A curated list of research works on wireless sensing security
For detailed information, please refer to our survey paper: A Survey of Wireless Sensing Security from a Role-Based View: Victim, Weapon, and Shield
-
20250212: Significantly expanded pre-2019 literature coverage
-
20250115: Updated papers in Mobicom'24, Sensys'24 and CCS'24
This repository provides a comprehensive collection of research exploring the intersection of wireless sensing and security. Works are categorized based on how wireless signals function in security contexts:
🎯 Victims
- Research on attacks targeting wireless sensing systems
⚔️ Weapons
- Studies exploring wireless signals as attack vectors
🛡️ Shields
- Studies leveraging wireless sensing for security applications
| Year | Journal/Conference | Title | Relevance Score |
|---|---|---|---|
| 2024 | NDSS | MadRadar: A Black-Box Physical Layer Attack Framework on mmWave Automotive FMCW Radars | 4 |
| 2024 | TIFS | iBA: Backdoor Attack on 3D Point Cloud via Reconstructing Itself. | 3 |
| 2024 | TMC | SecureSense: Defending Adversarial Attack for Secure Device-Free Human Activity Recognition | 3 |
| 2024 | Security | A First Physical-World Trajectory Prediction Attack via LiDAR-induced Deceptions in Autonomous Driving | 2 |
| 2024 | Security | AE-Morpher: Improve Physical Robustness of Adversarial Objects against LiDAR-based Detectors via Object Reconstruction | 2 |
| 2024 | Security | Adversary is on the Road: Attacks on Visual SLAM using Unnoticeable Adversarial Patch | 2 |
| 2024 | Security | pi-Jack: Physical-World Adversarial Attack on Monocular Depth Estimation with Perspective Hijacking | 2 |
| 2024 | Mobicom | Malicious Attacks against Multi-Sensor Fusion in Autonomous Driving | 2 |
| 2024 | TIFS | Adversarial Examples Against WiFi Fingerprint-Based Localization in the Physical World | 2 |
| 2024 | TIFS | Imperceptible and Robust Backdoor Attack in 3D Point Cloud | 2 |
| 2024 | TIFS | PHY-Layer Authentication Exploiting Channel Sparsity in MmWave MIMO UAV-Ground Systems | 2 |
| 2024 | TIFS | Reconfigurable Intelligent Surface-Assisted Key Generation for Millimeter-Wave Multi-User Systems | 2 |
| 2024 | Infocom | Explanation-Guided Backdoor Attacks on Model-Agnostic RF Fingerprinting | 2 |
| 2024 | NDSS | Invisible Reflections: Leveraging Infrared Laser Reflections to Target Traffic Sign Perception | 1 |
| 2024 | Mobisys | F2Key: Dynamically Converting Your Face into a Private Key Based on COTS Headphones for Reliable Voice Interaction | 1 |
| 2024 | Mobisys | Invisible Optical Adversarial Stripes on Traffic Sign against Autonomous Vehicles | 1 |
| 2024 | TIFS | Reconfigurable Intelligent Surface-Assisted Passive Beamforming Attack | 1 |
| 2024 | TIFS | Stealthy and Effective Physical Adversarial Attacks in Autonomous Driving | 1 |
| 2024 | TDSC | Time to Think the Security of WiFi-Based Behavior Recognition Systems | 1 |
| 2024 | TMC | Interference-Negligible Privacy-Preserved Shield for RF Sensing | 1 |
| 2024 | TMC | PhyFinAtt: An Undetectable Attack Framework Against PHY Layer Fingerprint-Based WiFi Authentication | 1 |
| 2024 | TMC | UAV-Enabled Secure Communications via Collaborative Beamforming With Imperfect Eavesdropper Information | 1 |
| 2023 | S&P | mmSpoof: Resilient Spoofing of Automotive Millimeter-wave Radars using Reflect Array | 4 |
| 2023 | NDSS | MetaWave: Attacking mmWave Sensing with Meta-material-enhanced Tags | 4 |
| 2023 | CCS | TileMask: A Passive-Reflection-based Attack against mmWave Radar Object Detection in Autonomous Driving | 4 |
| 2023 | Security | X-Adv: Physical Adversarial Object Attacks against X-ray Prohibited Item Detection | 3 |
| 2023 | Sensys | RIStealth: Practical and Covert Physical-Layer Attack against WiFi-based Intrusion Detection via Reconfigurable Intelligent Surface | 3 |
| 2023 | Infocom | Secur-Fi: A Secure Wireless Sensing System Based on Commercial Wi-Fi Devices | 3 |
| 2023 | Infocom | Universal Targeted Adversarial Attacks Against mmWave-based Human Activity Recognition | 3 |
| 2023 | S&P | PLA-LiDAR: Physical Laser Attacks against LiDAR-based 3D Object Detection in Autonomous Vehicle | 2 |
| 2023 | Security | Exorcising "Wraith": Protecting LiDAR-based Object Detector in Automated Driving System from Appearing Attacks | 2 |
| 2023 | Security | You Can't See Me: Physical Removal Attacks on LiDAR-based Autonomous Vehicles Driving Frameworks | 2 |
| 2023 | Mobicom | UniScatter: a Metamaterial Backscatter Tag for Wideband Joint Communication and Radar Sensing | 2 |
| 2023 | TIFS | Exploiting Fine-Grained Channel/Hardware Features for PHY-Layer Authentication in MmWave MIMO Systems | 2 |
| 2023 | TIFS | Robust Multi-Beam Secure mmWave Wireless Communication for Hybrid Wiretapping Systems | 2 |
| 2023 | TIFS | The Art of Defense: Letting Networks Fool the Attacker | 2 |
| 2023 | S&P | Breaking Security-Critical Voice Authentication | 1 |
| 2023 | TIFS | A Defensive Strategy Against Beam Training Attack in 5G mmWave Networks for Manufacturing | 1 |
| 2023 | TMC | Pilot Spoofing Attack Detection and Localization With Mobile Eavesdropper | 1 |
| 2023 | Infocom | Oblivion: Poisoning Federated Learning by Inducing Catastrophic Forgetting | 1 |
| 2022 | Mobisys | Universal targeted attacks against mmWave-based human activity recognition system | 4 |
| 2022 | Sigcomm | RF-protect: privacy against device-free human tracking | 4 |
| 2022 | Ubicomp | WiAdv: Practical and Robust Adversarial Attack against WiFi-based Gesture Recognition System | 4 |
| 2022 | Security | Security Analysis of Camera-LiDAR Fusion Against Black-Box Attacks on Autonomous Vehicles | 3 |
| 2022 | TDSC | IS-WARS: Intelligent and Stealthy Adversarial Attack to Wi-Fi-Based Human Activity Recognition Systems | 3 |
| 2022 | Infocom | Physical-World Attack towards WiFi-based Behavior Recognition | 3 |
| 2022 | Mobicom | Protego: securing wireless communication via programmable metasurface | 2 |
| 2022 | Mobisys | Defending wi-fi network discovery from time correlation tracking | 2 |
| 2022 | Sensys | Towards Backdoor Attacks against LiDAR Object Detection in Autonomous Driving | 2 |
| 2022 | TIFS | A Practical Deceptive Jamming Method Based on Vulnerable Location Awareness Adversarial Attack for Radar HRRP Target Recognition | 2 |
| 2022 | CCS | Physical Hijacking Attacks against Object Trackers | 2 |
| 2022 | Security | DoubleStar: Long-Range Attack Towards Depth Estimation based Obstacle Avoidance in Autonomous Systems | 1 |
| 2022 | Security | Ghost Peak: Practical Distance Reduction Attacks Against HRP UWB Ranging | 1 |
| 2022 | Security | Who Are You (I Really Wanna Know)? Detecting Audio {DeepFakes} Through Vocal Tract Reconstruction | 1 |
| 2022 | NDSS | Fooling the Eyes of Autonomous Vehicles: Robust Physical Adversarial Examples Against Traffic Sign Recognition Systems | 1 |
| 2022 | Mobicom | Audio-domain position-independent backdoor attack via unnoticeable triggers | 1 |
| 2022 | Sensys | KITE: Exploring the Practical Threat from Acoustic Transduction Attacks on Inertial Sensors | 1 |
| 2022 | TIFS | Beyond the Pixel World: A Novel Acoustic-Based Face Anti-Spoofing System for Smartphones | 1 |
| 2022 | TIFS | Fine-Grained Question-Level Deception Detection via Graph-Based Learning and Cross-Modal Fusion | 1 |
| 2022 | TIFS | Robust Secure Beamforming for Intelligent Reflecting Surface Assisted Full-Duplex MISO Systems | 1 |
| 2022 | TIFS | Secure Millimeter-Wave Ad Hoc Communications Using Physical Layer Security | 1 |
| 2022 | Infocom | Backdoor Defense with Machine Unlearning | 1 |
| 2022 | Infocom | Fast and Secure Key Generation with Channel Obfuscation in Slowly Varying Environments | 1 |
| 2022 | CCS | FenceSitter: Black-box, Content-Agnostic, and Synchronization-Free Enrollment-Phase Attacks on Speaker Recognition Systems | 1 |
| 2022 | CCS | SSLGuard: A Watermarking Scheme for Self-supervised Learning Pre-trained Encoders | 1 |
| 2021 | TIFS | Who Is in Control? Practical Physical Layer Attack and Defense for mmWave-Based Sensing in Autonomous Vehicles | 4 |
| 2021 | S&P | Who is Real Bob? Adversarial Attacks on Speaker Recognition Systems | 1 |
| 2021 | Security | Fragment and Forge: Breaking {Wi-Fi} Through Frame Aggregation and Fragmentation | 1 |
| 2021 | Security | Too Good to Be Safe: Tricking Lane Detection in Autonomous Driving with Crafted Perturbations | 1 |
| 2021 | NDSS | EarArray: Defending against DolphinAttack via Acoustic AttenuationEarArray: Defending against DolphinAttack via Acoustic Attenuation | 1 |
| 2021 | Sensys | Adversarial Attacks against LiDAR Semantic Segmentation in Autonomous Driving | 1 |
| 2021 | CCS | Can We Use Arbitrary Objects to Attack LiDAR Perception in Autonomous Driving? | 1 |
| 2021 | CCS | CapSpeaker: Injecting Voices to Microphones via Capacitors | 1 |
| 2021 | Infocom | Jamming of LoRa PHY and Countermeasure | 1 |
| 2020 | USENIX Security | {Devil¡¯s} Whisper: A General Approach for Physical Adversarial Attacks against Commercial Black-box Speech Recognition Devices | 2 |
| 2020 | NDSS | Metamorph: Injecting Inaudible Commands into Over-the-air Voice Controlled Systems | 1 |
| 2020 | USENIX Security | Towards Robust LiDAR-based Perception in Autonomous Driving: General Black-box Adversarial Sensor Attack and Countermeasures | 1 |
| 2019 | NDSS | Adversarial Attacks Against Automatic Speech Recognition Systems via Psychoacoustic Hiding | 1 |
| 2019 | CCS | Adversarial Sensor Attack on LiDAR-based Perception in Autonomous Driving | 1 |
| 2015 | Mobicom | Acoustic Eavesdropping through Wireless Vibrometry | 4 |
| 2015 | Mobicom | Keystroke Recognition Using WiFi Signals | 3 |
| 2015 | Mobisys | Tracking Keystrokes Using Wireless Signals | 2 |
| 2015 | CCS | PyCRA: Physical Challenge-Response Authentication For Active Sensors Under Spoofing Attacks | 2 |
| 2015 | Infocom | SpecGuard: Spectrum misuse detection in dynamic spectrum access systems | 2 |
| 2015 | CCS | Walls Have Ears! Opportunistically Communicating Secret Messages Over the Wiretap Channel: from Theory to Practice | 2 |
| 2009 | Mobisys | Attacks on public WLAN-based positioning systems | 3 |
| 2007 | TGRS | Vibration and Rotation in Millimeter-Wave SAR | 4 |
Papers exploring how wireless signals can be weaponized for attacks.
| Year | Journal/Conference | Title | Relevance Score |
|---|---|---|---|
| 2024 | Mobicom | Practical Adversarial Attack on WiFi Sensing Through Unnoticeable Communication Packet Perturbation | 3 |
| 2024 | TMC | Towards Unconstrained Vocabulary Eavesdropping With mmWave Radar Using GAN | 3 |
| 2024 | Infocom | mmEar: Push the Limit of COTS mmWave Eavesdropping on Headphones | 3 |
| 2024 | Security | AE-Morpher: Improve Physical Robustness of Adversarial Objects against LiDAR-based Detectors via Object Reconstruction | 2 |
| 2024 | Mobicom | Beamforming made Malicious: Manipulating Wi-Fi Traffic via Beamforming Feedback Forgery | 2 |
| 2024 | TDSC | Air-Gap Electromagnetic Covert Channel | 2 |
| 2024 | TDSC | Practical EMI Attacks on Smartphones With Users¡¯ Commands Cancelled | 2 |
| 2024 | TDSC | Privacy Leakage in Wireless Charging | 2 |
| 2024 | TMC | Echoes of Fingertip: Unveiling POS Terminal Passwords Through Wi-Fi Beamforming Feedback | 2 |
| 2024 | TMC | Exploring Practical Acoustic Transduction Attacks on Inertial Sensors in MDOF Systems | 2 |
| 2024 | TMC | MagView++: Data Exfiltration via CPU Magnetic Signals Under Video Decoding | 2 |
| 2024 | TMC | MuKI-Fi: Multi-Person Keystroke Inference With BFI-Enabled Wi-Fi Sensing | 2 |
| 2024 | TMC | WiFiLeaks: Exposing Stationary Human Presence Through a Wall With Commodity Mobile Devices | 2 |
| 2024 | Infocom | Silent Thief: Password Eavesdropping Leveraging Wi-Fi Beamforming Feedback from POS Terminal | 2 |
| 2024 | Security | Devil in the Room: Triggering Audio Backdoors in the Physical World | 1 |
| 2024 | Security | Eye of Sauron: Long-Range Hidden Spy Camera Detection and Positioning with Inbuilt Memory EM Radiation | 1 |
| 2024 | Security | LaserAdv: Laser Adversarial Attacks on Speech Recognition Systems | 1 |
| 2024 | Security | VibSpeech: Exploring Practical Wideband Eavesdropping via Bandlimited Signal of Vibration-based Side Channel | 1 |
| 2024 | NDSS | Acoustic Keystroke Leakage on Smart Televisions | 1 |
| 2024 | NDSS | CamPro: Camera-based Anti-Facial Recognition | 1 |
| 2024 | NDSS | EM Eye: Characterizing Electromagnetic Side-channel Eavesdropping on Embedded Cameras | 1 |
| 2024 | NDSS | GhostType: The Limits of Using Contactless Electromagnetic Interference to Inject Phantom Keys into Analog Circuits of Keyboards | 1 |
| 2024 | NDSS | LiDAR Spoofing Meets the New-Gen: Capability Improvements, Broken Assumptions, and New Attack Strategies | 1 |
| 2024 | NDSS | PrintListener: Uncovering the Vulnerability of Fingerprint Authentication via the Finger Friction Sound | 1 |
| 2024 | Mobicom | EVLeSen: In-Vehicle Sensing with EV-Leaked Signal | 1 |
| 2024 | Mobicom | Inaudible Backdoor Attack via Stealthy Frequency Trigger Injection in Audio Spectrogram | 1 |
| 2024 | Mobisys | Your Mic Leaks Too Much: A Double-Edged Sword for Security | 1 |
| 2024 | TDSC | Analyzing and Defending GhostTouch Attack Against Capacitive Touchscreens | 1 |
| 2024 | TDSC | UniAP: Protecting Speech Privacy With Non-Targeted Universal Adversarial Perturbations | 1 |
| 2024 | TDSC | Watch Out Your Thumb Drive: Covert Data Theft From Portable Data Storage via Backscatter | 1 |
| 2024 | Infocom | EchoLight: Sound Eavesdropping based on Ambient Light Reflection | 1 |
| 2024 | Ubicomp | PPG-Hear: A Practical Eavesdropping Attack with Photoplethysmography Sensors | 1 |
| 2024 | Ubicomp | PuppetMouse: Practical and Contactless Mouse Manipulation Attack via Intentional Electromagnetic Interference Injection | 1 |
| 2024 | Infocom | RF-Parrot: Wireless Eavesdropping on Wired Audio | 1 |
| 2024 | Infocom | Two-Way Aerial Secure Communications via Distributed Collaborative Beamforming under Eavesdropper Collusion | 1 |
| 2023 | S&P | mmEcho: A mmWave-based Acoustic Eavesdropping Method | 3 |
| 2023 | TMC | Keystroke Recognition With the Tapping Sound Recorded by Mobile Phone Microphones | 3 |
| 2023 | TMC | Measuring Micrometer-Level Vibrations With mmWave Radar | 3 |
| 2023 | CCS | Privacy Leakage via Speech-induced Vibrations on Room Objects through Remote Sensing based on Phased-MIMO | 3 |
| 2023 | Infocom | mmEavesdropper: Signal Augmentation-based Directional Eavesdropping with mmWave Radar | 3 |
| 2023 | Infocom | mmMIC: Multi-modal Speech Recognition based on mmWave Radar | 3 |
| 2023 | NDSS | Paralyzing Drones via EMI Signal Injection on Sensory Communication Channels | 2 |
| 2023 | TMC | No Seeing is Also Believing: Electromagnetic-Emission-Based Application Guessing Attacks via Smartphones | 2 |
| 2023 | TMC | No Seeing is Also Believing: Electromagnetic-Emission-Based Application Guessing Attacks via Smartphones | 2 |
| 2023 | CCS | FaceReader: Unobtrusively Mining Vital Signs and Vital Sign Embedded Sensitive Info via AR/VR Motion Sensors | 2 |
| 2023 | Ubicomp | IoTBeholder: A Privacy Snooping Attack on User Habitual Behaviors from Smart Home Wi-Fi Traffic | 2 |
| 2023 | Ubicomp | RF-Mic: Live Voice Eavesdropping via Capturing Subtle Facial Speech Dynamics Leveraging RFID | 2 |
| 2023 | S&P | Private Eye: On the Limits of Textual Screen Peeking via Eyeglass Reflections in Video Conferencing | 1 |
| 2023 | S&P | Side Eye: Characterizing the Limits of POV Acoustic Eavesdropping from Smartphone Cameras with Rolling Shutters and Movable Lenses | 1 |
| 2023 | NDSS | Brokenwire: Wireless Disruption of CCS Electric Vehicle Charging | 1 |
| 2023 | Mobicom | Exploiting Contactless Side Channels in Wireless Charging Power Banks for User Privacy Inference via Few-shot Learning | 1 |
| 2023 | Mobicom | MagTracer: Detecting GPU Cryptojacking Attacks via Magnetic Leakage Signals | 1 |
| 2023 | Mobicom | Screen Perturbation: Adversarial Attack and Defense on Under-Screen Camera | 1 |
| 2023 | Mobisys | BystandAR: Protecting Bystander Visual Data in Augmented Reality Systems | 1 |
| 2023 | Mobisys | EchoAttack: Practical Inaudible Attacks To Smart Earbuds | 1 |
| 2023 | TMC | Borrowing Arrows With Thatched Boats: Exploiting the Reactive Primary Communications for Boosting Jamming-Assisted Proactive Eavesdropping | 1 |
| 2023 | Infocom | Expelliarmus: Command Cancellation Attacks on Smartphones using Electromagnetic Interference | 1 |
| 2023 | Infocom | MagFingerprint: A Magnetic Based Device Fingerprinting in Wireless Charging | 1 |
| 2023 | Ubicomp | Privacy against Real-Time Speech Emotion Detection via Acoustic Adversarial Evasion of Machine Learning | 1 |
| 2023 | CCS | Recovering Fingerprints from In-Display Fingerprint Sensors via Electromagnetic Side Channel | 1 |
| 2023 | Ubicomp | VoiceListener: A Training-free and Universal Eavesdropping Attack on Built-in Speakers of Mobile Devices | 1 |
| 2022 | S&P | mmSpy: Spying Phone Calls using mmWave Radars | 4 |
| 2022 | NDSS | SpiralSpy: Exploring a Stealthy and Practical Covert Channel to Attack Air-gapped Computing Devices via mmWave Sensing | 4 |
| 2022 | Mobicom | mmEve: eavesdropping on smartphone's earpiece via COTS mmWave device | 4 |
| 2022 | Infocom | MILLIEAR: Millimeter-wave Acoustic Eavesdropping with Unconstrained Vocabulary | 4 |
| 2022 | Mobisys | Speech privacy attack via vibrations from room objects leveraging a phased-MIMO radar | 3 |
| 2022 | Ubicomp | AmbiEar: mmWave Based Voice Recognition in NLoS Scenarios | 3 |
| 2022 | Ubicomp | Wavesdropper: Through-wall Word Detection of Human Speech via Commercial mmWave Devices | 3 |
| 2022 | Infocom | mmPhone: Acoustic Eavesdropping on Loudspeakers via mmWave-characterized Piezoelectric Effect | 3 |
| 2022 | S&P | Graphics Peeping Unit: Exploiting EM Side-Channel Information of GPUs to Eavesdrop on Your Neighbors | 2 |
| 2022 | S&P | IRShield: A Countermeasure Against Adversarial Physical-Layer Wireless Sensing | 2 |
| 2022 | Mobicom | Non-cooperative wi-fi localization & its privacy implications | 2 |
| 2022 | Mobisys | MagEar: eavesdropping via audio recovery using magnetic side channel | 2 |
| 2022 | TIFS | Secure Active and Passive Beamforming in IRS-Aided MIMO Systems | 2 |
| 2022 | TMC | Securing IoT Devices by Exploiting Backscatter Propagation Signatures | 2 |
| 2022 | CCS | TickTock: Detecting Microphone Status in Laptops Leveraging Electromagnetic Leakage of Clock Signals | 2 |
| 2022 | S&P | Attacks on Wireless Coexistence: Exploiting Cross-Technology Performance Features for Inter-Chip Privilege Escalation | 1 |
| 2022 | S&P | Invisible Finger: Practical Electromagnetic Interference Attack on Touchscreen-based Electronic Devices | 1 |
| 2022 | Security | Can one hear the shape of a neural network?: Snooping the GPU via Magnetic Side Channel | 1 |
| 2022 | Security | Lamphone: Passive Sound Recovery from a Desk Lamp's Light Bulb Vibrations | 1 |
| 2022 | Security | Lend Me Your Ear: Passive Remote Physical Side Channels on PCs | 1 |
| 2022 | Sensys | Light Auditor: Power Measurement Can Tell Private Data Leakage through IoT Covert Channels | 1 |
| 2022 | Sensys | Push the Limit of Adversarial Example Attack on Speaker Recognition in Physical Domain | 1 |
| 2022 | TIFS | Invisible Geolocation Signature Extraction From a Single Image | 1 |
| 2022 | TIFS | Multi-User Beam Training and Transmission Design for Covert Millimeter-Wave Communication | 1 |
| 2022 | TIFS | Secure Multiantenna Transmission With an Unknown Eavesdropper: Power Allocation and Secrecy Outage Analysis | 1 |
| 2022 | TMC | Preventing Sensitive Information Leakage From Mobile Sensor Signals via Integrative Transformation | 1 |
| 2022 | TMC | Secure Voice Input on Augmented Reality Headsets | 1 |
| 2022 | CCS | HeatDeCam: Detecting Hidden Spy Cameras via Thermal Emissions | 1 |
| 2021 | TMC | An Indirect Eavesdropping Attack of Keystrokes on Touch Screen through Acoustic Sensing | 3 |
| 2021 | TMC | Stealing Your Android Patterns via Acoustic Signals | 3 |
| 2021 | S&P | Poltergeist: Acoustic Adversarial Machine Learning against Cameras and Computer Vision | 2 |
| 2021 | S&P | When LoRa Meets EMR: Electromagnetic Covert Channels Can Be Super Resilient | 2 |
| 2021 | NDSS | Screen Gleaning: A Screen Reading TEMPEST Attack on Mobile Devices Exploiting an Electromagnetic Side Channel | 2 |
| 2021 | Ubicomp | My(o) Armband Leaks Passwords: An EMG and IMU Based Keylogging Side-Channel Attack | 2 |
| 2021 | CCS | Periscope: A Keystroke Inference Attack Using Human Coupled Electromagnetic Emanations | 2 |
| 2021 | CCS | Wireless Charging Power Side-Channel Attacks | 2 |
| 2021 | Ubicomp | Thru-the-wall Eavesdropping on Loudspeakers via RFID by Capturing Sub-mm Level Vibration | 1 |
| 2020 | S&P | C3APSULe: Cross-FPGA Covert-Channel Attacks through Power Supply Unit Leakage | 2 |
| 2020 | S&P | Detection of Electromagnetic Interference Attacks on Sensor Systems | 2 |
| 2020 | S&P | WaveSpy: Remote and Through-wall Screen Attack via mmWave Sensing | 2 |
| 2020 | NDSS | Et Tu Alexa? When Commodity WiFi Devices Turn into Adversarial Motion Sensors | 2 |
| 2020 | NDSS | SurfingAttack: Interactive Hidden Attack on Voice Assistants Using Ultrasonic Guided Waves | 2 |
| 2020 | Mobicom | Bleep: motor-enabled audio side-channel for constrained UAVs | 2 |
| 2020 | Mobisys | MagHacker: eavesdropping on stylus pen writing via magnetic sensing from commodity mobile devices | 2 |
| 2020 | TIFS | Electromagnetic Side Channel Information Leakage Created by Execution of Series of Instructions in a Computer Processor | 2 |
| 2020 | TMC | aLeak: Context-Free Side-Channel from Your Smart Watch Leaks Your Typing Privacy | 2 |
| 2019 | S&P | Hard Drive of Hearing: Disks that Eavesdrop with a Synthesized Microphone | 2 |
| 2019 | S&P | Synesthesia: Detecting Screen Content via Remote Acoustic Side Channels | 2 |
| 2019 | S&P | Tap 'n Ghost: A Compilation of Novel Attack Techniques against Smartphone Touchscreens | 2 |
| 2019 | NDSS | RFDIDS: Radio Frequency-based Distributed Intrusion Detection System for the Power Grid | 2 |
| 2019 | USENIX Security | CSI NN: Reverse Engineering of Neural Network Architectures Through Electromagnetic Side Channel | 2 |
| 2019 | USENIX Security | Losing the Car Keys: Wireless PHY-Layer Insecurity in EV Charging | 2 |
| 2019 | USENIX Security | Wireless Attacks on Aircraft Instrument Landing Systems | 2 |
| 2019 | CCS | Latent Backdoor Attacks on Deep Neural Networks | 1 |
| 2019 | CCS | Seeing isn't Believing: Towards More Robust Adversarial Attack Against Real World Object Detectors | 1 |
| 2018 | S&P | Blue Note: How Intentional Acoustic Interference Damages Availability and Integrity in Hard Disk Drives and Operating Systems | 3 |
| 2018 | USENIX Security | Injected and Delivered: Fabricating Implicit Control over Actuation Systems by Spoofing Inertial Sensors | 3 |
| 2018 | CCS | PatternListener: Cracking Android Pattern Lock Using Acoustic Signals | 3 |
| 2018 | S&P | FPGA-Based Remote Power Side-Channel Attacks | 2 |
| 2018 | Mobisys | Shadow Wi-Fi: Teaching Smartphones to Transmit Raw Signals and to Extract Channel State Information to Implement Practical Covert Channels over Wi-Fi | 2 |
| 2018 | Infocom | Secret-Focus: A Practical Physical-Layer Secret Communication System by Perturbing Focused Phases in Distributed Beamforming | 2 |
| 2018 | CCS | Screaming Channels: When Electromagnetic Side Channels Meet Radio Transceivers | 1 |
| 2017 | NDSS | Broken Hearted: How To Attack ECG Biometrics | 2 |
| 2017 | CCS | DolphinAttack: Inaudible Voice Commands | 2 |
| 2017 | Mobicom | NICScatter: Backscatter as a Covert Channel in Mobile Devices | 1 |
| 2016 | CCS | Leave Your Phone at the Door: Side Channels that Reveal Factory Floor Secrets | 3 |
| 2016 | CCS | My Smartphone Knows What You Print: Exploring Smartphone-based Side-channel Attacks Against 3D Printers | 3 |
| 2016 | Mobisys | Listening through a Vibration Motor | 2 |
| 2016 | CCS | The Sounds of the Phones: Dangers of Zero-Effort Second Factor Login based on Ambient Audio | 2 |
| 2016 | CCS | When CSI Meets Public WiFi: Inferring Your Mobile Phone Password via WiFi Signals | 2 |
| 2015 | USENIX Security | Rocking Drones with Intentional Sound Noise on Gyroscopic Sensors | 4 |
| 2015 | Mobicom | Snooping Keystrokes with mm-level Audio Ranging on a Single Phone | 3 |
| 2015 | USENIX Security | GSMem: Data Exfiltration from Air-Gapped Computers over GSM Frequencies | 2 |
| 2015 | CCS | When Good Becomes Evil: Keystroke Inference with Smartwatch | 1 |
| 2013 | USENIX Security | Dismantling Megamos Crypto: Wirelessly Lockpicking a Vehicle Immobilizer | 3 |
| 2013 | S&P | Ghost Talk: Mitigating EMI Signal Injection Attacks against Analog Sensors | 2 |
| 2011 | NDSS | Relay Attacks on Passive Keyless Entry and Start Systems in Modern Cars | 3 |
| 2011 | CCS | (sp)iPhone: decoding vibrations from nearby keyboards using mobile phone accelerometers | 3 |
| 2011 | CCS | Televisions, video privacy, and powerline electromagnetic interference | 3 |
| 2011 | CCS | iSpy: automatic reconstruction of typed input from compromising reflections | 3 |
| 2010 | USENIX Security | Acoustic Side-Channel Attacks on Printers | 3 |
| 2010 | CCS | On pairing constrained wireless devices based on secrecy of auxiliary channels: the case of acoustic eavesdropping | 3 |
| 2009 | USENIX Security | Compromising Electromagnetic Emanations of Wired and Wireless Keyboards | 3 |
| 2008 | S&P | Pacemakers and Implantable Cardiac Defibrillators: Software Radio Attacks and Zero-Power Defenses | 2 |
| 2005 | CCS | Keyboard acoustic emanations revisited | 2 |
| 2004 | S&P | Keyboard acoustic emanations | 2 |
Papers on using wireless signals for security applications.
| Year | Journal/Conference | Title | Relevance Score |
|---|---|---|---|
| 2024 | S&P | Guessing on Dominant Paths: Understanding the Limitation of Wireless Authentication Using Channel State Information | 2 |
| 2024 | Security | Lumos: Identifying and Localizing Diverse Hidden IoT Devices in an Unfamiliar Environment | 2 |
| 2024 | TIFS | CSI-RFF: Leveraging Micro-Signals on CSI for RF Fingerprinting of Commodity WiFi | 2 |
| 2024 | TIFS | DCS-Gait: A Class-Level Domain Adaptation Approach for Cross-Scene and Cross-State Gait Recognition Using Wi-Fi CSI | 2 |
| 2024 | TIFS | Dr. Defender: Proactive Detection of Autopilot Drones Based on CSI. | 2 |
| 2024 | TDSC | BIOWISH: Biometric Recognition Using Wearable Inertial Sensors Detecting Heart Activity | 2 |
| 2024 | TMC | CovertEye: Gait-Based Human Identification Under Weakly Constrained Trajectory | 2 |
| 2024 | TMC | MAUTH: Continuous User Authentication Based on Subtle Intrinsic Muscular Tremors | 2 |
| 2024 | TMC | MagSign: Harnessing Dynamic Magnetism for User Authentication on IoT Devices | 2 |
| 2024 | TMC | Sensing Human Gait for Environment-Independent User Authentication Using Commodity RFID Devices | 2 |
| 2024 | TMC | Touchscreens Can Reveal User Identity: Capacitive Plethysmogram-Based Biometrics | 2 |
| 2024 | TMC | Towards Receiver-Agnostic and Collaborative Radio Frequency Fingerprint Identification | 2 |
| 2024 | TMC | Turning Noises to Fingerprint-Free ¡°Credentials¡±: Secure and Usable Drone Authentication | 2 |
| 2024 | TMC | Two-Factor Authentication for Keyless Entry System via Finger-Induced Vibrations | 2 |
| 2024 | TMC | Unsupervised Sensor-Based Continuous Authentication With Low-Rank Transformer Using Learning-to-Rank Algorithms | 2 |
| 2024 | TMC | ZITA: Zero-Interaction Two-Factor Authentication Using Contact Traces and In-Band Proximity Verification | 2 |
| 2024 | Infocom | AGR: Acoustic Gait Recognition Using Interpretable Micro-Range Profile | 2 |
| 2024 | Mobisys | Face Recognition In Harsh Conditions: An Acoustic Based Approach | 1 |
| 2024 | TIFS | Dual-Adversarial Representation Disentanglement for Visible Infrared Person Re-Identification | 1 |
| 2024 | TIFS | RFTrack: Stealthy Location Inference and Tracking Attack on Wi-Fi Devices | 1 |
| 2024 | TDSC | CyberSpec: Behavioral Fingerprinting for Intelligent Attacks Detection on Crowdsensing Spectrum Sensors | 1 |
| 2024 | TDSC | MotoPrint: Reconfigurable Vibration Motor Fingerprint via Homologous Signals Learning | 1 |
| 2024 | TDSC | User Authentication on Earable Devices via Bone-Conducted Occlusion Sounds | 1 |
| 2024 | Ubicomp | RDGait: A mmWave Based Gait User Recognition System for Complex Indoor Environments Using Single-chip Radar | 1 |
| 2023 | TIFS | Radar2: Passive Spy Radar Detection and Localization Using COTS mmWave Radar | 4 |
| 2023 | Security | Person Re-identification in 3D Space: A WiFi Vision-based Approach | 3 |
| 2023 | S&P | Guessing on Dominant Paths: Understanding the Limitation of Wireless Authentication Using Channel State Information | 2 |
| 2023 | S&P | ImU: Physical Impersonating Attack for Face Recognition System with Natural Style Changes | 2 |
| 2023 | S&P | Low-effort VR Headset User Authentication Using Head-reverberated Sounds with Replay Resistance | 2 |
| 2023 | NDSS | SoundLock: A Novel User Authentication Scheme for VR Devices Using Auditory-Pupillary Response | 2 |
| 2023 | Sensys | Jawthenticate: Microphone-free Speech-based Authentication using Jaw Motion and Facial Vibrations | 2 |
| 2023 | TDSC | PressPIN: Enabling Secure PIN Authentication on Mobile Devices via Structure-Borne Sounds | 2 |
| 2023 | TMC | H2K: A Heartbeat-Based Key Generation Framework for ECG and PPG Signals | 2 |
| 2023 | TMC | RF-Badge: Vital Sign-Based Authentication via RFID Tag Array on Badges | 2 |
| 2023 | TMC | Sweep-to-Unlock: Fingerprinting Smartphones Based on Loudspeaker Roll-Off Characteristics | 2 |
| 2023 | TMC | VocalPrint: A mmWave-Based Unmediated Vocal Sensing System for Secure Authentication | 2 |
| 2023 | Ubicomp | NF-Heart: A Near-field Non-contact Continuous User Authentication System via Ballistocardiogram | 2 |
| 2023 | Infocom | Nowhere to Hide: Detecting Live Video Forgery via Vision-WiFi Silhouette Correspondence | 2 |
| 2023 | Mobisys | BioCase: Privacy Protection via Acoustic Sensing of Finger Touches on Smartphone Case Mini-Structures | 1 |
| 2023 | TIFS | Occlusion-Aware Human Mesh Model-Based Gait Recognition | 1 |
| 2023 | TIFS | Self-Supervised Modality-Aware Multiple Granularity Pre-Training for RGB-Infrared Person Re-Identification | 1 |
| 2023 | TMC | Secure User Verification and Continuous Authentication via Earphone IMU | 1 |
| 2023 | Infocom | BreathSign: Transparent and Continuous In-ear Authentication Using Bone-conducted Breathing Biometrics | 1 |
| 2023 | Ubicomp | Fingerprinting IoT Devices Using Latent Physical Side-Channels | 1 |
| 2023 | Infocom | SkyNet: Multi-Drone Cooperation for Real-Time Person Identification and Localization | 1 |
| 2022 | TIFS | Person Re-Identification Through Wi-Fi Extracted Radio Biometric Signatures | 3 |
| 2022 | Ubicomp | RFCam: Uncertainty-aware Fusion of Camera and Wi-Fi for Real-time Human Identification with Mobile Devices | 3 |
| 2022 | Sensys | Accuth: Anti-Spoofing Voice Authentication via Accelerometer | 2 |
| 2022 | TDSC | Toward Robust Detection of Puppet Attacks via Characterizing Fingertip-Touch Behaviors | 2 |
| 2022 | TMC | Attention-Based Gait Recognition and Walking Direction Estimation in Wi-Fi Networks | 2 |
| 2022 | TMC | Enabling Finger-Touch-Based Mobile User Authentication via Physical Vibrations on IoT Devices | 2 |
| 2022 | TMC | Health-Radio: Towards Contactless Myocardial Infarction Detection Using Radio Signals | 2 |
| 2022 | TMC | Radio Frequency Fingerprinting on the Edge | 2 |
| 2022 | TMC | Robust Human Face Authentication Leveraging Acoustic Sensing on Smartphones | 2 |
| 2022 | TMC | Scanning the Voice of Your Fingerprint With Everyday Surfaces | 2 |
| 2022 | TMC | Wi-PIGR: Path Independent Gait Recognition With Commodity Wi-Fi | 2 |
| 2022 | TMC | WiFace: Facial Expression Recognition Using Wi-Fi Signals | 2 |
| 2022 | TMC | WiHF: Gesture and User Recognition With WiFi | 2 |
| 2022 | CCS | EchoHand: High Accuracy and Presentation Attack Resistant Hand Authentication on Commodity Mobile Devices | 2 |
| 2022 | Infocom | Push the Limit of WiFi-based User Authentication towards Undefined Gestures | 2 |
| 2022 | Mobisys | Your tapstroke tells who you are: authenticating smartphone users with tapstroke-driven vibrations | 1 |
| 2022 | TIFS | BCAuth: Physical Layer Enhanced Authentication and Attack Tracing for Backscatter Communications | 1 |
| 2022 | TMC | Multi-Agent Coordinated Close-in Jamming for Disabling a Rogue Drone | 1 |
| 2022 | TMC | Simultaneous Energy Harvesting and Gait Recognition Using Piezoelectric Energy Harvester | 1 |
| 2022 | Ubicomp | AEROKEY: Using Ambient Electromagnetic Radiation for Secure and Usable Wireless Device Authentication | 1 |
| 2022 | CCS | Poster: A WiFi Vision-based Approach to Person Re-identification | 1 |
| 2021 | TMC | Continuous Authentication Through Finger Gesture Interaction for Smart Homes Using WiFi | 4 |
| 2021 | TIFS | A Generalizable Model-and-Data Driven Approach for Open-Set RFF Authentication | 3 |
| 2021 | TIFS | Radio Frequency Fingerprint Identification for Narrowband Systems, Modelling and Classification | 3 |
| 2021 | Security | I Always Feel Like Somebody's Sensing Me! A Framework to Detect, Identify, and Localize Clandestine Wireless Sensors | 2 |
| 2021 | Mobicom | BioFace-3D: continuous 3d facial reconstruction through lightweight single-ear biosensors | 2 |
| 2021 | Mobicom | EarGate: gait-based user identification with in-ear microphones | 2 |
| 2021 | Mobisys | Counting a stationary crowd using off-the-shelf wifi | 2 |
| 2021 | TIFS | Physical Layer Security Enhancement With Reconfigurable Intelligent Surface-Aided Networks | 2 |
| 2021 | Ubicomp | ChestLive: Fortifying Voice-based Authentication with Chest Motion Biometric on Smart Devices | 2 |
| 2021 | Ubicomp | DriverSonar: Fine-Grained Dangerous Driving Detection Using Active Sonar | 2 |
| 2021 | Ubicomp | DronePrint: Acoustic Signatures for Open-set Drone Detection and Identification with Online Data | 2 |
| 2021 | Ubicomp | Leakage or Identification: Behavior-irrelevant User Identification Leveraging Leakage Current on Laptops | 2 |
| 2021 | Infocom | Physical Layer Key Generation between Backscatter Devices over Ambient RF Signals | 2 |
| 2021 | Infocom | Proximity-Echo: Secure Two Factor Authentication Using Active Sound Sensing | 2 |
| 2021 | Ubicomp | RF-Identity: Non-Intrusive Person Identification Based on Commodity RFID Devices | 2 |
| 2021 | Infocom | RFace: Anti-Spoofing Facial Authentication Using COTS RFID | 2 |
| 2021 | Ubicomp | RFaceID: Towards RFID-based Facial Recognition | 2 |
| 2021 | CCS | Revisiting Fuzzy Signatures: Towards a More Risk-Free Cryptographic Authentication System based on Biometrics | 2 |
| 2021 | Ubicomp | Unobtrusive Pedestrian Identification by Leveraging Footstep Sounds with Replay Resistance | 2 |
| 2021 | Ubicomp | Voice In Ear: Spoofing-Resistant and Passphrase-Independent Body Sound Authentication | 2 |
| 2021 | Ubicomp | WiStress: Contactless Stress Monitoring Using Wireless Signals | 2 |
| 2021 | Mobicom | Face-Mic: inferring live speech and speaker identity via subtle facial dynamics captured by AR/VR motion sensors | 1 |
| 2021 | Mobicom | Notification privacy protection via unobtrusive gripping hand verification using media sounds | 1 |
| 2021 | Mobisys | MotionCompass: pinpointing wireless camera via motion-activated traffic | 1 |
| 2021 | Sensys | Wavoice: A Noise-resistant Multi-modal Speech Recognition System Fusing mmWave and Audio Signals | 1 |
| 2021 | TMC | A Usable and Robust Continuous Authentication Framework Using Wearables | 1 |
| 2021 | CCS | Biometrics-Authenticated Key Exchange for Secure Messaging | 1 |
| 2020 | Sensys | VocalPrint: exploring a resilient and secure voice authentication via mmWave biometric interrogation | 3 |
| 2020 | Infocom | Continuous User Verification via Respiratory Biometrics | 3 |
| 2020 | S&P | Leveraging EM Side-Channel Information to Detect Rowhammer Attacks | 2 |
| 2020 | NDSS | Hold the Door! Fingerprinting Your Car Key to Prevent Keyless Entry Car Theft | 2 |
| 2020 | Mobicom | Contactless seismocardiography via deep learning radars | 2 |
| 2020 | TIFS | Machine Learning-Based Delay-Aware UAV Detection and Operation Mode Identification Over Encrypted Wi-Fi Traffic | 2 |
| 2020 | USENIX Security | You Are What You Broadcast: Identification of Mobile and IoT Devices from (Public) WiFi | 2 |
| 2020 | CCS | Game-Set-MATCH: Using Mobile Devices for Seamless External-Facing Biometric Matching | 1 |
| 2020 | USENIX Security | Liveness is Not Enough: Enhancing Fingerprint Authentication with Behavioral Biometrics to Defeat Puppet Attacks | 1 |
| 2019 | Mobicom | PDVocal: Towards Privacy-preserving Parkinson's Disease Detection using Non-speech Body Sounds | 3 |
| 2019 | Mobicom | XModal-ID: Using WiFi for Through-Wall Person Identification from Candidate Video Footage | 3 |
| 2019 | Mobisys | BreathListener: Fine-grained Breathing Monitoring in Driving Environments Utilizing Acoustic Signals | 3 |
| 2019 | TMC | WiFi CSI Based Passive Human Activity Recognition Using Attention Based BLSTM | 3 |
| 2019 | IoTJ | Continuous User Authentication by Contactless Wireless Sensing | 3 |
| 2019 | Infocom | FID: Function Modeling-based Data-Independent and Channel-Robust Physical-Layer Identification | 3 |
| 2019 | Infocom | NAuth: Secure Face-to-Face Device Authentication via Nonlinearity | 3 |
| 2019 | CCS | DeMiCPU: Device Fingerprinting with Magnetic Signals Radiated by CPU | 2 |
| 2019 | Infocom | VoicePop: A Pop Noise based Anti-spoofing System for Voice Authentication | 2 |
| 2019 | Mobicom | XModal-ID: Using WiFi for Through-Wall Person Identification from Candidate Video Footage | 1 |
| 2019 | IMWUT | EarEcho: Using Ear Canal Echo for Wearable Authentication | 1 |
| 2018 | Mobicom | EchoPrint: Two-factor Authentication using Acoustics and Vision on Smartphones | 3 |
| 2018 | Sensys | E-Eye: Hidden Electronics Recognition through mmWave Nonlinear Effects | 3 |
| 2018 | Mobicom | Ghostbuster: Detecting the Presence of Hidden Eavesdroppers | 2 |
| 2018 | Mobisys | LiquID: A Wireless Liquid IDentifier | 2 |
| 2018 | TIFS | Drone Pilot Identification by Classifying Radio-Control Signals | 2 |
| 2018 | Ubicomp | BiLock: User Authentication via Dental Occlusion Biometrics | 2 |
| 2018 | CCS | PrinTracker: Fingerprinting 3D Printers using Commodity Scanners | 2 |
| 2017 | Mobicom | Cardiac Scan: A Non-contact and Continuous Heart-based User Authentication System | 4 |
| 2017 | Sensys | WiFi-Enabled Smart Human Dynamics Monitoring | 4 |
| 2017 | Mobicom | Continuous Authentication for Voice Assistants | 3 |
| 2017 | Mobisys | BreathPrint: Breathing Acoustics-based User Authentication | 3 |
| 2017 | Mobisys | Strata: Fine-Grained Acoustic-based Device-Free Tracking | 3 |
| 2017 | TMC | RT?Fall: A Real?Time and Contactless Fall Detection System with Commodity WiFi Devices | 3 |
| 2017 | TMC | WiFall: Device?Free Fall Detection by Wireless Networks | 3 |
| 2017 | NDSS | Wi-Fly?: Detecting Privacy Invasion Attacks by Consumer Drones | 2 |
| 2017 | Mobisys | Matthan: Drone Presence Detection by Identifying Physical Signatures in the Drone's RF Communication | 2 |
| 2017 | Infocom | DBF: A General Framework for Anomaly Detection in RFID Systems | 2 |
| 2017 | CCS | Watch Me, but Don't Touch Me! Contactless Control Flow Monitoring via Electromagnetic Emanations | 2 |
| 2016 | NDSS | Emotion recognition using wireless signals | 3 |
| 2016 | NDSS | Who¡¯s in Control of Your Control System? Device Fingerprinting for Cyber-Physical Systems | 3 |
| 2016 | Mobisys | BodyScan: Enabling Radio-based Sensing on Wearable Devices for Contactless Activity and Vital Sign Monitoring | 3 |
| 2016 | TIFS | Wireless Physical-Layer Identification: Modeling and Validation | 3 |
| 2016 | Infocom | RAM: Radar-based Activity Monitor | 3 |
| 2016 | CCS | VoiceLive: A Phoneme Localization based Liveness Detection for Voice Authentication on Smartphones | 3 |
| 2016 | TMC | We Can Hear You with Wi-Fi! | 2 |
| 2015 | TIFS | Wireless Device Identification Based on RF Oscillator Imperfections. | 3 |
| 2015 | Mobisys | Contactless Sleep Apnea Detection on Smartphones | 2 |
| 2015 | CCS | Authenticating Privately over Public Wi-Fi Hotspots | 2 |
| 2015 | USENIX Security | Sound-Proof: Usable Two-Factor Authentication Based on Ambient Sound | 2 |
| 2014 | CCS | Acoustic Fingerprinting Revisited: Generate Stable Device ID Stealthily with Inaudible Sound | 3 |
| 2014 | CCS | Context-free Attacks Using Keyboard Acoustic Emanations | 3 |
| 2014 | CCS | Do You Hear What I Hear?: Fingerprinting Smart Devices Through Embedded Acoustic Components | 3 |
| 2014 | NDSS | AuthenticationUsingPulse-ResponseBiometrics | 2 |
| 2014 | Mobicom | E-eyes: device-free location-oriented activity identification using fine-grained WiFi signatures | 2 |
| 2014 | Mobisys | Ubiquitous keyboard for small mobile devices: harnessing multipath fading for fine-grained keystroke localization | 2 |
| 2013 | NDSS | How Privacy Leaks From Bluetooth Mouse | 2 |
| 2013 | Sensys | iSleep: unobtrusive sleep quality monitoring using smartphones | 2 |
| 2012 | Mobicom | Locating in fingerprint space: wireless indoor localization with little human intervention | 2 |
| 2012 | Sensys | Low cost crowd counting using audio tones | 2 |
| 2011 | NDSS | Tracker: Security and Privacy for RFID-based Supply Chains | 2 |
| 2011 | Mobicom | Detecting driver phone use leveraging car speakers | 2 |
| 2011 | Mobicom | I am the antenna: accurate outdoor AP location using smartphones | 2 |
| 2009 | Mobicom | On the effectiveness of secret key extraction from wireless signal strength in real environments | 2 |
| 2009 | CCS | EPC RFID tag security weaknesses and defenses: passport cards, enhanced drivers licenses, and beyond | 2 |
| 2009 | USENIX Security | Physical-layer Identification of RFID Devices | 2 |
| 2008 | Mobicom | Wireless device identification with radiometric signatures | 2 |
We provide both the raw data (CSV format) and visualization code for reproducing the analysis figures in our survey paper.
- Navigate to the analysis directory:
cd analysis
- Run the MATLAB script:
analysis.mThis is a continuously maintained collection of wireless sensing security research. Welcome expand this list by:
- Opening an issue or pull request
- Sending suggestions via email
If you find this repository useful, please consider citing:
@article{WirelessSensingSecurity2024,
author={Geng, Ruixu* and Wang, Jianyang* and Yuan, Yuqin and Zhan, Fengquan and Zhang, Tianyu and Zhang, Rui and Huang, Pengcheng and Zhang, Dongheng and Chen, Jinbo and Hu, Yang and Chen, Yan},
journal={IEEE Communications Surveys & Tutorials},
title={A Survey of Wireless Sensing Security From a Role-Based View},
year={2025},
volume={},
number={},
pages={},
doi={10.1109/COMST.2025.3597716}}

