{"id":"https://openalex.org/W4308089062","doi":"https://doi.org/10.1109/secon55815.2022.9918606","title":"Your Breath Doesn't Lie: Multi-user Authentication by Sensing Respiration Using mmWave Radar","display_name":"Your Breath Doesn't Lie: Multi-user Authentication by Sensing Respiration Using mmWave Radar","publication_year":2022,"publication_date":"2022-09-20","ids":{"openalex":"https://openalex.org/W4308089062","doi":"https://doi.org/10.1109/secon55815.2022.9918606"},"language":"en","primary_location":{"id":"doi:10.1109/secon55815.2022.9918606","is_oa":false,"landing_page_url":"https://doi.org/10.1109/secon55815.2022.9918606","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2022 19th Annual IEEE International Conference on Sensing, Communication, and Networking (SECON)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5016490673","display_name":"Yao Wang","orcid":"https://orcid.org/0000-0002-4578-4932"},"institutions":[{"id":"https://openalex.org/I149594827","display_name":"Xidian University","ror":"https://ror.org/05s92vm98","country_code":"CN","type":"education","lineage":["https://openalex.org/I149594827"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Yao Wang","raw_affiliation_strings":["School of Cyber Engineering, Xidian University,China","School of Cyber Engineering, Xidian University, China"],"affiliations":[{"raw_affiliation_string":"School of Cyber Engineering, Xidian University,China","institution_ids":["https://openalex.org/I149594827"]},{"raw_affiliation_string":"School of Cyber Engineering, Xidian University, China","institution_ids":["https://openalex.org/I149594827"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5054698524","display_name":"Tao Gu","orcid":"https://orcid.org/0000-0002-1350-6639"},"institutions":[{"id":"https://openalex.org/I99043593","display_name":"Macquarie University","ror":"https://ror.org/01sf06y89","country_code":"AU","type":"education","lineage":["https://openalex.org/I99043593"]}],"countries":["AU"],"is_corresponding":false,"raw_author_name":"Tao Gu","raw_affiliation_strings":["School of Computing, Macquarie University,Australia","School of Computing, Macquarie University, Australia"],"affiliations":[{"raw_affiliation_string":"School of Computing, Macquarie University,Australia","institution_ids":["https://openalex.org/I99043593"]},{"raw_affiliation_string":"School of Computing, Macquarie University, Australia","institution_ids":["https://openalex.org/I99043593"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5040978564","display_name":"Tom H. Luan","orcid":"https://orcid.org/0000-0002-5215-7443"},"institutions":[{"id":"https://openalex.org/I149594827","display_name":"Xidian University","ror":"https://ror.org/05s92vm98","country_code":"CN","type":"education","lineage":["https://openalex.org/I149594827"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Tom H. Luan","raw_affiliation_strings":["School of Cyber Engineering, Xidian University,China","School of Cyber Engineering, Xidian University, China"],"affiliations":[{"raw_affiliation_string":"School of Cyber Engineering, Xidian University,China","institution_ids":["https://openalex.org/I149594827"]},{"raw_affiliation_string":"School of Cyber Engineering, Xidian University, China","institution_ids":["https://openalex.org/I149594827"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5100419998","display_name":"Yong Yu","orcid":"https://orcid.org/0000-0002-0187-2439"},"institutions":[{"id":"https://openalex.org/I4210136859","display_name":"Xi\u2019an University of Posts and Telecommunications","ror":"https://ror.org/04jn0td46","country_code":"CN","type":"education","lineage":["https://openalex.org/I4210136859"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Yong Yu","raw_affiliation_strings":["School of Cyber Security, Xi&#x0027;an University of Posts and Telecommunications,China"],"affiliations":[{"raw_affiliation_string":"School of Cyber Security, Xi&#x0027;an University of Posts and Telecommunications,China","institution_ids":["https://openalex.org/I4210136859"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5016490673"],"corresponding_institution_ids":["https://openalex.org/I149594827"],"apc_list":null,"apc_paid":null,"fwci":8.2764,"has_fulltext":false,"cited_by_count":28,"citation_normalized_percentile":{"value":0.97638873,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":96,"max":99},"biblio":{"volume":null,"issue":null,"first_page":"64","last_page":"72"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11800","display_name":"User Authentication and Security Systems","score":0.9753999710083008,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11800","display_name":"User Authentication and Security Systems","score":0.9753999710083008,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11196","display_name":"Non-Invasive Vital Sign Monitoring","score":0.953499972820282,"subfield":{"id":"https://openalex.org/subfields/2204","display_name":"Biomedical Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11932","display_name":"Wireless Body Area Networks","score":0.9388999938964844,"subfield":{"id":"https://openalex.org/subfields/2204","display_name":"Biomedical Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7967277765274048},{"id":"https://openalex.org/keywords/authentication","display_name":"Authentication (law)","score":0.47064298391342163},{"id":"https://openalex.org/keywords/radar","display_name":"Radar","score":0.4655293822288513},{"id":"https://openalex.org/keywords/spoofing-attack","display_name":"Spoofing attack","score":0.43649324774742126},{"id":"https://openalex.org/keywords/real-time-computing","display_name":"Real-time computing","score":0.3572390079498291},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.2696648836135864},{"id":"https://openalex.org/keywords/telecommunications","display_name":"Telecommunications","score":0.09041169285774231}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7967277765274048},{"id":"https://openalex.org/C148417208","wikidata":"https://www.wikidata.org/wiki/Q4825882","display_name":"Authentication (law)","level":2,"score":0.47064298391342163},{"id":"https://openalex.org/C554190296","wikidata":"https://www.wikidata.org/wiki/Q47528","display_name":"Radar","level":2,"score":0.4655293822288513},{"id":"https://openalex.org/C167900197","wikidata":"https://www.wikidata.org/wiki/Q11081100","display_name":"Spoofing attack","level":2,"score":0.43649324774742126},{"id":"https://openalex.org/C79403827","wikidata":"https://www.wikidata.org/wiki/Q3988","display_name":"Real-time computing","level":1,"score":0.3572390079498291},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.2696648836135864},{"id":"https://openalex.org/C76155785","wikidata":"https://www.wikidata.org/wiki/Q418","display_name":"Telecommunications","level":1,"score":0.09041169285774231}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/secon55815.2022.9918606","is_oa":false,"landing_page_url":"https://doi.org/10.1109/secon55815.2022.9918606","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2022 19th Annual IEEE International Conference on Sensing, Communication, and Networking (SECON)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[{"id":"https://openalex.org/G8278920337","display_name":null,"funder_award_id":"62002278","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"}],"funders":[{"id":"https://openalex.org/F4320321001","display_name":"National Natural Science Foundation of China","ror":"https://ror.org/01h0zpd94"}],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":0,"referenced_works":[],"related_works":["https://openalex.org/W4391375266","https://openalex.org/W2899084033","https://openalex.org/W2748952813","https://openalex.org/W2188559950","https://openalex.org/W2989910292","https://openalex.org/W2998478967","https://openalex.org/W3128793638","https://openalex.org/W2123299109","https://openalex.org/W4387799680","https://openalex.org/W4308237908"],"abstract_inverted_index":{"User":[0],"authentication":[1,197],"is":[2,158,169,173,185],"critical":[3],"to":[4,43,65,74,104,123,141,153,161],"privacy":[5],"preservation.":[6],"Most":[7],"of":[8,199,208],"the":[9,45,52,95,125,143],"existing":[10],"works":[11],"focus":[12,110],"on":[13,111],"single-user":[14],"authentication,":[15],"which":[16],"may":[17],"not":[18],"work":[19],"efficiently":[20],"and":[21,108,147,164,167,175,191,203],"practically":[22],"in":[23,83,187],"multi-user":[24],"scenarios.":[25],"To":[26,90],"this":[27],"end,":[28],"we":[29,99,135],"present":[30],"a":[31,38,118,137,149],"Multi-user":[32],"Authentication":[33],"system":[34],"(M-Auth)":[35],"that":[36,54,183],"employs":[37],"single":[39],"COTS":[40],"mmWave":[41],"radar":[42,77],"capture":[44],"user's":[46],"unique":[47,174],"breathing":[48],"pattern.":[49],"It":[50],"exploits":[51],"phenomenon":[53],"radio":[55],"frequency":[56],"(RF)":[57],"signals":[58,86],"are":[59],"affected":[60],"by":[61],"chest":[62],"displacements":[63],"due":[64,160],"breathing.":[66],"We":[67,116],"specifically":[68],"design":[69],"an":[70,196,204],"auxiliary":[71],"rotating":[72],"gadget":[73],"dynamically":[75],"adjust":[76],"orientation,":[78],"making":[79],"it":[80,168],"more":[81],"effective":[82,186],"capturing":[84],"respiration":[85,132,172],"from":[87,94,113],"multiple":[88],"users.":[89],"profile":[91],"individual":[92],"components":[93],"entangled":[96],"RF":[97],"signals,":[98],"leverage":[100],"mmWave's":[101],"high":[102],"directivity":[103],"locate":[105],"each":[106,155],"user":[107],"separately":[109],"reflections":[112],"different":[114],"positions.":[115],"propose":[117],"signal":[119],"energy":[120],"comparison":[121],"method":[122],"eliminate":[124],"irrelevant":[126],"body":[127],"movements":[128],"for":[129],"preserving":[130],"fine-grained":[131],"traits.":[133],"Afterward,":[134],"develop":[136],"feature":[138],"selection":[139],"pipeline":[140],"elicit":[142],"most":[144],"informative":[145],"features":[146],"train":[148],"machine":[150],"learning-based":[151],"classifier":[152],"identify":[154],"user.":[156],"M-Auth":[157,184],"practical":[159],"its":[162],"non-contact":[163],"passive":[165],"nature,":[166],"secure":[170],"as":[171],"difficult-to-forge.":[176],"Extensive":[177],"experiments":[178],"involving":[179],"37":[180],"participants":[181],"demonstrate":[182],"verifying":[188],"legitimate":[189],"users":[190],"thwarting":[192],"spoofing":[193],"attacks,":[194],"with":[195],"accuracy":[198],"over":[200,209],"96":[201],"%":[202],"attack":[205],"detection":[206],"rate":[207],"95%.":[210]},"counts_by_year":[{"year":2026,"cited_by_count":2},{"year":2025,"cited_by_count":10},{"year":2024,"cited_by_count":13},{"year":2023,"cited_by_count":3}],"updated_date":"2026-03-17T09:09:15.849793","created_date":"2025-10-10T00:00:00"}
