{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,17]],"date-time":"2026-04-17T07:58:08Z","timestamp":1776412688274,"version":"3.51.2"},"reference-count":53,"publisher":"Association for Computing Machinery (ACM)","issue":"1","content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":["Proc. ACM Interact. Mob. Wearable Ubiquitous Technol."],"published-print":{"date-parts":[[2026,3,16]]},"abstract":"<jats:p>Integrating WiFi communication with vital signs sensing, particularly under the emerging 802.11bf standard, offers a promising pathway toward next-generation authentication systems, providing non-intrusive, continuous, and scalable security. However, current WiFi-based respiration authentication approaches are limited to single-user scenarios, whereas existing multi-user respiration monitoring technologies either lack identity awareness or require users to remain completely stationary. In this paper, we present MURAL-Fi, the first system to achieve multi-user respiration authentication using WiFi, addressing three critical requirements: multi-user support, identity-aware capability, and involuntary-motion tolerance. Unlike conventional methods that monitor the movement of the highest-energy point within the respiration frequency band of the WiFi spectrum, MURAL-Fi introduces a novel baseline region variation exploration technique. This technique identifies a spatial region of points corresponding to the chest cavities and extracts respiration signals by analyzing strength variations within these regions. Specifically, we iteratively employ baseline region identification coupled with interference suppression utilizing spatial spectral information derived from WiFi signals. This iterative refinement progressively enhances the precision of chest-cavity localization and robustly mitigates various interferences, enabling identity-aware respiration pattern extraction despite involuntary body movements. Subsequently, we perform multi-level feature analysis to derive user-specific respiratory characteristics and utilize a triplet loss-based Siamese Neural Network to authenticate users. Through extensive experiments with 24 participants across diverse environments, we demonstrate that MURAL-Fi achieves high authentication accuracy, maintaining superior performance across challenging scenarios, including resistance to mimic attacks.<\/jats:p>","DOI":"10.1145\/3790111","type":"journal-article","created":{"date-parts":[[2026,3,16]],"date-time":"2026-03-16T17:51:14Z","timestamp":1773683474000},"page":"1-26","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":1,"title":["MURAL-Fi:\n                    <u>M<\/u>\n                    ulti-\n                    <u>U<\/u>\n                    ser\n                    <u>R<\/u>\n                    espiration\n                    <u>A<\/u>\n                    uthentication\n                    <u>L<\/u>\n                    everaging Wi\n                    <u>Fi<\/u>"],"prefix":"10.1145","volume":"10","author":[{"ORCID":"https:\/\/orcid.org\/0009-0001-5304-4272","authenticated-orcid":false,"given":"Bofan","family":"Li","sequence":"first","affiliation":[{"name":"Computer Science, Florida State University, Tallahassee, Florida, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-5674-4592","authenticated-orcid":false,"given":"Xin","family":"Liu","sequence":"additional","affiliation":[{"name":"Computer Science, Florida State University, Tallahassee, Florida, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-2502-7272","authenticated-orcid":false,"given":"Yichao","family":"Wang","sequence":"additional","affiliation":[{"name":"Computer Science, Florida State University, Tallahassee, Florida, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-4029-6945","authenticated-orcid":false,"given":"Yili","family":"Ren","sequence":"additional","affiliation":[{"name":"Computer Science and Engineering, University of South Florida, Tampa, Florida, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-8754-0311","authenticated-orcid":false,"given":"Weikuan","family":"Yu","sequence":"additional","affiliation":[{"name":"Computer Science, Florida State University, Tallahassee, Florida, USA"}]}],"member":"320","published-online":{"date-parts":[[2026,3,16]]},"reference":[{"key":"e_1_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1145\/2746285.2755969"},{"key":"e_1_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1145\/3594739.3610733"},{"key":"e_1_2_1_3_1","volume-title":"\u201c siamese","author":"Bromley Jane","year":"1993","unstructured":"Jane Bromley, Isabelle Guyon, Yann LeCun, Eduard S\u00e4ckinger, and Roopak Shah. 1993. Signature verification using a\u201c siamese\u201d time delay neural network. Advances in neural information processing systems 6 (1993)."},{"key":"e_1_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2019.2960823"},{"key":"e_1_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/3636534.3698835"},{"key":"e_1_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1145\/3636534.3649350"},{"key":"e_1_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/3287036"},{"key":"e_1_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1109\/TBME.2017.2699422"},{"key":"e_1_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM.2017.8057220"},{"key":"e_1_2_1_10_1","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1145\/3494962","article-title":"ChestLive: Fortifying voice-based authentication with chest motion biometric on smart devices","volume":"5","author":"Chen Yanjiao","year":"2021","unstructured":"Yanjiao Chen, Meng Xue, Jian Zhang, Qianyun Guan, Zhiyuan Wang, Qian Zhang, and Wei Wang. 2021. ChestLive: Fortifying voice-based authentication with chest motion biometric on smart devices. Proceedings of the ACM on Interactive, Mobile, Wearable and Ubiquitous Technologies 5, 4 (2021), 1\u201325.","journal-title":"Proceedings of the ACM on Interactive, Mobile, Wearable and Ubiquitous Technologies"},{"key":"e_1_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1145\/3706599.3719813"},{"key":"e_1_2_1_12_1","volume-title":"The mechanics of inhaled pharmaceutical aerosols: an introduction","author":"Finlay Warren H","unstructured":"Warren H Finlay. 2001. The mechanics of inhaled pharmaceutical aerosols: an introduction. Academic press."},{"key":"e_1_2_1_13_1","volume-title":"A biometric authentication model using hand gesture images. Biomedical engineering online 12","author":"Fong Simon","year":"2013","unstructured":"Simon Fong, Yan Zhuang, Iztok Fister, and Iztok Fister. 2013. A biometric authentication model using hand gesture images. Biomedical engineering online 12 (2013), 1\u201318."},{"key":"e_1_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1145\/1925861.1925870"},{"key":"e_1_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1609\/aaai.v39i1.32004"},{"key":"e_1_2_1_16_1","volume-title":"SIMBAD 2015, Copenhagen, Denmark, October 12\u201314, 2015. Proceedings 3. Springer, 84\u201392","author":"Hoffer Elad","year":"2015","unstructured":"Elad Hoffer and Nir Ailon. 2015. Deep metric learning using triplet network. In Similarity-based pattern recognition: third international workshop, SIMBAD 2015, Copenhagen, Denmark, October 12\u201314, 2015. Proceedings 3. Springer, 84\u201392."},{"key":"e_1_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1145\/3492866.3549718"},{"key":"e_1_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1145\/3570361.3613290"},{"key":"e_1_2_1_19_1","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1145\/3478123","article-title":"BreathTrack: detecting regular breathing phases from unannotated acoustic data captured by a smartphone","volume":"5","author":"Islam Bashima","year":"2021","unstructured":"Bashima Islam, Md Mahbubur Rahman, Tousif Ahmed, Mohsin Yusuf Ahmed, Md Mehedi Hasan, Viswam Nathan, Korosh Vatanparvar, Ebrahim Nemati, Jilong Kuang, and Jun Alex Gao. 2021. BreathTrack: detecting regular breathing phases from unannotated acoustic data captured by a smartphone. Proceedings of the ACM on Interactive, Mobile, Wearable and Ubiquitous Technologies 5, 3 (2021), 1\u201322.","journal-title":"Proceedings of the ACM on Interactive, Mobile, Wearable and Ubiquitous Technologies"},{"key":"e_1_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1109\/TMC.2020.2994955"},{"key":"e_1_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1145\/3466772.3467032"},{"key":"e_1_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1145\/2785956.2787487"},{"key":"e_1_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1145\/3678590"},{"key":"e_1_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1145\/3117811.3117839"},{"key":"e_1_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM41043.2020.9155258"},{"key":"e_1_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1145\/2746285.2746303"},{"key":"e_1_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1145\/3494971"},{"key":"e_1_2_1_28_1","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1145\/3397320","article-title":"Vocallock: Sensing vocal tract for passphrase-independent user authentication leveraging acoustic signals on smartphones","volume":"4","author":"Lu Li","year":"2020","unstructured":"Li Lu, Jiadi Yu, Yingying Chen, and Yan Wang. 2020. Vocallock: Sensing vocal tract for passphrase-independent user authentication leveraging acoustic signals on smartphones. Proceedings of the ACM on Interactive, Mobile, Wearable and Ubiquitous Technologies 4, 2 (2020), 1\u201324.","journal-title":"Proceedings of the ACM on Interactive, Mobile, Wearable and Ubiquitous Technologies"},{"key":"e_1_2_1_29_1","unstructured":"Neulog. [n.d.]. Neulog sensors. https:\/\/neulog.com\/"},{"key":"e_1_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1109\/JPROC.2003.819611"},{"key":"e_1_2_1_31_1","volume-title":"32nd USENIX Security Symposium (USENIX Security 23)","author":"Ren Yili","year":"2023","unstructured":"Yili Ren, Yichao Wang, Sheng Tan, Yingying Chen, and Jie Yang. 2023. Person Re-identification in 3D Space: A {WiFi} Vision-based Approach. In 32nd USENIX Security Symposium (USENIX Security 23). 5217\u20135234."},{"key":"e_1_2_1_32_1","volume-title":"Golmie","author":"Ropitault Tanguy","year":"2023","unstructured":"Tanguy Ropitault, Steve Blandino, Anirudha Sahoo, and Nada T. Golmie. 2023. IEEE 802.11bf: Enabling the Widespread Adoption of Wi-Fi Sensing. (2023-05-31 04:05:00 2023). https:\/\/tsapps.nist.gov\/publication\/get_pdf.cfm?pub_id=935175"},{"key":"e_1_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1109\/TAP.1986.1143830"},{"key":"e_1_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2015.7298682"},{"key":"e_1_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1109\/TPAMI.2007.1010"},{"key":"e_1_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1145\/3210240.3210347"},{"key":"e_1_2_1_37_1","volume-title":"International conference on machine learning. PMLR, 6105\u20136114","author":"Tan Mingxing","year":"2019","unstructured":"Mingxing Tan and Quoc Le. 2019. Efficientnet: Rethinking model scaling for convolutional neural networks. In International conference on machine learning. PMLR, 6105\u20136114."},{"key":"e_1_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICASSP.2011.5947265"},{"key":"e_1_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.1007\/s13538-020-00842-y"},{"key":"e_1_2_1_40_1","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM42981.2021.9488881"},{"key":"e_1_2_1_41_1","doi-asserted-by":"publisher","DOI":"10.1145\/3264950"},{"key":"e_1_2_1_42_1","doi-asserted-by":"publisher","DOI":"10.1109\/TMC.2023.3279976"},{"key":"e_1_2_1_43_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICDCS.2017.206"},{"key":"e_1_2_1_44_1","doi-asserted-by":"publisher","DOI":"10.1109\/SECON55815.2022.9918606"},{"key":"e_1_2_1_45_1","doi-asserted-by":"publisher","DOI":"10.1145\/3548606.3560553"},{"key":"e_1_2_1_46_1","volume-title":"10th USENIX Symposium on Networked Systems Design and Implementation (NSDI 13)","author":"Xiong Jie","year":"2013","unstructured":"Jie Xiong and Kyle Jamieson. 2013. {ArrayTrack}: A {Fine-Grained} indoor location system. In 10th USENIX Symposium on Networked Systems Design and Implementation (NSDI 13). 71\u201384."},{"key":"e_1_2_1_47_1","doi-asserted-by":"publisher","DOI":"10.1145\/3214289"},{"key":"e_1_2_1_48_1","doi-asserted-by":"publisher","DOI":"10.1145\/3411816"},{"key":"e_1_2_1_49_1","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2019.2893330"},{"key":"e_1_2_1_50_1","doi-asserted-by":"publisher","DOI":"10.1145\/3494990"},{"key":"e_1_2_1_51_1","doi-asserted-by":"publisher","DOI":"10.1145\/3560905.3568513"},{"key":"e_1_2_1_52_1","doi-asserted-by":"publisher","DOI":"10.1145\/2973750.2973762"},{"key":"e_1_2_1_53_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICECCE47252.2019.8940725"}],"container-title":["Proceedings of the ACM on Interactive, Mobile, Wearable and Ubiquitous Technologies"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3790111","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,4,16]],"date-time":"2026-04-16T20:00:51Z","timestamp":1776369651000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3790111"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2026,3,16]]},"references-count":53,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2026,3,16]]}},"alternative-id":["10.1145\/3790111"],"URL":"https:\/\/doi.org\/10.1145\/3790111","relation":{},"ISSN":["2474-9567"],"issn-type":[{"value":"2474-9567","type":"electronic"}],"subject":[],"published":{"date-parts":[[2026,3,16]]},"assertion":[{"value":"2026-03-16","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}