{"id":"https://openalex.org/W2534482106","doi":"https://doi.org/10.1145/2976749.2978397","title":"When CSI Meets Public WiFi","display_name":"When CSI Meets Public WiFi","publication_year":2016,"publication_date":"2016-10-24","ids":{"openalex":"https://openalex.org/W2534482106","doi":"https://doi.org/10.1145/2976749.2978397","mag":"2534482106"},"language":"en","primary_location":{"id":"doi:10.1145/2976749.2978397","is_oa":false,"landing_page_url":"https://doi.org/10.1145/2976749.2978397","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5112096566","display_name":"Mengyuan Li","orcid":"https://orcid.org/0009-0009-4832-2467"},"institutions":[{"id":"https://openalex.org/I183067930","display_name":"Shanghai Jiao Tong University","ror":"https://ror.org/0220qvk04","country_code":"CN","type":"education","lineage":["https://openalex.org/I183067930"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Mengyuan Li","raw_affiliation_strings":["Shanghai Jiao Tong University, Shanghai, China"],"affiliations":[{"raw_affiliation_string":"Shanghai Jiao Tong University, Shanghai, China","institution_ids":["https://openalex.org/I183067930"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5076583947","display_name":"Yan Meng","orcid":"https://orcid.org/0000-0001-5445-0347"},"institutions":[{"id":"https://openalex.org/I183067930","display_name":"Shanghai Jiao Tong University","ror":"https://ror.org/0220qvk04","country_code":"CN","type":"education","lineage":["https://openalex.org/I183067930"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Yan Meng","raw_affiliation_strings":["Shanghai Jiao Tong University, Shanghai, China"],"affiliations":[{"raw_affiliation_string":"Shanghai Jiao Tong University, Shanghai, China","institution_ids":["https://openalex.org/I183067930"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100738705","display_name":"Junyi Liu","orcid":"https://orcid.org/0000-0002-4277-1802"},"institutions":[{"id":"https://openalex.org/I183067930","display_name":"Shanghai Jiao Tong University","ror":"https://ror.org/0220qvk04","country_code":"CN","type":"education","lineage":["https://openalex.org/I183067930"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Junyi Liu","raw_affiliation_strings":["Shanghai Jiao Tong University, Shanghai, China"],"affiliations":[{"raw_affiliation_string":"Shanghai Jiao Tong University, Shanghai, China","institution_ids":["https://openalex.org/I183067930"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5039106671","display_name":"Haojin Zhu","orcid":"https://orcid.org/0000-0001-5079-4556"},"institutions":[{"id":"https://openalex.org/I183067930","display_name":"Shanghai Jiao Tong University","ror":"https://ror.org/0220qvk04","country_code":"CN","type":"education","lineage":["https://openalex.org/I183067930"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Haojin Zhu","raw_affiliation_strings":["Shanghai Jiao Tong University, Shanghai, China"],"affiliations":[{"raw_affiliation_string":"Shanghai Jiao Tong University, Shanghai, China","institution_ids":["https://openalex.org/I183067930"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5101655447","display_name":"Xiaohui Liang","orcid":"https://orcid.org/0000-0003-4064-2393"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Xiaohui Liang","raw_affiliation_strings":["University of Massachusetts at Boston, Boston, USA"],"affiliations":[{"raw_affiliation_string":"University of Massachusetts at Boston, Boston, USA","institution_ids":[]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100463098","display_name":"Yao Liu","orcid":"https://orcid.org/0000-0003-3382-798X"},"institutions":[{"id":"https://openalex.org/I2613432","display_name":"University of South Florida","ror":"https://ror.org/032db5x82","country_code":"US","type":"education","lineage":["https://openalex.org/I2613432"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Yao Liu","raw_affiliation_strings":["University of South Florida, Tampa, USA"],"affiliations":[{"raw_affiliation_string":"University of South Florida, Tampa, USA","institution_ids":["https://openalex.org/I2613432"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5052771052","display_name":"Na Ruan","orcid":null},"institutions":[{"id":"https://openalex.org/I183067930","display_name":"Shanghai Jiao Tong University","ror":"https://ror.org/0220qvk04","country_code":"CN","type":"education","lineage":["https://openalex.org/I183067930"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Na Ruan","raw_affiliation_strings":["Shanghai Jiao Tong University, Shanghai, China"],"affiliations":[{"raw_affiliation_string":"Shanghai Jiao Tong University, Shanghai, China","institution_ids":["https://openalex.org/I183067930"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":7,"corresponding_author_ids":["https://openalex.org/A5112096566"],"corresponding_institution_ids":["https://openalex.org/I183067930"],"apc_list":null,"apc_paid":null,"fwci":47.1145,"has_fulltext":false,"cited_by_count":185,"citation_normalized_percentile":{"value":0.99826452,"is_in_top_1_percent":true,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":90,"max":100},"biblio":{"volume":null,"issue":null,"first_page":"1068","last_page":"1079"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11800","display_name":"User Authentication and Security Systems","score":0.9990000128746033,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11800","display_name":"User Authentication and Security Systems","score":0.9990000128746033,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12801","display_name":"Bluetooth and Wireless Communication Technologies","score":0.9965999722480774,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10326","display_name":"Indoor and Outdoor Localization Technologies","score":0.9948999881744385,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8511239290237427},{"id":"https://openalex.org/keywords/keystroke-logging","display_name":"Keystroke logging","score":0.7240211963653564},{"id":"https://openalex.org/keywords/password","display_name":"Password","score":0.7123687863349915},{"id":"https://openalex.org/keywords/exploit","display_name":"Exploit","score":0.5745574831962585},{"id":"https://openalex.org/keywords/mobile-device","display_name":"Mobile device","score":0.5368908047676086},{"id":"https://openalex.org/keywords/side-channel-attack","display_name":"Side channel attack","score":0.5139014720916748},{"id":"https://openalex.org/keywords/adversary","display_name":"Adversary","score":0.48059436678886414},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.4670490324497223},{"id":"https://openalex.org/keywords/inference","display_name":"Inference","score":0.428445428609848},{"id":"https://openalex.org/keywords/channel-state-information","display_name":"Channel state information","score":0.42200490832328796},{"id":"https://openalex.org/keywords/installation","display_name":"Installation","score":0.41410592198371887},{"id":"https://openalex.org/keywords/real-time-computing","display_name":"Real-time computing","score":0.39029496908187866},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.34619563817977905},{"id":"https://openalex.org/keywords/wireless","display_name":"Wireless","score":0.3297008275985718},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.17436358332633972},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.16774976253509521},{"id":"https://openalex.org/keywords/telecommunications","display_name":"Telecommunications","score":0.11801683902740479},{"id":"https://openalex.org/keywords/world-wide-web","display_name":"World Wide Web","score":0.09418216347694397},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.07909426093101501}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8511239290237427},{"id":"https://openalex.org/C161615301","wikidata":"https://www.wikidata.org/wiki/Q309396","display_name":"Keystroke logging","level":2,"score":0.7240211963653564},{"id":"https://openalex.org/C109297577","wikidata":"https://www.wikidata.org/wiki/Q161157","display_name":"Password","level":2,"score":0.7123687863349915},{"id":"https://openalex.org/C165696696","wikidata":"https://www.wikidata.org/wiki/Q11287","display_name":"Exploit","level":2,"score":0.5745574831962585},{"id":"https://openalex.org/C186967261","wikidata":"https://www.wikidata.org/wiki/Q5082128","display_name":"Mobile device","level":2,"score":0.5368908047676086},{"id":"https://openalex.org/C49289754","wikidata":"https://www.wikidata.org/wiki/Q2267081","display_name":"Side channel attack","level":3,"score":0.5139014720916748},{"id":"https://openalex.org/C41065033","wikidata":"https://www.wikidata.org/wiki/Q2825412","display_name":"Adversary","level":2,"score":0.48059436678886414},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.4670490324497223},{"id":"https://openalex.org/C2776214188","wikidata":"https://www.wikidata.org/wiki/Q408386","display_name":"Inference","level":2,"score":0.428445428609848},{"id":"https://openalex.org/C148063708","wikidata":"https://www.wikidata.org/wiki/Q5072511","display_name":"Channel state information","level":3,"score":0.42200490832328796},{"id":"https://openalex.org/C146778888","wikidata":"https://www.wikidata.org/wiki/Q836862","display_name":"Installation","level":2,"score":0.41410592198371887},{"id":"https://openalex.org/C79403827","wikidata":"https://www.wikidata.org/wiki/Q3988","display_name":"Real-time computing","level":1,"score":0.39029496908187866},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.34619563817977905},{"id":"https://openalex.org/C555944384","wikidata":"https://www.wikidata.org/wiki/Q249","display_name":"Wireless","level":2,"score":0.3297008275985718},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.17436358332633972},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.16774976253509521},{"id":"https://openalex.org/C76155785","wikidata":"https://www.wikidata.org/wiki/Q418","display_name":"Telecommunications","level":1,"score":0.11801683902740479},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.09418216347694397},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.07909426093101501}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1145/2976749.2978397","is_oa":false,"landing_page_url":"https://doi.org/10.1145/2976749.2978397","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[{"id":"https://openalex.org/G3220748246","display_name":null,"funder_award_id":"1527144","funder_id":"https://openalex.org/F4320306076","funder_display_name":"National Science Foundation"},{"id":"https://openalex.org/G5118938759","display_name":null,"funder_award_id":"1553304","funder_id":"https://openalex.org/F4320306076","funder_display_name":"National Science Foundation"},{"id":"https://openalex.org/G5131762909","display_name":null,"funder_award_id":"1618893","funder_id":"https://openalex.org/F4320306076","funder_display_name":"National Science Foundation"}],"funders":[{"id":"https://openalex.org/F4320306076","display_name":"National Science Foundation","ror":"https://ror.org/021nxhr62"}],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":25,"referenced_works":["https://openalex.org/W1963641652","https://openalex.org/W2004333922","https://openalex.org/W2005751867","https://openalex.org/W2007382769","https://openalex.org/W2010882865","https://openalex.org/W2021432364","https://openalex.org/W2024796780","https://openalex.org/W2064081294","https://openalex.org/W2074367177","https://openalex.org/W2085866051","https://openalex.org/W2089695767","https://openalex.org/W2096986574","https://openalex.org/W2102005779","https://openalex.org/W2103280777","https://openalex.org/W2115042198","https://openalex.org/W2124885613","https://openalex.org/W2149359921","https://openalex.org/W2150639461","https://openalex.org/W2152417697","https://openalex.org/W2158223124","https://openalex.org/W2162003954","https://openalex.org/W2163472226","https://openalex.org/W2322532377","https://openalex.org/W2579193977","https://openalex.org/W4252630203"],"related_works":["https://openalex.org/W2320589413","https://openalex.org/W2065920179","https://openalex.org/W2886761711","https://openalex.org/W2889672494","https://openalex.org/W2277743221","https://openalex.org/W3163279580","https://openalex.org/W2278696264","https://openalex.org/W3129147562","https://openalex.org/W2370466952","https://openalex.org/W1990636673"],"abstract_inverted_index":{"In":[0,146],"this":[1],"study,":[2],"we":[3],"present":[4],"WindTalker,":[5],"a":[6,23,54,93,104,204,238],"novel":[7,94],"and":[8,47,61,82,144,153,202],"practical":[9],"keystroke":[10,112,159],"inference":[11,113,160,215],"framework":[12],"that":[13,36,230],"allows":[14],"an":[15],"attacker":[16,232],"to":[17,43,57,85,96,121,136,156,208],"infer":[18,86],"the":[19,34,48,58,66,75,79,83,87,98,110,122,127,133,151,154,158,163,175,180,193,210,213,218,224,231,235],"sensitive":[20,164],"keystrokes":[21,37,84],"on":[22,38,192,198],"mobile":[24,39,200,220],"device":[25,124],"through":[26],"WiFi-based":[27],"side-channel":[28],"information.":[29],"WindTalker":[30,91,115,170],"is":[31,142],"motivated":[32],"from":[33],"observation":[35],"devices":[40,119],"will":[41,52],"lead":[42],"different":[44],"hand":[45],"coverage":[46],"finger":[49],"motions,":[50],"which":[51,141],"introduce":[53],"unique":[55],"interference":[56],"multi-path":[59],"signals":[60],"can":[62,73,171,233],"be":[63,172],"reflected":[64],"by":[65,102],"channel":[67],"state":[68],"information":[69],"(CSI).":[70],"The":[71,226],"adversary":[72],"exploit":[74],"strong":[76],"correlation":[77],"between":[78],"CSI":[80,100,139,155],"fluctuation":[81],"user's":[88,138,183],"number":[89],"input.":[90],"presents":[92],"approach":[95],"collect":[97,137],"target's":[99],"data":[101],"deploying":[103],"public":[105,134],"WiFi":[106,135],"hotspot.":[107],"Compared":[108],"with":[109,237],"previous":[111],"approach,":[114],"neither":[116],"deploys":[117],"external":[118],"close":[120],"target":[123,128],"nor":[125],"compromises":[126],"device.":[129],"Instead,":[130],"it":[131,148],"utilizes":[132],"data,":[140],"easy-to-deploy":[143],"difficult-to-detect.":[145],"addition,":[147],"jointly":[149],"analyzes":[150],"traffic":[152],"launch":[157],"only":[161],"for":[162],"period":[165],"where":[166],"password":[167,214],"entering":[168],"occurs.":[169],"launched":[173],"without":[174],"requirement":[176],"of":[177,212],"visually":[178],"seeing":[179],"smart":[181],"phone":[182],"input":[184],"process,":[185],"backside":[186],"motion,":[187],"or":[188],"installing":[189],"any":[190],"malware":[191],"tablet.":[194],"We":[195],"implemented":[196],"Windtalker":[197],"several":[199],"phones":[201],"performed":[203],"detailed":[205],"case":[206],"study":[207],"evaluate":[209],"practicality":[211],"towards":[216],"Alipay,":[217],"largest":[219],"payment":[221],"platform":[222],"in":[223],"world.":[225],"evaluation":[227],"results":[228],"show":[229],"recover":[234],"key":[236],"high":[239],"successful":[240],"rate.":[241]},"counts_by_year":[{"year":2025,"cited_by_count":15},{"year":2024,"cited_by_count":18},{"year":2023,"cited_by_count":15},{"year":2022,"cited_by_count":24},{"year":2021,"cited_by_count":21},{"year":2020,"cited_by_count":24},{"year":2019,"cited_by_count":28},{"year":2018,"cited_by_count":25},{"year":2017,"cited_by_count":14},{"year":2016,"cited_by_count":1}],"updated_date":"2026-04-04T16:13:02.066488","created_date":"2025-10-10T00:00:00"}
