{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,9]],"date-time":"2026-01-09T18:25:37Z","timestamp":1767983137504,"version":"3.49.0"},"reference-count":106,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"9","license":[{"start":{"date-parts":[[2023,5,1]],"date-time":"2023-05-01T00:00:00Z","timestamp":1682899200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2023,5,1]],"date-time":"2023-05-01T00:00:00Z","timestamp":1682899200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2023,5,1]],"date-time":"2023-05-01T00:00:00Z","timestamp":1682899200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/501100000923","name":"Australian Research Council","doi-asserted-by":"publisher","award":["LP180100663"],"award-info":[{"award-number":["LP180100663"]}],"id":[{"id":"10.13039\/501100000923","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Internet Things J."],"published-print":{"date-parts":[[2023,5,1]]},"DOI":"10.1109\/jiot.2022.3231381","type":"journal-article","created":{"date-parts":[[2022,12,22]],"date-time":"2022-12-22T18:39:27Z","timestamp":1671734367000},"page":"8155-8171","source":"Crossref","is-referenced-by-count":13,"title":["<i>Pistis<\/i>: Replay Attack and Liveness Detection for Gait-Based User Authentication System on Wearable Devices Using Vibration"],"prefix":"10.1109","volume":"10","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-1240-8412","authenticated-orcid":false,"given":"Wei","family":"Song","sequence":"first","affiliation":[{"name":"School of Computer Science and Engineering, The University of New South Wales, Sydney, NSW, Australia"}]},{"given":"Hong","family":"Jia","sequence":"additional","affiliation":[{"name":"Department of Computer Science and Technology, University of Cambridge, Cambridge, U.K."}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-1580-6387","authenticated-orcid":false,"given":"Min","family":"Wang","sequence":"additional","affiliation":[{"name":"School of Engineering and Information Technology, The University of New South Wales, Canberra, ACT, Australia"}]},{"given":"Yuezhong","family":"Wu","sequence":"additional","affiliation":[{"name":"School of Computer Science and Engineering, The University of New South Wales, Sydney, NSW, Australia"}]},{"given":"Wanli","family":"Xue","sequence":"additional","affiliation":[{"name":"Security Lab of Sophos, Sophos, Sydney, NSW, Australia"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-4512-7155","authenticated-orcid":false,"given":"Chun Tung","family":"Chou","sequence":"additional","affiliation":[{"name":"School of Computer Science and Engineering, The University of New South Wales, Sydney, NSW, Australia"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-0230-1432","authenticated-orcid":false,"given":"Jiankun","family":"Hu","sequence":"additional","affiliation":[{"name":"School of Engineering and Information Technology, The University of New South Wales, Canberra, ACT, Australia"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-4076-1811","authenticated-orcid":false,"given":"Wen","family":"Hu","sequence":"additional","affiliation":[{"name":"School of Computer Science and Engineering, The University of New South Wales, Sydney, NSW, Australia"}]}],"member":"263","reference":[{"key":"ref57","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2017.23408"},{"key":"ref56","author":"shultz","year":"2015","journal-title":"Examination of Musculoskeletal Injuries"},{"key":"ref59","first-page":"1558","article-title":"Proceedings of the 22nd ACM SIGSAC conference on computer and communications security, CCS 15","author":"ray","year":"2015","journal-title":"Proc 22nd ACM SIGSAC Conf Comput Commun Security"},{"key":"ref58","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV.2007.4409068"},{"key":"ref53","doi-asserted-by":"publisher","DOI":"10.1109\/CVPRW.2014.20"},{"key":"ref52","doi-asserted-by":"publisher","DOI":"10.1145\/3230633"},{"key":"ref55","first-page":"361","article-title":"Information security","author":"mjaaland","year":"2010","journal-title":"Proc 13th Int Conf ISC"},{"key":"ref54","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2007.902030"},{"key":"ref51","doi-asserted-by":"publisher","DOI":"10.1145\/2634317.2642868"},{"key":"ref50","doi-asserted-by":"publisher","DOI":"10.4304\/jcp.1.7.51-59"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.1109\/TIP.2006.888339"},{"key":"ref45","first-page":"304","article-title":"Usable user authentication on a smartwatch using vibration","author":"kim","year":"2021","journal-title":"Proc ACM SIGSAC Conf Comput Commun Security"},{"key":"ref48","doi-asserted-by":"publisher","DOI":"10.1109\/IIH-MSP.2012.11"},{"key":"ref47","doi-asserted-by":"publisher","DOI":"10.1109\/ICIEA.2007.4318894"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2020.2985628"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1016\/j.patcog.2017.09.005"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1109\/IPSN48710.2020.00-11"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1109\/TMC.2019.2897933"},{"key":"ref49","doi-asserted-by":"publisher","DOI":"10.1109\/IIHMSP.2010.84"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/TMC.2014.2365185"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2020.3016819"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.23919\/BIOSIG.2017.8053523"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/AUTOID.2005.2"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1145\/3447993.3483240"},{"key":"ref6","year":"2021","journal-title":"Bone conduction kit"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1038\/s41597-020-0563-y"},{"key":"ref100","year":"2022","journal-title":"What Is Liveness Detection? Types and Benefits of Liveness Detection"},{"key":"ref101","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2015.2398819"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1117\/12.603331"},{"key":"ref35","first-page":"159","article-title":"Tactile feedback for mobile interactions","author":"rosson","year":"2007","journal-title":"Proc SIGCHI Conf Human Factors Comput Syst"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1109\/ISVRI.2011.5759662"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1145\/3340293"},{"key":"ref36","year":"2021","journal-title":"Practical Applications for Frictionless Authentication"},{"key":"ref31","year":"2021","journal-title":"Analog"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1145\/3447993.3448621"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.14311\/MAD.2017.04.04"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.20858\/sjsutst.2016.91.13"},{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1109\/BTAS.2015.7358794"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.3390\/s20154110"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1007\/s13755-019-0093-1"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/TELFOR.2014.7034475"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1016\/B978-1-4832-3110-5.50011-X"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2018.23176"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2011.2146090"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1145\/1859204.1859229"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/LSP.2018.2878061"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1016\/j.actbio.2017.02.011"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1016\/j.mechmat.2021.103851"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1007\/s10237-007-0112-z"},{"key":"ref13","year":"2021","journal-title":"Vibrator (mechanical)"},{"key":"ref12","year":"2021","journal-title":"Dynamic Time Warping"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1145\/3372224.3380901"},{"key":"ref14","year":"2021","journal-title":"Damping"},{"key":"ref97","first-page":"304","article-title":"Usable user authentication on a smartwatch using vibration","author":"kim","year":"2021","journal-title":"Proc ACM SIGSAC Conf Comput Commun Security"},{"key":"ref96","year":"2022","journal-title":"A Look at How Easily 3D-Printed Heads Can Hack Facial Recognition"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1016\/j.patcog.2013.06.028"},{"key":"ref99","doi-asserted-by":"publisher","DOI":"10.1145\/3319535.3354242"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/TMC.2020.3035045"},{"key":"ref98","first-page":"73","article-title":"VibWrite","author":"thuraisingham","year":"2017","journal-title":"Proc ACM SIGSAC Conf Comput Commun Security"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-73287-7_75"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1017\/9781108380690"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/TSP.2012.2218810"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2007.914731"},{"key":"ref93","year":"2022","journal-title":"Wired"},{"key":"ref92","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2018.07.001"},{"key":"ref95","year":"2022","journal-title":"Hackers Make a Fake Hand to Beat Vein Authentication"},{"key":"ref94","year":"2022","journal-title":"Hackers Just Broke the iPhone X&#x2019;s Face ID Using a 3D-Printed Mask"},{"key":"ref91","doi-asserted-by":"publisher","DOI":"10.1145\/3139243.3139251"},{"key":"ref90","doi-asserted-by":"publisher","DOI":"10.1109\/BTAS.2015.7358794"},{"key":"ref89","doi-asserted-by":"publisher","DOI":"10.1109\/CCST.2018.8585571"},{"key":"ref86","year":"2022","journal-title":"ECG Smartwatches Explained How They Work and the Best on the Market"},{"key":"ref85","first-page":"1","article-title":"Smartwatches locking methods: A comparative study","author":"nguyen","year":"2017","journal-title":"Proc SOUPS"},{"key":"ref88","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-04372-8_3"},{"key":"ref87","year":"2022","journal-title":"Nymi"},{"key":"ref82","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-29133-8_25"},{"key":"ref81","year":"2021","journal-title":"Samsung Patent Illustrates Continued Work on Under-Display Fingerprint Scanning for Future Smartphones and Galaxy Watch"},{"key":"ref84","year":"2022","journal-title":"FiDELYS&#x2014;The World&#x2019;s First Iris Recognition Enabled Smartwatch"},{"key":"ref83","year":"2022","journal-title":"Patentlymobile"},{"key":"ref80","doi-asserted-by":"publisher","DOI":"10.1109\/IPSN.2016.7460725"},{"key":"ref79","doi-asserted-by":"publisher","DOI":"10.1016\/j.acha.2016.03.001"},{"key":"ref78","doi-asserted-by":"publisher","DOI":"10.1145\/3560830.3563722"},{"key":"ref106","article-title":"Adversarial autoencoders","author":"makhzani","year":"2015","journal-title":"arXiv 1511 05644"},{"key":"ref75","first-page":"149","article-title":"Smartphonebased user verification leveraging gait recognition for mobile healthcare systems","author":"ren","year":"2013","journal-title":"Proc InSecon"},{"key":"ref104","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2015.2398817"},{"key":"ref74","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2014.04.008"},{"key":"ref105","doi-asserted-by":"publisher","DOI":"10.1145\/3133956.3137050"},{"key":"ref77","year":"2021","journal-title":"VibrationEffect"},{"key":"ref102","first-page":"497","article-title":"Virtual U: Defeating face liveness detection by building virtual models from your public photos","author":"xu","year":"2016","journal-title":"Proc 25th USENIX Security Symp (USENIX Security)"},{"key":"ref76","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2018.00053"},{"key":"ref103","doi-asserted-by":"publisher","DOI":"10.1016\/j.patcog.2018.08.019"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1016\/j.adhoc.2020.102218"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1145\/3054977.3054991"},{"key":"ref71","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2009.12.015"},{"key":"ref70","doi-asserted-by":"publisher","DOI":"10.1109\/TPAMI.2006.38"},{"key":"ref73","first-page":"275","article-title":"The smart foor: A mechanism fornatural user identification and tracking","author":"orr","year":"2000","journal-title":"Proc ACM CHI"},{"key":"ref72","doi-asserted-by":"publisher","DOI":"10.1109\/AUTOID.2005.2"},{"key":"ref68","doi-asserted-by":"publisher","DOI":"10.1109\/IPSN.2016.7460726"},{"key":"ref67","first-page":"1","article-title":"Fusion of gait and ECG for biometric user authentication","author":"derawi","year":"2014","journal-title":"Proc Int Conf Biometr Special Interest Group (BIOSIG)"},{"key":"ref69","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2017.23023"},{"key":"ref64","doi-asserted-by":"publisher","DOI":"10.1109\/EuroSP.2017.42"},{"key":"ref63","first-page":"1","article-title":"I can be you: Questioning the use of keystroke dynamics as biometrics","author":"tey","year":"2013","journal-title":"Proc NDSS"},{"key":"ref66","doi-asserted-by":"publisher","DOI":"10.1109\/ICNP.2014.43"},{"key":"ref65","first-page":"1545","article-title":"Injected and delivered: Fabricating implicit control over actuation systems by spoofing inertial sensors","author":"tu","year":"2018","journal-title":"Proc 27th USENIX Security Symp (USENIX Security)"},{"key":"ref60","doi-asserted-by":"publisher","DOI":"10.1145\/2976749.2978296"},{"key":"ref62","first-page":"1528","article-title":"Accessorize to a crime","author":"weippl","year":"2016","journal-title":"Proc ACM SIGSAC Conf Comput Commun Security"},{"key":"ref61","first-page":"57","article-title":"Proceedings of the 2017 ACM SIGSAC conference on computer and communications security, CCS 17","author":"thuraisingham","year":"2017","journal-title":"Proc ACM SIGSAC Conf Comput Commun Security"}],"container-title":["IEEE Internet of Things Journal"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6488907\/10106528\/09996544.pdf?arnumber=9996544","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,12,11]],"date-time":"2024-12-11T02:03:35Z","timestamp":1733882615000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9996544\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,5,1]]},"references-count":106,"journal-issue":{"issue":"9"},"URL":"https:\/\/doi.org\/10.1109\/jiot.2022.3231381","relation":{},"ISSN":["2327-4662","2372-2541"],"issn-type":[{"value":"2327-4662","type":"electronic"},{"value":"2372-2541","type":"electronic"}],"subject":[],"published":{"date-parts":[[2023,5,1]]}}}