{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,30]],"date-time":"2024-10-30T11:29:13Z","timestamp":1730287753988,"version":"3.28.0"},"reference-count":38,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018,12]]},"DOI":"10.1109\/padsw.2018.8644559","type":"proceedings-article","created":{"date-parts":[[2019,2,21]],"date-time":"2019-02-21T23:23:38Z","timestamp":1550791418000},"page":"228-235","source":"Crossref","is-referenced-by-count":3,"title":["Stop Unauthorized Access to Your Smart Devices"],"prefix":"10.1109","author":[{"given":"Yutong","family":"Liu","sequence":"first","affiliation":[]},{"given":"Linghe","family":"Kong","sequence":"additional","affiliation":[]},{"given":"Yifeng","family":"Cao","sequence":"additional","affiliation":[]},{"given":"Vahan","family":"Sarafian","sequence":"additional","affiliation":[]},{"given":"Long","family":"Cheng","sequence":"additional","affiliation":[]},{"given":"Guihai","family":"Chen","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref38","article-title":"Making large-scale svm learning practical","author":"joachims","year":"1998","journal-title":"Tech Rep"},{"key":"ref33","article-title":"Automatic secure fingerprint verification system based on fuzzy vault scheme","author":"yang","year":"2005","journal-title":"IEEE ICASSP"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.5120\/21374-3894"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1155\/2009\/746481"},{"key":"ref30","article-title":"The fuzzy vault for fingerprints is vulnerable to brute force attack","author":"mihailescu","year":"2007","journal-title":"arXiv preprint arXiv 0708 2974"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1109\/WACV.2016.7477553"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2014.241"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2005.177"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1109\/PERCOM.2015.7146534"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM.2016.7524367"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/IIHMSP.2010.83"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1016\/j.patcog.2011.04.010"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1145\/3117811.3117839"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1145\/3081333.3081355"},{"key":"ref15","article-title":"Keystroke-based user identification on smart phones","author":"zahid","year":"2009","journal-title":"Springer RAID"},{"key":"ref16","doi-asserted-by":"crossref","first-page":"465","DOI":"10.1007\/978-3-642-30436-1_38","article-title":"Multi-modal behavioural biometric authentication for mobile devices","author":"saevanee","year":"2012","journal-title":"Information Security and Privacy Research"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/ICNP.2014.43"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/ICB.2015.7139044"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1145\/2556288.2557097"},{"key":"ref28","article-title":"Attacks on the pairing protocol of bluetooth v2. 1","author":"lindell","year":"2008","journal-title":"Black Hat Las Vegas Nevada USA"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1145\/2858036.2858267"},{"key":"ref27","first-page":"474476","article-title":"Bluetooth hacking: A case study","volume":"4","author":"kessler","year":"2009","journal-title":"Journal of Digital Forensics Security and Law"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/MITP.2014.40"},{"key":"ref6","first-page":"1","article-title":"Smudge attacks on smartphone touch screens","volume":"10","author":"aviv","year":"2010","journal-title":"WOOT"},{"key":"ref29","article-title":"Robustness of biometric gait authentication against impersonation attack","author":"gafurov","year":"2006","journal-title":"OTM"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1145\/1133265.1133303"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1145\/2594368.2594373"},{"key":"ref7","article-title":"iphone 5s fingerprint sensor hacked by germany's chaos computer club","volume":"23","year":"2013","journal-title":"Guardian News Np"},{"journal-title":"Social media use continues to rise in developing countries but plateaus across developed ones","year":"0","key":"ref2"},{"journal-title":"Radio telecommunication device and method of authenticating a user with a voice authentication token","year":"2000","author":"kennedy","key":"ref9"},{"journal-title":"Cyber threats to mobile phones","year":"0","key":"ref1"},{"key":"ref20","first-page":"1","article-title":"A shoulder surfing resistant graphical authentication system","author":"sun","year":"2018","journal-title":"IEEE Trans Dependable and Secure Computing"},{"key":"ref22","first-page":"1","author":"potts","year":"2012","journal-title":"Exploiting Bluetooth on Android mobile devices for home security application"},{"key":"ref21","article-title":"Seeing your face is not enough:an inertial sensor-based liveness detection for face authentication","author":"li","year":"2015","journal-title":"ACM CCS"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1155\/2016\/8793025"},{"key":"ref23","article-title":"Implicit sensor-based authentication of smart-phone users with smartwatch","author":"lee","year":"2016","journal-title":"ACM HASP"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1145\/2660267.2660288"},{"key":"ref25","article-title":"Cracking android pattern lock in five attempts","author":"ye","year":"2017","journal-title":"NDSS"}],"event":{"name":"2018 IEEE 24th International Conference on Parallel and Distributed Systems (ICPADS)","start":{"date-parts":[[2018,12,11]]},"location":"Singapore, Singapore","end":{"date-parts":[[2018,12,13]]}},"container-title":["2018 IEEE 24th International Conference on Parallel and Distributed Systems (ICPADS)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8635632\/8644527\/08644559.pdf?arnumber=8644559","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,1,27]],"date-time":"2022-01-27T08:09:48Z","timestamp":1643270988000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/8644559\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,12]]},"references-count":38,"URL":"https:\/\/doi.org\/10.1109\/padsw.2018.8644559","relation":{},"subject":[],"published":{"date-parts":[[2018,12]]}}}