{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,10]],"date-time":"2026-01-10T19:21:07Z","timestamp":1768072867484,"version":"3.49.0"},"publisher-location":"New York, NY, USA","reference-count":46,"publisher":"ACM","license":[{"start":{"date-parts":[[2019,11,6]],"date-time":"2019-11-06T00:00:00Z","timestamp":1572998400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/100000001","name":"National Science Foundation","doi-asserted-by":"publisher","award":["CNS-1719336, CNS-1845469"],"award-info":[{"award-number":["CNS-1719336, CNS-1845469"]}],"id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100001395","name":"Wisconsin Alumni Research Foundation","doi-asserted-by":"publisher","id":[{"id":"10.13039\/100001395","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2019,11,6]]},"DOI":"10.1145\/3319535.3354242","type":"proceedings-article","created":{"date-parts":[[2019,11,7]],"date-time":"2019-11-07T13:08:32Z","timestamp":1573132112000},"page":"1201-1213","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":52,"title":["Velody"],"prefix":"10.1145","author":[{"given":"Jingjie","family":"Li","sequence":"first","affiliation":[{"name":"University of Wisconsin-Madison, Madison, WI, USA"}]},{"given":"Kassem","family":"Fawaz","sequence":"additional","affiliation":[{"name":"University of Wisconsin-Madison, Madison, WI, USA"}]},{"given":"Younghyun","family":"Kim","sequence":"additional","affiliation":[{"name":"University of Wisconsin-Madison, Madison, WI, USA"}]}],"member":"320","published-online":{"date-parts":[[2019,11,6]]},"reference":[{"key":"e_1_3_2_2_1_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jsv.2010.02.001"},{"key":"e_1_3_2_2_2_1","doi-asserted-by":"publisher","DOI":"10.1109\/NER.2011.5910581"},{"key":"e_1_3_2_2_3_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2018.01.010"},{"key":"e_1_3_2_2_4_1","doi-asserted-by":"publisher","DOI":"10.1145\/3081333.3081355"},{"key":"e_1_3_2_2_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/3300061.3300124"},{"key":"e_1_3_2_2_6_1","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM.2015.7218660"},{"key":"e_1_3_2_2_7_1","doi-asserted-by":"publisher","DOI":"10.1109\/IIHMSP.2010.83"},{"key":"e_1_3_2_2_8_1","volume-title":"Vibration energy absorption (VEA) in human fingers-hand-arm system. Medical engineering & physics","author":"Dong Ren G.","year":"2004"},{"key":"e_1_3_2_2_9_1","volume-title":"Recent advances in biodynamics of human hand-arm system. Industrial health","author":"Dong Ren G.","year":"2005"},{"key":"e_1_3_2_2_10_1","volume-title":"Proceedings of the International Conference on Machine Learning (ICML). 1068--1077","author":"Engel Jesse","year":"2017"},{"key":"e_1_3_2_2_11_1","doi-asserted-by":"publisher","DOI":"10.1145\/328236.328110"},{"key":"e_1_3_2_2_12_1","volume-title":"Biometric technology for human identification III","author":"Kalka Nathan D","year":"2020"},{"key":"e_1_3_2_2_13_1","doi-asserted-by":"publisher","DOI":"10.1145\/2851581.2892314"},{"key":"e_1_3_2_2_14_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.chaos.2006.05.061"},{"key":"e_1_3_2_2_15_1","doi-asserted-by":"publisher","DOI":"10.1145\/1743666.1743712"},{"key":"e_1_3_2_2_16_1","first-page":"907","article-title":"Tutorial: Loudspeaker nonlinearities--causes, parameters, symptoms","volume":"54","author":"Klippel Wolfgang","year":"2006","journal-title":"Journal of the Audio Engineering Society"},{"key":"e_1_3_2_2_17_1","doi-asserted-by":"publisher","DOI":"10.1145\/2984511.2984582"},{"key":"e_1_3_2_2_18_1","doi-asserted-by":"publisher","DOI":"10.1145\/3274783.3274833"},{"key":"e_1_3_2_2_19_1","doi-asserted-by":"publisher","DOI":"10.1145\/3210240.3210344"},{"key":"e_1_3_2_2_20_1","doi-asserted-by":"publisher","DOI":"10.1145\/3117811.3117839"},{"key":"e_1_3_2_2_21_1","doi-asserted-by":"publisher","DOI":"10.1145\/3133956.3133964"},{"key":"e_1_3_2_2_22_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.ndteint.2017.07.005"},{"key":"e_1_3_2_2_23_1","doi-asserted-by":"publisher","DOI":"10.1145\/3191751"},{"key":"e_1_3_2_2_24_1","volume-title":"WaveNet and low-quality found data. arXiv preprint arXiv:1803.00860","author":"Lorenzo-Trueba Jaime","year":"2018"},{"key":"e_1_3_2_2_25_1","volume-title":"Proceedings of the USENIX Symposium on Usable Privacy and Security (SOUPS). 189--206","author":"Mare Shrirang","year":"2016"},{"key":"e_1_3_2_2_26_1","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2018.23303"},{"key":"e_1_3_2_2_27_1","volume-title":"Proceedings of the USENIX Symposium on Usable Privacy and Security (SOUPS). 257--269","author":"Panjwani Saurabh","year":"2014"},{"key":"e_1_3_2_2_28_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.clinbiomech.2013.11.022"},{"key":"e_1_3_2_2_29_1","doi-asserted-by":"publisher","DOI":"10.3390\/s17030660"},{"key":"e_1_3_2_2_30_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jsv.2010.09.012"},{"key":"e_1_3_2_2_31_1","doi-asserted-by":"publisher","DOI":"10.1006\/dspr.1999.0361"},{"key":"e_1_3_2_2_32_1","doi-asserted-by":"publisher","DOI":"10.1145\/2594368.2594375"},{"key":"e_1_3_2_2_33_1","doi-asserted-by":"publisher","DOI":"10.1145\/2976749.2978311"},{"key":"e_1_3_2_2_34_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2017.54"},{"key":"e_1_3_2_2_35_1","volume-title":"Proceedings of the ACM\/IEEE Design Automation Conference (DAC). 9--14","author":"Edward Suh G","year":"2007"},{"key":"e_1_3_2_2_36_1","volume-title":"Proceedings of the COMSOL Conference .","author":"Talarico A","year":"2014"},{"key":"e_1_3_2_2_37_1","volume-title":"WaveNet: A generative model for raw audio. arXiv preprint arXiv:1609.03499","author":"Den Oord Aaron Van","year":"2016"},{"key":"e_1_3_2_2_38_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPRW.2015.7301326"},{"key":"e_1_3_2_2_39_1","first-page":"332","article-title":"Graphing, interpretation, and comparison of results of loudspeaker nonlinear distortion measurements","volume":"52","author":"Voishvillo Alexander","year":"2004","journal-title":"Journal of the Audio Engineering Society"},{"key":"e_1_3_2_2_40_1","doi-asserted-by":"publisher","DOI":"10.1145\/3264950"},{"key":"e_1_3_2_2_41_1","doi-asserted-by":"publisher","DOI":"10.1109\/JSTSP.2017.2671435"},{"key":"e_1_3_2_2_42_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.ndteint.2010.09.002"},{"key":"e_1_3_2_2_43_1","doi-asserted-by":"publisher","DOI":"10.1145\/3133956.3133962"},{"key":"e_1_3_2_2_44_1","doi-asserted-by":"publisher","DOI":"10.1145\/2976749.2978296"},{"key":"e_1_3_2_2_45_1","doi-asserted-by":"publisher","DOI":"10.1109\/TITB.2012.2206115"},{"key":"e_1_3_2_2_46_1","first-page":"152","article-title":"BiLock: User authentication via dental occlusion biometrics","volume":"2","author":"Zou Yongpan","year":"2018","journal-title":"Proceedings of the ACM on Interactive, Mobile, Wearable and Ubiquitous Technologies (IMWUT)"}],"event":{"name":"CCS '19: 2019 ACM SIGSAC Conference on Computer and Communications Security","location":"London United Kingdom","acronym":"CCS '19","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"]},"container-title":["Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3319535.3354242","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3319535.3354242","content-type":"application\/pdf","content-version":"vor","intended-application":"syndication"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3319535.3354242","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T23:24:03Z","timestamp":1750202643000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3319535.3354242"}},"subtitle":["Nonlinear Vibration Challenge-Response for Resilient User Authentication"],"short-title":[],"issued":{"date-parts":[[2019,11,6]]},"references-count":46,"alternative-id":["10.1145\/3319535.3354242","10.1145\/3319535"],"URL":"https:\/\/doi.org\/10.1145\/3319535.3354242","relation":{},"subject":[],"published":{"date-parts":[[2019,11,6]]},"assertion":[{"value":"2019-11-06","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}