WiPIN: Operation-Free Passive Person Identification Using Wi-Fi Signals
暂无分享,去创建一个
Jinsong Han | Fei Wang | Ziyi Dai | Han Ding | Kui Ren | Feng Lin | Jinsong Han | Fei Wang
[1] Wei Wang,et al. Keystroke Recognition Using WiFi Signals , 2015, MobiCom.
[2] Sachin Katti,et al. SpotFi: Decimeter Level Localization Using WiFi , 2015, SIGCOMM.
[3] Heinrich Hußmann,et al. Touch me once and i know it's you!: implicit authentication based on touch screen patterns , 2012, CHI.
[4] Shaojie Tang,et al. Electronic frog eye: Counting crowd using WiFi , 2014, IEEE INFOCOM 2014 - IEEE Conference on Computer Communications.
[5] Davide Anguita,et al. Transition-Aware Human Activity Recognition Using Smartphones , 2016, Neurocomputing.
[6] Wu Yang,et al. Device-Free Passive Identity Identification via WiFi Signals , 2017, Sensors.
[7] Kaishun Wu,et al. We Can Hear You with Wi-Fi! , 2016, IEEE Trans. Mob. Comput..
[8] N Kuster,et al. Characterization of the electromagnetic near-field absorption in layered biological tissue in the frequency range from 30 MHz to 6000 MHz , 2006, Physics in medicine and biology.
[9] Zhi Sun,et al. NeuralWave: Gait-Based User Identification Through Commodity WiFi and Deep Learning , 2018, IECON 2018 - 44th Annual Conference of the IEEE Industrial Electronics Society.
[10] Chih-Jen Lin,et al. LIBLINEAR: A Library for Large Linear Classification , 2008, J. Mach. Learn. Res..
[11] Brian C. Lovell,et al. Face Recognition on Consumer Devices: Reflections on Replay Attacks , 2015, IEEE Transactions on Information Forensics and Security.
[12] Gregory Melia,et al. Electromagnetic Absorption by the Human Body from 1 - 15 GHz , 2013 .
[13] Jin Zhang,et al. WiFi-ID: Human Identification Using WiFi Signal , 2016, 2016 International Conference on Distributed Computing in Sensor Systems (DCOSS).
[14] Archan Misra,et al. BreathPrint: Breathing Acoustics-based User Authentication , 2017, MobiSys.
[15] Bernhard Schölkopf,et al. A tutorial on support vector regression , 2004, Stat. Comput..
[16] Jin Zhang,et al. Human identification using WiFi signal , 2016, 2016 IEEE International Conference on Pervasive Computing and Communication Workshops (PerCom Workshops).
[17] Parth H. Pathak,et al. WiWho: WiFi-Based Person Identification in Smart Spaces , 2016, 2016 15th ACM/IEEE International Conference on Information Processing in Sensor Networks (IPSN).
[18] Chih-Jen Lin,et al. LIBSVM: A library for support vector machines , 2011, TIST.
[19] Alex X. Liu,et al. Secure unlocking of mobile touch screen devices by simple gestures: you can see it but you can not do it , 2013, MobiCom.
[20] Theodore S. Rappaport,et al. Wireless communications - principles and practice , 1996 .
[21] Wei Wang,et al. Gait recognition using wifi signals , 2016, UbiComp.
[22] Mo Li,et al. Precise Power Delay Profiling with Commodity Wi-Fi , 2015, IEEE Transactions on Mobile Computing.
[23] Geoffrey E. Hinton,et al. ImageNet classification with deep convolutional neural networks , 2012, Commun. ACM.
[24] Hongbo Liu,et al. Smart User Authentication through Actuation of Daily Activities Leveraging WiFi-enabled IoT , 2017, MobiHoc.
[25] Michael K. Reiter,et al. Password hardening based on keystroke dynamics , 1999, CCS '99.
[26] B. Scholkopf,et al. Fisher discriminant analysis with kernels , 1999, Neural Networks for Signal Processing IX: Proceedings of the 1999 IEEE Signal Processing Society Workshop (Cat. No.98TH8468).
[27] Giorgio Franceschetti,et al. Wireless Networks: From the Physical Layer to Communication, Computing, Sensing and Control , 2006 .
[28] Tong Xin,et al. FreeSense: Indoor Human Identification with Wi-Fi Signals , 2016, 2016 IEEE Global Communications Conference (GLOBECOM).
[29] Gregory D. Abowd,et al. A practical approach for recognizing eating moments with wrist-mounted inertial sensing , 2015, UbiComp.
[30] Xiang Li,et al. Dynamic-MUSIC: accurate device-free indoor localization , 2016, UbiComp.
[31] Yunhao Liu,et al. From RSSI to CSI , 2013, ACM Comput. Surv..
[32] Einar Snekkenes,et al. Spoof Attacks on Gait Authentication System , 2007, IEEE Transactions on Information Forensics and Security.
[33] Corinna Cortes,et al. Support-Vector Networks , 1995, Machine Learning.
[34] David Wetherall,et al. Tool release: gathering 802.11n traces with channel state information , 2011, CCRV.
[35] A. Ant Ozok,et al. A comparison of perceived and real shoulder-surfing risks between alphanumeric and graphical passwords , 2006, SOUPS '06.
[36] C. Sidney Burrus,et al. Generalized digital Butterworth filter design , 1998, IEEE Trans. Signal Process..
[37] Hüseyin R. Hiziroglu,et al. Electromagnetic Field Theory Funda-mentals , 1997 .