{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,6]],"date-time":"2024-09-06T09:51:14Z","timestamp":1725616274126},"reference-count":15,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017,3]]},"DOI":"10.1109\/percomw.2017.7917646","type":"proceedings-article","created":{"date-parts":[[2017,5,4]],"date-time":"2017-05-04T20:32:54Z","timestamp":1493929974000},"page":"685-690","source":"Crossref","is-referenced-by-count":8,"title":["Inferring smartphone keypress via smartwatch inertial sensing"],"prefix":"10.1109","author":[{"given":"Sougata","family":"Sen","sequence":"first","affiliation":[]},{"given":"Karan","family":"Grover","sequence":"additional","affiliation":[]},{"given":"Vigneshwaran","family":"Subbaraju","sequence":"additional","affiliation":[]},{"given":"Archan","family":"Misra","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"year":"2016","key":"ref10"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/PERCOMW.2015.7134103"},{"key":"ref12","article-title":"Friend or foe?: Your wearable devices reveal your personal pin","author":"wang","year":"0","journal-title":"Proceedings of 11th Asia Conference on Computerand Communications Security ASIACCS'16"},{"key":"ref13","article-title":"Mole: Motion leaks through smartwatch sensors","author":"wang","year":"0","journal-title":"Proceedings of 21st Annual International Conference on Mobile Computing and Networking MobiCom '15"},{"year":"2016","key":"ref14"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1145\/2699343.2699350"},{"journal-title":"The WEKA Data Mining Software An Update","year":"2009","author":"hall","key":"ref4"},{"year":"2016","key":"ref3"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1145\/2810103.2813668"},{"year":"2016","key":"ref5"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1145\/2162081.2162095"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/ISWC.2003.1241424"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/PERCOMW.2016.7457172"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1145\/1999995.1999998"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1145\/2594368.2594379"}],"event":{"name":"2017 IEEE International Conference on Pervasive Computing and Communications: Workshops (PerCom Workshops)","start":{"date-parts":[[2017,3,13]]},"location":"Kona, HI","end":{"date-parts":[[2017,3,17]]}},"container-title":["2017 IEEE International Conference on Pervasive Computing and Communications Workshops (PerCom Workshops)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/7911894\/7917470\/07917646.pdf?arnumber=7917646","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,4,26]],"date-time":"2019-04-26T03:51:24Z","timestamp":1556250684000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/7917646\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,3]]},"references-count":15,"URL":"https:\/\/doi.org\/10.1109\/percomw.2017.7917646","relation":{},"subject":[],"published":{"date-parts":[[2017,3]]}}}