1. Adib, F., Katabi, D.: See through walls with WiFi! In: ACM Special Interest Group on Data Communication (SIGCOMM) (2013)
2. Ahmed, M.E., Kwak, I.Y., Huh, J.H., Kim, I., Oh, T., Kim, H.: Void: a fast and light voice liveness detection system. In: 29th USENIX Security Symposium (USENIX Security 20), pp. 2685–2702. USENIX Association (2020). https://www.usenix.org/conference/usenixsecurity20/presentation/ahmed-muhammad
3. Alan, H.F., Kaur, J.: Can android applications be identified using only TCP/IP headers of their launch time traffic? In: Proceedings of the 9th ACM Conference on Security & Privacy in Wireless and Mobile Networks, pp. 61–66. ACM (2016)
4. Ali, K., Liu, A.X., Wang, W., Shahzad, M.: Keystroke recognition using WiFi signals. In: Proceedings of the 21st Annual International Conference on Mobile Computing and Networking, pp. 90–102. ACM (2015)
5. Arsene, L.: Wearable plain-text communication exposed through brute-force, bitdefender finds (2014). https://www.hotforsecurity.com/blog/wearable-plain-text-communication-exposed-through-brute-force-bitdefender-finds-10973.html