WiFi sensing with channel state information: A survey

Y Ma, G Zhou, S Wang - ACM Computing Surveys (CSUR), 2019 - dl.acm.org
With the high demand for wireless data traffic, WiFi networks have experienced very rapid
growth, because they provide high throughput and are easy to deploy. Recently, Channel …

On the detection of unauthorized drones—Techniques and future perspectives: A review

MA Khan, H Menouar, A Eldeeb… - IEEE Sensors …, 2022 - ieeexplore.ieee.org
The market size of civilian drones is tremendously increasing and is expected to reach 1.66
million by the end of 2023. The increase in number of civilian drones poses several privacy …

A reliable trust computing mechanism based on multisource feedback and fog computing in social sensor cloud

J Liang, M Zhang, VCM Leung - IEEE Internet of Things Journal, 2020 - ieeexplore.ieee.org
Social sensor cloud (SSC) is combined with social network, wireless sensor network, cloud
computing, and fog computing, which is currently a new type of Internet of Things (IoT). In …

A survey on human profile information inference via wireless signals

Q He, E Yang, S Fang - IEEE Communications Surveys & …, 2024 - ieeexplore.ieee.org
Due to the ubiquitous deployment of wireless infrastructures, the radio signal nature of
invisibility, and the elimination of the line-of-sight requirement, it has drawn increasing …

MAGLeak: A learning-based side-channel attack for password recognition with multiple sensors in IIoT environment

D Chen, Z Zhao, X Qin, Y Luo, M Cao… - IEEE Transactions on …, 2020 - ieeexplore.ieee.org
As an emerging technology, industrial Internet of Things (IIoT) connects massive sensors
and actuators to empower industrial sectors being smart, autonomous, efficient, and safety …

Listen to your fingers: User authentication based on geometry biometrics of touch gesture

H Chen, F Li, W Du, S Yang, M Conn… - Proceedings of the ACM …, 2020 - dl.acm.org
Inputting a pattern or PIN code on the touch screen is a popular method to prevent
unauthorized access to mobile devices. However, these sensitive tokens are highly …

Sensing beyond itself: Multi-functional use of ubiquitous signals towards wearable applications

Z Wang, J Li, Y **, J Wang, F Yang, G Li, X Ni… - Digital Signal …, 2021 - Elsevier
Wearable technologies provide a non-invasive way to monitor user's activity, identity, and
health in real-time, which have attracted tremendous interests from both academia and …

A survey of user authentication based on channel state information

Z Wang, W Dou, M Ma, X Feng, Z Huang… - Wireless …, 2021 - Wiley Online Library
Recently, human behavior sensing based on WiFi channel state information has drawn
more attention in the ubiquitous computing field because it can provide accurate information …

Efficient sub-carrier relationship extraction for human activity recognition via EEGNet in wireless sensing

S Zaravashan, S Arefizadeh… - 2023 13th International …, 2023 - ieeexplore.ieee.org
Human activity Recognition (HAR) through wireless sensing is a complex task due to the
dynamic nature of human movements. Deep learning models have proven to be highly …

[HTML][HTML] MCSM-Wri: A small-scale motion recognition method using WiFi based on multi-scale convolutional neural network

S Ma, T Huang, S Li, J Huang, T Ma, J Liu - Sensors, 2019 - mdpi.com
Small-scale motion recognition has received wide attention recently with the development of
environmental perception technology based on WiFi, and some state-of-the-art techniques …