{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,8,22]],"date-time":"2025-08-22T22:10:06Z","timestamp":1755900606425,"version":"3.44.0"},"publisher-location":"New York, NY, USA","reference-count":70,"publisher":"ACM","funder":[{"DOI":"10.13039\/501100006374","name":"National Science Foundation","doi-asserted-by":"publisher","award":["CNS-2008384, CNS-1956276"],"award-info":[{"award-number":["CNS-2008384, CNS-1956276"]}],"id":[{"id":"10.13039\/501100006374","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2025,6,30]]},"DOI":"10.1145\/3734477.3734708","type":"proceedings-article","created":{"date-parts":[[2025,6,27]],"date-time":"2025-06-27T21:11:01Z","timestamp":1751058661000},"page":"4-15","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":0,"title":["<i>Wireless-Tap:<\/i>\n            Automatic Transcription of Phone Calls Using Millimeter-Wave Radar Sensing"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-1982-1787","authenticated-orcid":false,"given":"Suryoday","family":"Basak","sequence":"first","affiliation":[{"name":"Department of Computer Science and Engineering, The Pennsylvania State University, University Park, PA, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-5325-5013","authenticated-orcid":false,"given":"Mahanth","family":"Gowda","sequence":"additional","affiliation":[{"name":"Department of Computer Science and Engineering, The Pennsylvania State University, University Park, PA, USA"}]}],"member":"320","published-online":{"date-parts":[[2025,6,30]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"[n. d.]. AN\/AVR-2 Laser Warning System. https:\/\/fas.org\/man\/dod-101\/sys\/ac\/equip\/an-avr-2.htm."},{"key":"e_1_3_2_1_2_1","unstructured":"[n. d.]. How Accurate Is Lip Reading? This Is How It Feels To Depend On It Every Day - VIDEO - bustle.com. https:\/\/www.bustle.com\/articles\/131261-how-accurate-is-lip-reading-this-is-how-it-feels-to-depend-on-it-every-day. [Accessed 13-09-2024]."},{"key":"e_1_3_2_1_3_1","unstructured":"[n. d.]. VIBRATION: ORIGINS EFFECTS SOLUTIONS. https:\/\/www.gcaudio.com\/tips-tricks\/vibration-origins-effects-solutions\/."},{"key":"e_1_3_2_1_4_1","unstructured":"Acconeer. 2024. Products. https:\/\/www.acconeer.com\/products\/ Accessed: 2024-10-24."},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2018.00004"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1145\/3448300.3468499"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2020.24076"},{"volume-title":"Antenna theory (4 ed.)","author":"Balanis Constantine A","key":"e_1_3_2_1_8_1","unstructured":"Constantine A Balanis. 2016. Antenna theory (4 ed.). Wiley-Blackwell, Hoboken, NJ."},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP46214.2022.9833568"},{"key":"e_1_3_2_1_10_1","unstructured":"Suryoday Basak Abhijeeth Padarthi and Mahanth Gowda. 2024. mmWave-Whisper: Phone Call Eavesdropping and Transcription Using Millimeter-Wave Radar. arXiv:2410.17457 [cs.SD] https:\/\/arxiv.org\/abs\/2410.17457"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-47854-7_30"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/3643832.3661887"},{"key":"e_1_3_2_1_13_1","unstructured":"Commsrisk. 2024. The Radar That Hears Your Phone Calls https:\/\/commsrisk.com\/academics-made-a-radar-that-hears-your-phonecalls\/. https:\/\/commsrisk.com\/academics-made-a-radar-that-hears-your-phone-calls\/ Accessed: 2024-10-24."},{"key":"e_1_3_2_1_14_1","unstructured":"OpenAI Community. 2024. How to Avoid Hallucinations in Whisper Transcriptions https:\/\/community.openai.com\/t\/how-to-avoid-hallucinations-in-whisper-transcriptions\/125300. https:\/\/community.openai.com\/t\/how-to-avoid-hallucinations-in-whisper-transcriptions\/125300 Accessed: 2024-10-24."},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2015.7299171"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"crossref","unstructured":"Abe Davis Michael Rubinstein Neal Wadhwa Gautham J Mysore Fredo Durand and William T Freeman. 2014. The visual microphone: Passive recovery of sound from video. (2014).","DOI":"10.1145\/2601097.2601119"},{"key":"e_1_3_2_1_17_1","unstructured":"David Ericsson et al. 2020. Adversarial representation learning for private speech generation. arXiv preprint arXiv:2006.09114 (2020)."},{"key":"e_1_3_2_1_18_1","volume-title":"Rush","author":"Gandhi Sanchit","year":"2023","unstructured":"Sanchit Gandhi, Patrick von Platen, and Alexander M. Rush. 2023. Distil-Whisper: Robust Knowledge Distillation via Large-Scale Pseudo Labelling. arXiv:2311.00430 [cs.CL] https:\/\/arxiv.org\/abs\/2311.00430"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1145\/1143844.1143891"},{"key":"e_1_3_2_1_20_1","volume-title":"Proceedings of the 31st International Conference on Machine Learning (Proceedings of Machine Learning Research","volume":"1772","author":"Graves Alex","year":"2014","unstructured":"Alex Graves and Navdeep Jaitly. 2014. Towards End-To-End Speech Recognition with Recurrent Neural Networks. In Proceedings of the 31st International Conference on Machine Learning (Proceedings of Machine Learning Research, Vol. 32), Eric P. Xing and Tony Jebara (Eds.). PMLR, Bejing, China, 1764-1772. https:\/\/proceedings.mlr.press\/v32\/graves14.html"},{"key":"e_1_3_2_1_21_1","volume-title":"Conformer: Convolution-augmented Transformer for Speech Recognition.","author":"Gulati Anmol","year":"2020","unstructured":"Anmol Gulati, Chung-Cheng Chiu, James Qin, Jiahui Yu, Niki Parmar, Ruoming Pang, Shibo Wang, Wei Han, Yonghui Wu, Yu Zhang, and Zhengdong Zhang (Eds.). 2020. Conformer: Convolution-augmented Transformer for Speech Recognition."},{"key":"e_1_3_2_1_22_1","unstructured":"Hi-Link. 2024. HLK-LD2461 mmWave Radar Module. https:\/\/hlktech.net\/index.php?id=1185 Accessed: 2024-10-24."},{"key":"e_1_3_2_1_23_1","unstructured":"Hi-Link. 2024. HLK-LD602C mmWave Radar Module. https:\/\/www.hlktech.net\/index.php?id=1211&cateid=755 Accessed: 2024-10-24."},{"key":"e_1_3_2_1_24_1","unstructured":"Hi-Link. 2024. HLK-LD8001 mmWave Radar Module. https:\/\/www.hlktech.net\/index.php?id=1180 Accessed: 2024-10-24."},{"key":"e_1_3_2_1_25_1","unstructured":"Edward J. Hu Yelong Shen Phillip Wallis Zeyuan Allen-Zhu Yuanzhi Li Shean Wang Lu Wang and Weizhu Chen. 2021. LoRA: Low-Rank Adaptation of Large Language Models. arXiv:2106.09685 [cs.CL] https:\/\/arxiv.org\/abs\/2106.09685"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1145\/3603165.3607440"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1145\/3603165.3607440"},{"key":"e_1_3_2_1_28_1","unstructured":"Texas Instruments. 2024. IWR6843ISK Evaluation Module. https:\/\/www.ti.com\/tool\/IWR6843ISK Accessed: 2024-10-24."},{"key":"e_1_3_2_1_29_1","unstructured":"Texas Instruments. 2024. mmWave Studio Tool https:\/\/www.ti.com\/tool\/MMWAVE-STUDIO. https:\/\/www.ti.com\/tool\/MMWAVE-STUDIO Accessed: 2024-10-24."},{"key":"e_1_3_2_1_30_1","unstructured":"Texas Instruments. 2024. Radar Academy. https:\/\/dev.ti.com\/tirex\/explore\/node?node=A__AEIJm0rwIeU.2P1OBWwlaA__RADAR-ACADEMY__GwxShWe__LATEST Accessed: 2024-10-24."},{"key":"e_1_3_2_1_31_1","unstructured":"Cesar Iovescu and Sandeep Rao. 2020. The fundamentals of millimeter wave radar sensors. Technical Report. Texas Instruments. https:\/\/www.ti.com\/lit\/spyy005"},{"key":"e_1_3_2_1_32_1","volume-title":"Also Believing: Electromagnetic-emission-based Application Guessing Attacks via Smartphones","author":"Xiaoyu Ji","year":"2021","unstructured":"Xiaoyu Ji et al. 2021. No Seeing is Also Believing: Electromagnetic-emission-based Application Guessing Attacks via Smartphones. IEEE Transactions on Mobile Computing (2021)."},{"key":"e_1_3_2_1_33_1","unstructured":"Jong Wook Kim. [n. d.]. Whisper Model Card. https:\/\/github.com\/openai\/whisper\/blob\/main\/model-card.md"},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1145\/3630106.3658996"},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1145\/2897824.2925953"},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1145\/3485730.3485945"},{"key":"e_1_3_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.1145\/3586183.3606775"},{"key":"e_1_3_2_1_38_1","volume-title":"eMotion MaxThe 60GHz mmWave Radar Presence Sensor (Accessed on 23rd","author":"Pty Ltd LinknLink","year":"2024","unstructured":"LinknLink Pty Ltd. 2024. eMotion MaxThe 60GHz mmWave Radar Presence Sensor (Accessed on 23rd October 2024) url = https:\/\/www.kickstarter.com\/projects\/linknlink\/emotion-max-the-60ghz-mmwave-radar-presence-sensor. Technical Report. Kickstarter.com. https:\/\/www.kickstarter.com\/projects\/linknlink\/emotion-max-the-60ghz-mmwave-radar-presence-sensor?ref=discovery&term=mmwave&total_hits=2&category_id=52"},{"key":"e_1_3_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.18653\/v1\/2020.acl-main.173"},{"key":"e_1_3_2_1_40_1","volume-title":"Gyrophone: Recognizing speech from gyroscope signals. In 23rd {USENIX} Security Symposium ({USENIX} Security 14). 1053-1067.","author":"Michalevsky Yan","year":"2014","unstructured":"Yan Michalevsky, Dan Boneh, and Gabi Nakibly. 2014. Gyrophone: Recognizing speech from gyroscope signals. In 23rd {USENIX} Security Symposium ({USENIX} Security 14). 1053-1067."},{"key":"e_1_3_2_1_41_1","volume-title":"Lamphone: Real-Time Passive Sound Recovery from Light Bulb Vibrations. Cryptology ePrint Archive, Report 2020\/708. https:\/\/eprint.iacr.org\/2020\/708.","author":"Nassi Ben","year":"2020","unstructured":"Ben Nassi, Yaron Pirutin, Adi Shamir, Yuval Elovici, and Boris Zadov. 2020. Lamphone: Real-Time Passive Sound Recovery from Light Bulb Vibrations. Cryptology ePrint Archive, Report 2020\/708. https:\/\/eprint.iacr.org\/2020\/708."},{"key":"e_1_3_2_1_42_1","unstructured":"OpenAI. 2024. Whisper GitHub Discussion #1606. https:\/\/github.com\/openai\/whisper\/discussions\/1606 Accessed: 2024-10-24."},{"key":"e_1_3_2_1_43_1","unstructured":"OpenAI. 2024. Whisper GitHub Discussion #679 https:\/\/github.com\/openai\/whisper\/discussions\/679. https:\/\/github.com\/openai\/whisper\/discussions\/679 Accessed: 2024-10-24."},{"key":"e_1_3_2_1_44_1","doi-asserted-by":"publisher","DOI":"10.1145\/2162081.2162095"},{"key":"e_1_3_2_1_45_1","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2022.3217968"},{"key":"e_1_3_2_1_46_1","doi-asserted-by":"publisher","DOI":"10.1145\/3539490.3539599"},{"key":"e_1_3_2_1_47_1","doi-asserted-by":"publisher","DOI":"10.1109\/TASLP.2023.3250846"},{"key":"e_1_3_2_1_48_1","unstructured":"RadarIQ. 2024. mmWave Radar Solutions. https:\/\/radariq.io\/?srsltid=AfmBOoq2x4VWLA-Sv6dD6yKxOY4pWrwaPDsV5hlvB1C7yV3SNhCJabmH Accessed: 2024-10-24."},{"key":"e_1_3_2_1_49_1","volume-title":"Tao Xu, Greg Brockman, Christine McLeavey, and Ilya Sutskever.","author":"Radford Alec","year":"2022","unstructured":"Alec Radford, Jong Wook Kim, Tao Xu, Greg Brockman, Christine McLeavey, and Ilya Sutskever. 2022. Robust Speech Recognition via Large-Scale Weak Supervision. arXiv:2212.04356 [eess.AS] https:\/\/arxiv.org\/abs\/2212.04356"},{"key":"e_1_3_2_1_50_1","doi-asserted-by":"publisher","unstructured":"Tim Sainburg. 2019. timsainb\/noisereduce: v1.0. doi:10.5281\/zenodo.3243139","DOI":"10.5281\/zenodo.3243139"},{"key":"e_1_3_2_1_51_1","volume-title":"visualizing, and quantifying latent structure across diverse animal vocal repertoires. PLoS computational biology 16, 10","author":"Sainburg Tim","year":"2020","unstructured":"Tim Sainburg, Marvin Thielk, and Timothy Q Gentner. 2020. Finding, visualizing, and quantifying latent structure across diverse animal vocal repertoires. PLoS computational biology 16, 10 (2020), e1008228."},{"key":"e_1_3_2_1_52_1","unstructured":"Jilt Sebastian Husein Zolkepli Hicham Badri and Appu Shaji. 2024. Faster and Smaller Whisper: A Deep Dive into Quantization and Torch Compilation. https:\/\/mobiusml.github.io\/whisper-static-cache-blog\/"},{"key":"e_1_3_2_1_53_1","unstructured":"Matthew Sparkes. [n. d.]. Spies can eavesdrop on phone calls by sensing vibrations with radar - newscientist.com. https:\/\/www.newscientist.com\/article\/2453191-spies-can-eavesdrop-on-phone-calls-by-sensing-vibrations-with-radar\/. [Accessed 16-03-2025]."},{"key":"e_1_3_2_1_54_1","unstructured":"Seeed Studio. 2024. 24GHz mmWave Sensor Human Static Presence Module Lite. https:\/\/www.seeedstudio.com\/24GHz-mmWave-Sensor-Human-Static-Presence-Module-Lite-p-5524.html Accessed: 2024-10-24."},{"key":"e_1_3_2_1_55_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2017.316"},{"key":"e_1_3_2_1_56_1","doi-asserted-by":"publisher","DOI":"10.1145\/3534592"},{"key":"e_1_3_2_1_57_1","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM48880.2022.9796806"},{"key":"e_1_3_2_1_58_1","doi-asserted-by":"publisher","DOI":"10.1145\/3495243.3560543"},{"key":"e_1_3_2_1_59_1","doi-asserted-by":"publisher","DOI":"10.1145\/2789168.2790121"},{"key":"e_1_3_2_1_60_1","doi-asserted-by":"publisher","DOI":"10.1145\/3384419.3430772"},{"key":"e_1_3_2_1_61_1","volume-title":"Speech Commands: A Dataset for Limited-Vocabulary Speech Recognition. ArXiv e-prints (April","author":"Warden P.","year":"2018","unstructured":"P. Warden. 2018. Speech Commands: A Dataset for Limited-Vocabulary Speech Recognition. ArXiv e-prints (April 2018). arXiv:1804.03209 [cs.CL] https:\/\/arxiv.org\/abs\/1804.03209"},{"key":"e_1_3_2_1_62_1","unstructured":"Waveshare. 2024. Human micro-motion detection mmWave Sensor. https:\/\/www.waveshare.com\/hmmd-mmwave-sensor.htm Accessed: 2024-10-24."},{"key":"e_1_3_2_1_63_1","doi-asserted-by":"publisher","DOI":"10.1145\/2789168.2790119"},{"key":"e_1_3_2_1_64_1","doi-asserted-by":"publisher","DOI":"10.1145\/3307334.3326073"},{"key":"e_1_3_2_1_65_1","unstructured":"YouTube. 2022. MMI-100 Using a Spectrogram for Audio Reconstruction https:\/\/www.youtube.com\/watch?v=o6G7eQOT-Fo. https:\/\/www.youtube.com\/watch?v=o6G7eQOT-Fo Accessed: 2024-10-24."},{"key":"e_1_3_2_1_66_1","doi-asserted-by":"publisher","DOI":"10.1145\/3580838"},{"key":"e_1_3_2_1_67_1","doi-asserted-by":"publisher","DOI":"10.1145\/2742647.2742658"},{"key":"e_1_3_2_1_68_1","doi-asserted-by":"publisher","DOI":"10.1145\/3569486"},{"key":"e_1_3_2_1_69_1","doi-asserted-by":"publisher","DOI":"10.1145\/3610873"},{"key":"e_1_3_2_1_70_1","volume-title":"A Comprehensive Survey on Transfer Learning. CoRR abs\/1911.02685","author":"Zhuang Fuzhen","year":"2019","unstructured":"Fuzhen Zhuang, Zhiyuan Qi, Keyu Duan, Dongbo Xi, Yongchun Zhu, Hengshu Zhu, Hui Xiong, and Qing He. 2019. A Comprehensive Survey on Transfer Learning. CoRR abs\/1911.02685 (2019). arXiv:1911.02685 http:\/\/arxiv.org\/abs\/1911.02685"}],"event":{"name":"WiSec 2025: 18th ACM Conference on Security and Privacy in Wireless and Mobile Networks","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control","SIGMOBILE ACM Special Interest Group on Mobility of Systems, Users, Data and Computing"],"location":"Arlington VA USA","acronym":"WiSec 2025"},"container-title":["18th ACM Conference on Security and Privacy in Wireless and Mobile Networks"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3734477.3734708","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,8,22]],"date-time":"2025-08-22T21:46:17Z","timestamp":1755899177000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3734477.3734708"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,6,30]]},"references-count":70,"alternative-id":["10.1145\/3734477.3734708","10.1145\/3734477"],"URL":"https:\/\/doi.org\/10.1145\/3734477.3734708","relation":{},"subject":[],"published":{"date-parts":[[2025,6,30]]},"assertion":[{"value":"2025-06-30","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}