{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T04:08:01Z","timestamp":1750306081381,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":73,"publisher":"ACM","license":[{"start":{"date-parts":[[2017,12,4]],"date-time":"2017-12-04T00:00:00Z","timestamp":1512345600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"Florida Center for Cybersecurity"},{"DOI":"10.13039\/100000001","name":"National Science Foundation","doi-asserted-by":"publisher","award":["CNS-1526494, CNS-1527153, SES-1450619"],"award-info":[{"award-number":["CNS-1526494, CNS-1527153, SES-1450619"]}],"id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2017,12,4]]},"DOI":"10.1145\/3134600.3134619","type":"proceedings-article","created":{"date-parts":[[2017,12,4]],"date-time":"2017-12-04T19:18:32Z","timestamp":1512415112000},"page":"28-41","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":8,"title":["A Secure Mobile Authentication Alternative to Biometrics"],"prefix":"10.1145","author":[{"given":"Mozhgan","family":"Azimpourkivi","sequence":"first","affiliation":[{"name":"Florida International University, Miami, FL, USA"}]},{"given":"Umut","family":"Topkara","sequence":"additional","affiliation":[{"name":"Bloomberg LP, New york, NY, USA"}]},{"given":"Bogdan","family":"Carbunar","sequence":"additional","affiliation":[{"name":"Florida International University, Miami, FL, USA"}]}],"member":"320","published-online":{"date-parts":[[2017,12,4]]},"reference":[{"volume-title":"Replacing RSA","year":"2015","key":"e_1_3_2_1_1_1","unstructured":"2015. Replacing RSA Secur ID : Why Are Customers Switching to Duo Security ? ( 2015 ). https:\/\/duo.com\/blog\/replacing-rsa-securid-why-are-customers-switching-to-duo-security. 2015. Replacing RSA SecurID: Why Are Customers Switching to Duo Security? (2015). https:\/\/duo.com\/blog\/replacing-rsa-securid-why-are-customers-switching-to-duo-security."},{"key":"e_1_3_2_1_2_1","unstructured":"2017. TAPS - Make touchscreen gloves using a Sticker w\/ Touch ID. (2017). https:\/\/www.kickstarter.com\/projects\/nanotips\/taps-touchscreen-sticker-w-touch-id-ships-before-x?token=5b586aa6.  2017. TAPS - Make touchscreen gloves using a Sticker w\/ Touch ID. (2017). https:\/\/www.kickstarter.com\/projects\/nanotips\/taps-touchscreen-sticker-w-touch-id-ships-before-x?token=5b586aa6."},{"key":"e_1_3_2_1_3_1","volume-title":"TensorFlow: A System for Large-Scale Machine Learning. In 12th USENIX Symposium on Operating Systems Design and Implementation (OSDI16)","author":"Abadi Mart\u00edn","year":"2016","unstructured":"Mart\u00edn Abadi , Paul Barham , Jianmin Chen , Zhifeng Chen , Andy Davis , Jeffrey Dean , Matthieu Devin , Sanjay Ghemawat , Geoffrey Irving , Michael Isard , Manjunath Kudlur , Josh Levenberg , Rajat Monga , Sherry Moore , Derek G. Murray , Benoit Steiner , Paul Tucker , Vijay Vasudevan , Pete Warden , Martin Wicke , Yuan Yu , and Xiaoqiang Zheng . 2016 . TensorFlow: A System for Large-Scale Machine Learning. In 12th USENIX Symposium on Operating Systems Design and Implementation (OSDI16) . USENIX Association, GA, 265--283. https:\/\/www.usenix.org\/conference\/osdi16\/technical-sessions\/presentation\/abadi Mart\u00edn Abadi, Paul Barham, Jianmin Chen, Zhifeng Chen, Andy Davis, Jeffrey Dean, Matthieu Devin, Sanjay Ghemawat, Geoffrey Irving, Michael Isard, Manjunath Kudlur, Josh Levenberg, Rajat Monga, Sherry Moore, Derek G. Murray, Benoit Steiner, Paul Tucker, Vijay Vasudevan, Pete Warden, Martin Wicke, Yuan Yu, and Xiaoqiang Zheng. 2016. TensorFlow: A System for Large-Scale Machine Learning. In 12th USENIX Symposium on Operating Systems Design and Implementation (OSDI16). USENIX Association, GA, 265--283. https:\/\/www.usenix.org\/conference\/osdi16\/technical-sessions\/presentation\/abadi"},{"key":"e_1_3_2_1_4_1","unstructured":"Apple Support 2017. About Touch ID security on iPhone and iPad. (2017). https:\/\/support.apple.com\/en-us\/HT204587.  Apple Support 2017. About Touch ID security on iPhone and iPad. (2017). https:\/\/support.apple.com\/en-us\/HT204587."},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICPR.2014.128"},{"key":"e_1_3_2_1_6_1","volume-title":"Camera Based Two Factor Authentication Through Mobile and Wearable Devices. In ACM International Joint Conference on Pervasive and Ubiquitous Computing.","author":"Azimpourkivi Mozhgan","year":"2017","unstructured":"Mozhgan Azimpourkivi , Umut Topkara , and Bogdan Carbunar . 2017 . Camera Based Two Factor Authentication Through Mobile and Wearable Devices. In ACM International Joint Conference on Pervasive and Ubiquitous Computing. Mozhgan Azimpourkivi, Umut Topkara, and Bogdan Carbunar. 2017. Camera Based Two Factor Authentication Through Mobile and Wearable Devices. In ACM International Joint Conference on Pervasive and Ubiquitous Computing."},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICME.2014.6890170"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1007\/11744023_32"},{"key":"e_1_3_2_1_9_1","volume-title":"Lorrie Faith Cranor, and Marios Savvides.","author":"Bhagavatula Chandrasekhar","year":"2015","unstructured":"Chandrasekhar Bhagavatula , Blase Ur , Kevin Iacovino , Su Mon Kywe , Lorrie Faith Cranor, and Marios Savvides. 2015 . Biometric authentication on iphone and android: Usability, perceptions, and influences on adoption. Proceeding of Usable Security (USEC) ( 2015), 1--2. Chandrasekhar Bhagavatula, Blase Ur, Kevin Iacovino, Su Mon Kywe, Lorrie Faith Cranor, and Marios Savvides. 2015. Biometric authentication on iphone and android: Usability, perceptions, and influences on adoption. Proceeding of Usable Security (USEC) (2015), 1--2."},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2012.49"},{"key":"e_1_3_2_1_11_1","volume-title":"On a class of error correcting binary group codes. Information and Control3, 1","author":"Bose Raj Chandra","year":"1960","unstructured":"Raj Chandra Bose and Dwijendra K Ray-Chaudhuri . 1960. On a class of error correcting binary group codes. Information and Control3, 1 ( 1960 ), 68--79. Raj Chandra Bose and Dwijendra K Ray-Chaudhuri. 1960. On a class of error correcting binary group codes. Information and Control3, 1 (1960), 68--79."},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/509907.509965"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2005.202"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"crossref","unstructured":"Ed. D. Hardt. 2012. The OAuth 2.0 Authorization Framework. RFC 6749. IETF. http:\/\/tools.ietf.org\/html\/rfc6749  Ed. D. Hardt. 2012. The OAuth 2.0 Authorization Framework. RFC 6749. IETF. http:\/\/tools.ietf.org\/html\/rfc6749","DOI":"10.17487\/rfc6749"},{"key":"e_1_3_2_1_15_1","volume-title":"Proceedings of the 13th Conference on USENIX Security Symposium -","volume":"13","author":"Davis Darren","unstructured":"Darren Davis , Fabian Monrose , and Michael K. Reiter . 2004. On User Choice in Graphical Password Schemes . In Proceedings of the 13th Conference on USENIX Security Symposium - Volume 13 (SSYM'04). USENIX Association, Berkeley, CA, USA, 11--11. http:\/\/dl.acm.org\/citation.cfm?id=1251375.1251386 Darren Davis, Fabian Monrose, and Michael K. Reiter. 2004. On User Choice in Graphical Password Schemes. In Proceedings of the 13th Conference on USENIX Security Symposium - Volume 13 (SSYM'04). USENIX Association, Berkeley, CA, USA, 11--11. http:\/\/dl.acm.org\/citation.cfm?id=1251375.1251386"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2009.5206848"},{"key":"e_1_3_2_1_17_1","volume-title":"Fuzzy Extractors: How to Generate Strong Keys from Biometrics and Other Noisy Data","author":"Dodis Yevgeniy","year":"2004","unstructured":"Yevgeniy Dodis , Leonid Reyzin , and Adam Smith . 2004 . Fuzzy Extractors: How to Generate Strong Keys from Biometrics and Other Noisy Data . Springer Berlin Heidelberg , Berlin, Heidelberg , 523--540. Yevgeniy Dodis, Leonid Reyzin, and Adam Smith. 2004. Fuzzy Extractors: How to Generate Strong Keys from Biometrics and Other Noisy Data. Springer Berlin Heidelberg, Berlin, Heidelberg, 523--540."},{"key":"e_1_3_2_1_18_1","first-page":"647","article-title":"DeCAF: A Deep Convolutional Activation Feature for Generic Visual Recognition","volume":"32","author":"Donahue Jeff","year":"2014","unstructured":"Jeff Donahue , Yangqing Jia , Oriol Vinyals , Judy Hoffman , Ning Zhang , Eric Tzeng , and Trevor Darrell . 2014 . DeCAF: A Deep Convolutional Activation Feature for Generic Visual Recognition . In Icml , Vol. 32. 647 -- 655 . Jeff Donahue, Yangqing Jia, Oriol Vinyals, Judy Hoffman, Ning Zhang, Eric Tzeng, and Trevor Darrell. 2014. DeCAF: A Deep Convolutional Activation Feature for Generic Visual Recognition. In Icml, Vol. 32. 647--655.","journal-title":"Icml"},{"volume-title":"High-Entropy Visual Identification for Touch Screen Devices","author":"Filardo Nathaniel Wesley","key":"e_1_3_2_1_19_1","unstructured":"Nathaniel Wesley Filardo and Giuseppe Ateniese . 2012. High-Entropy Visual Identification for Touch Screen Devices . Springer Berlin Heidelberg , Berlin, Heidelberg , 182--198. Nathaniel Wesley Filardo and Giuseppe Ateniese. 2012. High-Entropy Visual Identification for Touch Screen Devices. Springer Berlin Heidelberg, Berlin, Heidelberg, 182--198."},{"key":"e_1_3_2_1_20_1","volume-title":"On lines and planes of closest fit to systems of points in space. Philosophical Magazine Series 6 2, 11","author":"Karl Pearson F.R.S.","year":"1901","unstructured":"Karl Pearson F.R.S. 1901. LIII. On lines and planes of closest fit to systems of points in space. Philosophical Magazine Series 6 2, 11 ( 1901 ), 559--572. Karl Pearson F.R.S. 1901. LIII. On lines and planes of closest fit to systems of points in space. Philosophical Magazine Series 6 2, 11 (1901), 559--572."},{"key":"e_1_3_2_1_21_1","volume-title":"From the iriscode to the iris: A new vulnerability of iris recognition systems. Black Hat Briefings USA","author":"Galbally Javier","year":"2012","unstructured":"Javier Galbally , Arun Ross , Marta Gomez-Barrero , Julian Fierrez , and Javier Ortega-Garcia . 2012. From the iriscode to the iris: A new vulnerability of iris recognition systems. Black Hat Briefings USA ( 2012 ). Javier Galbally, Arun Ross, Marta Gomez-Barrero, Julian Fierrez, and Javier Ortega-Garcia. 2012. From the iriscode to the iris: A new vulnerability of iris recognition systems. Black Hat Briefings USA (2012)."},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1023\/B:VISI.0000042993.50813.60"},{"volume-title":"Advances in Neural Information Processing Systems 27","author":"Goodfellow Ian","key":"e_1_3_2_1_23_1","unstructured":"Ian Goodfellow , Jean Pouget-Abadie , Mehdi Mirza , Bing Xu , David Warde-Farley , Sherjil Ozair , Aaron Courville , and Yoshua Bengio . 2014. Generative Adversarial Nets . In Advances in Neural Information Processing Systems 27 , Z. Ghahramani, M. Welling, C. Cortes, N. D. Lawrence, and K. Q. Weinberger (Eds.). Curran Associates, Inc. , 2672--2680. http:\/\/papers.nips.cc\/paper\/5423-generative-adversarial-nets.pdf Ian Goodfellow, Jean Pouget-Abadie, Mehdi Mirza, Bing Xu, David Warde-Farley, Sherjil Ozair, Aaron Courville, and Yoshua Bengio. 2014. Generative Adversarial Nets. In Advances in Neural Information Processing Systems 27, Z. Ghahramani, M. Welling, C. Cortes, N. D. Lawrence, and K. Q. Weinberger (Eds.). Curran Associates, Inc., 2672--2680. http:\/\/papers.nips.cc\/paper\/5423-generative-adversarial-nets.pdf"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1145\/2207676.2208545"},{"key":"e_1_3_2_1_25_1","volume-title":"Distilling the knowledge in a neural network. arXiv preprint arXiv:1503.02531","author":"Hinton Geoffrey","year":"2015","unstructured":"Geoffrey Hinton , Oriol Vinyals , and Jeff Dean . 2015. Distilling the knowledge in a neural network. arXiv preprint arXiv:1503.02531 ( 2015 ). Geoffrey Hinton, Oriol Vinyals, and Jeff Dean. 2015. Distilling the knowledge in a neural network. arXiv preprint arXiv:1503.02531 (2015)."},{"key":"e_1_3_2_1_26_1","first-page":"147","article-title":"Codes correcteurs d'erreurs","volume":"2","author":"Hocquenghem Alexis","year":"1959","unstructured":"Alexis Hocquenghem . 1959 . Codes correcteurs d'erreurs . Chiffres 2 , 147 -- 156 (1959), 8--5. Alexis Hocquenghem. 1959. Codes correcteurs d'erreurs. Chiffres 2, 147--156 (1959), 8--5.","journal-title":"Chiffres"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIP.2012.2204272"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1145\/276698.276876"},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1155\/2008\/579416"},{"key":"e_1_3_2_1_30_1","unstructured":"Jeff Kent. 2017. python-bchlib. (2017). https:\/\/github.com\/jkent\/python-bchlib\/.  Jeff Kent. 2017. python-bchlib. (2017). https:\/\/github.com\/jkent\/python-bchlib\/."},{"volume-title":"Proceedings IEEE International Symposium on Information Theory. 408--.","author":"Juels A.","key":"e_1_3_2_1_31_1","unstructured":"A. Juels and M. Sudan . 2002. A fuzzy vault scheme . In Proceedings IEEE International Symposium on Information Theory. 408--. A. Juels and M. Sudan. 2002. A fuzzy vault scheme. In Proceedings IEEE International Symposium on Information Theory. 408--."},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1145\/319709.319714"},{"key":"e_1_3_2_1_33_1","volume-title":"Proceedings of the 24th USENIX Conference on Security Symposium (SEC'15)","author":"Karapanos Nikolaos","year":"2015","unstructured":"Nikolaos Karapanos , Claudio Marforio , Claudio Soriente , and Srdjan \u010capkun . 2015 . Sound-proof: Usable Two-factor Authentication Based on Ambient Sound . In Proceedings of the 24th USENIX Conference on Security Symposium (SEC'15) . USENIX Association, Berkeley, CA, USA, 483--498. http:\/\/dl.acm.org\/citation.cfm?id=2831143.2831174 Nikolaos Karapanos, Claudio Marforio, Claudio Soriente, and Srdjan \u010capkun. 2015. Sound-proof: Usable Two-factor Authentication Based on Ambient Sound. In Proceedings of the 24th USENIX Conference on Security Symposium (SEC'15). USENIX Association, Berkeley, CA, USA, 483--498. http:\/\/dl.acm.org\/citation.cfm?id=2831143.2831174"},{"key":"e_1_3_2_1_34_1","volume-title":"Hidden Risks of Biometric Identifiers and How to Avoid Them. BlackHat USA","author":"Keenan Thomas P","year":"2015","unstructured":"Thomas P Keenan . 2015. Hidden Risks of Biometric Identifiers and How to Avoid Them. BlackHat USA ( 2015 ). Thomas P Keenan. 2015. Hidden Risks of Biometric Identifiers and How to Avoid Them. BlackHat USA (2015)."},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPRW.2008.4563115"},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"crossref","unstructured":"H. Krawczyk and P. Eronen. 2010. HMAC-based Extract-and-Expand Key Derivation Function (HKDF). RFC 5869. IETF. https:\/\/tools.ietf.org\/html\/rfc5869  H. Krawczyk and P. Eronen. 2010. HMAC-based Extract-and-Expand Key Derivation Function (HKDF). RFC 5869. IETF. https:\/\/tools.ietf.org\/html\/rfc5869","DOI":"10.17487\/rfc5869"},{"key":"e_1_3_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.1179\/1743131x14Y.0000000090"},{"key":"e_1_3_2_1_38_1","volume-title":"ARMageddon: Cache Attacks on Mobile Devices. In 25th USENIX Security Symposium. 549--564","author":"Lipp Moritz","year":"2016","unstructured":"Moritz Lipp , Daniel Gruss , Raphael Spreitzer , Cl\u00e9mentine Maurice , and Stefan Mangard . 2016 . ARMageddon: Cache Attacks on Mobile Devices. In 25th USENIX Security Symposium. 549--564 . Moritz Lipp, Daniel Gruss, Raphael Spreitzer, Cl\u00e9mentine Maurice, and Stefan Mangard. 2016. ARMageddon: Cache Attacks on Mobile Devices. In 25th USENIX Security Symposium. 549--564."},{"key":"e_1_3_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.1023\/B:VISI.0000029664.99615.94"},{"key":"e_1_3_2_1_40_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSMCA.2010.2041653"},{"key":"e_1_3_2_1_41_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2005.19"},{"key":"e_1_3_2_1_42_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2015.2398817"},{"key":"e_1_3_2_1_43_1","volume-title":"India's billion-member biometric database raises privacy fears. (March","author":"Miglani Sanjeev","year":"2016","unstructured":"Sanjeev Miglani and Manoj Kumar . 2016. India's billion-member biometric database raises privacy fears. (March 2016 ). http:\/\/www.reuters.com\/article\/us-india-biometrics-idUSKCN0WI14E. Sanjeev Miglani and Manoj Kumar. 2016. India's billion-member biometric database raises privacy fears. (March 2016). http:\/\/www.reuters.com\/article\/us-india-biometrics-idUSKCN0WI14E."},{"key":"e_1_3_2_1_44_1","volume-title":"Jain","author":"Nandakumar Karthik","year":"2007","unstructured":"Karthik Nandakumar , Abhishek Nagar , and Anil K . Jain . 2007 . Hardening Fingerprint Fuzzy Vault Using Password. Springer Berlin Heidelberg , Berlin, Heidelberg, 927--937. Karthik Nandakumar, Abhishek Nagar, and Anil K. Jain. 2007. Hardening Fingerprint Fuzzy Vault Using Password. Springer Berlin Heidelberg, Berlin, Heidelberg, 927--937."},{"key":"e_1_3_2_1_45_1","doi-asserted-by":"publisher","DOI":"10.1037\/0278-7393.2.5.523"},{"key":"e_1_3_2_1_46_1","doi-asserted-by":"publisher","DOI":"10.1109\/JPROC.2003.819611"},{"key":"e_1_3_2_1_47_1","first-page":"127","article-title":"Application-Specific Key Release Scheme from Biometrics","volume":"6","author":"Ong Thian Song","year":"2008","unstructured":"Thian Song Ong , Andrew Teoh Beng Jin , and David Chek Ling Ngo . 2008 . Application-Specific Key Release Scheme from Biometrics . IJ Network Security 6 , 2 (2008), 127 -- 133 . Thian Song Ong, Andrew Teoh Beng Jin, and David Chek Ling Ngo. 2008. Application-Specific Key Release Scheme from Biometrics. IJ Network Security 6, 2 (2008), 127--133.","journal-title":"IJ Network Security"},{"key":"e_1_3_2_1_48_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2016.2578288"},{"key":"e_1_3_2_1_49_1","volume-title":"OPM says 5.6 million fingerprints stolen in cyberattack, five times as many as previously thought. (September","author":"Peterson Andrea","year":"2015","unstructured":"Andrea Peterson . 2015. OPM says 5.6 million fingerprints stolen in cyberattack, five times as many as previously thought. (September 2015 ). https:\/\/www.washingtonpost.com\/news\/the-switch\/wp\/2015\/09\/23\/opm-now-says-more-than-five-million-fingerprints-compromised-in-breaches\/. Andrea Peterson. 2015. OPM says 5.6 million fingerprints stolen in cyberattack, five times as many as previously thought. (September 2015). https:\/\/www.washingtonpost.com\/news\/the-switch\/wp\/2015\/09\/23\/opm-now-says-more-than-five-million-fingerprints-compromised-in-breaches\/."},{"key":"e_1_3_2_1_50_1","doi-asserted-by":"publisher","DOI":"10.1145\/2818000.2818005"},{"key":"e_1_3_2_1_51_1","doi-asserted-by":"publisher","DOI":"10.1145\/2420950.2421008"},{"volume-title":"2017 IEEE International Conference on Multimedia and Expo (ICME). 373--378","author":"Pouyanfar S.","key":"e_1_3_2_1_52_1","unstructured":"S. Pouyanfar , S. C. Chen , and M. L. Shyu . 2017. An efficient deep residual-inception network for multimedia classification . In 2017 IEEE International Conference on Multimedia and Expo (ICME). 373--378 . S. Pouyanfar, S. C. Chen, and M. L. Shyu. 2017. An efficient deep residual-inception network for multimedia classification. In 2017 IEEE International Conference on Multimedia and Expo (ICME). 373--378."},{"key":"e_1_3_2_1_53_1","doi-asserted-by":"publisher","DOI":"10.1145\/2647868.2654941"},{"key":"e_1_3_2_1_54_1","volume-title":"Unsupervised representation learning with deep convolutional generative adversarial networks. arXiv preprint arXiv:1511.06434","author":"Radford Alec","year":"2015","unstructured":"Alec Radford , Luke Metz , and Soumith Chintala . 2015. Unsupervised representation learning with deep convolutional generative adversarial networks. arXiv preprint arXiv:1511.06434 ( 2015 ). Alec Radford, Luke Metz, and Soumith Chintala. 2015. Unsupervised representation learning with deep convolutional generative adversarial networks. arXiv preprint arXiv:1511.06434 (2015)."},{"key":"e_1_3_2_1_55_1","first-page":"1","article-title":"Video Liveness for Citizen Journalism: Attacks and Defenses","volume":"99","author":"Rahman M.","year":"2017","unstructured":"M. Rahman , M. Azimpourkivi , U. Topkara , and B. Carbunar . 2017 . Video Liveness for Citizen Journalism: Attacks and Defenses . IEEE Transactions on Mobile Computing PP , 99 (2017), 1 -- 1 . M. Rahman, M. Azimpourkivi, U. Topkara, and B. Carbunar. 2017. Video Liveness for Citizen Journalism: Attacks and Defenses. IEEE Transactions on Mobile Computing PP, 99 (2017), 1--1.","journal-title":"IEEE Transactions on Mobile Computing PP"},{"key":"e_1_3_2_1_56_1","doi-asserted-by":"publisher","DOI":"10.1109\/TPAMI.2007.1004"},{"key":"e_1_3_2_1_57_1","unstructured":"RSA SecurID 2017. RSA SecurID Suite. (2017). https:\/\/www.rsa.com\/en-us\/products-services\/identity-access-management\/securid.  RSA SecurID 2017. RSA SecurID Suite. (2017). https:\/\/www.rsa.com\/en-us\/products-services\/identity-access-management\/securid."},{"key":"e_1_3_2_1_58_1","unstructured":"Schlage Keypad Locks 2017. Schlage Keypad Locks User Guide. (2017). http:\/\/www.schlage.com\/content\/dam\/sch-us\/documents\/pdf\/installation-manuals\/23780042.pdf.  Schlage Keypad Locks 2017. Schlage Keypad Locks User Guide. (2017). http:\/\/www.schlage.com\/content\/dam\/sch-us\/documents\/pdf\/installation-manuals\/23780042.pdf."},{"key":"e_1_3_2_1_59_1","unstructured":"SecuriCode 2017. Ford SecuriCode Keyless Entry Keypad. (2017). http:\/\/owner.ford.com\/how-tos\/vehicle-features\/locks-and-security\/securicode-keyless-entry-keypad.html.  SecuriCode 2017. Ford SecuriCode Keyless Entry Keypad. (2017). http:\/\/owner.ford.com\/how-tos\/vehicle-features\/locks-and-security\/securicode-keyless-entry-keypad.html."},{"key":"e_1_3_2_1_60_1","doi-asserted-by":"publisher","DOI":"10.1145\/584091.584093"},{"key":"e_1_3_2_1_61_1","doi-asserted-by":"crossref","first-page":"5","DOI":"10.1109\/TNNLS.2014.2330900","article-title":"Transfer Learning for Visual Categorization: A Survey","volume":"26","author":"Shao Ling","year":"2015","unstructured":"Ling Shao , Fan Zhu , and Xuelong Li . 2015 . Transfer Learning for Visual Categorization: A Survey . IEEE Transactions on Neural Networks and Learning Systems 26 , 5 (May 2015), 1019--1034. Ling Shao, Fan Zhu, and Xuelong Li. 2015. Transfer Learning for Visual Categorization: A Survey. IEEE Transactions on Neural Networks and Learning Systems 26, 5 (May 2015), 1019--1034.","journal-title":"IEEE Transactions on Neural Networks and Learning Systems"},{"key":"e_1_3_2_1_62_1","doi-asserted-by":"publisher","DOI":"10.1145\/2976749.2978311"},{"key":"e_1_3_2_1_63_1","volume-title":"Going Deeper With Convolutions. In The IEEE Conference on Computer Vision and Pattern Recognition (CVPR).","author":"Szegedy Christian","year":"2015","unstructured":"Christian Szegedy , Wei Liu , Yangqing Jia , Pierre Sermanet , Scott Reed , Dragomir Anguelov , Dumitru Erhan , Vincent Vanhoucke , and Andrew Rabinovich . 2015 . Going Deeper With Convolutions. In The IEEE Conference on Computer Vision and Pattern Recognition (CVPR). Christian Szegedy, Wei Liu, Yangqing Jia, Pierre Sermanet, Scott Reed, Dragomir Anguelov, Dumitru Erhan, Vincent Vanhoucke, and Andrew Rabinovich. 2015. Going Deeper With Convolutions. In The IEEE Conference on Computer Vision and Pattern Recognition (CVPR)."},{"volume-title":"Rethinking the Inception Architecture for Computer Vision. In 2016 IEEE Conference on Computer Vision and Pattern Recognition (CVPR). 2818--2826","author":"Szegedy C.","key":"e_1_3_2_1_64_1","unstructured":"C. Szegedy , V Vanhoucke , S. Ioffe , J. Shlens , and Z. Wojna . 2016 . Rethinking the Inception Architecture for Computer Vision. In 2016 IEEE Conference on Computer Vision and Pattern Recognition (CVPR). 2818--2826 . C. Szegedy, V Vanhoucke, S. Ioffe, J. Shlens, and Z. Wojna. 2016. Rethinking the Inception Architecture for Computer Vision. In 2016 IEEE Conference on Computer Vision and Pattern Recognition (CVPR). 2818--2826."},{"key":"e_1_3_2_1_65_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2014.220"},{"key":"e_1_3_2_1_66_1","volume-title":"PlaceRaider: Virtual Theft in Physical Spaces with Smartphones. In Annual Network and Distributed System Security Symposium.","author":"Templeman Robert","year":"2013","unstructured":"Robert Templeman , Zahid Rahman , David J. Crandall , and Apu Kapadia . 2013 . PlaceRaider: Virtual Theft in Physical Spaces with Smartphones. In Annual Network and Distributed System Security Symposium. Robert Templeman, Zahid Rahman, David J. Crandall, and Apu Kapadia. 2013. PlaceRaider: Virtual Theft in Physical Spaces with Smartphones. In Annual Network and Distributed System Security Symposium."},{"volume-title":"Inception in TensorFlow. (2017). Retrieved","year":"2017","key":"e_1_3_2_1_67_1","unstructured":"tensorflow. 2017. Inception in TensorFlow. (2017). Retrieved May 5, 2017 from https:\/\/github.com\/tensorflow\/models\/tree\/master\/inception tensorflow. 2017. Inception in TensorFlow. (2017). Retrieved May 5, 2017 from https:\/\/github.com\/tensorflow\/models\/tree\/master\/inception"},{"key":"e_1_3_2_1_68_1","doi-asserted-by":"publisher","DOI":"10.1109\/TPAMI.2006.250"},{"key":"e_1_3_2_1_69_1","doi-asserted-by":"publisher","DOI":"10.1145\/2812802"},{"volume-title":"Secure Surfing: Privacy-Preserving Speeded-Up Robust Feature Extractor. In 2016 IEEE 36th International Conference on Distributed Computing Systems (ICDCS). 700--710","author":"Wang Q.","key":"e_1_3_2_1_70_1","unstructured":"Q. Wang , S. Hu , J. Wang , and K. Ren . 2016 . Secure Surfing: Privacy-Preserving Speeded-Up Robust Feature Extractor. In 2016 IEEE 36th International Conference on Distributed Computing Systems (ICDCS). 700--710 . Q. Wang, S. Hu, J. Wang, and K. Ren. 2016. Secure Surfing: Privacy-Preserving Speeded-Up Robust Feature Extractor. In 2016 IEEE 36th International Conference on Distributed Computing Systems (ICDCS). 700--710."},{"key":"e_1_3_2_1_71_1","volume-title":"25th USENIX Security Symposium (USENIX Security 16)","author":"Xu Yi","year":"2016","unstructured":"Yi Xu , True Price , Jan-Michael Frahm , and Fabian Monrose . 2016 . Virtual U: Defeating Face Liveness Detection by Building Virtual Models from Your Public Photos . In 25th USENIX Security Symposium (USENIX Security 16) . USENIX Association, Austin, TX, 497--512. Yi Xu, True Price, Jan-Michael Frahm, and Fabian Monrose. 2016. Virtual U: Defeating Face Liveness Detection by Building Virtual Models from Your Public Photos. In 25th USENIX Security Symposium (USENIX Security 16). USENIX Association, Austin, TX, 497--512."},{"key":"e_1_3_2_1_72_1","volume-title":"Proceedings of the 27th International Conference on Neural Information Processing Systems (NIPS'14)","author":"Yosinski Jason","year":"2014","unstructured":"Jason Yosinski , Jeff Clune , Yoshua Bengio , and Hod Lipson . 2014 . How Transferable Are Features in Deep Neural Networks? . In Proceedings of the 27th International Conference on Neural Information Processing Systems (NIPS'14) . MIT Press, Cambridge, MA, USA, 3320--3328. http:\/\/dl.acm.org\/citation.cfm?id=2969033.2969197 Jason Yosinski, Jeff Clune, Yoshua Bengio, and Hod Lipson. 2014. How Transferable Are Features in Deep Neural Networks?. In Proceedings of the 27th International Conference on Neural Information Processing Systems (NIPS'14). MIT Press, Cambridge, MA, USA, 3320--3328. http:\/\/dl.acm.org\/citation.cfm?id=2969033.2969197"},{"key":"e_1_3_2_1_73_1","volume-title":"Zeiler and Rob Fergus","author":"Matthew","year":"2014","unstructured":"Matthew D. Zeiler and Rob Fergus . 2014 . Visualizing and Understanding Convolutional Networks. Springer International Publishing , Cham, 818--833. Matthew D. Zeiler and Rob Fergus. 2014. Visualizing and Understanding Convolutional Networks. Springer International Publishing, Cham, 818--833."}],"event":{"name":"ACSAC 2017: 2017 Annual Computer Security Applications Conference","acronym":"ACSAC 2017","location":"Orlando FL USA"},"container-title":["Proceedings of the 33rd Annual Computer Security Applications Conference"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3134600.3134619","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3134600.3134619","content-type":"application\/pdf","content-version":"vor","intended-application":"syndication"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3134600.3134619","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T03:30:11Z","timestamp":1750217411000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3134600.3134619"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,12,4]]},"references-count":73,"alternative-id":["10.1145\/3134600.3134619","10.1145\/3134600"],"URL":"https:\/\/doi.org\/10.1145\/3134600.3134619","relation":{},"subject":[],"published":{"date-parts":[[2017,12,4]]},"assertion":[{"value":"2017-12-04","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}