Skip to main content
. 2020 Sep 28;69:101265. doi: 10.1016/j.pmcj.2020.101265

Fig. 12.

Fig. 12

Main sensing signal, signal of the proposed method, recovered signal by the permitted person, and recovered signal by the attacker.