Using Wi-Fi","volume":"10","author":"Hu Yuqian","year":"2022","unstructured":"Yuqian Hu, Muhammed Zahid Ozturk, Beibei Wang, Chenshu Wu, Feng Zhang, and KJ Ray Liu. 2022. Robust Passive Proximity Detection Using Wi-Fi. IEEE Internet of Things Journal 10, 7 (2022), 6221--6234.","journal-title":"IEEE Internet of Things Journal"},{"key":"e_1_3_2_1_21_1","volume-title":"2017 International Conference on Computer, Communications and Electronics (Comptelix). IEEE, 559--564","author":"Jaitly Sunakshi","year":"2017","unstructured":"Sunakshi Jaitly, Harshit Malhotra, and Bharat Bhushan. 2017. Security vulnerabilities and countermeasures against jamming attacks in Wireless Sensor Networks: A survey. In 2017 International Conference on Computer, Communications and Electronics (Comptelix). IEEE, 559--564."},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1109\/MILCOM.2004.1495141"},{"key":"e_1_3_2_1_23_1","volume-title":"2007 IEEE Radar Conference. IEEE, 451--456","author":"Kerce J Clayton","year":"2007","unstructured":"J Clayton Kerce, George C Brown, and Mark A Mitchell. 2007. Phase-only transmit beam broadening for improved radar search performance. In 2007 IEEE Radar Conference. IEEE, 451--456."},{"key":"e_1_3_2_1_24_1","volume-title":"2012 IEEE International Conference on Pervasive Computing and Communications. IEEE, 180--189","author":"Kosba Ahmed E","year":"2012","unstructured":"Ahmed E Kosba, Ahmed Saeed, and Moustafa Youssef. 2012. RASID: A robust WLAN device-free passive motion detection system. In 2012 IEEE International Conference on Pervasive Computing and Communications. IEEE, 180--189."},{"key":"e_1_3_2_1_25_1","volume-title":"Enhanced Quality of Life and Smart Living: 15th International Conference, ICOST 2017, Paris, France, August 29--31, 2017, Proceedings 15","author":"Li Shengjie","year":"2017","unstructured":"Shengjie Li, Xiang Li, Kai Niu, Hao Wang, Yue Zhang, and Daqing Zhang. 2017. Ar-alarm: An adaptive and robust intrusion detection system leveraging csi from commodity wi-fi. In Enhanced Quality of Life and Smart Living: 15th International Conference, ICOST 2017, Paris, France, August 29--31, 2017, Proceedings 15. Springer, 211--223."},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1145\/3495243.3560547"},{"key":"e_1_3_2_1_27_1","volume-title":"IPSN 2005. Fourth International Symposium on Information Processing in Sensor Networks","author":"Li Zang","year":"2005","unstructured":"Zang Li, Wade Trappe, Yanyong Zhang, and Badri Nath. 2005. Robust statistical methods for securing wireless localization in sensor networks. In IPSN 2005. Fourth International Symposium on Information Processing in Sensor Networks, 2005. IEEE, 91--98."},{"key":"e_1_3_2_1_28_1","volume-title":"Revisiting indoor intrusion detection with WiFi signals: do not panic over a pet! IEEE Internet of Things Journal 7, 10","author":"Lin Yuxiang","year":"2020","unstructured":"Yuxiang Lin, Yi Gao, Bingji Li, and Wei Dong. 2020. Revisiting indoor intrusion detection with WiFi signals: do not panic over a pet! IEEE Internet of Things Journal 7, 10 (2020), 10437--10449."},{"key":"e_1_3_2_1_29_1","unstructured":"Linksys. 2019. Linksys Aware. https:\/\/www.linksys.com\/for-home\/software-and-services\/linksys-aware\/"},{"key":"e_1_3_2_1_30_1","volume-title":"A coding diffuse metasurface for RCS reduction","author":"Liu Xiao","year":"2016","unstructured":"Xiao Liu, Jun Gao, Liming Xu, Xiangyu Cao, Yi Zhao, and Sijia Li. 2016. A coding diffuse metasurface for RCS reduction. IEEE Antennas and wireless propagation letters 16 (2016), 724--727."},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1145\/1592568.1592589"},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1145\/1859995.1860020"},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.3390\/app9010175"},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"crossref","first-page":"75","DOI":"10.2528\/PIERB21081401","article-title":"A review of metasurface-assisted RCS reduction techniques","volume":"94","author":"Murugesan Akila","year":"2021","unstructured":"Akila Murugesan, Krishnasamy T Selvan, Ashwin Iyer, Kumar Vaibhav Srivastava, and Arokiaswami Alphones. 2021. A review of metasurface-assisted RCS reduction techniques. Progress In Electromagnetics Research B 94 (2021), 75--103.","journal-title":"Progress In Electromagnetics Research B"},{"key":"e_1_3_2_1_35_1","volume-title":"Origin Wireless","author":"Inc.","year":"2021","unstructured":"Inc. Origin Wireless. 2021. Hex Home Smart Home Security System. https:\/\/myhexhome.com\/"},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1109\/TCOMM.2021.3116151"},{"key":"e_1_3_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2022.3159185"},{"key":"e_1_3_2_1_38_1","volume-title":"Hai Tao, Weifeng Yan, and Zhe Tang.","author":"Qi Fang","year":"2022","unstructured":"Fang Qi, Yingkai Zhao, Md Zakirul Alam Bhuiyan, Hai Tao, Weifeng Yan, and Zhe Tang. 2022. Artificial intelligence driven Wi-Fi CSI data mining: Focusing on the intrusion detection applications. International Journal of Communication Systems (2022), e5338."},{"key":"e_1_3_2_1_39_1","volume-title":"Deep-learning-enabled self-adaptive microwave cloak without human intervention. Nature photonics 14, 6","author":"Qian Chao","year":"2020","unstructured":"Chao Qian, Bin Zheng, Yichen Shen, Li Jing, Erping Li, Lian Shen, and Hongsheng Chen. 2020. Deep-learning-enabled self-adaptive microwave cloak without human intervention. Nature photonics 14, 6 (2020), 383--390."},{"key":"e_1_3_2_1_40_1","volume-title":"13th {USENIX} Symposium on Networked Systems Design and Implementation ({NSDI} 16). 685--699.","author":"Qiao Yue","unstructured":"Yue Qiao, Ouyang Zhang, Wenjie Zhou, Kannan Srinivasan, and Anish Arora. 2016. PhyCloak: Obfuscating sensing from communication signals. In 13th {USENIX} Symposium on Networked Systems Design and Implementation ({NSDI} 16). 685--699."},{"key":"e_1_3_2_1_41_1","volume-title":"2012 IEEE International Conference on Communications (ICC). IEEE, 3637--3642","author":"Rajagopal Sridhar","year":"2012","unstructured":"Sridhar Rajagopal. 2012. Beam broadening for phased antenna arrays using multi-beam subarrays. In 2012 IEEE International Conference on Communications (ICC). IEEE, 3637--3642."},{"key":"e_1_3_2_1_42_1","volume-title":"2021 13th International Conference on Electronics, Computers and Artificial Intelligence (ECAI). IEEE, 1--6.","author":"Sadhwani Jatin","year":"2021","unstructured":"Jatin Sadhwani and M Sabarimalai Manikandan. 2021. Non-collaborative human presence detection using channel state information of Wi-Fi signal and long-short term memory neural network. In 2021 13th International Conference on Electronics, Computers and Artificial Intelligence (ECAI). IEEE, 1--6."},{"key":"e_1_3_2_1_43_1","doi-asserted-by":"publisher","DOI":"10.1145\/3544216.3544256"},{"key":"e_1_3_2_1_44_1","first-page":"274","article-title":"Geo-fencing: Confining Wi-Fi Coverage to Physical Boundaries","volume":"5538","author":"Sheth Anmol","year":"2009","unstructured":"Anmol Sheth, Srinivasan Seshan, and David Wetherall. 2009. Geo-fencing: Confining Wi-Fi Coverage to Physical Boundaries.. In Pervasive, Vol. 5538. 274--290.","journal-title":"Pervasive"},{"key":"e_1_3_2_1_45_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP46214.2022.9833676"},{"key":"e_1_3_2_1_46_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2021.3076287"},{"key":"e_1_3_2_1_47_1","doi-asserted-by":"publisher","DOI":"10.1145\/2664243.2664260"},{"key":"e_1_3_2_1_48_1","doi-asserted-by":"publisher","DOI":"10.1145\/2809695.2809720"},{"key":"e_1_3_2_1_49_1","doi-asserted-by":"publisher","DOI":"10.1145\/3264953"},{"key":"e_1_3_2_1_50_1","first-page":"109","article-title":"Can you trust autonomous vehicles: Contactless attacks against sensors of self-driving vehicle","volume":"24","author":"Yan Chen","year":"2016","unstructured":"Chen Yan, Wenyuan Xu, and Jianhao Liu. 2016. Can you trust autonomous vehicles: Contactless attacks against sensors of self-driving vehicle. Def Con 24, 8 (2016), 109.","journal-title":"Def Con"},{"key":"e_1_3_2_1_51_1","volume-title":"Broadband RCS reduction based on spiral-coded metasurface","author":"Yuan Fang","year":"2017","unstructured":"Fang Yuan, Guang-Ming Wang, He-Xiu Xu, Tong Cai, Xiao-Jun Zou, and Ze-Hao Pang. 2017. Broadband RCS reduction based on spiral-coded metasurface. IEEE Antennas and wireless propagation letters 16 (2017), 3188--3191."},{"key":"e_1_3_2_1_52_1","doi-asserted-by":"publisher","DOI":"10.1145\/3369839"},{"key":"e_1_3_2_1_53_1","doi-asserted-by":"crossref","first-page":"2007966","DOI":"10.1002\/adma.202007966","article-title":"Smart Doppler cloak operating in broad band and full polarizations","volume":"33","author":"Zhang Xin Ge","year":"2021","unstructured":"Xin Ge Zhang, Ya Lun Sun, Qian Yu, Qiang Cheng, Wei Xiang Jiang, Cheng-Wei Qiu, and Tie Jun Cui. 2021. Smart Doppler cloak operating in broad band and full polarizations. Advanced Materials 33, 17 (2021), 2007966.","journal-title":"Advanced Materials"},{"key":"e_1_3_2_1_54_1","doi-asserted-by":"crossref","first-page":"B229","DOI":"10.1364\/PRJ.418445","article-title":"Realizing transmitted metasurface cloak by a tandem neural network","volume":"9","author":"Zhen Zheng","year":"2021","unstructured":"Zheng Zhen, Chao Qian, Yuetian Jia, Zhixiang Fan, Ran Hao, Tong Cai, Bin Zheng, Hongsheng Chen, and Erping Li. 2021. Realizing transmitted metasurface cloak by a tandem neural network. Photonics Research 9, 5 (2021), B229--B235.","journal-title":"Photonics Research"},{"key":"e_1_3_2_1_55_1","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1145\/3534618","article-title":"WiAdv: Practical and Robust Adversarial Attack against WiFi-based Gesture Recognition System","volume":"6","author":"Zhou Yuxuan","year":"2022","unstructured":"Yuxuan Zhou, Huangxun Chen, Chenyu Huang, and Qian Zhang. 2022. WiAdv: Practical and Robust Adversarial Attack against WiFi-based Gesture Recognition System. Proceedings of the ACM on Interactive, Mobile, Wearable and Ubiquitous Technologies 6, 2 (2022), 1--25.","journal-title":"Proceedings of the ACM on Interactive, Mobile, Wearable and Ubiquitous Technologies"},{"key":"e_1_3_2_1_56_1","volume-title":"Human and Non-human Motion Recognition with WiFi. In 2022 IEEE 19th International Conference on Mobile Ad Hoc and Smart Systems (MASS). IEEE, 476--484","author":"Zhu Guozhen","year":"2022","unstructured":"Guozhen Zhu, Chenshu Wu, Xiaolu Zeng, Beibei Wang, and KJ Ray Liu. 2022. Who Moved My Cheese? Human and Non-human Motion Recognition with WiFi. In 2022 IEEE 19th International Conference on Mobile Ad Hoc and Smart Systems (MASS). IEEE, 476--484."},{"key":"e_1_3_2_1_57_1","volume-title":"Network and Distributed Systems Security (NDSS) Symposium.","author":"Zhu Yanzi","year":"2020","unstructured":"Yanzi Zhu, Zhujun Xiao, Yuxin Chen, Zhijing Li, Max Liu, Ben Y Zhao, and Haitao Zheng. 2020. Et tu alexa? when commodity wifi devices turn into adversarial motion sensors. In Network and Distributed Systems Security (NDSS) Symposium."}],"event":{"name":"SenSys '23: 21st ACM Conference on Embedded Networked Sensor Systems","location":"Istanbul Turkiye","acronym":"SenSys '23","sponsor":["SIGARCH ACM Special Interest Group on Computer Architecture","SIGBED ACM Special Interest Group on Embedded Systems","SIGMETRICS ACM Special Interest Group on Measurement and Evaluation","SIGMOBILE ACM Special Interest Group on Mobility of Systems, Users, Data and Computing","SIGOPS ACM Special Interest Group on Operating Systems"]},"container-title":["Proceedings of the 21st ACM Conference on Embedded Networked Sensor Systems"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3625687.3625790","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3625687.3625790","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T17:49:11Z","timestamp":1750182551000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3625687.3625790"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,11,12]]},"references-count":57,"alternative-id":["10.1145\/3625687.3625790","10.1145\/3625687"],"URL":"https:\/\/doi.org\/10.1145\/3625687.3625790","relation":{},"subject":[],"published":{"date-parts":[[2023,11,12]]},"assertion":[{"value":"2024-04-26","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}