{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,7]],"date-time":"2026-03-07T18:26:23Z","timestamp":1772907983604,"version":"3.50.1"},"reference-count":33,"publisher":"IEEE","license":[{"start":{"date-parts":[[2019,6,1]],"date-time":"2019-06-01T00:00:00Z","timestamp":1559347200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2019,6,1]],"date-time":"2019-06-01T00:00:00Z","timestamp":1559347200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2019,6,1]],"date-time":"2019-06-01T00:00:00Z","timestamp":1559347200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2019,6]]},"DOI":"10.1109\/sahcn.2019.8824958","type":"proceedings-article","created":{"date-parts":[[2019,9,5]],"date-time":"2019-09-05T23:23:57Z","timestamp":1567725837000},"page":"1-9","source":"Crossref","is-referenced-by-count":12,"title":["Speech Based Human Authentication on Smartphones"],"prefix":"10.1109","author":[{"given":"Haipeng","family":"Dai","sequence":"first","affiliation":[]},{"given":"Wei","family":"Wang","sequence":"additional","affiliation":[]},{"given":"Alex X.","family":"Liu","sequence":"additional","affiliation":[]},{"given":"Kang","family":"Ling","sequence":"additional","affiliation":[]},{"given":"Jiajun","family":"Sun","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref33","year":"2016","journal-title":"Most common passwords list"},{"key":"ref32","article-title":"Darpa timit acoustic-phonetic continous speech corpus cd-rom. nist speech disc 1-1.1","volume":"93","author":"garofolo","year":"1993","journal-title":"NASA STI\/Recon Technical Report N"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1162\/neco.1993.5.2.305"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1145\/2500423.2500434"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/ISCSLP.2010.5684887"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/TASL.2012.2201472"},{"key":"ref12","doi-asserted-by":"crossref","DOI":"10.21437\/Interspeech.2012-135","article-title":"Synthetic speech discrimination using pitch pattern statistics derived from image analysis","author":"de leon","year":"2012","journal-title":"InterSpeech"},{"key":"ref13","doi-asserted-by":"crossref","first-page":"1700","DOI":"10.21437\/Interspeech.2012-465","article-title":"Detecting converted speech and natural speech for anti-spoofing attack in speaker recognition","author":"wu","year":"2012","journal-title":"InterSpeech"},{"key":"ref14","article-title":"A study on spoofing attack in state-of-the-art speaker verification: the telephone speech case","author":"wu","year":"2012","journal-title":"IEEE APSIPA ASC"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/ICASSP.2013.6638222"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1145\/2976749.2978296"},{"key":"ref17","doi-asserted-by":"crossref","first-page":"274","DOI":"10.1007\/978-3-642-19530-3_25","article-title":"Detecting replay attacks from far-field recordings on speaker verification systems","author":"villalba","year":"2011","journal-title":"Biometrics and ID Management"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/CCST.2011.6095943"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/ICMLC.2011.6016982"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1145\/2742647.2742662"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1145\/2307636.2307638"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1016\/j.specom.2009.08.009"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1145\/1322263.1322265"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1145\/2971648.2971670"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1177\/154411130301400604"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1145\/2858036.2858580"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1016\/j.specom.2014.10.005"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1145\/3117811.3117839"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.3109\/14992027.2014.893375"},{"key":"ref9","article-title":"Detecting voice disguise from speech variability: Analysis of three glottal and vocal tract measures","author":"amin","year":"2015","journal-title":"Meetings on Acoustics"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1016\/0167-6393(95)00009-D"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/ICASSP.2006.1660097"},{"key":"ref22","article-title":"Device-free gesture tracking using acoustic signals","author":"wang","year":"2016","journal-title":"ACM MOBICOM"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/ICDCS.2017.133"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/SAHCN.2018.8397099"},{"key":"ref23","article-title":"Strata: Fine-grained acoustic-based device-free tracking","author":"sangki","year":"2017","journal-title":"ACM MobiSys"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/LSP.2005.860538"},{"key":"ref25","article-title":"Pcias: Precise and contactless measurement of instantaneous angular speed using a smartphone","author":"li","year":"2019","journal-title":"ACM Ubicomp"}],"event":{"name":"2019 16th Annual IEEE International Conference on Sensing, Communication, and Networking (SECON)","location":"Boston, MA, USA","start":{"date-parts":[[2019,6,10]]},"end":{"date-parts":[[2019,6,13]]}},"container-title":["2019 16th Annual IEEE International Conference on Sensing, Communication, and Networking (SECON)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8822235\/8824788\/08824958.pdf?arnumber=8824958","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,9,27]],"date-time":"2022-09-27T17:39:34Z","timestamp":1664300374000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/8824958\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,6]]},"references-count":33,"URL":"https:\/\/doi.org\/10.1109\/sahcn.2019.8824958","relation":{},"subject":[],"published":{"date-parts":[[2019,6]]}}}