2021
DOI: 10.1145/3494975
|View full text |Cite
|
Sign up to set email alerts
|

Thru-the-wall Eavesdropping on Loudspeakers via RFID by Capturing Sub-mm Level Vibration

Abstract: The unprecedented success of speech recognition methods has stimulated the wide usage of intelligent audio systems, which provides new attack opportunities for stealing the user privacy through eavesdropping on the loudspeakers. Effective eavesdropping methods employ a high-speed camera, relying on LOS to measure object vibrations, or utilize WiFi MIMO antenna array, requiring to eavesdrop in quiet environments. In this paper, we explore the possibility of eavesdropping on the loudspeaker based on COTS RFID ta… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
5
1
1

Relationship

0
7

Authors

Journals

citations
Cited by 19 publications
(2 citation statements)
references
References 29 publications
0
2
0
Order By: Relevance
“…EC 3: We chose papers that use or study neural network-based generative models such as GAN, VAE, LSTM, GPT-3, and DALL-E. For instance, the use of conventional generative models like Gaussian mixture models was excluded. EC 4: Since we are interested in the impact of generative models to humans, excluded are the technical papers which adopted generative models for data augmentation [50,60], synthesizing [37], and complement [98]. EC 5: We excluded doctoral dissertation, survey paper, book, book chapter, and demo papers.…”
Section: Exclusion Criteriamentioning
confidence: 99%
“…EC 3: We chose papers that use or study neural network-based generative models such as GAN, VAE, LSTM, GPT-3, and DALL-E. For instance, the use of conventional generative models like Gaussian mixture models was excluded. EC 4: Since we are interested in the impact of generative models to humans, excluded are the technical papers which adopted generative models for data augmentation [50,60], synthesizing [37], and complement [98]. EC 5: We excluded doctoral dissertation, survey paper, book, book chapter, and demo papers.…”
Section: Exclusion Criteriamentioning
confidence: 99%
“…With the commercialization of RFID, its application is becoming more and more widespread, including item tracking, motion detection [1,2], goods security and so on [3][4][5][6][7]. As the increasing demand on protection for security industry and personal privacy, user authentication technology has become particularly important.…”
Section: Introductionmentioning
confidence: 99%