{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,5,2]],"date-time":"2025-05-02T23:44:42Z","timestamp":1746229482908,"version":"3.37.3"},"reference-count":38,"publisher":"IEEE","license":[{"start":{"date-parts":[[2021,6,25]],"date-time":"2021-06-25T00:00:00Z","timestamp":1624579200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2021,6,25]],"date-time":"2021-06-25T00:00:00Z","timestamp":1624579200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/501100012166","name":"National Key Research and Development Program of China","doi-asserted-by":"publisher","id":[{"id":"10.13039\/501100012166","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100006190","name":"Research and Development","doi-asserted-by":"publisher","id":[{"id":"10.13039\/100006190","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100004835","name":"Zhejiang University","doi-asserted-by":"publisher","id":[{"id":"10.13039\/501100004835","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100004835","name":"Zhejiang University","doi-asserted-by":"publisher","id":[{"id":"10.13039\/501100004835","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2021,6,25]]},"DOI":"10.1109\/iwqos52092.2021.9521278","type":"proceedings-article","created":{"date-parts":[[2021,8,26]],"date-time":"2021-08-26T20:59:51Z","timestamp":1630011591000},"page":"1-10","source":"Crossref","is-referenced-by-count":3,"title":["A Behavior Privacy Preserving Method towards RF Sensing"],"prefix":"10.1109","author":[{"given":"Jianwei","family":"Liu","sequence":"first","affiliation":[{"name":"Zhejiang University,China"}]},{"given":"Chaowei","family":"Xiao","sequence":"additional","affiliation":[{"name":"Arizona State University,USA"}]},{"given":"Kaiyan","family":"Cui","sequence":"additional","affiliation":[{"name":"Xi’an Jiaotong University,China"}]},{"given":"Jinsong","family":"Han","sequence":"additional","affiliation":[{"name":"Zhejiang University,China"}]},{"given":"Xian","family":"Xu","sequence":"additional","affiliation":[{"name":"Zhejiang University,China"}]},{"given":"Kui","family":"Ren","sequence":"additional","affiliation":[{"name":"Zhejiang University,China"}]},{"given":"Xufei","family":"Mao","sequence":"additional","affiliation":[{"name":"Dongguan University of Technology,China"}]}],"member":"263","reference":[{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2923743"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM41043.2020.9155471"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM41043.2020.9155427"},{"key":"ref31","article-title":"Towards deep learning models resistant to adversarial attacks","author":"madry","year":"2018","journal-title":"International Conference on Learning Representations"},{"year":"2020","key":"ref30","article-title":"Chi-square test of independence: Definition, formula, and example"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1145\/3286978.3287009"},{"article-title":"Privacy-preserving speech processing via STPC and TEEs","year":"2019","author":"bayerl","key":"ref36"},{"key":"ref35","article-title":"Our data, ourselves: Privacy via distributed noise generation","author":"dwork","year":"2006","journal-title":"International Conference on the Theory and Applications of Cryptographic Techniques"},{"key":"ref34","article-title":"Protecting sensitive attributes via generative adversarial networks","author":"rezaei","year":"2018","journal-title":"CoRR"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1145\/3191755"},{"year":"2020","key":"ref11","article-title":"What do your daily habits reveal about your personality?"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1145\/2973750.2973762"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1145\/2976749.2978397"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2005.202"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1145\/2971648.2971670"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/TMC.2016.2557792"},{"key":"ref17","article-title":"Inbody backscatter communication and localization","author":"vasisht","year":"2018","journal-title":"Conference of the ACM Special Interest Special Interest Group on Data Communication SIGCOMM"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2017.54"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR42600.2020.01071"},{"key":"ref28","article-title":"Relu and sigmoidal activation functions","author":"pretorius","year":"2019","journal-title":"South African Forum for Artificial Intelligence Research"},{"key":"ref4","article-title":"Wipin: Operation-free person identification using wifi signals","author":"wang","year":"2019","journal-title":"Proc IEEE Global Communication Conference GLOBECOM"},{"key":"ref27","doi-asserted-by":"crossref","DOI":"10.14722\/ndss.2020.24210","article-title":"On the resilience of biometric authentication systems against random inputs","author":"zhao","year":"2020","journal-title":"the Symposium on Network and Distributed System Security NDSS-95"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1145\/3210240.3210314"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/IPSN.2016.7460727"},{"key":"ref29","article-title":"Cross-entropy loss and low-rank features have responsibility for adversarial examples","author":"nar","year":"2019","journal-title":"CoRR"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/GLOCOM.2016.7841847"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM41043.2020.9155346"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/IWQoS49365.2020.9212855"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1145\/3307334.3326081"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1145\/3241539.3241548"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM.2019.8737419"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/DCOSS.2016.30"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM41043.2020.9155539"},{"key":"ref21","first-page":"193:1","article-title":"Modeling RFID signal reflection for contactfree activity recognition","volume":"2","author":"wang","year":"2018","journal-title":"Proceedings of the ACM on Interactive Mobile Wearable and Ubiquitous Technologies IMWUT"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1007\/s10044-011-0222-1"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2017.1700082"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV.2019.00555"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1145\/1672308.1672313"}],"event":{"name":"2021 IEEE\/ACM 29th International Symposium on Quality of Service (IWQOS)","start":{"date-parts":[[2021,6,25]]},"location":"Tokyo, Japan","end":{"date-parts":[[2021,6,28]]}},"container-title":["2021 IEEE\/ACM 29th International Symposium on Quality of Service (IWQOS)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9521186\/9521256\/09521278.pdf?arnumber=9521278","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,8,2]],"date-time":"2022-08-02T23:44:30Z","timestamp":1659483870000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9521278\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,6,25]]},"references-count":38,"URL":"https:\/\/doi.org\/10.1109\/iwqos52092.2021.9521278","relation":{},"subject":[],"published":{"date-parts":[[2021,6,25]]}}}