{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,1]],"date-time":"2025-11-01T21:41:34Z","timestamp":1762033294530,"version":"3.41.0"},"publisher-location":"New York, New York, USA","reference-count":9,"publisher":"ACM Press","license":[{"start":{"date-parts":[[2015,1,1]],"date-time":"2015-01-01T00:00:00Z","timestamp":1420070400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2015]]},"DOI":"10.1145\/2802083.2808397","type":"proceedings-article","created":{"date-parts":[[2015,9,15]],"date-time":"2015-09-15T15:02:27Z","timestamp":1442329347000},"page":"27-30","source":"Crossref","is-referenced-by-count":49,"title":["(Smart)watch your taps"],"prefix":"10.1145","author":[{"given":"Anindya","family":"Maiti","sequence":"first","affiliation":[]},{"given":"Murtuza","family":"Jadliwala","sequence":"additional","affiliation":[]},{"given":"Jibo","family":"He","sequence":"additional","affiliation":[]},{"given":"Igor","family":"Bilogrevic","sequence":"additional","affiliation":[]}],"member":"320","reference":[{"key":"key-10.1145\/2802083.2808397-1","unstructured":"How do users really hold mobile devices? (2013). http:\/\/www.uxmatters.com\/mt\/archives\/2013\/02\/how-do-users-really-hold-mobile-devices.php."},{"key":"key-10.1145\/2802083.2808397-2","unstructured":"Asonov, D., and Agrawal, R. Keyboard acoustic emanations. InIEEE S &#38; P(2004)."},{"key":"key-10.1145\/2802083.2808397-3","unstructured":"Cai, L., and Chen, H. Touchlogger: Inferring keystrokes on touch screen from smartphone motion. InHotSec(2011)."},{"key":"key-10.1145\/2802083.2808397-4","doi-asserted-by":"crossref","unstructured":"Gao, X., Firner, B., Sugrim, S., Kaiser-Pendergrast, V., Yang, Y., and Lindqvist, J. Elastic pathing: You speed is enough to track you. InACM UbiComp(2014).","DOI":"10.1145\/2632048.2632077"},{"key":"key-10.1145\/2802083.2808397-5","doi-asserted-by":"crossref","unstructured":"Ghosh, A., and Riccardi, G. Recognizing human activities from smartphone sensor signals. InACM Multimedia(2014).","DOI":"10.1145\/2647868.2655034"},{"key":"key-10.1145\/2802083.2808397-6","doi-asserted-by":"crossref","unstructured":"Hall, M., Frank, E., Holmes, G., Pfahringer, B., Reutemann, P., and Witten, I. H. The weka data mining software: an update. InACM SigKDD Explorations Newsletter 11, 1 (2009), 10--18.","DOI":"10.1145\/1656274.1656278"},{"key":"key-10.1145\/2802083.2808397-7","doi-asserted-by":"crossref","unstructured":"Owusu, E., Han, J., Das, S., Perrig, A., and Zhang, J. ACCessory: Password Inference Using Accelerometers on Smartphones. InACM HotMobile(2012).","DOI":"10.1145\/2162081.2162095"},{"key":"key-10.1145\/2802083.2808397-8","unstructured":"Vuagnoux, M., and Pasini, S. Compromising electromagnetic emanations of wired and wireless keyboards. InUSENIX Security(2009)."},{"key":"key-10.1145\/2802083.2808397-9","doi-asserted-by":"crossref","unstructured":"Xu, Z., Bai, K., and Zhu, S. Taplogger: Inferring user inputs on smartphone touchscreens using on-board motion sensors. InACM WiSec(2012).","DOI":"10.1145\/2185448.2185465"}],"event":{"number":"2015","sponsor":["ACM, Association for Computing Machinery","Bell Labs, Bell Laboratories","Yahoo! Japan","KDDI","Google Inc.","Telef\u00f3nica","SIGCHI, ACM Special Interest Group on Computer-Human Interaction","SIGMOBILE, ACM Special Interest Group on Mobility of Systems, Users, Data and Computing","FX Palo Alto Laboratory, Inc."],"acronym":"ISWC '15","name":"the 2015 ACM International Symposium","start":{"date-parts":[[2015,9,7]]},"location":"Osaka, Japan","end":{"date-parts":[[2015,9,11]]}},"container-title":["Proceedings of the 2015 ACM International Symposium on Wearable Computers - ISWC '15"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2802083.2808397","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/dl.acm.org\/ft_gateway.cfm?id=2808397&amp;ftid=1619242&amp;dwn=1","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T05:07:29Z","timestamp":1750223249000},"score":1,"resource":{"primary":{"URL":"http:\/\/dl.acm.org\/citation.cfm?doid=2802083.2808397"}},"subtitle":["side-channel keystroke inference attacks using smartwatches"],"proceedings-subject":"Wearable Computers","short-title":[],"issued":{"date-parts":[[2015]]},"references-count":9,"URL":"https:\/\/doi.org\/10.1145\/2802083.2808397","relation":{},"subject":[],"published":{"date-parts":[[2015]]}}}