Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
WiFi sensing with channel state information: A survey
With the high demand for wireless data traffic, WiFi networks have experienced very rapid
growth, because they provide high throughput and are easy to deploy. Recently, Channel …
growth, because they provide high throughput and are easy to deploy. Recently, Channel …
On the detection of unauthorized drones—Techniques and future perspectives: A review
MA Khan, H Menouar, A Eldeeb… - IEEE Sensors …, 2022 - ieeexplore.ieee.org
The market size of civilian drones is tremendously increasing and is expected to reach 1.66
million by the end of 2023. The increase in number of civilian drones poses several privacy …
million by the end of 2023. The increase in number of civilian drones poses several privacy …
A reliable trust computing mechanism based on multisource feedback and fog computing in social sensor cloud
Social sensor cloud (SSC) is combined with social network, wireless sensor network, cloud
computing, and fog computing, which is currently a new type of Internet of Things (IoT). In …
computing, and fog computing, which is currently a new type of Internet of Things (IoT). In …
A survey on human profile information inference via wireless signals
Due to the ubiquitous deployment of wireless infrastructures, the radio signal nature of
invisibility, and the elimination of the line-of-sight requirement, it has drawn increasing …
invisibility, and the elimination of the line-of-sight requirement, it has drawn increasing …
MAGLeak: A learning-based side-channel attack for password recognition with multiple sensors in IIoT environment
As an emerging technology, industrial Internet of Things (IIoT) connects massive sensors
and actuators to empower industrial sectors being smart, autonomous, efficient, and safety …
and actuators to empower industrial sectors being smart, autonomous, efficient, and safety …
Listen to your fingers: User authentication based on geometry biometrics of touch gesture
Inputting a pattern or PIN code on the touch screen is a popular method to prevent
unauthorized access to mobile devices. However, these sensitive tokens are highly …
unauthorized access to mobile devices. However, these sensitive tokens are highly …
Sensing beyond itself: Multi-functional use of ubiquitous signals towards wearable applications
Wearable technologies provide a non-invasive way to monitor user's activity, identity, and
health in real-time, which have attracted tremendous interests from both academia and …
health in real-time, which have attracted tremendous interests from both academia and …
A survey of user authentication based on channel state information
Z Wang, W Dou, M Ma, X Feng, Z Huang… - Wireless …, 2021 - Wiley Online Library
Recently, human behavior sensing based on WiFi channel state information has drawn
more attention in the ubiquitous computing field because it can provide accurate information …
more attention in the ubiquitous computing field because it can provide accurate information …
Efficient sub-carrier relationship extraction for human activity recognition via EEGNet in wireless sensing
S Zaravashan, S Arefizadeh… - 2023 13th International …, 2023 - ieeexplore.ieee.org
Human activity Recognition (HAR) through wireless sensing is a complex task due to the
dynamic nature of human movements. Deep learning models have proven to be highly …
dynamic nature of human movements. Deep learning models have proven to be highly …
[HTML][HTML] MCSM-Wri: A small-scale motion recognition method using WiFi based on multi-scale convolutional neural network
S Ma, T Huang, S Li, J Huang, T Ma, J Liu - Sensors, 2019 - mdpi.com
Small-scale motion recognition has received wide attention recently with the development of
environmental perception technology based on WiFi, and some state-of-the-art techniques …
environmental perception technology based on WiFi, and some state-of-the-art techniques …