A survey on human behavior recognition using channel state information
Z Wang, K Jiang, Y Hou, W Dou, C Zhang… - Ieee …, 2019 - ieeexplore.ieee.org
Recently, device-free human behavior recognition has become a hot research topic and has
achieved significant progress in the field of ubiquitous computing. Among various …
achieved significant progress in the field of ubiquitous computing. Among various …
Joint activity recognition and indoor localization with WiFi fingerprints
Recent years have witnessed the rapid development in the research topic of WiFi sensing
that automatically senses human with commercial WiFi devices. Past work falls into two …
that automatically senses human with commercial WiFi devices. Past work falls into two …
A survey of user authentication based on channel state information
Z Wang, W Dou, M Ma, X Feng, Z Huang… - Wireless …, 2021 - Wiley Online Library
Recently, human behavior sensing based on WiFi channel state information has drawn
more attention in the ubiquitous computing field because it can provide accurate information …
more attention in the ubiquitous computing field because it can provide accurate information …
RF-Badge: Vital sign-based authentication via RFID tag array on badges
Nowadays, authentication systems are usually required to provide continuous, contactless,
and non-intrusive services. In this paper, we propose RF-Badge, a vital sign-based …
and non-intrusive services. In this paper, we propose RF-Badge, a vital sign-based …
NF-heart: A near-field non-contact continuous user authentication system via ballistocardiogram
The increasingly remote workforce resulting from the global coronavirus pandemic has
caused unprecedented cybersecurity concerns to organizations. Considerable evidence has …
caused unprecedented cybersecurity concerns to organizations. Considerable evidence has …
BioTag: Robust RFID-based continuous user verification using physiological features from respiration
For decades, one-time verification has been the standard for user verification at entry points,
office rooms, etc. However, such approaches request users to provide their secrets (eg …
office rooms, etc. However, such approaches request users to provide their secrets (eg …
A classifications framework for continuous biometric authentication (2018–2024)
D Boshoff, GP Hancke - Computers & Security, 2025 - Elsevier
The increase in personal devices, the amount of private and sensitive information these
devices store/process, and the importance of this information have introduced vital security …
devices store/process, and the importance of this information have introduced vital security …
Resource Allocation for the Training of Image Semantic Communication Networks
Semantic communication is a new paradigm that aims at providing more efficient
communication for the next-generation wireless network. It focuses on transmitting extracted …
communication for the next-generation wireless network. It focuses on transmitting extracted …