{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,29]],"date-time":"2026-04-29T01:38:39Z","timestamp":1777426719146,"version":"3.51.4"},"reference-count":37,"publisher":"Association for Computing Machinery (ACM)","issue":"2","license":[{"start":{"date-parts":[[2021,5,4]],"date-time":"2021-05-04T00:00:00Z","timestamp":1620086400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/100000183","name":"Army Research Office Grant","doi-asserted-by":"publisher","award":["W911NF-18-1-0221"],"award-info":[{"award-number":["W911NF-18-1-0221"]}],"id":[{"id":"10.13039\/100000183","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100000001","name":"National Science Foundation","doi-asserted-by":"publisher","award":["CCF1909963, CCF2028876, CNS1814590"],"award-info":[{"award-number":["CCF1909963, CCF2028876, CNS1814590"]}],"id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":["ACM Trans. Internet Things"],"published-print":{"date-parts":[[2021,5,31]]},"abstract":"<jats:p>User authentication is a critical process in both corporate and home environments due to the ever-growing security and privacy concerns. With the advancement of smart cities and home environments, the concept of user authentication is evolved with a broader implication by not only preventing unauthorized users from accessing confidential information but also providing the opportunities for customized services corresponding to a specific user. Traditional approaches of user authentication either require specialized device installation or inconvenient wearable sensor attachment. This article supports the extended concept of user authentication with a device-free approach by leveraging the prevalent WiFi signals made available by IoT devices, such as smart refrigerator, smart TV, and smart thermostat, and so on. The proposed system utilizes the WiFi signals to capture unique human physiological and behavioral characteristics inherited from their daily activities, including both walking and stationary ones. Particularly, we extract representative features from channel state information (CSI) measurements of WiFi signals, and develop a deep-learning-based user authentication scheme to accurately identify each individual user. To mitigate the signal distortion caused by surrounding people\u2019s movements, our deep learning model exploits a CNN-based architecture that constructively combines features from multiple receiving antennas and derives more reliable feature abstractions. Furthermore, a transfer-learning-based mechanism is developed to reduce the training cost for new users and environments. Extensive experiments in various indoor environments are conducted to demonstrate the effectiveness of the proposed authentication system. In particular, our system can achieve over 94% authentication accuracy with 11 subjects through different activities.<\/jats:p>","DOI":"10.1145\/3448738","type":"journal-article","created":{"date-parts":[[2021,5,4]],"date-time":"2021-05-04T16:08:23Z","timestamp":1620144503000},"page":"1-25","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":33,"title":["WiFi-Enabled User Authentication through Deep Learning in Daily Activities"],"prefix":"10.1145","volume":"2","author":[{"given":"Cong","family":"Shi","sequence":"first","affiliation":[{"name":"Rutgers University, New Brunswick, New Jersey, NJ, United States"}]},{"given":"Jian","family":"Liu","sequence":"additional","affiliation":[{"name":"University of Tennessee, Knoxville, Tennessee, TN, United States"}]},{"given":"Hongbo","family":"Liu","sequence":"additional","affiliation":[{"name":"University of Electronic Science and Technology of China, Chengdu, Sichuan, China"}]},{"given":"Yingying","family":"Chen","sequence":"additional","affiliation":[{"name":"Rutgers University, New Brunswick, New Jersey"}]}],"member":"320","published-online":{"date-parts":[[2021,5,4]]},"reference":[{"key":"e_1_2_1_1_1","first-page":"1","article-title":"Smudge attacks on smartphone touch screens","volume":"10","author":"Aviv Adam J.","year":"2010","unstructured":"Adam J. Aviv , Katherine L. Gibson , Evan Mossop , Matt Blaze , and Jonathan M. Smith . 2010 . Smudge attacks on smartphone touch screens . Woot 10 (2010), 1 -- 7 . Adam J. Aviv, Katherine L. Gibson, Evan Mossop, Matt Blaze, and Jonathan M. Smith. 2010. Smudge attacks on smartphone touch screens. Woot 10 (2010), 1--7.","journal-title":"Woot"},{"key":"e_1_2_1_2_1","volume-title":"Pattern recognition. Machine Learning 128","author":"Bishop Christopher M.","year":"2006","unstructured":"Christopher M. Bishop . 2006. Pattern recognition. Machine Learning 128 ( 2006 ). Christopher M. Bishop. 2006. Pattern recognition. Machine Learning 128 (2006)."},{"key":"e_1_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1007\/BF00994018"},{"key":"e_1_2_1_4_1","volume-title":"Proceedings of the 9th Conference on USENIX Security Symposium (SSYM)","volume":"9","author":"Dhamija Rachna","year":"2000","unstructured":"Rachna Dhamija and Adrian Perrig . 2000 . Deja Vu - A user study: Using images for authentication . In Proceedings of the 9th Conference on USENIX Security Symposium (SSYM) , Vol. 9 . 4. https:\/\/dl.acm.org\/doi\/10.5555\/1251306.1251310 Rachna Dhamija and Adrian Perrig. 2000. Deja Vu - A user study: Using images for authentication. In Proceedings of the 9th Conference on USENIX Security Symposium (SSYM), Vol. 9. 4. https:\/\/dl.acm.org\/doi\/10.5555\/1251306.1251310"},{"key":"e_1_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1109\/83.753738"},{"key":"e_1_2_1_6_1","volume-title":"Why does unsupervised pre-training help deep learning?Journal of Machine Learning Research 11","author":"Erhan Dumitru","year":"2010","unstructured":"Dumitru Erhan , Yoshua Bengio , Aaron Courville , Pierre-Antoine Manzagol , Pascal Vincent , and Samy Bengio . 2010. Why does unsupervised pre-training help deep learning?Journal of Machine Learning Research 11 ( 2010 ), 625--660. Dumitru Erhan, Yoshua Bengio, Aaron Courville, Pierre-Antoine Manzagol, Pascal Vincent, and Samy Bengio. 2010. Why does unsupervised pre-training help deep learning?Journal of Machine Learning Research 11 (2010), 625--660."},{"key":"e_1_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1109\/TPAMI.2015.2437384"},{"key":"e_1_2_1_8_1","volume-title":"Tool release: Gathering 802.11 n traces with channel state information. ACM SIGCOMM Computer Communication Review","author":"Halperin Daniel","year":"2011","unstructured":"Daniel Halperin , Wenjun Hu , Anmol Sheth , and David Wetherall . 2011. Tool release: Gathering 802.11 n traces with channel state information. ACM SIGCOMM Computer Communication Review ( 2011 ), 53--53. Daniel Halperin, Wenjun Hu, Anmol Sheth, and David Wetherall. 2011. Tool release: Gathering 802.11 n traces with channel state information. ACM SIGCOMM Computer Communication Review (2011), 53--53."},{"key":"e_1_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1049\/iet-bmt.2011.0008"},{"key":"e_1_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1109\/TASSP.1981.1163711"},{"key":"e_1_2_1_11_1","volume-title":"Proceedings of the 20th ACM International Symposium on Mobile Ad Hoc Networking and Computing. ACM, 201--210","author":"Kong Hao","year":"2019","unstructured":"Hao Kong , Li Lu , Jiadi Yu , Yingying Chen , Linghe Kong , and Minglu Li . 2019 . FingerPass: Finger gesture-based continuous user authentication for smart homes using commodity WiFi . In Proceedings of the 20th ACM International Symposium on Mobile Ad Hoc Networking and Computing. ACM, 201--210 . Hao Kong, Li Lu, Jiadi Yu, Yingying Chen, Linghe Kong, and Minglu Li. 2019. FingerPass: Finger gesture-based continuous user authentication for smart homes using commodity WiFi. In Proceedings of the 20th ACM International Symposium on Mobile Ad Hoc Networking and Computing. ACM, 201--210."},{"key":"e_1_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/2785956.2787487"},{"key":"e_1_2_1_13_1","volume-title":"Hinton","author":"Krizhevsky Alex","year":"2012","unstructured":"Alex Krizhevsky , Ilya Sutskever , and Geoffrey E . Hinton . 2012 . Imagenet classification with deep convolutional neural networks. In Advances in Neural Information Processing Systems . 1097--1105. Alex Krizhevsky, Ilya Sutskever, and Geoffrey E. Hinton. 2012. Imagenet classification with deep convolutional neural networks. In Advances in Neural Information Processing Systems. 1097--1105."},{"key":"e_1_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.patcog.2009.08.016"},{"key":"e_1_2_1_15_1","volume-title":"Proceedings of the 2018 15th Annual IEEE International Conference on Sensing, Communication, and Networking (IEEE SECON). 1--9.","author":"Lin Chi","year":"2018","unstructured":"Chi Lin , Jiaye Hu , Yu Sun , Fenglong Ma , Lei Wang , and Guowei Wu . 2018 . WiAU: An accurate device-free authentication system with ResNet . In Proceedings of the 2018 15th Annual IEEE International Conference on Sensing, Communication, and Networking (IEEE SECON). 1--9. Chi Lin, Jiaye Hu, Yu Sun, Fenglong Ma, Lei Wang, and Guowei Wu. 2018. WiAU: An accurate device-free authentication system with ResNet. In Proceedings of the 2018 15th Annual IEEE International Conference on Sensing, Communication, and Networking (IEEE SECON). 1--9."},{"key":"e_1_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1145\/2746285.2746303"},{"key":"e_1_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10044-005-0022-6"},{"key":"e_1_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1145\/359168.359172"},{"key":"e_1_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2009.191"},{"key":"e_1_2_1_20_1","first-page":"33","article-title":"Theory and application of digital signal processing","volume":"8","author":"Rabiner Lawrence R.","year":"1978","unstructured":"Lawrence R. Rabiner , Bernard Gold , and C. K. Yuen . 1978 . Theory and application of digital signal processing . IEEE Transactions on Systems, Man, and Cybernetics 8 , 2 (1978), 33 -- 43 . Lawrence R. Rabiner, Bernard Gold, and C. K. Yuen. 1978. Theory and application of digital signal processing. IEEE Transactions on Systems, Man, and Cybernetics 8, 2 (1978), 33--43.","journal-title":"IEEE Transactions on Systems, Man, and Cybernetics"},{"key":"e_1_2_1_21_1","volume-title":"Proceedings of the ACM International Joint Conference on Pervasive and Ubiquitous Computing (ACM Ubicomp). 51--61","author":"Ranjan Juhi","year":"2015","unstructured":"Juhi Ranjan and Kamin Whitehouse . 2015 . Object hallmarks: Identifying object users using wearable wrist sensors . In Proceedings of the ACM International Joint Conference on Pervasive and Ubiquitous Computing (ACM Ubicomp). 51--61 . Juhi Ranjan and Kamin Whitehouse. 2015. Object hallmarks: Identifying object users using wearable wrist sensors. In Proceedings of the ACM International Joint Conference on Pervasive and Ubiquitous Computing (ACM Ubicomp). 51--61."},{"key":"e_1_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1109\/SAHCN.2013.6644973"},{"key":"e_1_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1007\/s12555-009-0102-2"},{"key":"e_1_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1038\/323533a0"},{"key":"e_1_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1145\/3084041.3084061"},{"key":"e_1_2_1_26_1","volume-title":"Science and Human Behavior","author":"Skinner Burrhus Frederic","unstructured":"Burrhus Frederic Skinner . 1953. Science and Human Behavior . Simon and Schuster . Burrhus Frederic Skinner. 1953. Science and Human Behavior. Simon and Schuster."},{"key":"e_1_2_1_27_1","volume-title":"Fundamentals of Wireless Communication","author":"Tse David","unstructured":"David Tse and Pramod Viswanath . 2005. Fundamentals of Wireless Communication . Cambridge University Press . David Tse and Pramod Viswanath. 2005. Fundamentals of Wireless Communication. Cambridge University Press."},{"key":"e_1_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.5555\/1756006.1953039"},{"key":"e_1_2_1_29_1","first-page":"708","article-title":"Two birds with one stone: Two-factor authentication with security beyond conventional bound","volume":"15","author":"Wang Ding","year":"2016","unstructured":"Ding Wang and Ping Wang . 2016 . Two birds with one stone: Two-factor authentication with security beyond conventional bound . IEEE Transactions on Dependable and Secure Computing 15 , 4 (2016), 708 -- 722 . Ding Wang and Ping Wang. 2016. Two birds with one stone: Two-factor authentication with security beyond conventional bound. IEEE Transactions on Dependable and Secure Computing 15, 4 (2016), 708--722.","journal-title":"IEEE Transactions on Dependable and Secure Computing"},{"key":"e_1_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1145\/2971648.2971670"},{"key":"e_1_2_1_31_1","volume-title":"Proceedings of the 21st Annual International Conference on Mobile Computing and Networking (ACM MobiCom). 65--76","author":"Wang Wei","year":"2015","unstructured":"Wei Wang , Alex X. Liu , Muhammad Shahzad , Kang Ling , and Sanglu Lu . 2015 . Understanding and modeling of WiFi signal based human activity recognition . In Proceedings of the 21st Annual International Conference on Mobile Computing and Networking (ACM MobiCom). 65--76 . Wei Wang, Alex X. Liu, Muhammad Shahzad, Kang Ling, and Sanglu Lu. 2015. Understanding and modeling of WiFi signal based human activity recognition. In Proceedings of the 21st Annual International Conference on Mobile Computing and Networking (ACM MobiCom). 65--76."},{"key":"e_1_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1145\/2639108.2639143"},{"key":"e_1_2_1_33_1","volume-title":"Proceedings of ACM International Joint Conference on Pervasive and Ubiquitous Computing (ACM Ubicomp). 351--362","author":"Wu Dan","year":"2016","unstructured":"Dan Wu , Daqing Zhang , Chenren Xu , Yasha Wang , and Hao Wang . 2016 . WiDir: Walking direction estimation using wireless signals . In Proceedings of ACM International Joint Conference on Pervasive and Ubiquitous Computing (ACM Ubicomp). 351--362 . Dan Wu, Daqing Zhang, Chenren Xu, Yasha Wang, and Hao Wang. 2016. WiDir: Walking direction estimation using wireless signals. In Proceedings of ACM International Joint Conference on Pervasive and Ubiquitous Computing (ACM Ubicomp). 351--362."},{"key":"e_1_2_1_34_1","volume-title":"Precise power delay profiling with commodity Wi-Fi","author":"Xie Yaxiong","year":"2018","unstructured":"Yaxiong Xie , Zhenjiang Li , and Mo Li. 2018. Precise power delay profiling with commodity Wi-Fi . IEEE Transactions on Mobile Computing ( 2018 ). Yaxiong Xie, Zhenjiang Li, and Mo Li. 2018. Precise power delay profiling with commodity Wi-Fi. IEEE Transactions on Mobile Computing (2018)."},{"key":"e_1_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.5555\/2959355.2959359"},{"key":"e_1_2_1_36_1","volume-title":"Proceedings of International Conference on Distributed Computing in Sensor Systems (IEEE DCOSS). 75--82","author":"Zhang J.","unstructured":"J. Zhang , B. Wei , W. Hu , and S. Kenhere . 2016. WiFi-ID: Human identification using WiFi signal . In Proceedings of International Conference on Distributed Computing in Sensor Systems (IEEE DCOSS). 75--82 . J. Zhang, B. Wei, W. Hu, and S. Kenhere. 2016. WiFi-ID: Human identification using WiFi signal. In Proceedings of International Conference on Distributed Computing in Sensor Systems (IEEE DCOSS). 75--82."},{"key":"e_1_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.1145\/2046707.2046725"}],"container-title":["ACM Transactions on Internet of Things"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3448738","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3448738","content-type":"application\/pdf","content-version":"vor","intended-application":"syndication"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3448738","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T20:47:52Z","timestamp":1750193272000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3448738"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,5,4]]},"references-count":37,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2021,5,31]]}},"alternative-id":["10.1145\/3448738"],"URL":"https:\/\/doi.org\/10.1145\/3448738","relation":{},"ISSN":["2691-1914","2577-6207"],"issn-type":[{"value":"2691-1914","type":"print"},{"value":"2577-6207","type":"electronic"}],"subject":[],"published":{"date-parts":[[2021,5,4]]},"assertion":[{"value":"2020-02-01","order":0,"name":"received","label":"Received","group":{"name":"publication_history","label":"Publication History"}},{"value":"2021-02-01","order":1,"name":"accepted","label":"Accepted","group":{"name":"publication_history","label":"Publication History"}},{"value":"2021-05-04","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}