{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T04:31:17Z","timestamp":1750221077973,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":8,"publisher":"ACM","license":[{"start":{"date-parts":[[2018,12,29]],"date-time":"2018-12-29T00:00:00Z","timestamp":1546041600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/501100011002","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["No. 61673316"],"award-info":[{"award-number":["No. 61673316"]}],"id":[{"id":"10.13039\/501100011002","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Major Science and Technology Project of Guangdong Province","award":["No. 2015B010104002"],"award-info":[{"award-number":["No. 2015B010104002"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2018,12,29]]},"DOI":"10.1145\/3301551.3301600","type":"proceedings-article","created":{"date-parts":[[2019,3,11]],"date-time":"2019-03-11T12:33:01Z","timestamp":1552307581000},"page":"110-114","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":4,"title":["A Speech and Lip Authentication System Based On Android Smart Phone"],"prefix":"10.1145","author":[{"given":"Xinman","family":"Zhang","sequence":"first","affiliation":[{"name":"School of Electronics and Information Engineering, MOE Key Lab for Intelligent Networks and Network Security, Xi'an Jiaotong University, Xi'an, China"}]},{"given":"Jiayu","family":"Zhang","sequence":"additional","affiliation":[{"name":"School of Electronics and Information Engineering, MOE Key Lab for Intelligent Networks and Network Security, Xi'an Jiaotong University, Xi'an, China"}]},{"given":"Tingting","family":"He","sequence":"additional","affiliation":[{"name":"School of Electronics and Information Engineering, MOE Key Lab for Intelligent Networks and Network Security, Xi'an Jiaotong University, Xi'an, China"}]},{"given":"Yiyu","family":"Chen","sequence":"additional","affiliation":[{"name":"School of Electronics and Information Engineering, MOE Key Lab for Intelligent Networks and Network Security, Xi'an Jiaotong University, Xi'an, China"}]},{"given":"Yuanjun","family":"Shen","sequence":"additional","affiliation":[{"name":"School of Electronics and Information Engineering, MOE Key Lab for Intelligent Networks and Network Security, Xi'an Jiaotong University, Xi'an, China"}]},{"given":"Xuebin","family":"Xu","sequence":"additional","affiliation":[{"name":"Guangdong Xi'an Jiaotong, University Academy, Xi'an Jiaotong University, Guangdong, China, Foshan, Guangdong"}]}],"member":"320","published-online":{"date-parts":[[2018,12,29]]},"reference":[{"key":"e_1_3_2_1_1_1","volume-title":"Mobile Internet Security Overview. Radio Communications Technology (Jan","author":"Sun Q.B.","year":"2016","unstructured":"Sun , Q.B. 2016. Mobile Internet Security Overview. Radio Communications Technology (Jan . 2016 ), 1--8. Sun, Q.B. 2016. Mobile Internet Security Overview. Radio Communications Technology (Jan. 2016), 1--8."},{"key":"e_1_3_2_1_2_1","unstructured":"Wang L.J. Yao X. M. and Tan Y. Y. 2015. Exploration of mobile payment security. Cyberspace Security (Jan. 2015) 7--10.  Wang L.J. Yao X. M. and Tan Y. Y. 2015. Exploration of mobile payment security. Cyberspace Security (Jan. 2015) 7--10."},{"key":"e_1_3_2_1_3_1","article-title":"Biometric technology and its application in the field of financial payment security","author":"Song D.","year":"2016","unstructured":"Song , D. and Huang , X. 2016 . Biometric technology and its application in the field of financial payment security . Journal of Information Security Research ( Jan. 2016), 27--32. Song, D. and Huang, X. 2016. Biometric technology and its application in the field of financial payment security. Journal of Information Security Research (Jan. 2016), 27--32.","journal-title":"Journal of Information Security Research"},{"key":"e_1_3_2_1_4_1","volume-title":"Research on speech parameter extraction method in speaker recognition","author":"Hu Z. Q.","year":"2016","unstructured":"Hu , Z. Q. Research on speech parameter extraction method in speaker recognition . 2016 . Nanjing Normal University ( 2016). Hu, Z. Q. Research on speech parameter extraction method in speaker recognition. 2016. Nanjing Normal University (2016)."},{"key":"e_1_3_2_1_5_1","volume-title":"Speaker recognition system based on MFCC features and GMM models","author":"Zhou C.H.","year":"2013","unstructured":"Zhou , C.H. 2013. Speaker recognition system based on MFCC features and GMM models . Lanzhou University of Technology ( 2013 ). Zhou, C.H. 2013. Speaker recognition system based on MFCC features and GMM models. Lanzhou University of Technology (2013)."},{"key":"e_1_3_2_1_6_1","volume-title":"European Signal Processing Conference","author":"Gutman D.","year":"2015","unstructured":"Gutman , D. , Bistritz , Y. 2015 . Speaker verification using phoneme-adapted gaussian mixture models . European Signal Processing Conference (2015), 1--4. Gutman, D., Bistritz, Y. 2015. Speaker verification using phoneme-adapted gaussian mixture models. European Signal Processing Conference (2015), 1--4."},{"key":"e_1_3_2_1_7_1","unstructured":"Jiang Y. and Tang Z. M. 2010. Research on GMM text independent speaker recognition system. Computer Engineering and Applications (Nov. 2010) 179--182.  Jiang Y. and Tang Z. M. 2010. Research on GMM text independent speaker recognition system. Computer Engineering and Applications (Nov. 2010) 179--182."},{"key":"e_1_3_2_1_8_1","unstructured":"Wang F. H. and Meng W. J. 2012. A multi-modal biometrics recognition method based on feature level fusion. Science Technology and Engineering (Apr. 2012) 3134--3138.  Wang F. H. and Meng W. J. 2012. A multi-modal biometrics recognition method based on feature level fusion. Science Technology and Engineering (Apr. 2012) 3134--3138."}],"event":{"name":"ICIT 2018: IoT and Smart City","sponsor":["The Hong Kong Polytechnic The Hong Kong Polytechnic University","TU Tianjin University"],"location":"Hong Kong Hong Kong","acronym":"ICIT 2018"},"container-title":["Proceedings of the 6th International Conference on Information Technology: IoT and Smart City"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3301551.3301600","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3301551.3301600","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T00:57:35Z","timestamp":1750208255000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3301551.3301600"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,12,29]]},"references-count":8,"alternative-id":["10.1145\/3301551.3301600","10.1145\/3301551"],"URL":"https:\/\/doi.org\/10.1145\/3301551.3301600","relation":{},"subject":[],"published":{"date-parts":[[2018,12,29]]},"assertion":[{"value":"2018-12-29","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}