{"id":"https://openalex.org/W4408100409","doi":"https://doi.org/10.1109/ants63515.2024.10898521","title":"Practical Defense Against Adversarial WiFi Sensing","display_name":"Practical Defense Against Adversarial WiFi Sensing","publication_year":2024,"publication_date":"2024-12-15","ids":{"openalex":"https://openalex.org/W4408100409","doi":"https://doi.org/10.1109/ants63515.2024.10898521"},"language":"en","primary_location":{"id":"doi:10.1109/ants63515.2024.10898521","is_oa":false,"landing_page_url":"https://doi.org/10.1109/ants63515.2024.10898521","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2024 IEEE International Conference on Advanced Networks and Telecommunications Systems (ANTS)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5079011325","display_name":"Yamini Shankar","orcid":"https://orcid.org/0009-0002-0351-3912"},"institutions":[{"id":"https://openalex.org/I24676775","display_name":"Indian Institute of Technology Madras","ror":"https://ror.org/03v0r5n49","country_code":"IN","type":"facility","lineage":["https://openalex.org/I24676775"]}],"countries":["IN"],"is_corresponding":true,"raw_author_name":"Yamini Shankar","raw_affiliation_strings":["Indian Institute of Technology Madras,Department of Computer Science and Engineering,Chennai,India"],"affiliations":[{"raw_affiliation_string":"Indian Institute of Technology Madras,Department of Computer Science and Engineering,Chennai,India","institution_ids":["https://openalex.org/I24676775"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5008768711","display_name":"Ayon Chakraborty","orcid":"https://orcid.org/0000-0003-0889-5702"},"institutions":[{"id":"https://openalex.org/I24676775","display_name":"Indian Institute of Technology Madras","ror":"https://ror.org/03v0r5n49","country_code":"IN","type":"facility","lineage":["https://openalex.org/I24676775"]}],"countries":["IN"],"is_corresponding":false,"raw_author_name":"Ayon Chakraborty","raw_affiliation_strings":["Indian Institute of Technology Madras,Department of Computer Science and Engineering,Chennai,India"],"affiliations":[{"raw_affiliation_string":"Indian Institute of Technology Madras,Department of Computer Science and Engineering,Chennai,India","institution_ids":["https://openalex.org/I24676775"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5079011325"],"corresponding_institution_ids":["https://openalex.org/I24676775"],"apc_list":null,"apc_paid":null,"fwci":0.3663,"has_fulltext":false,"cited_by_count":1,"citation_normalized_percentile":{"value":0.66977061,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":91,"max":95},"biblio":{"volume":null,"issue":null,"first_page":"1","last_page":"6"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11498","display_name":"Security in Wireless Sensor Networks","score":0.9921000003814697,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11498","display_name":"Security in Wireless Sensor Networks","score":0.9921000003814697,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10964","display_name":"Wireless Communication Security Techniques","score":0.9693999886512756,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12879","display_name":"Distributed Sensor Networks and Detection Algorithms","score":0.934499979019165,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/adversarial-system","display_name":"Adversarial system","score":0.8933427929878235},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.6819268465042114},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.5437475442886353},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.4102744162082672},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.15440499782562256}],"concepts":[{"id":"https://openalex.org/C37736160","wikidata":"https://www.wikidata.org/wiki/Q1801315","display_name":"Adversarial system","level":2,"score":0.8933427929878235},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6819268465042114},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.5437475442886353},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.4102744162082672},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.15440499782562256}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/ants63515.2024.10898521","is_oa":false,"landing_page_url":"https://doi.org/10.1109/ants63515.2024.10898521","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2024 IEEE International Conference on Advanced Networks and Telecommunications Systems (ANTS)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":16,"referenced_works":["https://openalex.org/W2010882865","https://openalex.org/W2346191743","https://openalex.org/W2603766943","https://openalex.org/W2952065976","https://openalex.org/W2980064241","https://openalex.org/W2995394700","https://openalex.org/W3135635493","https://openalex.org/W3210895594","https://openalex.org/W4284895653","https://openalex.org/W4288057789","https://openalex.org/W4290972958","https://openalex.org/W4308089457","https://openalex.org/W4312509674","https://openalex.org/W4399121477","https://openalex.org/W6698303669","https://openalex.org/W6766978945"],"related_works":["https://openalex.org/W4391375266","https://openalex.org/W2899084033","https://openalex.org/W2748952813","https://openalex.org/W2502115930","https://openalex.org/W2482350142","https://openalex.org/W4246396837","https://openalex.org/W3126451824","https://openalex.org/W1561927205","https://openalex.org/W3191453585","https://openalex.org/W4297672492"],"abstract_inverted_index":{"WiFi-based":[0,110],"sensing,":[1],"a":[2,32,54,84,104,114],"non-intrusive":[3],"technology":[4],"that":[5,118],"leverages":[6],"existing":[7],"communication":[8,79,124],"infrastructure,":[9],"has":[10],"become":[11],"widely":[12],"used":[13],"for":[14,44],"environmental":[15],"monitoring":[16],"by":[17],"extracting":[18],"Channel":[19],"State":[20],"Information":[21],"(CSI).":[22],"However,":[23],"the":[24,42],"vulnerability":[25],"of":[26,91],"these":[27],"systems":[28],"to":[29,60,75],"adversarial":[30,65],"attacks,":[31],"core":[33],"challenge":[34],"within":[35],"Integrated":[36],"Sensing":[37],"and":[38,46,97,123],"Communication":[39],"(ISAC),":[40],"highlights":[41],"need":[43],"practical":[45,55],"robust":[47],"defenses.":[48],"In":[49],"this":[50],"work,":[51],"we":[52],"introduce":[53],"black-box":[56],"defense":[57,102],"strategy":[58],"designed":[59],"protect":[61],"CSI":[62],"data":[63],"from":[64,73],"manipulation,":[66],"significantly":[67],"reducing":[68],"an":[69],"attacker\u2019s":[70],"classification":[71],"accuracy":[72],"98%":[74],"17%":[76],"while":[77],"preserving":[78],"quality.":[80],"Our":[81],"approach":[82],"achieves":[83],"minimal":[85],"median":[86],"Signal-to-Noise":[87],"Ratio":[88],"(SNR)":[89],"difference":[90],"1":[92],"dB,":[93],"ensuring":[94],"stable":[95],"throughput":[96],"reliable":[98],"system":[99],"performance.":[100],"This":[101],"represents":[103],"crucial":[105],"step":[106],"forward":[107],"in":[108],"securing":[109],"sensing":[111,121],"systems,":[112],"offering":[113],"resilient,":[115],"low-impact":[116],"solution":[117],"safeguards":[119],"both":[120],"integrity":[122],"efficacy.":[125]},"counts_by_year":[{"year":2025,"cited_by_count":1}],"updated_date":"2025-12-28T23:10:05.387466","created_date":"2025-10-10T00:00:00"}
