正在加载图片...
REFERENCES [22]Y.Li.J.Fang.K.Tan.J.Zhang.Q.Cui.and X.Tao."Soft-LTE:A software radio implementation of 3GPP long term evolution based on [1]D.Shukla,R.Kumar,A.Serwadda,and V.V.Phoha,"Beware,your Sora platform,"in Proceedings of ACM MobiCom (Demo),2009. hands reveal your secrets!,"in Proceedings of ACM CCS,pp.904-917, [23]M.Driusso.C.Marshall.M.Sabathy.F.Knutti.H.Mathis.and ACM.2014. F.Babich."Vehicular position tracking using Ite signals."IEEE Trans. [2]J.Sun,X.Jin,Y.Chen.J.Zhang.Y.Zhang,and R.Zhang,"VISIBLE Video-assisted keystroke inference from tablet backside motion.,"in Vehicular Technology.vol.66.no.4.pp.3376-3391.2017 [24]D.Vasisht,S.Kumar,H.Rahul,and D.Katabi,"Eliminating channel NDSS.2016. feedback in next-generation cellular networks."in Proceedings of ACM [3]E.Owusu,J.Han,S.Das,A.Perrig,and J.Zhang,"Accessory:password SIGCOMM.2016. inference using accelerometers on smartphones,"in Proceedings of the Twelfth Workshop on Mobile Computing Systems Applications,p.9. [25]Q.Pu,S.Gupta,S.Gollakota,and S.Patel,"Whole-home gesture recognition using wireless signals,"in Proceedings of ACM MobiCom, ACM.2012. 2013. [4]X.Liu,Z.Zhou,W.Diao,Z.Li,and K.Zhang,"When good becomes [26]Y.Wang.J.Liu,Y.Chen.M.Gruteser,J.Yang.and H.Liu,"E evil:Keystroke inference with smartwatch,"in Proceedings of ACM eyes:In-home device-free activity identification using fine-grained WiFi CCS.2015. signatures,"in Proceedings of ACM MobiCom.2014. [5]J.Liu,Y.Wang,G.Kar,Y.Chen.J.Yang,and M.Gruteser,"Snooping [27]W.Wang,A.X.Liu,M.Shahzad,K.Ling,and S.Lu,"Understanding keystrokes with mm-level audio ranging on a single phone,"in Proceed- and modeling of WiFi signal based human activity recognition,"in ings of ACM MobiCom,2015. Proceedings of ACM MobiCom.2015. [6]T.Zhu,Q.Ma,S.Zhang,and Y.Liu,"Context-free attacks using [28]G.Wang.Y.Zou,Z.Zhou,K.Wu,and L.M.Ni,"We can hear you keyboard acoustic emanations,"in Proceedings of ACM CCS,2014. with Wi-Fi!,"in Proceedings of ACM MobiCom,2014. [7]L.Zhuang.F.Zhou,and J.D.Tygar,"Keyboard acoustic emanations (29]F.Adib and D.Katabi,"See through walls with WiFi!,"in Proceedings revisited,"ACM Transactions on Information and System Security (TIS- of ACM SIGCOMM.2013. SEC,ol.13,no.1,p.3,2009. [30]F.Adib.Z.Kabelac,and D.Katabi,"Multi-person motion tracking via [8]D.Asonov and R.Agrawal,"Keyboard acoustic emanations,"in /EEE RF body reflections,"in Proceedings of Usenix NSDI.2015. Symposium on Security and Privacy,2004. [31]J.Lien,N.Gillian.M.E.Karagozler,P.Amihood.C.Schwesig. [9]J.Liu,C.Wang.Y.Chen,and N.Saxena,"Vibwrite:Towards finger- E.Olson.H.Raja,and I.Poupyrev,"Soli:ubiquitous gesture sensing input authentication on ubiquitous surfaces via physical vibration,"in with millimeter wave radar,"ACM Transactions on Graphics,vol.35 Proceedings of ACM CCS,2017. no.4,p.142,2016. [10]K.Ali,A.X.Liu,W.Wang,and M.Shahzad,"Keystroke recognition [32]T.Wei and X.Zhang,"mTrack:High-precision passive tracking using using WiFi signals."in Proceedings of ACM MobiCom.2015. millimeter wave radios,"in Proceedings of ACM MobiCom,2015. [11]B.Chen,V.Yenamandra,and K.Srinivasan,"Tracking keystrokes using [33]L.Yang,Q.Lin,X.Li,T.Liu,and Y.Liu,"See through walls with wireless signals,"in Proceedings of ACM MobiSys.2015. COTS RFID system!,"in Proceedings of ACM MobiCom,2015. [12]M.Li,Y.Meng.J.Liu.H.Zhu,X.Liang,Y.Liu,and N.Ruan."When [34]C.Wang,J.Liu.Y.Chen,H.Liu,L.Xie,W.Wang,B.He.and CSI meets public WiFi:Inferring your mobile phone password via WiFi S.Lu,"Multi-touch in the air:Device-free finger tracking and gesture signals,"in Proceedings of ACM CCS,2016. recognition via cots rfid,"in Proceedings of IEEE INFOCOM.2018. [13]J.Zhang,X.Zheng,Z.Tang,T.Xing,X.Chen,D.Fang.R.Li, [35]D.K.P.Tan,M.Lesturgie,H.Sun,W.Li,and Y.Lu,"GSM based X.Gong.and F.Chen."Privacy leakage in mobile sensing:Your unlock through-the-wall passive radar demonstrator for motion sensing,"in passwords can be leaked through wireless hotspot functionality,"Mobile Proceedings of IEEE New Trends for Environmental Monitoring Using Information Systems,vol.2016,2016. Passive Systems.2008. [14]L.Chiaraviglio,F.Cuomo,M.Maisto,A.Gigli,J.Lorincz,Y.Zhou., [36]Q.Yue,Z.Ling.X.Fu,B.Liu,K.Ren,and W.Zhao,"Blind recognition Z.Zhao,C.Qi,and H.Zhang."What is the best spatial distribution of touched keys on mobile devices,"in Proceedings of ACM CCS,2014 to model base station density?a deep dive into two european mobile [37]Y.Berger,A.Wool,and A.Yeredor,"Dictionary attacks using keyboard networks,"IEEE Access,vol.4.pp.1434-1443.2016. acoustic emanations,"in Proceedings of ACM CCS,pp.245-254.ACM [15]M.Y.Arslan,J.Yoon,K.Sundaresan,S.V.Krishnamurthy,and 2006. S.Banerjee,"FERMI:a femtocell resource management system for- [38]Y.Yao,Y.Li,X.Liu.Z.Chi,W.Wang,T.Xie,and T.Zhu,"Aegis: interference mitigation in OFDMA networks,"in Proceedings of ACM An interference-negligible RF sensing shield,"in Proceedings of IEEE MobiCom.2011. INFOCOM.2018. [16]R.Baldemair.T.Irnich.K.Balachandran,E.Dahlman.G.Mildh. 39]LTE:Evolved Universal Terrestrial Radio Access (E-UTRA):Physical Y.Selen,S.Parkvall,M.Meyer,and A.Osseiran,"Ultra-dense networks channels and modulation.3GPP LTE TS 36.211.2015. in millimeter-wave frequencies,"IEEE Communications Magazine (40]D.Tse and P.Viswanath,Fundamentals of wireless communication. vol.53,no.1,pp.202-208.2015. Cambridge university press,2005. [17]Y.Qiao,O.Zhang,W.Zhou,K.Srinivasan,and A.Arora,"Phycloak: [41]H.Li,W.Yang.J.Wang.Y.Xu,and L.Huang."WiFinger:talk to Obfuscating sensing from communication signals,"in Proceedings of your smart devices with finger-grained gesture,"in Proceedings of ACM Usenix NSDI.2016. UbiComp,2016. [18]F.Lu,H.Du,A.Jain,G.M.Voelker,A.C.Snoeren,and A.Terzis. [42]D.Vasisht,S.Kumar,and D.Katabi,"Decimeter-level localization with "CQIC:Revisiting cross-layer congestion control for cellular networks," a single WiFi access point,"in Proceedings of Usenix NSDI,2016. in Proceedings of ACM HotMobile,2015. (43]Y.Xie,Z.Li,and M.Li,"Precise power delay profiling with commodity [19]X.Xie,X.Zhang,and S.Zhu,"Accelerating mobile web loading using WiFi,"in Proceedings of ACM MobiCom,2015. cellular link information,"in Proceedings of ACM MobiSys,2017. [44]L.R.Rabiner,"A tutorial on hidden markov models and selected [20]X.Xie,X.Zhang,S.Kumar,and L.E.Li,"pistream:Physical layer applications in speech recognition."Proceedings of the IEEE.vol.77, informed adaptive video streaming over LTE,"in Proceedings of ACM no.2,Pp.257-286,1989. MobiCom,2015. [45]I.Goodfellow,J.Pouget-Abadie,M.Mirza.B.Xu,D.Warde-Farley, [21]S.Kumar,E.Hamed,D.Katabi,and L.Erran Li,"LTE radio analytics S.Ozair,A.Courville,and Y.Bengio,"Generative adversarial nets," made easy and accessible,"in Proceedings of ACM SIGCOMM,2014. in Advances in neural information processing systems,pp.2672-2680. 2014.REFERENCES [1] D. Shukla, R. Kumar, A. Serwadda, and V. V. Phoha, “Beware, your hands reveal your secrets!,” in Proceedings of ACM CCS, pp. 904–917, ACM, 2014. [2] J. Sun, X. Jin, Y. Chen, J. Zhang, Y. Zhang, and R. Zhang, “VISIBLE: Video-assisted keystroke inference from tablet backside motion.,” in NDSS, 2016. [3] E. Owusu, J. Han, S. Das, A. Perrig, and J. Zhang, “Accessory: password inference using accelerometers on smartphones,” in Proceedings of the Twelfth Workshop on Mobile Computing Systems & Applications, p. 9, ACM, 2012. [4] X. Liu, Z. Zhou, W. Diao, Z. Li, and K. Zhang, “When good becomes evil: Keystroke inference with smartwatch,” in Proceedings of ACM CCS, 2015. [5] J. Liu, Y. Wang, G. Kar, Y. Chen, J. Yang, and M. Gruteser, “Snooping keystrokes with mm-level audio ranging on a single phone,” in Proceed￾ings of ACM MobiCom, 2015. [6] T. Zhu, Q. Ma, S. Zhang, and Y. Liu, “Context-free attacks using keyboard acoustic emanations,” in Proceedings of ACM CCS, 2014. [7] L. Zhuang, F. Zhou, and J. D. Tygar, “Keyboard acoustic emanations revisited,” ACM Transactions on Information and System Security (TIS￾SEC), vol. 13, no. 1, p. 3, 2009. [8] D. Asonov and R. Agrawal, “Keyboard acoustic emanations,” in IEEE Symposium on Security and Privacy, 2004. [9] J. Liu, C. Wang, Y. Chen, and N. Saxena, “Vibwrite: Towards finger￾input authentication on ubiquitous surfaces via physical vibration,” in Proceedings of ACM CCS, 2017. [10] K. Ali, A. X. Liu, W. Wang, and M. Shahzad, “Keystroke recognition using WiFi signals,” in Proceedings of ACM MobiCom, 2015. [11] B. Chen, V. Yenamandra, and K. Srinivasan, “Tracking keystrokes using wireless signals,” in Proceedings of ACM MobiSys, 2015. [12] M. Li, Y. Meng, J. Liu, H. Zhu, X. Liang, Y. Liu, and N. Ruan, “When CSI meets public WiFi: Inferring your mobile phone password via WiFi signals,” in Proceedings of ACM CCS, 2016. [13] J. Zhang, X. Zheng, Z. Tang, T. Xing, X. Chen, D. Fang, R. Li, X. Gong, and F. Chen, “Privacy leakage in mobile sensing: Your unlock passwords can be leaked through wireless hotspot functionality,” Mobile Information Systems, vol. 2016, 2016. [14] L. Chiaraviglio, F. Cuomo, M. Maisto, A. Gigli, J. Lorincz, Y. Zhou, Z. Zhao, C. Qi, and H. Zhang, “What is the best spatial distribution to model base station density? a deep dive into two european mobile networks,” IEEE Access, vol. 4, pp. 1434–1443, 2016. [15] M. Y. Arslan, J. Yoon, K. Sundaresan, S. V. Krishnamurthy, and S. Banerjee, “FERMI: a femtocell resource management system for￾interference mitigation in OFDMA networks,” in Proceedings of ACM MobiCom, 2011. [16] R. Baldemair, T. Irnich, K. Balachandran, E. Dahlman, G. Mildh, Y. Selen, S. Parkvall, M. Meyer, and A. Osseiran, “Ultra-dense networks ´ in millimeter-wave frequencies,” IEEE Communications Magazine, vol. 53, no. 1, pp. 202–208, 2015. [17] Y. Qiao, O. Zhang, W. Zhou, K. Srinivasan, and A. Arora, “Phycloak: Obfuscating sensing from communication signals,” in Proceedings of Usenix NSDI, 2016. [18] F. Lu, H. Du, A. Jain, G. M. Voelker, A. C. Snoeren, and A. Terzis, “CQIC: Revisiting cross-layer congestion control for cellular networks,” in Proceedings of ACM HotMobile, 2015. [19] X. Xie, X. Zhang, and S. Zhu, “Accelerating mobile web loading using cellular link information,” in Proceedings of ACM MobiSys, 2017. [20] X. Xie, X. Zhang, S. Kumar, and L. E. Li, “pistream: Physical layer informed adaptive video streaming over LTE,” in Proceedings of ACM MobiCom, 2015. [21] S. Kumar, E. Hamed, D. Katabi, and L. Erran Li, “LTE radio analytics made easy and accessible,” in Proceedings of ACM SIGCOMM, 2014. [22] Y. Li, J. Fang, K. Tan, J. Zhang, Q. Cui, and X. Tao, “Soft-LTE: A software radio implementation of 3GPP long term evolution based on Sora platform,” in Proceedings of ACM MobiCom (Demo), 2009. [23] M. Driusso, C. Marshall, M. Sabathy, F. Knutti, H. Mathis, and F. Babich, “Vehicular position tracking using lte signals,” IEEE Trans. Vehicular Technology, vol. 66, no. 4, pp. 3376–3391, 2017. [24] D. Vasisht, S. Kumar, H. Rahul, and D. Katabi, “Eliminating channel feedback in next-generation cellular networks,” in Proceedings of ACM SIGCOMM, 2016. [25] Q. Pu, S. Gupta, S. Gollakota, and S. Patel, “Whole-home gesture recognition using wireless signals,” in Proceedings of ACM MobiCom, 2013. [26] Y. Wang, J. Liu, Y. Chen, M. Gruteser, J. Yang, and H. Liu, “E￾eyes: In-home device-free activity identification using fine-grained WiFi signatures,” in Proceedings of ACM MobiCom, 2014. [27] W. Wang, A. X. Liu, M. Shahzad, K. Ling, and S. Lu, “Understanding and modeling of WiFi signal based human activity recognition,” in Proceedings of ACM MobiCom, 2015. [28] G. Wang, Y. Zou, Z. Zhou, K. Wu, and L. M. Ni, “We can hear you with Wi-Fi!,” in Proceedings of ACM MobiCom, 2014. [29] F. Adib and D. Katabi, “See through walls with WiFi!,” in Proceedings of ACM SIGCOMM, 2013. [30] F. Adib, Z. Kabelac, and D. Katabi, “Multi-person motion tracking via RF body reflections,” in Proceedings of Usenix NSDI, 2015. [31] J. Lien, N. Gillian, M. E. Karagozler, P. Amihood, C. Schwesig, E. Olson, H. Raja, and I. Poupyrev, “Soli: ubiquitous gesture sensing with millimeter wave radar,” ACM Transactions on Graphics, vol. 35, no. 4, p. 142, 2016. [32] T. Wei and X. Zhang, “mTrack: High-precision passive tracking using millimeter wave radios,” in Proceedings of ACM MobiCom, 2015. [33] L. Yang, Q. Lin, X. Li, T. Liu, and Y. Liu, “See through walls with COTS RFID system!,” in Proceedings of ACM MobiCom, 2015. [34] C. Wang, J. Liu, Y. Chen, H. Liu, L. Xie, W. Wang, B. He, and S. Lu, “Multi-touch in the air: Device-free finger tracking and gesture recognition via cots rfid,” in Proceedings of IEEE INFOCOM, 2018. [35] D. K. P. Tan, M. Lesturgie, H. Sun, W. Li, and Y. Lu, “GSM based through-the-wall passive radar demonstrator for motion sensing,” in Proceedings of IEEE New Trends for Environmental Monitoring Using Passive Systems, 2008. [36] Q. Yue, Z. Ling, X. Fu, B. Liu, K. Ren, and W. Zhao, “Blind recognition of touched keys on mobile devices,” in Proceedings of ACM CCS, 2014. [37] Y. Berger, A. Wool, and A. Yeredor, “Dictionary attacks using keyboard acoustic emanations,” in Proceedings of ACM CCS, pp. 245–254, ACM, 2006. [38] Y. Yao, Y. Li, X. Liu, Z. Chi, W. Wang, T. Xie, and T. Zhu, “Aegis: An interference-negligible RF sensing shield,” in Proceedings of IEEE INFOCOM, 2018. [39] LTE; Evolved Universal Terrestrial Radio Access (E-UTRA); Physical channels and modulation. 3GPP LTE TS 36.211, 2015. [40] D. Tse and P. Viswanath, Fundamentals of wireless communication. Cambridge university press, 2005. [41] H. Li, W. Yang, J. Wang, Y. Xu, and L. Huang, “WiFinger: talk to your smart devices with finger-grained gesture,” in Proceedings of ACM UbiComp, 2016. [42] D. Vasisht, S. Kumar, and D. Katabi, “Decimeter-level localization with a single WiFi access point,” in Proceedings of Usenix NSDI, 2016. [43] Y. Xie, Z. Li, and M. Li, “Precise power delay profiling with commodity WiFi,” in Proceedings of ACM MobiCom, 2015. [44] L. R. Rabiner, “A tutorial on hidden markov models and selected applications in speech recognition,” Proceedings of the IEEE, vol. 77, no. 2, pp. 257–286, 1989. [45] I. Goodfellow, J. Pouget-Abadie, M. Mirza, B. Xu, D. Warde-Farley, S. Ozair, A. Courville, and Y. Bengio, “Generative adversarial nets,” in Advances in neural information processing systems, pp. 2672–2680, 2014
<<向上翻页
©2008-现在 cucdc.com 高等教育资讯网 版权所有