{"id":"https://openalex.org/W4414898690","doi":"https://doi.org/10.1109/icdcs63083.2025.00079","title":"Physical Backdoor Attacks against mmWave-based Human Activity Recognition","display_name":"Physical Backdoor Attacks against mmWave-based Human Activity Recognition","publication_year":2025,"publication_date":"2025-07-21","ids":{"openalex":"https://openalex.org/W4414898690","doi":"https://doi.org/10.1109/icdcs63083.2025.00079"},"language":"en","primary_location":{"id":"doi:10.1109/icdcs63083.2025.00079","is_oa":false,"landing_page_url":"https://doi.org/10.1109/icdcs63083.2025.00079","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2025 IEEE 45th International Conference on Distributed Computing Systems (ICDCS)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5108304756","display_name":"Ziqian Bi","orcid":null},"institutions":[{"id":"https://openalex.org/I219193219","display_name":"Purdue University West Lafayette","ror":"https://ror.org/02dqehb95","country_code":"US","type":"education","lineage":["https://openalex.org/I219193219"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Ziqian Bi","raw_affiliation_strings":["Purdue University"],"affiliations":[{"raw_affiliation_string":"Purdue University","institution_ids":["https://openalex.org/I219193219"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5043162645","display_name":"Amit Singha","orcid":"https://orcid.org/0009-0008-7523-9143"},"institutions":[{"id":"https://openalex.org/I219193219","display_name":"Purdue University West Lafayette","ror":"https://ror.org/02dqehb95","country_code":"US","type":"education","lineage":["https://openalex.org/I219193219"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Amit Singha","raw_affiliation_strings":["Purdue University"],"affiliations":[{"raw_affiliation_string":"Purdue University","institution_ids":["https://openalex.org/I219193219"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5014632942","display_name":"Hongfei Xue","orcid":"https://orcid.org/0000-0001-9691-9668"},"institutions":[{"id":"https://openalex.org/I102149020","display_name":"University of North Carolina at Charlotte","ror":"https://ror.org/04dawnj30","country_code":"US","type":"education","lineage":["https://openalex.org/I102149020"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Hongfei Xue","raw_affiliation_strings":["University of North Carolina,Charlotte"],"affiliations":[{"raw_affiliation_string":"University of North Carolina,Charlotte","institution_ids":["https://openalex.org/I102149020"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100455316","display_name":"Tao Li","orcid":"https://orcid.org/0000-0002-5333-0586"},"institutions":[{"id":"https://openalex.org/I219193219","display_name":"Purdue University West Lafayette","ror":"https://ror.org/02dqehb95","country_code":"US","type":"education","lineage":["https://openalex.org/I219193219"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Tao Li","raw_affiliation_strings":["Purdue University"],"affiliations":[{"raw_affiliation_string":"Purdue University","institution_ids":["https://openalex.org/I219193219"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100377726","display_name":"Yimin Chen","orcid":"https://orcid.org/0000-0002-7452-2165"},"institutions":[{"id":"https://openalex.org/I133738476","display_name":"University of Massachusetts Lowell","ror":"https://ror.org/03hamhx47","country_code":"US","type":"education","lineage":["https://openalex.org/I133738476"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Yimin Chen","raw_affiliation_strings":["University of Massachusetts Lowell"],"affiliations":[{"raw_affiliation_string":"University of Massachusetts Lowell","institution_ids":["https://openalex.org/I133738476"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5100615703","display_name":"Yanchao Zhang","orcid":"https://orcid.org/0000-0002-0137-0922"},"institutions":[{"id":"https://openalex.org/I55732556","display_name":"Arizona State University","ror":"https://ror.org/03efmqc40","country_code":"US","type":"education","lineage":["https://openalex.org/I55732556"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Yanchao Zhang","raw_affiliation_strings":["Arizona State University"],"affiliations":[{"raw_affiliation_string":"Arizona State University","institution_ids":["https://openalex.org/I55732556"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":6,"corresponding_author_ids":["https://openalex.org/A5108304756"],"corresponding_institution_ids":["https://openalex.org/I219193219"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.39960664,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":null,"issue":null,"first_page":"758","last_page":"768"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11800","display_name":"User Authentication and Security Systems","score":0.9822999835014343,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11800","display_name":"User Authentication and Security Systems","score":0.9822999835014343,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10444","display_name":"Context-Aware Activity Recognition Systems","score":0.9660000205039978,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9474999904632568,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/backdoor","display_name":"Backdoor","score":0.9799000024795532},{"id":"https://openalex.org/keywords/wireless","display_name":"Wireless","score":0.6916999816894531},{"id":"https://openalex.org/keywords/key","display_name":"Key (lock)","score":0.5005999803543091},{"id":"https://openalex.org/keywords/activity-recognition","display_name":"Activity recognition","score":0.4221999943256378},{"id":"https://openalex.org/keywords/wireless-network","display_name":"Wireless network","score":0.34290000796318054}],"concepts":[{"id":"https://openalex.org/C2781045450","wikidata":"https://www.wikidata.org/wiki/Q254569","display_name":"Backdoor","level":2,"score":0.9799000024795532},{"id":"https://openalex.org/C555944384","wikidata":"https://www.wikidata.org/wiki/Q249","display_name":"Wireless","level":2,"score":0.6916999816894531},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6215999722480774},{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.5005999803543091},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.4925999939441681},{"id":"https://openalex.org/C121687571","wikidata":"https://www.wikidata.org/wiki/Q4677630","display_name":"Activity recognition","level":2,"score":0.4221999943256378},{"id":"https://openalex.org/C108037233","wikidata":"https://www.wikidata.org/wiki/Q11375","display_name":"Wireless network","level":3,"score":0.34290000796318054},{"id":"https://openalex.org/C24590314","wikidata":"https://www.wikidata.org/wiki/Q336038","display_name":"Wireless sensor network","level":2,"score":0.3174999952316284},{"id":"https://openalex.org/C59201141","wikidata":"https://www.wikidata.org/wiki/Q46904","display_name":"GSM","level":2,"score":0.31189998984336853},{"id":"https://openalex.org/C107457646","wikidata":"https://www.wikidata.org/wiki/Q207434","display_name":"Human\u2013computer interaction","level":1,"score":0.27230000495910645},{"id":"https://openalex.org/C127413603","wikidata":"https://www.wikidata.org/wiki/Q11023","display_name":"Engineering","level":0,"score":0.2721000015735626},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.25589999556541443}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/icdcs63083.2025.00079","is_oa":false,"landing_page_url":"https://doi.org/10.1109/icdcs63083.2025.00079","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2025 IEEE 45th International Conference on Distributed Computing Systems (ICDCS)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[{"id":"https://openalex.org/F4320306076","display_name":"National Science Foundation","ror":"https://ror.org/021nxhr62"},{"id":"https://openalex.org/F4320316514","display_name":"Arm","ror":"https://ror.org/04mmhzs81"}],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":32,"referenced_works":["https://openalex.org/W1984114931","https://openalex.org/W2141336889","https://openalex.org/W2399587145","https://openalex.org/W2558891025","https://openalex.org/W2594230123","https://openalex.org/W2942091739","https://openalex.org/W2944605902","https://openalex.org/W2968303571","https://openalex.org/W2979411809","https://openalex.org/W3043470802","https://openalex.org/W3107337211","https://openalex.org/W3146968685","https://openalex.org/W3161507190","https://openalex.org/W3175215793","https://openalex.org/W3197804866","https://openalex.org/W3212158867","https://openalex.org/W3212616108","https://openalex.org/W3214186465","https://openalex.org/W4210553182","https://openalex.org/W4283780898","https://openalex.org/W4288826407","https://openalex.org/W4317927978","https://openalex.org/W4318603230","https://openalex.org/W4324007222","https://openalex.org/W4385248623","https://openalex.org/W4385626275","https://openalex.org/W4386057740","https://openalex.org/W4386076655","https://openalex.org/W4386260603","https://openalex.org/W4386353014","https://openalex.org/W4388858786","https://openalex.org/W4398131541"],"related_works":[],"abstract_inverted_index":{"Human":[0],"Activity":[1],"Recognition":[2],"(HAR)":[3],"using":[4],"wireless":[5,55],"signals":[6,98],"like":[7],"mmWave":[8,128],"technology":[9],"has":[10],"promising":[11],"applications":[12],"in":[13,31,79],"numerous":[14],"scenarios,":[15],"including":[16],"monitoring":[17],"and":[18,21,28,111,120],"surveillance,":[19],"healthcare,":[20],"smart":[22],"home.":[23],"Wireless":[24],"HAR":[25,56,94,129],"is":[26,117],"non-intrusive":[27],"can":[29],"operate":[30],"situations":[32],"where":[33],"traditional":[34],"sensors":[35],"or":[36],"cameras":[37],"may":[38],"fail.":[39],"However,":[40],"these":[41,68,77],"systems":[42,102],"also":[43],"introduce":[44],"new":[45],"attack":[46,91,116],"surfaces":[47],"alongside":[48],"their":[49],"benefits.":[50],"Existing":[51],"security":[52],"research":[53],"on":[54,59,126],"primarily":[57],"focuses":[58],"the":[60,63,72,87,101,132,136],"vulnerabilities":[61],"of":[62,74,135],"AI":[64],"models":[65],"used":[66],"by":[67],"systems,":[69,95],"without":[70],"addressing":[71],"challenges":[73],"physically":[75],"implementing":[76],"attacks":[78],"real-world":[80],"scenarios.":[81],"In":[82],"this":[83],"paper,":[84],"we":[85],"present":[86],"first":[88],"physical":[89,97],"backdoor":[90],"for":[92],"mmWave-based":[93],"manipulating":[96],"to":[99,122],"deceive":[100],"into":[103],"producing":[104],"targeted":[105],"outputs.":[106],"Utilizing":[107],"passive":[108],"metal":[109],"reflectors":[110],"optimized":[112],"attacking":[113],"strategies,":[114],"our":[115],"efficient,":[118],"stealthy,":[119],"easy":[121],"implement.":[123],"Tailored":[124],"experiments":[125],"a":[127],"prototype":[130],"demonstrate":[131],"high":[133],"effectiveness":[134],"proposed":[137],"attack.":[138]},"counts_by_year":[],"updated_date":"2026-04-09T08:11:56.329763","created_date":"2025-10-10T00:00:00"}
