Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
research-article

mmSign: mmWave-based Few-Shot Online Handwritten Signature Verification

Published: 11 May 2024 Publication History

Abstract

Handwritten signature verification has become one of the most important document authentication methods that are widely used in the financial, legal, and administrative sectors. Compared with offline methods based on static signature images, online handwritten signature verification methods are more reliable because of the temporary dynamic information (e.g., signing velocity, writing force, stroke order) that alleviates the risk of being forged. However, most existing online handwritten signature verification solutions are reliant on specific signing devices (e.g., customized pens or writing pads) and require extensive data collection during the registration phase, resulting in poor adaptability and applicability for new users. In this article, we propose mmSign, a millimeter wave (mmWave)–based online handwritten signature verification system, which enables accurate sensing of the user’s hand movements when signing through the superior sensing capability of mmWave. mmSign extracts the time-velocity feature maps from the captured mmWave signals by the carefully designed signal processing algorithms and then exploits a transformer-based verification model for signature verification. In addition, a novel meta-learning strategy with proposed task generation and data augmentation methods is introduced in mmSign to teach the verification model to learn effectively with limited samples, allowing our model to quickly adapt to new users. Extensive experiments show that mmSign is a robust, efficient, and secure handwritten signature verification system, achieving 84.07%, 87.31%, 91.12%, and 96.54% verification accuracy when 1, 3, 5, and 10 labeled signatures are available, respectively, while being resistant to common forgery attacks.

References

[1]
Martín Abadi, Paul Barham, Jianmin Chen, Zhifeng Chen, Andy Davis, Jeffrey Dean, Matthieu Devin, Sanjay Ghemawat, Geoffrey Irving, Michael Isard, et al. 2016. TensorFlow: A system for large-scale machine learning. In Proceedings of the USENIX Symposium on Operating Systems Design and Implementation (OSDI). 265–283.
[2]
Samet Akcay, Amir Atapour-Abarghouei, and Toby P. Breckon. 2019. Ganomaly: Semi-supervised anomaly detection via adversarial training. In Proceedings of Asian Conference on Computer Vision (ACCV). 622–637.
[3]
Rahaf Aljundi, Punarjay Chakravarty, and Tinne Tuytelaars. 2017. Expert gate: Lifelong learning with a network of experts. In Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition (CVPR). 3366–3375.
[4]
Antreas Antoniou, Harri Edwards, and Amos Storkey. 2019. How to train your MAML. In Proceedings of the International Conference on Learning Representations (ICLR).
[5]
Jimmy Lei Ba, Jamie Ryan Kiros, and Geoffrey E. Hinton. 2016. Layer normalization. arXiv preprint arXiv:1607.06450 (2016).
[6]
Sungyong Baik, Janghoon Choi, Heewon Kim, Dohee Cho, Jaesik Min, and Kyoung Mu Lee. 2021. Meta-learning with task-adaptive loss function for few-shot learning. In Proceedings of the IEEE/CVF International Conference on Computer Vision (ICCV). 9465–9474.
[7]
Jessa Bekker and Jesse Davis. 2020. Learning from positive and unlabeled data: A survey. Machine Learning 109 (2020), 719–760.
[8]
Parkside Chambers. 2019. Court of Appeal Clarifies the Burden of Proof for Forgery in Civil Cases. Retrieved November 15, 2022 from http://www.parksidechambers.com.hk/court-of-appeal-clarifies-the-burden-of-proof-for-forgery-in-civil-cases.
[9]
Mengqi Chen, Jiawei Lin, Yongpan Zou, Rukhsana Ruby, and Kaishun Wu. 2020. SilentSign: Device-free handwritten signature verification through acoustic sensing. In Proceedings of the IEEE International Conference on Pervasive Computing and Communications (PerCom). 1–10.
[10]
Yongliang Chen, Tao Ni, Weitao Xu, and Tao Gu. 2022. SwipePass: Acoustic-based second-factor user authentication for smartphones. Proceedings of the ACM on Interactive, Mobile, Wearable and Ubiquitous Technologies 6, 3 (2022), 1–25.
[11]
Zhe Chen, Tianyue Zheng, Chao Cai, and Jun Luo. 2021. MoVi-Fi: Motion-robust vital signs waveform recovery via deep interpreted RF sensing. In Proceedings of the Annual International Conference on Mobile Computing and Networking (MobiCom). 392–405.
[12]
Francois Chollet et al. 2015. Keras. Retrieved November 11, 2022 from https://github.com/fchollet/keras.
[13]
Hewitt D. Crane and John S. Ostrem. 1983. Automatic signature verification using a three-axis force-sensitive pen. IEEE Transactions on Systems, Man, and Cybernetics SMC-13, 3 (1983), 329–337.
[14]
Jacob Devlin, Ming-Wei Chang, Kenton Lee, and Kristina Toutanova. 2019. BERT: Pre-training of deep bidirectional transformers for language understanding. In Proceedings of Human Language Technologies: The Annual Conference of the North American Chapter of the Association for Computational Linguistics (NAACL-HLT). 4171–4186.
[15]
Sounak Dey, Anjan Dutta, J Ignacio Toledo, Suman K. Ghosh, Josep Lladós, and Umapada Pal. 2017. SigNet: Convolutional Siamese network for writer independent offline signature verification. arXiv preprint arXiv:1707.02131 (2017).
[16]
Moises Diaz, Miguel A. Ferrer, Donato Impedovo, Muhammad Imran Malik, Giuseppe Pirlo, and Réjean Plamondon. 2019. A perspective analysis of handwritten signature technology. ACM Computing Surveys 51, 6 (2019), 1–39.
[17]
Feng Ding, Dong Wang, Qian Zhang, and Run Zhao. 2019. ASSV: Handwritten signature verification using acoustic signals. Proceedings of the ACM on Interactive, Mobile, Wearable and Ubiquitous Technologies 3, 3 (2019), 1–22.
[18]
Alexey Dosovitskiy, Lucas Beyer, Alexander Kolesnikov, Dirk Weissenborn, Xiaohua Zhai, Thomas Unterthiner, Mostafa Dehghani, Matthias Minderer, Georg Heigold, Sylvain Gelly, et al. 2020. An image is worth 16x16 words: Transformers for image recognition at scale. In Proceedings of the International Conference on Learning Representations (ICLR).
[19]
J.-P. Drouhard, Robert Sabourin, and Mario Godbout. 1996. A neural network approach to off-line signature verification using directional PDF. Pattern Recognition 29, 3 (1996), 415–424.
[20]
Li Feifei, Robert Fergus, and Pietro Perona. 2006. One-shot learning of object categories. IEEE Transactions on Pattern Analysis and Machine Intelligence 28, 4 (2006), 594–611.
[21]
Chelsea Finn, Pieter Abbeel, and Sergey Levine. 2017. Model-agnostic meta-learning for fast adaptation of deep networks. In Proceedings of the International Conference on Machine Learning (ICML). 1126–1135.
[22]
Taesik Gong, Yeonsu Kim, Jinwoo Shin, and Sung-Ju Lee. 2019. MetaSense: Few-shot adaptation to untrained conditions in deep mobile sensing. In Proceedings of the Conference on Embedded Networked Sensor Systems (SenSys). 110–123.
[23]
Tianbo Gu, Zheng Fang, Zhicheng Yang, Pengfei Hu, and Prasant Mohapatra. 2019. mmSense: Multi-person detection and identification via mmWave sensing. In Proceedings of the ACM Workshop on Millimeter-Wave Networks and Sensing Systems (mmNets). 45–50.
[24]
Luiz G. Hafemann, Robert Sabourin, and Luiz S. Oliveira. 2017. Offline handwritten signature verification–Literature review. In Proceedings of the International Conference on Image Processing Theory, Tools and Applications (IPTA). 1–8.
[25]
Luiz G. Hafemann, Robert Sabourin, and Luiz S. Oliveira. 2019. Meta-learning for fast classifier adaptation to new users of signature verification systems. IEEE Transactions on Information Forensics and Security 15 (2019), 1735–1745.
[26]
Mingda Han, Linlin Guo, Jia Zhang, Hui Ji, Zihan Diao, and Jiande Sun. 2022. WiID: Precise WiFi-based person identification via bio-electromagnetic information. In Proceedings of the International Conference on Pattern Recognition (ICPR). 1105–1112.
[27]
Kaiming He, Xiangyu Zhang, Shaoqing Ren, and Jian Sun. 2016. Deep residual learning for image recognition. In Proceedings of the IEEE Computer Vision and Pattern Recognition (CVPR). 770–778.
[28]
Timothy Hospedales, Antreas Antoniou, Paul Micaelli, and Amos Storkey. 2021. Meta-learning in neural networks: A survey. IEEE Transactions on Pattern Analysis and Machine Intelligence 44, 9 (2021), 5149–5169.
[29]
Ming Hou, Brahim Chaib-Draa, Chao Li, and Qibin Zhao. 2017. Generative adversarial positive-unlabelled learning. arXiv preprint arXiv:1711.08054 (2017).
[30]
Pengfei Hu, Yifan Ma, Panneer Selvam Santhalingam, Parth H. Pathak, and Xiuzhen Cheng. 2022. MILLIEAR: Millimeter-wave acoustic eavesdropping with unconstrained vocabulary. In Proceedings of the IEEE International Conference on Computer Communications (INFOCOM). 11–20.
[31]
Donato Impedovo and Giuseppe Pirlo. 2008. Automatic signature verification: The state of the art. IEEE Transactions on Systems, Man, and Cybernetics, Part C (Applications and Reviews) 38, 5 (2008), 609–635.
[32]
J. P. Morgan. 2022. 2022 AFP Payments Fraud and Control Report. Retrieved November 15, 2022 from https://www.afponline.org/publications-data-tools/reports/survey-research-economic-data/Details/payments-fraud.
[33]
Anil K. Jain, Friederike D. Griess, and Scott D. Connell. 2002. On-line signature verification. Pattern Recognition 35, 12 (2002), 2963–2972.
[34]
Muhammad Abdullah Jamal and Guojun Qi. 2019. Task agnostic meta-learning for few-shot learning. In Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR). 11719–11727.
[35]
Chengkun Jiang, Junchen Guo, Yuan He, Meng Jin, Shuai Li, and Yunhao Liu. 2020. mmVib: Micrometer-level vibration measurement with mmWave radar. In Proceedings of the Annual International Conference on Mobile Computing and Networking (MobiCom). 1–13.
[36]
Wenjun Jiang, Chenglin Miao, Fenglong Ma, Shuochao Yao, Yaqing Wang, Ye Yuan, Hongfei Xue, Chen Song, Xin Ma, Dimitrios Koutsonikolas, et al. 2018. Towards environment independent device free human activity recognition. In Proceedings of the Annual International Conference on Mobile Computing and Networking (MobiCom). 289–304.
[37]
Nidal S. Kamel, Shohel Sayeed, and Grant A. Ellis. 2008. Glove-based approach to online signature verification. IEEE Transactions on Pattern Analysis and Machine Intelligence 30, 6 (2008), 1109–1113.
[38]
Alisher Kholmatov and Berrin Yanikoglu. 2005. Identity authentication using improved online signature verification method. Pattern Recognition Letters 26, 15 (2005), 2400–2408.
[39]
Guohao Lan, Bailey Heit, Tim Scargill, and Maria Gorlatova. 2020. GazeGraph: Graph-based few-shot cognitive context sensing from human visual behavior. In Proceedings of the Conference on Embedded Networked Sensor Systems (SenSys). 422–435.
[40]
Alona Levy, Ben Nassi, Yuval Elovici, and Erez Shmueli. 2018. Handwritten signature verification using wrist-worn devices. Proceedings of the ACM on Interactive, Mobile, Wearable and Ubiquitous Technologies 2, 3 (2018), 1–26.
[41]
Huining Li, Chenhan Xu, Aditya Singh Rathore, Zhengxiong Li, Hanbin Zhang, Chen Song, Kun Wang, Lu Su, Feng Lin, Kui Ren, et al. 2020. VocalPrint: Exploring a resilient and secure voice authentication via mmWave biometric interrogation. In Proceedings of the Conference on Embedded Networked Sensor Systems (SenSys). 312–325.
[42]
Chris Xiaoxuan Lu, Stefano Rosa, Peijun Zhao, Bing Wang, Changhao Chen, John A. Stankovic, Niki Trigoni, and Andrew Markham. 2020. See through smoke: Robust indoor mapping with low-cost mmWave radar. In Proceedings of the International Conference on Mobile Systems, Applications, and Services (MobiSys). 14–27.
[43]
Marcos Martinez-Diaz, Julian Fierrez, Ram P. Krish, and Javier Galbally. 2014. Mobile signature verification: Feature robustness and performance comparison. IET Biometrics 3, 4 (2014), 267–277.
[44]
Yu Mitsuzumi, Go Irie, Daiki Ikami, and Takashi Shibata. 2021. Generalized domain adaptation. In Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR). 1084–1093.
[45]
Kenrick Mock, Bogdan Hoanca, Justin Weaver, and Mikal Milton. 2012. Real-time continuous iris recognition for authentication using an eye tracker. In Proceedings of the ACM Conference on Computer and Communications Security (CCS). 1007–1009.
[46]
Daigo Muramatsu and Takashi Matsumoto. 2007. Effectiveness of pen pressure, azimuth, and altitude features for online signature verification. In Proceedings of the International Conference on Biometrics (ICB). 503–512.
[47]
CBS News. 2016. Slamming “Bizarre” Law, Judge Rules on Florida’s Vote-by-mail Ballots. Retrieved November 15, 2022 from https://www.cbsnews.com/news/florida-voters-can-fix-vote-by-mail-ballot-federal-judge-rules.
[48]
CSO Security News. 2018. Busted! Cops Use Fingerprint Pulled from a WhatsApp Photo to ID Drug Dealer. Retrieved November 19, 2022 from https://www.csoonline.com/article/3268837/busted-cops-use-fingerprint-pulled-from-a-whatsapp-photo-to-id-drug-dealer.html.
[49]
Luiz S. Oliveira, Edson Justino, Cinthia Freitas, and Robert Sabourin. 2005. The graphology applied to signature verification. In Proceedings of the Conference of the International Graphonomics Society (IGS). 286–290.
[50]
Felix Ott, Mohamad Wehbi, Tim Hamann, Jens Barth, Björn Eskofier, and Christopher Mutschler. 2020. The OnHW dataset: Online handwriting recognition from IMU-enhanced ballpoint pens with machine learning. Proceedings of the ACM on Interactive, Mobile, Wearable and Ubiquitous Technologies 4, 3 (2020), 1–20.
[51]
A. B. M. Mohaimenur Rahman, Yetong Cao, Xinliang Wei, Pu Wang, Fan Li, and Yu Wang. 2022. PPGSign: Handwritten signature authentication using wearable PPG sensor. In Proceedings of the IEEE Wireless Communications and Networking Conference (WCNC). 2721–2726.
[52]
Aravind Rajeswaran, Chelsea Finn, Sham M. Kakade, and Sergey Levine. 2019. Meta-learning with implicit gradients. Advances in Neural Information Processing Systems 32 (2019).
[53]
Carolina Sanchez-Hernandez, Doreen S. Boyd, and Giles M. Foody. 2007. One-class classification for mapping a specific land-cover class: SVDD classification of fenland. IEEE Transactions on Geoscience and Remote Sensing 45, 4 (2007), 1061–1073.
[54]
M. C. Schoeman-Malan. 2015. Fraud and forgery of the testator’s will or signature: The flight from formalities to no formalities. Journal of South African Law/Tydskrif vir die Suid-Afrikaanse Reg 2015, 1 (2015), 125–152.
[55]
Hiroki Shimizu, Satoshi Kiyono, Takenori Motoki, and Wei Gao. 2004. An electrical pen for signature verification using a two-dimensional optical angle sensor. Sensors and Actuators A: Physical 111, 2-3 (2004), 216–221.
[56]
Karen Simonyan and Andrew Zisserman. 2014. Very deep convolutional networks for large-scale image recognition. arXiv preprint arXiv:1409.1556 (2014).
[57]
Akash Deep Singh, Sandeep Singh Sandha, Luis Garcia, and Mani Srivastava. 2019. RadHAR: Human activity recognition from point clouds generated through a millimeter-wave radar. In Proceedings of the ACM Workshop on Millimeter-Wave Networks and Sensing Systems (mmNets). 51–56.
[58]
Jake Snell, Kevin Swersky, and Richard Zemel. 2017. Prototypical networks for few-shot learning. Advances in Neural Information Processing Systems 30 (2017).
[59]
Amir Soleimani, Babak N. Araabi, and Kazim Fouladi. 2016. Deep multitask metric learning for offline signature verification. Pattern Recognition Letters 80 (2016), 84–90.
[60]
Gan Sun, Yang Cong, and Xiaowei Xu. 2018. ”. In Proceedings of the AAAI Conference on Artificial Intelligence (AAAI), Vol. 32.
[61]
Flood Sung, Yongxin Yang, Li Zhang, Tao Xiang, Philip H. S. Torr, and Timothy M. Hospedales. 2018. Learning to compare: Relation network for few-shot learning. In Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition (CVPR). 1199–1208.
[62]
Ashish Vaswani, Noam Shazeer, Niki Parmar, Jakob Uszkoreit, Llion Jones, Aidan N. Gomez, Łukasz Kaiser, and Illia Polosukhin. 2017. Attention is all you need. Advances in Neural Information Processing Systems 30 (2017).
[63]
Chao Wang, Feng Lin, Tiantian Liu, Ziwei Liu, Yijie Shen, Zhongjie Ba, Li Lu, Wenyao Xu, and Kui Ren. 2022. mmPhone: Acoustic eavesdropping on loudspeakers via mmWave-characterized piezoelectric effect. In Proceedings of the IEEE Conference on Computer Communications (INFOCOM). 820–829.
[64]
Dazhuo Wang, Jianfei Yang, Wei Cui, Lihua Xie, and Sumei Sun. 2022. CAUTION: A robust WiFi-based human authentication system via few-shot open-set gait recognition. IEEE Internet of Things Journal 9, 18 (2022), 17323–17333.
[65]
Ting-Chun Wang, Ming-Yu Liu, Andrew Tao, Guilin Liu, Jan Kautz, and Bryan Catanzaro. 2019. Few-shot video-to-video synthesis. arXiv preprint arXiv:1910.12713 (2019).
[66]
Wei Wang, Alex X. Liu, and Ke Sun. 2016. Device-free gesture tracking using acoustic signals. In Proceedings of the Annual International Conference on Mobile Computing and Networking (MobiCom). 82–94.
[67]
Xuyu Wang, Chao Yang, and Shiwen Mao. 2017. PhaseBeat: Exploiting CSI phase data for vital sign monitoring with commodity WiFi devices. In Proceedings of the IEEE International Conference on Distributed Computing Systems (ICDCS). 1230–1239.
[68]
Yao Wang, Tao Gu, Tom H. Luan, Minjie Lyu, and Yue Li. 2022. HeartPrint: Exploring a heartbeat-based multiuser authentication with single mmWave radar. IEEE Internet of Things Journal 9, 24 (2022), 25324–25336.
[69]
Yao Wang, Tao Gu, Tom H. Luan, and Yong Yu. 2022. Your breath doesn’t lie: Multi-user authentication by sensing respiration using mmWave radar. In Proceedings of the IEEE International Conference on Sensing, Communication, and Networking (SECON). 64–72.
[70]
Yanwen Wang, Jiaxing Shen, and Yuanqing Zheng. 2020. Push the limit of acoustic gesture recognition. IEEE Transactions on Mobile Computing 21, 5 (2020), 1798–1811.
[71]
Michael Whyte. 2015. Fingerprint Identifications from Images and Video Recovered from Cell Phones. Retrieved November 19, 2022 from http://www.in-the-loop.net.au/fp-identifications-from-digital-media.
[72]
Cong Wu, Kun He, Jing Chen, Ziming Zhao, and Ruiying Du. 2020. Liveness is not enough: Enhancing fingerprint authentication with behavioral biometrics to defeat puppet attacks. In Proceedings of the USENIX Security Symposium (USENIX Security). 2219–2236.
[73]
Rui Xiao, Jianwei Liu, Jinsong Han, and Kui Ren. 2021. OneFi: One-shot recognition for unseen gesture via COTS WiFi. In Proceedings of the ACM Conference on Embedded Networked Sensor Systems (SenSys). 206–219.
[74]
Weitao Xu, Yiran Shen, Yongtuo Zhang, Neil Bergmann, and Wen Hu. 2017. Gait-watch: A context-aware authentication system for smart watch based on gait recognition. In Proceedings of the International Conference on Internet-of-Things Design and Implementation. 59–70.
[75]
Weiye Xu, Wenfan Song, Jianwei Liu, Yajie Liu, Xin Cui, Yuanqing Zheng, Jinsong Han, Xinhuai Wang, and Kui Ren. 2022. Mask does not matter: Anti-spoofing face authentication using mmWave without on-site registration. In Proceedings of the Annual International Conference on Mobile Computing and Networking (MobiCom). 310–323.
[76]
Shiqi Yang, Yaxing Wang, Joost van de Weijer, Luis Herranz, and Shangling Jui. 2021. Generalized source-free domain adaptation. In Proceedings of the IEEE/CVF International Conference on Computer Vision (ICCV). 8978–8987.
[77]
Xin Yang, Jian Liu, Yingying Chen, Xiaonan Guo, and Yucheng Xie. 2020. MU-ID: Multi-user identification through gaits using millimeter wave radios. In Proceedings of the IEEE Conference on Computer Communications (INFOCOM). 2589–2598.
[78]
Zhicheng Yang, Parth H. Pathak, Yunze Zeng, Xixi Liran, and Prasant Mohapatra. 2017. Vital sign and sleep monitoring using millimeter wave. ACM Transactions on Sensor Networks 13, 2 (2017), 1–32.
[79]
Kumiko Yasuda, Daigo Muramatsu, Satoshi Shirato, and Takashi Matsumoto. 2010. Visual-based online signature verification using features extracted from video. Journal of Network and Computer Applications 33, 3 (2010), 333–341.
[80]
Chi Zhang, Yujun Cai, Guosheng Lin, and Chunhua Shen. 2020. DeepEMD: Few-shot image classification with differentiable earth mover’s distance and structured classifiers. In Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR). 12203–12213.
[81]
Ye Zhang and Byron Wallace. 2015. A sensitivity analysis of (and practitioners’ guide to) convolutional neural networks for sentence classification. arXiv preprint arXiv:1510.03820 (2015).
[82]
Run Zhao, Dong Wang, Qian Zhang, Xueyi Jin, and Ke Liu. 2021. Smartphone-based handwritten signature verification using acoustic signals. Proceedings of the ACM on Human-Computer Interaction 5, ISS (2021), 1–26.

Cited By

View all
  • (2025)Cyber–Physical–Social Security of High‐DER‐Penetrated Smart Grids: Threats, Countermeasures, and ChallengesIET Information Security10.1049/ise2/26545502025:1Online publication date: 9-Jan-2025
  • (2024)EarDA: Towards Accurate and Data-Efficient Earable Activity Sensing2024 IEEE Coupling of Sensing & Computing in AIoT Systems (CSCAIoT)10.1109/CSCAIoT62585.2024.00005(1-7)Online publication date: 13-May-2024
  • (2024)mmPalm: Unlocking Ubiquitous User Authentication through Palm Recognition with mmWave Signals2024 IEEE Conference on Communications and Network Security (CNS)10.1109/CNS62487.2024.10735583(1-9)Online publication date: 30-Sep-2024
  • Show More Cited By

Index Terms

  1. mmSign: mmWave-based Few-Shot Online Handwritten Signature Verification

      Recommendations

      Comments

      Information & Contributors

      Information

      Published In

      cover image ACM Transactions on Sensor Networks
      ACM Transactions on Sensor Networks  Volume 20, Issue 4
      July 2024
      603 pages
      EISSN:1550-4867
      DOI:10.1145/3618082
      • Editor:
      • Wen Hu
      Issue’s Table of Contents

      Publisher

      Association for Computing Machinery

      New York, NY, United States

      Journal Family

      Publication History

      Published: 11 May 2024
      Online AM: 24 June 2023
      Accepted: 20 June 2023
      Revised: 23 April 2023
      Received: 27 December 2022
      Published in TOSN Volume 20, Issue 4

      Check for updates

      Author Tags

      1. Signature verification
      2. mmWave sensing
      3. Meta-learning

      Qualifiers

      • Research-article

      Funding Sources

      • NSFC
      • Shenzhen Research Institute, City University of Hong Kong
      • Research Grants Council of the Hong Kong Special Administrative Region, China
      • Shenzhen Science and Technology Funding Fundamental Research Program
      • NSF of Shandong Province
      • Chow Sang Sang Group Research Fund
      • Chow Sang Sang Holdings International Limited
      • CityU MFPRC
      • CityU SIRG
      • CityU APRC
      • CityU ARG
      • CityU SRG-Fd

      Contributors

      Other Metrics

      Bibliometrics & Citations

      Bibliometrics

      Article Metrics

      • Downloads (Last 12 months)516
      • Downloads (Last 6 weeks)56
      Reflects downloads up to 01 Feb 2025

      Other Metrics

      Citations

      Cited By

      View all
      • (2025)Cyber–Physical–Social Security of High‐DER‐Penetrated Smart Grids: Threats, Countermeasures, and ChallengesIET Information Security10.1049/ise2/26545502025:1Online publication date: 9-Jan-2025
      • (2024)EarDA: Towards Accurate and Data-Efficient Earable Activity Sensing2024 IEEE Coupling of Sensing & Computing in AIoT Systems (CSCAIoT)10.1109/CSCAIoT62585.2024.00005(1-7)Online publication date: 13-May-2024
      • (2024)mmPalm: Unlocking Ubiquitous User Authentication through Palm Recognition with mmWave Signals2024 IEEE Conference on Communications and Network Security (CNS)10.1109/CNS62487.2024.10735583(1-9)Online publication date: 30-Sep-2024
      • (2024)milliFlow: Scene Flow Estimation on mmWave Radar Point Cloud for Human Motion SensingComputer Vision – ECCV 202410.1007/978-3-031-72691-0_12(202-221)Online publication date: 3-Nov-2024

      View Options

      Login options

      Full Access

      View options

      PDF

      View or Download as a PDF file.

      PDF

      eReader

      View online with eReader.

      eReader

      Full Text

      View this article in Full Text.

      Full Text

      Figures

      Tables

      Media

      Share

      Share

      Share this Publication link

      Share on social media