{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,5,29]],"date-time":"2025-05-29T04:11:16Z","timestamp":1748491876219,"version":"3.41.0"},"reference-count":26,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2015,3]]},"DOI":"10.1109\/isba.2015.7126368","type":"proceedings-article","created":{"date-parts":[[2015,6,18]],"date-time":"2015-06-18T20:04:45Z","timestamp":1434657885000},"page":"1-6","source":"Crossref","is-referenced-by-count":4,"title":["On motion sensors as source for user input inference in smartphones"],"prefix":"10.1109","author":[{"given":"Chao","family":"Shen","sequence":"first","affiliation":[]},{"given":"Shichao","family":"Pei","sequence":"additional","affiliation":[]},{"given":"Tianwen","family":"Yu","sequence":"additional","affiliation":[]},{"given":"Xiaohong","family":"Guan","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"journal-title":"Advances in Kernel Methods - Support Vector Learning","year":"1998","author":"schoelkopf","key":"ref10"},{"journal-title":"Pattern Recognition and Machine Learning","year":"2007","author":"christopher","key":"ref11"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1145\/1866307.1866395"},{"journal-title":"Wikipedia Descriptive statistics","year":"0","key":"ref13"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1023\/A:1010933404324"},{"key":"ref15","first-page":"1","article-title":"Compromising electromagnetic emanations of wired and wireless keyboards","author":"vuagnoux","year":"2009","journal-title":"Proc the 18th conference on USENIX security symposium USENIX Association"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1145\/1609956.1609959"},{"key":"ref17","first-page":"9","article-title":"TouchLogger: inferring keystrokes on touch screen from smartphone motion","author":"cai","year":"2011","journal-title":"Proceedings of the 5th USENIX Conference on Hot Topics in Security"},{"key":"ref18","article-title":"PIN skimmer: inferring PINs through the camera and microphone","author":"laurent","year":"2013","journal-title":"Proceedings of the Third ACM workshop on Security and privacy in smartphones &amp; mobile devices - SPSM '13"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-30921-2_16"},{"journal-title":"Developers A Handling UI events","year":"0","key":"ref4"},{"journal-title":"Wikipedia Comparison of smartphones","year":"0","key":"ref3"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/SECPRI.2004.1301311"},{"journal-title":"Introduction to Probability and Statistics for Engineers and Scientists","year":"1999","author":"ross","key":"ref5"},{"journal-title":"Android Developers TouchListener","year":"0","key":"ref8"},{"key":"ref7","article-title":"Soundminer: A stealthy and context-aware sound trojan for smartphones","author":"zhang","year":"2011","journal-title":"The 18th Annual Network & Distributed System Security Symposium"},{"key":"ref2","first-page":"234","volume":"12","year":"2002","journal-title":"Apple iOS Developer Library Uiaccelerometer class reference"},{"journal-title":"Android Developers Input Events","year":"0","key":"ref9"},{"journal-title":"Android Developers SensorEvent specication","year":"0","key":"ref1"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1145\/2162081.2162095"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1145\/2307636.2307666"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1145\/2185448.2185465"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.5614\/itbj.ict.res.appl.2013.7.2.2"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1145\/2420950.2420957"},{"key":"ref26","doi-asserted-by":"crossref","DOI":"10.1093\/oso\/9780198523963.001.0001","author":"bowman","year":"1997","journal-title":"Applied Smoothing Techniques for Data Analysis"},{"journal-title":"Android Developers Monitoring Sensor Events","year":"0","key":"ref25"}],"event":{"name":"IEEE International Conference on Identity, Security and Behavior Analysis (ISBA 2015)","start":{"date-parts":[[2015,3,23]]},"location":"Hong Kong","end":{"date-parts":[[2015,3,25]]}},"container-title":["IEEE International Conference on Identity, Security and Behavior Analysis (ISBA 2015)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/7118006\/7126341\/07126368.pdf?arnumber=7126368","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,5,28]],"date-time":"2025-05-28T18:47:01Z","timestamp":1748458021000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/7126368\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015,3]]},"references-count":26,"URL":"https:\/\/doi.org\/10.1109\/isba.2015.7126368","relation":{},"subject":[],"published":{"date-parts":[[2015,3]]}}}