{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,17]],"date-time":"2026-03-17T08:01:13Z","timestamp":1773734473640,"version":"3.50.1"},"reference-count":38,"publisher":"Association for Computing Machinery (ACM)","issue":"4","license":[{"start":{"date-parts":[[2018,12,27]],"date-time":"2018-12-27T00:00:00Z","timestamp":1545868800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":["Proc. ACM Interact. Mob. Wearable Ubiquitous Technol."],"published-print":{"date-parts":[[2018,12,27]]},"abstract":"<jats:p>Providing secure access to smart devices such as smartphones, wearables and various other IoT devices is becoming increasingly important, especially as these devices store a range of sensitive personal information. Breathing acoustics-based authentication offers a highly usable and possibly a secondary authentication mechanism for secure access. Executing sophisticated machine learning pipelines for such authentication on such devices remains an open problem, given their resource limitations in terms of storage, memory and computational power. To investigate this challenge, we compare the performance of an end-to-end system for both user identification and user verification tasks based on breathing acoustics on three type of smart devices: smartphone, smartwatch and Raspberry Pi using both shallow classifiers (i.e., SVM, GMM, Logistic Regression) and deep learning based classifiers (e.g., LSTM, MLP). Via detailed analysis, we conclude that LSTM models for acoustic classification are the smallest in size, have the lowest inference time and are more accurate than all other compared classifiers. An uncompressed LSTM model provides an average f-score of 80%-94% while requiring only 50--180 KB of storage (depending on the breathing gesture). The resulting inference can be done on smartphones and smartwatches within approximately 7--10 ms and 18--66 ms respectively, thereby making them suitable for resource-constrained devices. Further memory and computational savings can be achieved using model compression methods such as weight quantization and fully connected layer factorization: in particular, a combination of quantization and factorization achieves 25%--55% reduction in LSTM model size, with almost no loss in performance. We also compare the performance on GPUs and show that the use of GPU can reduce the inference time of LSTM models by a factor of 300%. These results provide a practical way to deploy breathing based biometrics, and more broadly LSTM-based classifiers, in future ubiquitous computing applications.<\/jats:p>","DOI":"10.1145\/3287036","type":"journal-article","created":{"date-parts":[[2018,12,27]],"date-time":"2018-12-27T19:28:03Z","timestamp":1545938883000},"page":"1-24","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":38,"title":["Performance Characterization of Deep Learning Models for Breathing-based Authentication on Resource-Constrained Devices"],"prefix":"10.1145","volume":"2","author":[{"given":"Jagmohan","family":"Chauhan","sequence":"first","affiliation":[{"name":"Aalto University, Espoo, Finland"}]},{"given":"Jathushan","family":"Rajasegaran","sequence":"additional","affiliation":[{"name":"University of Moratuwa, Sri Lanka"}]},{"given":"Suranga","family":"Seneviratne","sequence":"additional","affiliation":[{"name":"University of Sydney, Sydney, NSW, Australia"}]},{"given":"Archan","family":"Misra","sequence":"additional","affiliation":[{"name":"Singapore Management University, Singapore, Singapore"}]},{"given":"Aruna","family":"Seneviratne","sequence":"additional","affiliation":[{"name":"University of New South Wales, Sydney, Australia"}]},{"given":"Youngki","family":"Lee","sequence":"additional","affiliation":[{"name":"Seoul National University, Seoul, South Korea"}]}],"member":"320","published-online":{"date-parts":[[2018,12,27]]},"reference":[{"key":"e_1_2_2_1_1","volume-title":"OSDI","volume":"16","author":"Abadi Mart\u00edn","year":"2016"},{"key":"e_1_2_2_2_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.patrec.2005.08.018"},{"key":"e_1_2_2_3_1","doi-asserted-by":"publisher","DOI":"10.1145\/2994551.2994564"},{"key":"e_1_2_2_4_1","doi-asserted-by":"publisher","DOI":"10.1145\/3089801.3089804"},{"key":"e_1_2_2_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/1961189.1961199"},{"key":"e_1_2_2_6_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-39555-5_35"},{"key":"e_1_2_2_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/3081333.3081355"},{"key":"e_1_2_2_8_1","doi-asserted-by":"publisher","DOI":"10.1109\/MC.2018.2381119"},{"key":"e_1_2_2_9_1","doi-asserted-by":"publisher","DOI":"10.1016\/0169-2070(89)90012-5"},{"key":"e_1_2_2_10_1","first-page":"1","article-title":"Statistical comparisons of classifiers over multiple data sets","author":"Dem\u0161ar Janez","year":"2006","journal-title":"Journal of Machine learning research 7"},{"key":"e_1_2_2_11_1","doi-asserted-by":"publisher","DOI":"10.1080\/01621459.1937.10503522"},{"key":"e_1_2_2_12_1","volume-title":"Gartner Says Worldwide Wearable Device Sales to Grow 17 Percent","year":"2017"},{"key":"e_1_2_2_13_1","unstructured":"Nils Y. Hammerla Shane Halloran and Thomas Pl\u00f6tz. 2016. Deep Convolutional and Recurrent Models for Human Activity Recognition Using Wearables. In AAAI. AAAI Press Phoenix USA 1533--1540.   Nils Y. Hammerla Shane Halloran and Thomas Pl\u00f6tz. 2016. Deep Convolutional and Recurrent Models for Human Activity Recognition Using Wearables. In AAAI. AAAI Press Phoenix USA 1533--1540."},{"key":"e_1_2_2_14_1","volume-title":"Deep compression: Compressing deep neural networks with pruning, trained quantization and huffman coding. arXiv preprint arXiv:1510.00149","author":"Han Song","year":"2015"},{"key":"e_1_2_2_15_1","doi-asserted-by":"publisher","DOI":"10.1145\/3081333.3081360"},{"key":"e_1_2_2_16_1","doi-asserted-by":"publisher","DOI":"10.1145\/3081333.3081338"},{"key":"e_1_2_2_17_1","volume-title":"Compression of deep convolutional neural networks for fast and low power mobile applications. arXiv preprint arXiv:1511.06530","author":"Kim Yong-Deok","year":"2015"},{"key":"e_1_2_2_18_1","volume-title":"Adam: A method for stochastic optimization. arXiv preprint arXiv:1412.6980","author":"Kingma Diederik","year":"2014"},{"key":"e_1_2_2_19_1","doi-asserted-by":"publisher","DOI":"10.1145\/2820975.2820980"},{"key":"e_1_2_2_20_1","doi-asserted-by":"publisher","DOI":"10.1145\/2750858.2804262"},{"key":"e_1_2_2_21_1","volume-title":"Mobile payments to overtake credit cards by","author":"Low Aloysius","year":"2019"},{"key":"e_1_2_2_22_1","first-page":"2579","article-title":"Visualizing data using t-SNE","author":"van der Maaten Laurens","year":"2008","journal-title":"Journal of Machine Learning Research 9"},{"key":"e_1_2_2_23_1","doi-asserted-by":"publisher","DOI":"10.1287\/mnsc.29.9.987"},{"key":"e_1_2_2_24_1","volume-title":"Proceedings of workshop on learning from imbalanced datasets","volume":"126","author":"Mani Inderjeet","year":"2003"},{"key":"e_1_2_2_25_1","doi-asserted-by":"publisher","DOI":"10.1145\/3081333.3081359"},{"key":"e_1_2_2_26_1","volume-title":"Convolutional neural networks using logarithmic data representation. arXiv preprint arXiv:1603.01025","author":"Miyashita Daisuke","year":"2016"},{"key":"e_1_2_2_27_1","unstructured":"Netimperative. 2017. Health and fitness app usage grew 330% in just 3 years. http:\/\/www.netimperative.com\/2017\/09\/health-fitness-app-usage-grew-330-just-3-years\/. (2017).  Netimperative. 2017. Health and fitness app usage grew 330% in just 3 years. http:\/\/www.netimperative.com\/2017\/09\/health-fitness-app-usage-grew-330-just-3-years\/. (2017)."},{"key":"e_1_2_2_28_1","doi-asserted-by":"publisher","DOI":"10.1109\/PERCOMW.2017.7917596"},{"key":"e_1_2_2_29_1","doi-asserted-by":"publisher","DOI":"10.1109\/JPROC.2003.819611"},{"key":"e_1_2_2_30_1","first-page":"2825","article-title":"Scikit-learn: Machine learning in Python","author":"Pedregosa Fabian","year":"2011","journal-title":"Journal of Machine Learning Research 12"},{"key":"e_1_2_2_31_1","volume-title":"Incremental Learning in Deep Convolutional Neural Networks Using Partial Network Sharing. arXiv preprint arXiv:1712.02719","author":"Sarwar Syed Shakib","year":"2017"},{"key":"e_1_2_2_32_1","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2017.2731979"},{"key":"e_1_2_2_33_1","doi-asserted-by":"publisher","DOI":"10.1109\/TPAMI.2007.1010"},{"key":"e_1_2_2_34_1","unstructured":"Statista. 2018. Internet of Things (IoT) connected devices installed base worldwide from 2015 to 2025 (in billions). https:\/\/www.statista.com\/statistics\/471264\/iot-number-of-connected-devices-worldwide\/. (2018).  Statista. 2018. Internet of Things (IoT) connected devices installed base worldwide from 2015 to 2025 (in billions). https:\/\/www.statista.com\/statistics\/471264\/iot-number-of-connected-devices-worldwide\/. (2018)."},{"key":"e_1_2_2_35_1","doi-asserted-by":"publisher","DOI":"10.1145\/3212725.3212728"},{"key":"e_1_2_2_36_1","volume-title":"Ignacio Lopez Moreno, and Javier Gonzalez-Dominguez","author":"Variani Ehsan","year":"2014"},{"key":"e_1_2_2_37_1","volume-title":"Quantized convolutional neural networks for mobile devices","author":"Wu Jiaxiang"},{"key":"e_1_2_2_38_1","volume-title":"ICLR.","author":"Zhou Aojun"}],"container-title":["Proceedings of the ACM on Interactive, Mobile, Wearable and Ubiquitous Technologies"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3287036","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3287036","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T01:02:08Z","timestamp":1750208528000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3287036"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,12,27]]},"references-count":38,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2018,12,27]]}},"alternative-id":["10.1145\/3287036"],"URL":"https:\/\/doi.org\/10.1145\/3287036","relation":{},"ISSN":["2474-9567"],"issn-type":[{"value":"2474-9567","type":"electronic"}],"subject":[],"published":{"date-parts":[[2018,12,27]]},"assertion":[{"value":"2018-02-01","order":0,"name":"received","label":"Received","group":{"name":"publication_history","label":"Publication History"}},{"value":"2018-10-01","order":1,"name":"accepted","label":"Accepted","group":{"name":"publication_history","label":"Publication History"}},{"value":"2018-12-27","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}