2018 IEEE Conference on Communications and Network Security (CNS) 2018
DOI: 10.1109/cns.2018.8433142
|View full text |Cite
|
Sign up to set email alerts
|

Towards In-baggage Suspicious Object Detection Using Commodity WiFi

Abstract: The growing needs of public safety urgently require scalable and low-cost techniques on detecting dangerous objects (e.g., lethal weapons, homemade-bombs, explosive chemicals) hidden in baggage. Traditional baggage check involves either high manpower for manual examinations or expensive and specialized instruments, such as X-ray and CT. As such, many public places (i.e., museums and schools) that lack of strict security check are exposed to high risk. In this work, we propose to utilize the finegrained channel… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
16
0

Year Published

2019
2019
2024
2024

Publication Types

Select...
4
3
1

Relationship

0
8

Authors

Journals

citations
Cited by 53 publications
(18 citation statements)
references
References 23 publications
0
16
0
Order By: Relevance
“…To separate targets from the noise floor on the RDM, a threshold is applied on each cell of the RDM. The most common technique is CA-CFAR, for which the threshold is based on the noise power estimateσ 2 n on a band of size D centered on the RDM cell. Here the band is 1-dimensional along the range dimension of the RDM [10].…”
Section: Ca-cfarmentioning
confidence: 99%
See 1 more Smart Citation
“…To separate targets from the noise floor on the RDM, a threshold is applied on each cell of the RDM. The most common technique is CA-CFAR, for which the threshold is based on the noise power estimateσ 2 n on a band of size D centered on the RDM cell. Here the band is 1-dimensional along the range dimension of the RDM [10].…”
Section: Ca-cfarmentioning
confidence: 99%
“…to remotely monitor movements of people or objects in buildings. Examples include control of building evacuations and intrusion detection [1], assistance of security staffs in airports or public places [2], or human movements classification [3]. Indoor monitoring with radar is of interest when cameras do not have line-of-sight or cause privacy concerns.…”
Section: Introductionmentioning
confidence: 99%
“…In the case of non-moving objects, the multipath propagation is different depending on the location or the shape of objects where they exist between antennas. This characteristic is used for location estimation and object identification [6][7][8][9][10] among others. In these applications, the main classification algorithms for estimation, such as SVMs and convolutional neural networks (CNNs), are used.…”
Section: Related Studiesmentioning
confidence: 99%
“…The CSI consists of frequency and space information, expresses the effect of multipath propagation, and corresponds to the space state between transmitting and receiving antennas. To date, CSI has been used for various studies such as human movement detection, human behavior classification, location estimation, object identification, human counting in a room, and human counting in a passageway [3,[5][6][7][8][9][10][11][12][13][14][15][16][17][18][19].…”
Section: Introductionmentioning
confidence: 99%
“…TagScan 10 identifies the target material by detecting the changes of the RSSI and phase when the RFID signal penetrates through the target and it is sensitive enough to differentiate between Coke and Pepsi. Wang et al 19 explores the feasibility of using CSI from COTS WiFi to detect suspicious objects (i.e., liquid objects and metal) hidden in baggage. LiquID 11 employs the UWB signals to identify liquids at high accuracies.…”
Section: Object Materials Identificationmentioning
confidence: 99%