Find me a safe zone: A countermeasure for channel state information based attacks
Tài liệu tham khảo
Abdelnasser, 2015, Wigest: a ubiquitous wifi-based gesture recognition system, 1472
Ali, 2015, Keystroke recognition using wifi signals, 90
Aviv, 2010, Smudge attacks on smartphone touch screens, Woot, 10, 1
Chintalapudi, 2010, Indoor localization without the pain, 173
Daniel H, Anmol S, David Wetherall WH. Linux 802.11n CSI tool. https://github.com/dhalperi/linux-80211n-csitool; 2012.
Fazal L, Kappes M, Krishnakumar AS, Ganu SN, Krishnan P. Detection of hidden wireless routers. 2010. US Patent 7,840,698.
Goswami, 2011, WIGEM: a learning-based approach for indoor localization, 3
Halperin, 2010, 802.11 with multiple antennas for dummies, SIGCOMM Comput Commun Rev, 40, 19, 10.1145/1672308.1672313
Jiang, 2013, Rejecting the attack: Source authentication for wi-fi management frames using CSI information, Proc. IEEE Infocom, 12, 2544
Lachapelle G, Godha S, Cannon ME. Performance of integrated HSGPS-IMU technology for pedestrian navigation under signal masking2006.
Li, 2012, A reliable and accurate indoor localization method using phone inertial sensors, 421
Li, 2016, When CSI meets public wifi: Inferring your mobile phone password via wifi signals, 1068
Liu, 2015, Snooping keystrokes with mm-level audio ranging on a single phone, 142
Melgarejo, 2014, Leveraging directional antenna capabilities for fine-grained gesture recognition, 541
Rai, 2012, Zee: zero-effort crowdsourcing for indoor localization, 293
Raij, 2011, Privacy risks emerging from the adoption of innocuous wearable sensors in the mobile environment, 11
Shukla, 2014, Beware, your hands reveal your secrets!, 904
Tung, 2014, Vulnerability and protection of channel state information in multiuser mimo networks, 22, 775
Uellenbeck, 2013, Quantifying the security of graphical passwords:the case of android unlock patterns, 161
Wang, 2018, Accurate sybil attack detection based on fine-grained physical channel information, Sensors
Wang, 2014, We can hear you with wi-fi!, 593
Wang, 2015, Mole: motion leaks through smartwatch sensors, 155
Wang, 2015, Understanding and modeling of wifi signal based human activity recognition, 65
Wang, 2014, E-eyes: device-free location-oriented activity identification using fine-grained wifi signatures, 617
Wang, 2017, Wifall: device-free fall detection by wireless networks, IEEE Trans. Mob. Comput., 16, 581, 10.1109/TMC.2016.2557792
Weinberg, 2002, Using the adxl202 in pedometer and personal navigation applications, Analog Devices AN-602 Application Note, 2, 1
Wu, 2015, Phaseu:real-time los identification with wifi, 2038
Xi, 2014, Electronic frog eye: counting crowd using wifi, 361
Xu, 2014, Rss-based source localization when path-loss model parameters are unknown, IEEE Commun. Lett., 18, 1055, 10.1109/LCOMM.2014.2318031
Yang, 2013, From RSSI to CSI: Indoor localization via channel response, ACM Comput. Surv. (CSUR), 46, 25, 10.1145/2543581.2543592
Ye, 2017, Cracking android pattern lock in five attempts
Yue, 2014, Blind recognition of touched keys on mobile devices, 1403
Zeng, 2016, Wiwho: Wifi-based person identification in smart spaces, 1
Zhang, 2017, Protect sensitive information against channel state information based attacks
Zhang, 2016, Privacy leakage in mobile sensing: your unlock passwords can be leaked through wireless hotspot functionality, Mob. Inf. Syst., 2016, 1
Zhang, 2012, Fingerprint attack against touch-enabled devices, 57
Zhu, 2014, Context-free attacks using keyboard acoustic emanations, 453