{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,16]],"date-time":"2026-04-16T10:34:28Z","timestamp":1776335668360,"version":"3.51.2"},"reference-count":31,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"12","license":[{"start":{"date-parts":[[2024,12,1]],"date-time":"2024-12-01T00:00:00Z","timestamp":1733011200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2024,12,1]],"date-time":"2024-12-01T00:00:00Z","timestamp":1733011200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2024,12,1]],"date-time":"2024-12-01T00:00:00Z","timestamp":1733011200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["62271124"],"award-info":[{"award-number":["62271124"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61802051"],"award-info":[{"award-number":["61802051"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["62172080"],"award-info":[{"award-number":["62172080"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["62072081"],"award-info":[{"award-number":["62072081"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["62072078"],"award-info":[{"award-number":["62072078"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100018542","name":"Natural Science Foundation of Sichuan Province","doi-asserted-by":"publisher","award":["2023NSFSC0488"],"award-info":[{"award-number":["2023NSFSC0488"]}],"id":[{"id":"10.13039\/501100018542","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100018542","name":"Natural Science Foundation of Sichuan Province","doi-asserted-by":"publisher","award":["2023NSFSC0478"],"award-info":[{"award-number":["2023NSFSC0478"]}],"id":[{"id":"10.13039\/501100018542","id-type":"DOI","asserted-by":"publisher"}]},{"name":"National Key R&amp;D Program of China","award":["2022YFB4501200"],"award-info":[{"award-number":["2022YFB4501200"]}]},{"name":"Fundamental Research Funds for Chinese Central Universities","award":["ZYGX2015J056"],"award-info":[{"award-number":["ZYGX2015J056"]}]},{"name":"Fundamental Research Funds for Chinese Central Universities","award":["ZYGX2020ZB027"],"award-info":[{"award-number":["ZYGX2020ZB027"]}]},{"name":"Sichuan Science and Technology Program","award":["2020JDTD0007"],"award-info":[{"award-number":["2020JDTD0007"]}]},{"name":"Sichuan Science and Technology Program","award":["2020YFG0298"],"award-info":[{"award-number":["2020YFG0298"]}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans. on Mobile Comput."],"published-print":{"date-parts":[[2024,12]]},"DOI":"10.1109\/tmc.2024.3391184","type":"journal-article","created":{"date-parts":[[2024,4,19]],"date-time":"2024-04-19T17:35:04Z","timestamp":1713548104000},"page":"11105-11120","source":"Crossref","is-referenced-by-count":7,"title":["Robust Mobile Two-Factor Authentication Leveraging Acoustic Fingerprinting"],"prefix":"10.1109","volume":"23","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-2286-1384","authenticated-orcid":false,"given":"Yanzhi","family":"Ren","sequence":"first","affiliation":[{"name":"University of Electronic Science and Technology of China, Chengdu, China"}]},{"ORCID":"https:\/\/orcid.org\/0009-0003-9142-6487","authenticated-orcid":false,"given":"Tingyuan","family":"Yang","sequence":"additional","affiliation":[{"name":"University of Electronic Science and Technology of China, Chengdu, China"}]},{"ORCID":"https:\/\/orcid.org\/0009-0007-9920-3308","authenticated-orcid":false,"given":"Zhiliang","family":"Xia","sequence":"additional","affiliation":[{"name":"University of Electronic Science and Technology of China, Chengdu, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-1162-839X","authenticated-orcid":false,"given":"Hongbo","family":"Liu","sequence":"additional","affiliation":[{"name":"University of Electronic Science and Technology of China, Chengdu, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-0207-9643","authenticated-orcid":false,"given":"Jiadi","family":"Yu","sequence":"additional","affiliation":[{"name":"Department of Computer Science and Engineering, Shanghai Jiao Tong University, Shanghai, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-2519-6196","authenticated-orcid":false,"given":"Bo","family":"Liu","sequence":"additional","affiliation":[{"name":"Amazon Machine Learning, Seattle, WA, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-1961-7946","authenticated-orcid":false,"given":"Hongwei","family":"Li","sequence":"additional","affiliation":[{"name":"University of Electronic Science and Technology of China, Chengdu, China"}]}],"member":"263","reference":[{"key":"ref1","article-title":"How hackers steal passwords","year":"2020"},{"key":"ref2","article-title":"Duo mobile app","year":"2022"},{"key":"ref3","article-title":"Google 2-step verification","year":"2022"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2014.23167"},{"key":"ref5","first-page":"404","article-title":"Strengthening user authentication through opportunistic cryptographic identity assertions","volume-title":"Proc. ACM Conf. Comput. Commun. Secur.","author":"Alexei","year":"2012"},{"key":"ref6","first-page":"483","article-title":"Sound-proof: Usable two-factor authentication based on ambient sound","volume-title":"Proc. 24th USENIX Conf. Secur. Symp.","author":"Karapanos","year":"2015"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1145\/2976749.2978328"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1145\/3241539.3241574"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2022.3162718"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM.2019.8737572"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1145\/2660267.2660300"},{"key":"ref12","first-page":"441","article-title":"Do you hear what i hear? Fingerprinting smart devices through embedded acoustic components","volume-title":"Proc. ACM SIGSAC Conf. Comput. Commun. Secur.","author":"Das","year":"2014"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-8348-9195-2_23"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/ICSAI.2012.6223389"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/CPSNA.2015.12"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1145\/3212480.3212501"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2016.2619679"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1145\/3412382.3458260"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2014.23167"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1145\/3287072"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1145\/2789168.2790102"},{"key":"ref22","volume-title":"Signals and Systems","author":"Alan","year":"1996"},{"key":"ref23","article-title":"Power-law attenuation of acoustic waves in random stratified viscoelastic media","author":"Stordal","year":"2011"},{"key":"ref24","volume-title":"Fundamentals of Acoustics","author":"Kinsler","year":"2000"},{"key":"ref25","doi-asserted-by":"crossref","DOI":"10.1201\/9781351259446","volume-title":"The Analysis of Time Series an Introduction With R","author":"Chatfield","year":"2019"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/TMC.2021.3053282"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1145\/3372224.3380901"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1007\/978-0-387-77592-0"},{"key":"ref29","article-title":"Cell phone vibrate sound effects","year":"2023"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1145\/3448300.3468499"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM53939.2023.10229054"}],"container-title":["IEEE Transactions on Mobile Computing"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/7755\/10746253\/10505808.pdf?arnumber=10505808","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,11,27]],"date-time":"2024-11-27T00:03:25Z","timestamp":1732665805000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10505808\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,12]]},"references-count":31,"journal-issue":{"issue":"12"},"URL":"https:\/\/doi.org\/10.1109\/tmc.2024.3391184","relation":{},"ISSN":["1536-1233","1558-0660","2161-9875"],"issn-type":[{"value":"1536-1233","type":"print"},{"value":"1558-0660","type":"electronic"},{"value":"2161-9875","type":"electronic"}],"subject":[],"published":{"date-parts":[[2024,12]]}}}