{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,9]],"date-time":"2026-04-09T14:27:34Z","timestamp":1775744854093,"version":"3.50.1"},"reference-count":42,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"5","license":[{"start":{"date-parts":[[2024,5,1]],"date-time":"2024-05-01T00:00:00Z","timestamp":1714521600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2024,5,1]],"date-time":"2024-05-01T00:00:00Z","timestamp":1714521600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2024,5,1]],"date-time":"2024-05-01T00:00:00Z","timestamp":1714521600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["62072040"],"award-info":[{"award-number":["62072040"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans. on Mobile Comput."],"published-print":{"date-parts":[[2024,5]]},"DOI":"10.1109\/tmc.2023.3315291","type":"journal-article","created":{"date-parts":[[2023,9,14]],"date-time":"2023-09-14T18:04:30Z","timestamp":1694714670000},"page":"6045-6059","source":"Crossref","is-referenced-by-count":9,"title":["FingerSlid: Towards Finger-Sliding Continuous Authentication on Smart Devices Via Vibration"],"prefix":"10.1109","volume":"23","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-2467-4240","authenticated-orcid":false,"given":"Yadong","family":"Xie","sequence":"first","affiliation":[{"name":"School of Computer Science and Technology, Beijing Institute of Technology, Beijing, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-2348-4488","authenticated-orcid":false,"given":"Fan","family":"Li","sequence":"additional","affiliation":[{"name":"School of Computer Science and Technology, Beijing Institute of Technology, Beijing, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-3511-0288","authenticated-orcid":false,"given":"Yu","family":"Wang","sequence":"additional","affiliation":[{"name":"Department of Computer and Information Sciences, Temple University, Philadelphia, PA, USA"}]}],"member":"263","reference":[{"key":"ref1","article-title":"ITRC 2020 data breach report","year":"2020"},{"key":"ref2","article-title":"2020 cisco consumer privacy survey","year":"2020"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1145\/3241539.3241575"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1145\/3386901.3388939"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1145\/2382196.2382307"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1145\/3133956.3133962"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2012.2225048"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/ICB.2015.7139043"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/MNET.001.1900184"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/PERCOMW.2015.7134097"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/CCST.2018.8585571"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM41043.2020.9155380"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1115\/1.2720917"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1016\/j.jbiomech.2004.05.021"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1016\/j.medengphy.2004.02.003"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-24261-3_7"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1145\/3319535.3354242"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1145\/3133956.3133964"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/IPSN.2016.7460725"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1145\/3460120.3484553"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1145\/3372224.3380901"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/ICDCS51616.2021.00101"},{"issue":"3","key":"ref23","first-page":"13","article-title":"Biometric authentication: A review","volume":"2","author":"Bhattacharyya","year":"2009","journal-title":"Int. J. U- E- Service Sci. Technol."},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1145\/3411809"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1145\/3411806"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/MSN.2016.082"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1007\/s12652-018-1123-6"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/PCCC.2014.7017067"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1016\/j.istruc.2015.12.001"},{"issue":"10","key":"ref30","first-page":"907","article-title":"Tutorial: Loudspeaker nonlinearities\u2013causes, parameters, symptoms","volume":"54","author":"Klippel","year":"2006","journal-title":"J. Audio Eng. Soc."},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1016\/j.jsv.2010.02.001"},{"issue":"11","key":"ref32","first-page":"2579","article-title":"Visualizing data using T\u2013SNE","volume":"9","author":"Van der Maaten","year":"2008","journal-title":"J. Mach. Learn. Res."},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1109\/TMC.2020.3048785"},{"key":"ref34","article-title":"Linear resonant actuators","author":"Microdrives","year":"2021"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1109\/TAEECE.2013.6557272"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1049\/ji-3-2.1946.0074"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1109\/18.57199"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1016\/j.acha.2010.08.002"},{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1098\/rspa.1998.0193"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1109\/TSP.2013.2265222"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2015.7298682"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1145\/2380116.2380174"}],"container-title":["IEEE Transactions on Mobile Computing"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/7755\/10491282\/10251599.pdf?arnumber=10251599","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,4,9]],"date-time":"2024-04-09T19:58:59Z","timestamp":1712692739000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10251599\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,5]]},"references-count":42,"journal-issue":{"issue":"5"},"URL":"https:\/\/doi.org\/10.1109\/tmc.2023.3315291","relation":{},"ISSN":["1536-1233","1558-0660","2161-9875"],"issn-type":[{"value":"1536-1233","type":"print"},{"value":"1558-0660","type":"electronic"},{"value":"2161-9875","type":"electronic"}],"subject":[],"published":{"date-parts":[[2024,5]]}}}