{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T04:56:12Z","timestamp":1750308972919,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":23,"publisher":"ACM","license":[{"start":{"date-parts":[[2016,10,11]],"date-time":"2016-10-11T00:00:00Z","timestamp":1476144000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2016,10,11]]},"DOI":"10.1145\/2987386.2987411","type":"proceedings-article","created":{"date-parts":[[2016,11,21]],"date-time":"2016-11-21T14:02:02Z","timestamp":1479736922000},"page":"142-147","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":3,"title":["User Authentication Method using Shaking Actions in Mobile Devices"],"prefix":"10.1145","author":[{"given":"Tae Kyong","family":"Lee","sequence":"first","affiliation":[{"name":"Dept. of Computer and Software, Hanyang University, Seoul, Korea"}]},{"given":"Tae Guen","family":"Kim","sequence":"additional","affiliation":[{"name":"Dept. of Computer and Software, Hanyang University, Seoul, Korea"}]},{"given":"Eul Gyu","family":"Im","sequence":"additional","affiliation":[{"name":"Div. of Computer Science and Engineering, Hanyang University, Seoul, Korea"}]}],"member":"320","published-online":{"date-parts":[[2016,10,11]]},"reference":[{"volume-title":"Proceedings of the 4th USENIX Conference on Offensive Technologies.10","author":"Aviv A. J.","key":"e_1_3_2_1_1_1"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1145\/2449396.2449432"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1145\/2381934.2381947"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1145\/2632048.2636090"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1109\/RVSP.2011.92"},{"key":"e_1_3_2_1_6_1","first-page":"3497","article-title":"Shoulder-Surfing Resistant Smartphone Authentication Scheme Using Virtual Joystick. Applied Mechanics and Materials. 284 (January, 2013)","volume":"284","author":"Kim S. W.","year":"2013","journal-title":"Trans Tech Publications, 3497--3501 DOI= http:\/\/dx.doi.org\/10.4028\/www.scientific.net\/amm."},{"key":"e_1_3_2_1_7_1","unstructured":"Android Accelerometer Sensor and Magnetic Sensor https:\/\/developer.android.com\/guide\/topics\/sensors\/sensors_overview.html. (last visited on 10 May 2016).  Android Accelerometer Sensor and Magnetic Sensor https:\/\/developer.android.com\/guide\/topics\/sensors\/sensors_overview.html. (last visited on 10 May 2016)."},{"volume-title":"proceedings of the American Association for Artificial Intelligence (AAAI). 5 (July","year":"2005","author":"Ravi N.","key":"e_1_3_2_1_8_1"},{"key":"e_1_3_2_1_9_1","first-page":"1","article-title":"Human Activity Recognition using an Image Sensor and a 3-axis Accelerometer Sensor","volume":"11","author":"Nam Y. Y.","year":"2010","journal-title":"Journal of Internet Computing and Service."},{"volume-title":"Proceedings of Student-Faculty Research Day, CSIS","year":"2015","author":"Kunnathu N.","key":"e_1_3_2_1_10_1"},{"volume-title":"Proceedings of the Signal Processing and its Applications (CSPA), 2011","year":"2011","author":"Nickel C.","key":"e_1_3_2_1_11_1"},{"key":"e_1_3_2_1_12_1","unstructured":"Android Rotation Sensor https:\/\/developer.android.com\/guide\/topics\/sensors\/sensors_motion.html. (last visited on 7 May 2016).  Android Rotation Sensor https:\/\/developer.android.com\/guide\/topics\/sensors\/sensors_motion.html. (last visited on 7 May 2016)."},{"key":"e_1_3_2_1_13_1","unstructured":"Android Sensor Frequency https:\/\/developer.android.com\/reference\/android\/hardware\/SensorManager.html. (last visited on 22 April 2016).  Android Sensor Frequency https:\/\/developer.android.com\/reference\/android\/hardware\/SensorManager.html. (last visited on 22 April 2016)."},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.4304\/jcp.1.7.51-59"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1145\/1656274.1656278"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1109\/TNN.2006.875989"},{"key":"e_1_3_2_1_17_1","unstructured":"Logistic Algorithm http:\/\/weka.sourceforge.net\/doc.dev\/weka\/classifiers\/functions\/Logistic.html. (last visited on 23 May 2016)  Logistic Algorithm http:\/\/weka.sourceforge.net\/doc.dev\/weka\/classifiers\/functions\/Logistic.html. (last visited on 23 May 2016)"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"crossref","unstructured":"Yang Z. R. 2010. Multi-layer Perceptron. Machine Learning Approaches To Bioinformatics. World Scientific 133--153.   Yang Z. R. 2010. Multi-layer Perceptron. Machine Learning Approaches To Bioinformatics. World Scientific 133--153.","DOI":"10.1142\/9789814287319_0010"},{"key":"e_1_3_2_1_19_1","unstructured":"Liaw A. and Wiener M. 2002. Classification and regression by randomForest. 2 3 (December. 2002) R news 18--22.  Liaw A. and Wiener M. 2002. Classification and regression by randomForest. 2 3 (December. 2002) R news 18--22."},{"key":"e_1_3_2_1_20_1","first-page":"2","article-title":"Performance analysis of Naive Bayes and J48 classification algorithm for data classification","volume":"6","author":"Patil T. R.","year":"2013","journal-title":"International Journal of Computer Science and Applications."},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1145\/328236.328110"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1109\/ISPACS.2006.364871"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1109\/IIH-MSP.2012.11"}],"event":{"name":"RACS '16: International Conference on Research in Adaptive and Convergent Systems","sponsor":["SIGAPP ACM Special Interest Group on Applied Computing","ACCT Association of Convergent Computing Technology"],"location":"Odense Denmark","acronym":"RACS '16"},"container-title":["Proceedings of the International Conference on Research in Adaptive and Convergent Systems"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2987386.2987411","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2987386.2987411","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T21:38:38Z","timestamp":1750282718000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2987386.2987411"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,10,11]]},"references-count":23,"alternative-id":["10.1145\/2987386.2987411","10.1145\/2987386"],"URL":"https:\/\/doi.org\/10.1145\/2987386.2987411","relation":{},"subject":[],"published":{"date-parts":[[2016,10,11]]},"assertion":[{"value":"2016-10-11","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}