{"id":"https://openalex.org/W4409560481","doi":"https://doi.org/10.1109/tmc.2025.3562151","title":"Toward Open-World-Aware User Authentication Based on Human Bodies Using mmWave Signals","display_name":"Toward Open-World-Aware User Authentication Based on Human Bodies Using mmWave Signals","publication_year":2025,"publication_date":"2025-04-17","ids":{"openalex":"https://openalex.org/W4409560481","doi":"https://doi.org/10.1109/tmc.2025.3562151"},"language":"en","primary_location":{"id":"doi:10.1109/tmc.2025.3562151","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tmc.2025.3562151","pdf_url":null,"source":{"id":"https://openalex.org/S69141925","display_name":"IEEE Transactions on Mobile Computing","issn_l":"1536-1233","issn":["1536-1233","1558-0660","2161-9875"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310320439","host_organization_name":"IEEE Computer Society","host_organization_lineage":["https://openalex.org/P4310320439","https://openalex.org/P4310319808"],"host_organization_lineage_names":["IEEE Computer Society","Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Mobile Computing","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5101584650","display_name":"Junlin Yang","orcid":"https://orcid.org/0000-0002-9050-4039"},"institutions":[{"id":"https://openalex.org/I183067930","display_name":"Shanghai Jiao Tong University","ror":"https://ror.org/0220qvk04","country_code":"CN","type":"education","lineage":["https://openalex.org/I183067930"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Junlin Yang","raw_affiliation_strings":["Department of Computer Science and Engineering, Shanghai Jiao Tong University, Shanghai, China"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science and Engineering, Shanghai Jiao Tong University, Shanghai, China","institution_ids":["https://openalex.org/I183067930"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5012589427","display_name":"Jiadi Yu","orcid":"https://orcid.org/0000-0002-0207-9643"},"institutions":[{"id":"https://openalex.org/I183067930","display_name":"Shanghai Jiao Tong University","ror":"https://ror.org/0220qvk04","country_code":"CN","type":"education","lineage":["https://openalex.org/I183067930"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Jiadi Yu","raw_affiliation_strings":["Department of Computer Science and Engineering, Shanghai Jiao Tong University, Shanghai, China"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science and Engineering, Shanghai Jiao Tong University, Shanghai, China","institution_ids":["https://openalex.org/I183067930"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5072308822","display_name":"Linghe Kong","orcid":"https://orcid.org/0000-0001-9266-3044"},"institutions":[{"id":"https://openalex.org/I183067930","display_name":"Shanghai Jiao Tong University","ror":"https://ror.org/0220qvk04","country_code":"CN","type":"education","lineage":["https://openalex.org/I183067930"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Linghe Kong","raw_affiliation_strings":["Department of Computer Science and Engineering, Shanghai Jiao Tong University, Shanghai, China"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science and Engineering, Shanghai Jiao Tong University, Shanghai, China","institution_ids":["https://openalex.org/I183067930"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5081759167","display_name":"Yanmin Zhu","orcid":"https://orcid.org/0000-0001-6406-4992"},"institutions":[{"id":"https://openalex.org/I183067930","display_name":"Shanghai Jiao Tong University","ror":"https://ror.org/0220qvk04","country_code":"CN","type":"education","lineage":["https://openalex.org/I183067930"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Yanmin Zhu","raw_affiliation_strings":["Department of Computer Science and Engineering, Shanghai Jiao Tong University, Shanghai, China"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science and Engineering, Shanghai Jiao Tong University, Shanghai, China","institution_ids":["https://openalex.org/I183067930"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5072659343","display_name":"Hong\u2010Ning Dai","orcid":"https://orcid.org/0000-0001-6165-4196"},"institutions":[{"id":"https://openalex.org/I141568987","display_name":"Hong Kong Baptist University","ror":"https://ror.org/0145fw131","country_code":"HK","type":"education","lineage":["https://openalex.org/I141568987"]}],"countries":["HK"],"is_corresponding":false,"raw_author_name":"Hong-Ning Dai","raw_affiliation_strings":["Department of Computer Science, Hong Kong Baptist University, Hong Kong"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science, Hong Kong Baptist University, Hong Kong","institution_ids":["https://openalex.org/I141568987"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":5,"corresponding_author_ids":["https://openalex.org/A5101584650"],"corresponding_institution_ids":["https://openalex.org/I183067930"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.09755378,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":"24","issue":"9","first_page":"9036","last_page":"9049"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11800","display_name":"User Authentication and Security Systems","score":0.9776999950408936,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11800","display_name":"User Authentication and Security Systems","score":0.9776999950408936,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10828","display_name":"Biometric Identification and Security","score":0.921500027179718,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8076469898223877},{"id":"https://openalex.org/keywords/authentication","display_name":"Authentication (law)","score":0.49419787526130676},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.46543756127357483},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.34484344720840454}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8076469898223877},{"id":"https://openalex.org/C148417208","wikidata":"https://www.wikidata.org/wiki/Q4825882","display_name":"Authentication (law)","level":2,"score":0.49419787526130676},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.46543756127357483},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.34484344720840454}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/tmc.2025.3562151","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tmc.2025.3562151","pdf_url":null,"source":{"id":"https://openalex.org/S69141925","display_name":"IEEE Transactions on Mobile Computing","issn_l":"1536-1233","issn":["1536-1233","1558-0660","2161-9875"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310320439","host_organization_name":"IEEE Computer Society","host_organization_lineage":["https://openalex.org/P4310320439","https://openalex.org/P4310319808"],"host_organization_lineage_names":["IEEE Computer Society","Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Mobile Computing","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[{"score":0.550000011920929,"display_name":"Gender equality","id":"https://metadata.un.org/sdg/5"}],"awards":[{"id":"https://openalex.org/G1081045896","display_name":null,"funder_award_id":"62472277","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G4001607369","display_name":null,"funder_award_id":"62172277","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G6576852456","display_name":null,"funder_award_id":"62172275","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"}],"funders":[{"id":"https://openalex.org/F4320321001","display_name":"National Natural Science Foundation of China","ror":"https://ror.org/01h0zpd94"}],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":62,"referenced_works":["https://openalex.org/W1595159159","https://openalex.org/W1792261693","https://openalex.org/W1917989004","https://openalex.org/W1965134348","https://openalex.org/W2025433733","https://openalex.org/W2027539209","https://openalex.org/W2065429801","https://openalex.org/W2072273451","https://openalex.org/W2108525321","https://openalex.org/W2113638573","https://openalex.org/W2130817593","https://openalex.org/W2131976234","https://openalex.org/W2138621090","https://openalex.org/W2149929743","https://openalex.org/W2165193616","https://openalex.org/W2169908475","https://openalex.org/W2471074815","https://openalex.org/W2557575422","https://openalex.org/W2752782242","https://openalex.org/W2787091153","https://openalex.org/W2953236873","https://openalex.org/W2953297989","https://openalex.org/W2954621027","https://openalex.org/W2963265099","https://openalex.org/W2979856235","https://openalex.org/W2980498517","https://openalex.org/W2997616834","https://openalex.org/W3001007330","https://openalex.org/W3010673682","https://openalex.org/W3013184273","https://openalex.org/W3013328903","https://openalex.org/W3021574417","https://openalex.org/W3026105097","https://openalex.org/W3046258263","https://openalex.org/W3046956326","https://openalex.org/W3085051942","https://openalex.org/W3109009614","https://openalex.org/W3147071923","https://openalex.org/W3153665222","https://openalex.org/W3161507190","https://openalex.org/W3173544011","https://openalex.org/W3175987492","https://openalex.org/W3177034761","https://openalex.org/W3199023895","https://openalex.org/W4211003818","https://openalex.org/W4213118444","https://openalex.org/W4283209386","https://openalex.org/W4289656548","https://openalex.org/W4294891410","https://openalex.org/W4294891853","https://openalex.org/W4306250185","https://openalex.org/W4308089062","https://openalex.org/W4308089114","https://openalex.org/W4361769930","https://openalex.org/W4381856592","https://openalex.org/W4384948669","https://openalex.org/W4386260529","https://openalex.org/W4391164429","https://openalex.org/W4400809837","https://openalex.org/W4402349817","https://openalex.org/W6628932435","https://openalex.org/W6760184523"],"related_works":["https://openalex.org/W4391375266","https://openalex.org/W2899084033","https://openalex.org/W2748952813","https://openalex.org/W2390279801","https://openalex.org/W4391913857","https://openalex.org/W2358668433","https://openalex.org/W4396701345","https://openalex.org/W2376932109","https://openalex.org/W2001405890","https://openalex.org/W2912135041"],"abstract_inverted_index":{"User":[0],"authentication":[1,11,62,163,183],"is":[2,165],"evolving":[3],"with":[4,33,43,51],"expanded":[5],"applications":[6],"and":[7,24,46,78,96,131,187],"innovative":[8],"techniques.":[9],"New":[10],"approaches":[12],"utilize":[13],"RF":[14,29],"signals":[15],"to":[16,73,92,109,167],"sense":[17,74],"specific":[18],"human":[19,76,99,104,114,120,133],"characteristics,":[20],"offering":[21],"a":[22,67,86,137,161],"contactless":[23],"nonintrusive":[25],"solution.":[26],"However,":[27],"these":[28,129],"signal-based":[30],"methods":[31],"struggle":[32],"challenges":[34],"in":[35,172,194],"open-world":[36,60,195],"scenarios,":[37],"i.e.,":[38],"dynamic":[39],"environments,":[40],"daily":[41],"behaviors":[42,79],"unrestricted":[44,75,119],"postures,":[45,115],"identification":[47],"of":[48,113,185,192],"unauthorized":[49,149,157],"users":[50],"security":[52,144],"threats.":[53],"In":[54],"this":[55],"paper,":[56],"we":[57],"present":[58],"an":[59,181],"user":[61,158],"system,":[63],"OpenAuth,":[64],"which":[65],"leverages":[66],"commercial":[68],"off-the-shelf":[69],"(COTS)":[70],"mmWave":[71],"radar":[72],"postures":[77],"for":[80,155],"identifying":[81],"individuals.":[82],"First,":[83],"OpenAuth":[84,151,179],"utilizes":[85],"MUSIC-based":[87],"neural":[88],"network":[89],"imaging":[90],"model":[91,164],"eliminate":[93,142],"environmental":[94],"clutter":[95],"generate":[97],"environment-independent":[98,130],"silhouette":[100,105,134],"images.":[101],"Then,":[102],"the":[103,177],"images":[106,135],"are":[107,126],"normalized":[108],"consistent":[110],"topological":[111],"structures":[112],"ensuring":[116],"robustness":[117],"against":[118],"postures.":[121],"Next,":[122],"fine-grained":[123],"body":[124],"features":[125],"extracted":[127],"from":[128,148],"posture-independent":[132],"using":[136],"metric":[138],"learning":[139],"model.":[140],"To":[141],"potential":[143],"threats":[145],"that":[146,176],"arise":[147],"users,":[150],"synthesizes":[152],"data":[153],"placeholders":[154],"enhancing":[156],"identification.":[159],"Finally,":[160],"k-NN-based":[162],"constructed":[166],"authenticate":[168],"users'":[169],"identities.":[170],"Experiments":[171],"real":[173],"environments":[174],"show":[175],"proposed":[178],"achieves":[180],"average":[182],"accuracy":[184],"93.4%":[186],"false":[188],"acceptance":[189],"rate":[190],"(FAR)":[191],"1.8%":[193],"scenarios.":[196]},"counts_by_year":[],"updated_date":"2026-04-09T08:11:56.329763","created_date":"2025-10-10T00:00:00"}
