{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,11]],"date-time":"2026-03-11T16:34:10Z","timestamp":1773246850055,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":22,"publisher":"ACM","license":[{"start":{"date-parts":[[2017,11,6]],"date-time":"2017-11-06T00:00:00Z","timestamp":1509926400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2017,11,6]]},"DOI":"10.1145\/3139243.3139251","type":"proceedings-article","created":{"date-parts":[[2017,12,27]],"date-time":"2017-12-27T18:57:16Z","timestamp":1514401036000},"page":"68-73","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":14,"title":["VeriNet"],"prefix":"10.1145","author":[{"given":"Chris Xiaoxuan","family":"Lu","sequence":"first","affiliation":[{"name":"Department of Computer Science, University of Oxford"}]},{"given":"Bowen","family":"Du","sequence":"additional","affiliation":[{"name":"Department of Computer Science, University of Warwick"}]},{"given":"Xuan","family":"Kan","sequence":"additional","affiliation":[{"name":"College of Software Engineering, Tongji University"}]},{"given":"Hongkai","family":"Wen","sequence":"additional","affiliation":[{"name":"Department of Computer Science, University of Warwick"}]},{"given":"Andrew","family":"Markham","sequence":"additional","affiliation":[{"name":"Department of Computer Science, University of Oxford"}]},{"given":"Niki","family":"Trigoni","sequence":"additional","affiliation":[{"name":"Department of Computer Science, University of Oxford"}]}],"member":"320","published-online":{"date-parts":[[2017,11,6]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"Ltd Alipay.com Co. 2017. Alipay - Makes Life Easy. https:\/\/itunes.apple.com\/us\/app\/alipay-makes-life-easy\/id333206289?mt=8. (2017).  Ltd Alipay.com Co. 2017. Alipay - Makes Life Easy. https:\/\/itunes.apple.com\/us\/app\/alipay-makes-life-easy\/id333206289?mt=8. (2017)."},{"key":"e_1_3_2_1_2_1","volume-title":"Smudge Attacks on Smartphone Touch Screens. USENIX Workshop on Offensive Technologies","author":"Aviv Adam J","year":"2010","unstructured":"Adam J Aviv , Katherine L Gibson , Evan Mossop , Matt Blaze , and Jonathan M Smith . 2010 . Smudge Attacks on Smartphone Touch Screens. USENIX Workshop on Offensive Technologies , Woot (2010). Adam J Aviv, Katherine L Gibson, Evan Mossop, Matt Blaze, and Jonathan M Smith. 2010. Smudge Attacks on Smartphone Touch Screens. USENIX Workshop on Offensive Technologies, Woot (2010)."},{"key":"e_1_3_2_1_3_1","volume-title":"NIPS 2011, BigLearning Workshop","volume":"3","author":"Bergstra James","year":"2011","unstructured":"James Bergstra , Fr\u00e9d\u00e9ric Bastien , Olivier Breuleux , Pascal Lamblin , Razvan Pascanu , Olivier Delalleau , Guillaume Desjardins , David Warde-Farley , Ian Goodfellow , Arnaud Bergeron , 2011 . Theano: Deep learning on gpus with python . In NIPS 2011, BigLearning Workshop , Granada, Spain , Vol. 3 . James Bergstra, Fr\u00e9d\u00e9ric Bastien, Olivier Breuleux, Pascal Lamblin, Razvan Pascanu, Olivier Delalleau, Guillaume Desjardins, David Warde-Farley, Ian Goodfellow, Arnaud Bergeron, et al. 2011. Theano: Deep learning on gpus with python. In NIPS 2011, BigLearning Workshop, Granada, Spain, Vol. 3."},{"key":"e_1_3_2_1_4_1","volume-title":"Proceedings of the 6th USENIX Conference on Hot Topics in Security, HotSec. USENIX.","author":"Cai Liang","year":"2011","unstructured":"Liang Cai and Hao Chen . 2011 . TouchLogger: Inferring Keystrokes on Touch Screen from Smartphone Motion .. In Proceedings of the 6th USENIX Conference on Hot Topics in Security, HotSec. USENIX. Liang Cai and Hao Chen. 2011. TouchLogger: Inferring Keystrokes on Touch Screen from Smartphone Motion.. In Proceedings of the 6th USENIX Conference on Hot Topics in Security, HotSec. USENIX."},{"key":"e_1_3_2_1_5_1","volume-title":"Keras: Deep learning library for theano and tensor-flow. URL: https:\/\/keras.io\/k","author":"Fran\u00e7ois Chollet","year":"2015","unstructured":"Fran\u00e7ois Chollet et al. 2015 . Keras: Deep learning library for theano and tensor-flow. URL: https:\/\/keras.io\/k (2015). Fran\u00e7ois Chollet et al. 2015. Keras: Deep learning library for theano and tensor-flow. URL: https:\/\/keras.io\/k (2015)."},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1145\/2207676.2208544"},{"key":"e_1_3_2_1_7_1","volume-title":"USENIX Security Symposium.","author":"Flor\u00eancio Dinei","year":"2014","unstructured":"Dinei Flor\u00eancio , Cormac Herley , and Paul C Van Oorschot . 2014 . passcode Portfolios and the Finite-Effort User: Sustainably Managing Large Numbers of Accounts .. In USENIX Security Symposium. Dinei Flor\u00eancio, Cormac Herley, and Paul C Van Oorschot. 2014. passcode Portfolios and the Finite-Effort User: Sustainably Managing Large Numbers of Accounts.. In USENIX Security Symposium."},{"key":"e_1_3_2_1_8_1","volume-title":"Touchalytics: On the applicability of touchscreen input as a behavioral biometric for continuous authentication","author":"Frank Mario","year":"2013","unstructured":"Mario Frank , Ralf Biedert , Eugene Ma , Ivan Martinovic , and Dawn Song . 2013 . Touchalytics: On the applicability of touchscreen input as a behavioral biometric for continuous authentication . IEEE transactions on information forensics and security. Mario Frank, Ralf Biedert, Eugene Ma, Ivan Martinovic, and Dawn Song. 2013. Touchalytics: On the applicability of touchscreen input as a behavioral biometric for continuous authentication. IEEE transactions on information forensics and security."},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1145\/2858036.2858267"},{"key":"e_1_3_2_1_10_1","unstructured":"Sepp Hochreiter Yoshua Bengio Paolo Frasconi and J\u00fcrgen Schmidhuber. 2001. Gradient flow in recurrent nets: the difficulty of learning long-term dependencies. (2001).  Sepp Hochreiter Yoshua Bengio Paolo Frasconi and J\u00fcrgen Schmidhuber. 2001. Gradient flow in recurrent nets: the difficulty of learning long-term dependencies. (2001)."},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1162\/neco.1997.9.8.1735"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/2942358.2942375"},{"key":"e_1_3_2_1_13_1","volume-title":"International Conference on Learning Representations, ICLR.","author":"Kingma Diederik","year":"2014","unstructured":"Diederik Kingma and Jimmy Ba . 2014 . Adam: A method for stochastic optimization . In International Conference on Learning Representations, ICLR. Diederik Kingma and Jimmy Ba. 2014. Adam: A method for stochastic optimization. In International Conference on Learning Representations, ICLR."},{"key":"e_1_3_2_1_14_1","unstructured":"Lingjun Li Xinxin Zhao and Guoliang Xue. 2013. Unobservable Reauthentication for Smartphones.. In NDSS.  Lingjun Li Xinxin Zhao and Guoliang Xue. 2013. Unobservable Reauthentication for Smartphones.. In NDSS."},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1145\/2809695.2809719"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1145\/2162081.2162095"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1145\/2500423.2500434"},{"key":"e_1_3_2_1_18_1","volume-title":"USENIX Symposium On Usable Privacy and Security.","author":"Stobert Elizabeth","year":"2014","unstructured":"Elizabeth Stobert and Robert Biddle . 2014 . The passcode life cycle: user behaviour in managing passcodes . In USENIX Symposium On Usable Privacy and Security. Elizabeth Stobert and Robert Biddle. 2014. The passcode life cycle: user behaviour in managing passcodes. In USENIX Symposium On Usable Privacy and Security."},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1145\/2185448.2185465"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICC.2015.7249465"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1145\/3038912.3052577"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICNP.2014.43"}],"event":{"name":"SenSys '17: The 15th ACM Conference on Embedded Network Sensor Systems","location":"Delft Netherlands","acronym":"SenSys '17","sponsor":["SIGMETRICS ACM Special Interest Group on Measurement and Evaluation","SIGCOMM ACM Special Interest Group on Data Communication","SIGMOBILE ACM Special Interest Group on Mobility of Systems, Users, Data and Computing","SIGOPS ACM Special Interest Group on Operating Systems","SIGBED ACM Special Interest Group on Embedded Systems","SIGARCH ACM Special Interest Group on Computer Architecture"]},"container-title":["Proceedings of the First ACM Workshop on Mobile Crowdsensing Systems and Applications"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3139243.3139251","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3139243.3139251","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T02:11:16Z","timestamp":1750212676000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3139243.3139251"}},"subtitle":["User Verification on Smartwatches via Behavior Biometrics"],"short-title":[],"issued":{"date-parts":[[2017,11,6]]},"references-count":22,"alternative-id":["10.1145\/3139243.3139251","10.1145\/3139243"],"URL":"https:\/\/doi.org\/10.1145\/3139243.3139251","relation":{},"subject":[],"published":{"date-parts":[[2017,11,6]]},"assertion":[{"value":"2017-11-06","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}