{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,21]],"date-time":"2025-02-21T01:44:26Z","timestamp":1740102266247,"version":"3.37.3"},"publisher-location":"New York, NY, USA","reference-count":76,"publisher":"ACM","license":[{"start":{"date-parts":[[2023,10,16]],"date-time":"2023-10-16T00:00:00Z","timestamp":1697414400000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/100000001","name":"NSF (National Science Foundation)","doi-asserted-by":"publisher","award":["1948547;2155181"],"id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2023,10,16]]},"DOI":"10.1145\/3607199.3607245","type":"proceedings-article","created":{"date-parts":[[2023,10,3]],"date-time":"2023-10-03T22:30:51Z","timestamp":1696372251000},"page":"440-454","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":0,"title":["Phantom-CSI Attacks against Wireless Liveness Detection"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-1315-1994","authenticated-orcid":false,"given":"Qiuye","family":"He","sequence":"first","affiliation":[{"name":"Computer Science, University of Oklahoma, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-7879-3731","authenticated-orcid":false,"given":"Song","family":"Fang","sequence":"additional","affiliation":[{"name":"Computer Science, University of Oklahoma, USA"}]}],"member":"320","published-online":{"date-parts":[[2023,10,16]]},"reference":[{"key":"e_1_3_2_1_1_1","volume-title":"29th USENIX Security Symposium (USENIX Security 20)","author":"Ahmed Muhammad\u00a0Ejaz","year":"2020","unstructured":"Muhammad\u00a0Ejaz Ahmed, Il-Youp Kwak, Jun\u00a0Ho Huh, Iljoo Kim, Taekkyung Oh, and Hyoungshick Kim. 2020. Void: A fast and light voice liveness detection system. In 29th USENIX Security Symposium (USENIX Security 20). 2685\u20132702."},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1145\/2789168.2790109"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2017.2680998"},{"key":"e_1_3_2_1_4_1","unstructured":"Zach Banks and Eric\u00a0Van Albert. 2015. Looping Surveillance Cameras through Live Editing of Network Streams. https:\/\/infocondb.org\/con\/def-con\/def-con-23\/looping-surveillance-cameras-through-live-editing-of-network-streams."},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/3212480.3212505"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1109\/TASSP.1979.1163209"},{"key":"e_1_3_2_1_7_1","volume-title":"OpenPose: realtime multi-person 2D pose estimation using Part Affinity Fields","author":"Cao Zhe","year":"2019","unstructured":"Zhe Cao, Gines Hidalgo, Tomas Simon, Shih-En Wei, and Yaser Sheikh. 2019. OpenPose: realtime multi-person 2D pose estimation using Part Affinity Fields. IEEE transactions on pattern analysis and machine intelligence 43, 1 (2019), 172\u2013186."},{"key":"e_1_3_2_1_8_1","unstructured":"Edgar Cervantes. 2021. The best Siri commands for productivity information laughter and more. https:\/\/www.androidauthority.com\/best-siri-commands-1094484\/."},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1145\/2594368.2594373"},{"key":"e_1_3_2_1_10_1","unstructured":"CODi. 2021. FALCO HD 1080P Auto Focus Webcam. https:\/\/www.codiworldwide.com\/mobile-accessories\/falco-hd-1080p-webcam\/."},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1080\/01621459.1993.10476339"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/2666620.2666623"},{"key":"e_1_3_2_1_13_1","unstructured":"Ettus Research. 2021. SBX 400-4400 MHz Rx\/Tx (120 MHz X Series only). https:\/\/www.ettus.com\/all-products\/sbx120\/."},{"key":"e_1_3_2_1_14_1","unstructured":"Ettus Research. 2021. USRP X300. https:\/\/www.ettus.com\/all-products\/x300-kit\/."},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1145\/3243734.3243755"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1145\/3117811.3117823"},{"volume-title":"Wireless Communications","author":"Goldsmith Andrea","key":"e_1_3_2_1_17_1","unstructured":"Andrea Goldsmith. 2005. Wireless Communications. Cambridge University Press, New York, NY, USA."},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1145\/3349623.3355477"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1145\/3458864.3467683"},{"key":"e_1_3_2_1_20_1","unstructured":"Craig Heffners. 2013. Exploiting Network Surveillance Cameras Like a Hollywood Hacker. https:\/\/www.youtube.com\/watch?v=B8DjTcANBx0."},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1145\/3241539.3241560"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1145\/3191744"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1109\/TWC.2021.3129188"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM42981.2021.9488798"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1109\/TBDATA.2018.2848969"},{"volume-title":"The Era of Interactive Media","author":"Jin S","key":"e_1_3_2_1_26_1","unstructured":"Jesse\u00a0S Jin, Changsheng Xu, Min Xu, Dai-Kyung Hyun, Min-Jeong Lee, Seung-Jin Ryu, Hae-Yeoun Lee, and Heung-Kyu Lee. 2013. Forgery detection for surveillance video. In The Era of Interactive Media. Springer, 25\u201336."},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.3390\/s20174806"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"crossref","unstructured":"Tomi Kinnunen Md Sahidullah H\u00e9ctor Delgado Massimiliano Todisco Nicholas Evans Junichi Yamagishi and Kong\u00a0Aik Lee. 2017. The ASVspoof 2017 challenge: Assessing the limits of replay spoofing attack detection. (2017).","DOI":"10.21437\/Interspeech.2017-1111"},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1145\/3317549.3324928"},{"key":"e_1_3_2_1_30_1","volume-title":"SurFi: Detecting Surveillance Camera Looping Attacks with Wi-Fi Channel State Information (Extended Version). arXiv preprint arXiv:1904.01350","author":"Lakshmanan Nitya","year":"2019","unstructured":"Nitya Lakshmanan, Inkyu Bang, Min\u00a0Suk Kang, Jun Han, and Jong\u00a0Taek Lee. 2019. SurFi: Detecting Surveillance Camera Looping Attacks with Wi-Fi Channel State Information (Extended Version). arXiv preprint arXiv:1904.01350 (2019)."},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2019.2934489"},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1145\/2746285.2746303"},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1109\/TNSE.2018.2848960"},{"key":"e_1_3_2_1_34_1","unstructured":"Yan Meng Jiachun Li Matthew Pillari Arjun Deopujari Liam Brennan Hafsah Shamsie Haojin Zhu and Yuan Tian. 2022. Your microphone array retains your identity: A robust voice liveness detection system for smart speaker. In USENIX Security."},{"volume-title":"WiVo: Enhancing the Security of Voice Control System via Wireless Signal in IoT Environment(Mobihoc \u201918)","author":"Meng Yan","key":"e_1_3_2_1_35_1","unstructured":"Yan Meng, Zichang Wang, Wei Zhang, Peilin Wu, Haojin Zhu, Xiaohui Liang, and Yao Liu. 2018. WiVo: Enhancing the Security of Voice Control System via Wireless Signal in IoT Environment(Mobihoc \u201918). Association for Computing Machinery, New York, NY, USA, 81\u201390."},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2020.2973620"},{"key":"e_1_3_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-24177-7_30"},{"volume-title":"Proceedings of the 2008 ACM SIGMOD International Conference on Management of Data","author":"F.","key":"e_1_3_2_1_38_1","unstructured":"Eduardo\u00a0F. Nakamura and Antonio A.\u00a0F. Loureiro. 2008. Information Fusion in Wireless Sensor Networks. In Proceedings of the 2008 ACM SIGMOD International Conference on Management of Data (Vancouver, Canada) (SIGMOD \u201908). Association for Computing Machinery, New York, NY, USA, 1365\u20131372."},{"key":"e_1_3_2_1_39_1","volume-title":"RadioMic: Sound Sensing via mmWave Signals. arXiv preprint arXiv:2108.03164","author":"Ozturk Muhammed\u00a0Zahid","year":"2021","unstructured":"Muhammed\u00a0Zahid Ozturk, Chenshu Wu, Beibei Wang, and KJ Liu. 2021. RadioMic: Sound Sensing via mmWave Signals. arXiv preprint arXiv:2108.03164 (2021)."},{"key":"e_1_3_2_1_40_1","doi-asserted-by":"publisher","DOI":"10.1145\/3161183"},{"key":"e_1_3_2_1_41_1","doi-asserted-by":"publisher","DOI":"10.1109\/87.974338"},{"key":"e_1_3_2_1_42_1","doi-asserted-by":"publisher","DOI":"10.1145\/3351258"},{"key":"e_1_3_2_1_43_1","doi-asserted-by":"publisher","DOI":"10.1145\/3157677"},{"key":"e_1_3_2_1_44_1","doi-asserted-by":"publisher","DOI":"10.1145\/3534593"},{"key":"e_1_3_2_1_45_1","doi-asserted-by":"publisher","DOI":"10.1145\/2307636.2307654"},{"key":"e_1_3_2_1_46_1","doi-asserted-by":"publisher","DOI":"10.1109\/TNSE.2021.3138699"},{"key":"e_1_3_2_1_47_1","doi-asserted-by":"publisher","DOI":"10.1145\/3084041.3084061"},{"key":"e_1_3_2_1_48_1","volume-title":"A tutorial on principal component analysis. arXiv preprint arXiv:1404.1100","author":"Shlens Jonathon","year":"2014","unstructured":"Jonathon Shlens. 2014. A tutorial on principal component analysis. arXiv preprint arXiv:1404.1100 (2014)."},{"key":"e_1_3_2_1_49_1","volume-title":"The scientist and engineer\u2019s guide to digital signal processing","author":"Smith W","year":"1999","unstructured":"Steven\u00a0W Smith. 1999. The scientist and engineer\u2019s guide to digital signal processing, Second Edition. (1999)."},{"key":"e_1_3_2_1_50_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-23678-5_12"},{"key":"e_1_3_2_1_51_1","doi-asserted-by":"publisher","DOI":"10.1145\/2851581.2892449"},{"key":"e_1_3_2_1_52_1","doi-asserted-by":"publisher","DOI":"10.1145\/2046707.2046719"},{"key":"e_1_3_2_1_53_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICC42927.2021.9500792"},{"key":"e_1_3_2_1_54_1","doi-asserted-by":"publisher","DOI":"10.1109\/CCST.2011.6095943"},{"key":"e_1_3_2_1_55_1","doi-asserted-by":"publisher","DOI":"10.1145\/3081333.3081340"},{"key":"e_1_3_2_1_56_1","doi-asserted-by":"publisher","DOI":"10.1145\/2639108.2639112"},{"key":"e_1_3_2_1_57_1","doi-asserted-by":"publisher","DOI":"10.1145\/2971648.2971744"},{"key":"e_1_3_2_1_58_1","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM.2019.8737422"},{"key":"e_1_3_2_1_59_1","doi-asserted-by":"publisher","DOI":"10.1145\/3372297.3417254"},{"key":"e_1_3_2_1_60_1","doi-asserted-by":"publisher","DOI":"10.1145\/2971648.2971670"},{"key":"e_1_3_2_1_61_1","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1145\/3377165","article-title":"On CSI-based vital sign monitoring using commodity WiFi","volume":"1","author":"Wang Xuyu","year":"2020","unstructured":"Xuyu Wang, Chao Yang, and Shiwen Mao. 2020. On CSI-based vital sign monitoring using commodity WiFi. ACM Transactions on Computing for Healthcare 1, 3 (2020), 1\u201327.","journal-title":"ACM Transactions on Computing for Healthcare"},{"key":"e_1_3_2_1_62_1","doi-asserted-by":"publisher","DOI":"10.1145\/2639108.2639143"},{"key":"e_1_3_2_1_63_1","doi-asserted-by":"publisher","DOI":"10.1145\/3338026"},{"key":"e_1_3_2_1_64_1","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2015.2430294"},{"key":"e_1_3_2_1_65_1","doi-asserted-by":"publisher","DOI":"10.1109\/TPDS.2012.214"},{"key":"e_1_3_2_1_66_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2019.2944058"},{"key":"e_1_3_2_1_67_1","doi-asserted-by":"publisher","DOI":"10.1109\/TNET.2022.3147721"},{"key":"e_1_3_2_1_68_1","doi-asserted-by":"publisher","DOI":"10.1145\/3548606.3559339"},{"key":"e_1_3_2_1_69_1","doi-asserted-by":"publisher","DOI":"10.1109\/TWC.2020.2969627"},{"key":"e_1_3_2_1_70_1","doi-asserted-by":"publisher","DOI":"10.1109\/LCNW.2015.7365932"},{"key":"e_1_3_2_1_71_1","volume-title":"WiWho: WiFi-Based Person Identification in Smart Spaces. In 2016 15th ACM\/IEEE International Conference on Information Processing in Sensor Networks (IPSN). 1\u201312","author":"Zeng Yunze","year":"2016","unstructured":"Yunze Zeng, Parth\u00a0H. Pathak, and Prasant Mohapatra. 2016. WiWho: WiFi-Based Person Identification in Smart Spaces. In 2016 15th ACM\/IEEE International Conference on Information Processing in Sensor Networks (IPSN). 1\u201312."},{"key":"e_1_3_2_1_72_1","doi-asserted-by":"publisher","DOI":"10.1145\/3264958"},{"key":"e_1_3_2_1_73_1","volume-title":"VibLive: A Continuous Liveness Detection for Secure Voice User Interface in IoT Environment. In Annual Computer Security Applications Conference. 884\u2013896","author":"Zhang Linghan","year":"2020","unstructured":"Linghan Zhang, Sheng Tan, Zi Wang, Yili Ren, Zhi Wang, and Jie Yang. 2020. VibLive: A Continuous Liveness Detection for Secure Voice User Interface in IoT Environment. In Annual Computer Security Applications Conference. 884\u2013896."},{"key":"e_1_3_2_1_74_1","doi-asserted-by":"publisher","DOI":"10.1145\/2976749.2978296"},{"key":"e_1_3_2_1_75_1","volume-title":"CommanderGabble: A Universal Attack Against ASR Systems Leveraging Fast Speech. In Annual Computer Security Applications Conference","author":"Yang Edwin","year":"2021","unstructured":"Zhaohe\u00a0(John) Zhang, Edwin Yang, and Song Fang. 2021. CommanderGabble: A Universal Attack Against ASR Systems Leveraging Fast Speech. In Annual Computer Security Applications Conference (Virtual Event, USA) (ACSAC \u201921). Association for Computing Machinery, New York, NY, USA, 720\u2013731."},{"key":"e_1_3_2_1_76_1","doi-asserted-by":"publisher","DOI":"10.1145\/3478116"}],"event":{"name":"RAID 2023: The 26th International Symposium on Research in Attacks, Intrusions and Defenses","acronym":"RAID 2023","location":"Hong Kong China"},"container-title":["Proceedings of the 26th International Symposium on Research in Attacks, Intrusions and Defenses"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3607199.3607245","content-type":"application\/pdf","content-version":"vor","intended-application":"syndication"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3607199.3607245","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,10,16]],"date-time":"2024-10-16T10:28:49Z","timestamp":1729074529000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3607199.3607245"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,10,16]]},"references-count":76,"alternative-id":["10.1145\/3607199.3607245","10.1145\/3607199"],"URL":"https:\/\/doi.org\/10.1145\/3607199.3607245","relation":{},"subject":[],"published":{"date-parts":[[2023,10,16]]},"assertion":[{"value":"2023-10-16","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}