{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,20]],"date-time":"2025-10-20T10:25:53Z","timestamp":1760955953587,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":23,"publisher":"ACM","license":[{"start":{"date-parts":[[2019,10,14]],"date-time":"2019-10-14T00:00:00Z","timestamp":1571011200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2019,10,14]]},"DOI":"10.1145\/3340555.3353740","type":"proceedings-article","created":{"date-parts":[[2019,10,17]],"date-time":"2019-10-17T12:49:48Z","timestamp":1571316588000},"page":"145-153","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":11,"title":["Motion Eavesdropper: Smartwatch-based Handwriting Recognition Using Deep Learning"],"prefix":"10.1145","author":[{"given":"Hao","family":"Jiang","sequence":"first","affiliation":[{"name":"School of Software Engineering, China"}]}],"member":"320","published-online":{"date-parts":[[2019,10,14]]},"reference":[{"key":"e_1_3_2_1_1_1","volume-title":"Keyboard Acoustic Emanations. In IEEE Symposium on Security & Privacy.","author":"Asonov Dmitri","year":"2004","unstructured":"Dmitri Asonov and Rakesh Agrawal . 2004 . Keyboard Acoustic Emanations. In IEEE Symposium on Security & Privacy. Dmitri Asonov and Rakesh Agrawal. 2004. Keyboard Acoustic Emanations. In IEEE Symposium on Security & Privacy."},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1145\/1180405.1180436"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"crossref","unstructured":"Xu Chao Parth\u00a0H. Pathak and Prasant Mohapatra. 2015. Finger-writing with Smartwatch:A Case for Finger and Hand Gesture Recognition using Smartwatch. (2015).  Xu Chao Parth\u00a0H. Pathak and Prasant Mohapatra. 2015. Finger-writing with Smartwatch:A Case for Finger and Hand Gesture Recognition using Smartwatch. (2015).","DOI":"10.1145\/2699343.2699350"},{"key":"e_1_3_2_1_4_1","volume-title":"Retrieved","author":"Dat Word\u00a0Frequency","year":"2016","unstructured":"Word\u00a0Frequency Dat . 2016 . Corpus of Contemporary American English . Retrieved March 13, 2016 from http:\/\/www.wordfrequency.info Word\u00a0Frequency Dat. 2016. Corpus of Contemporary American English. Retrieved March 13, 2016 from http:\/\/www.wordfrequency.info"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1109\/THMS.2014.2365723"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM.2018.8486285"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"crossref","unstructured":"Ahmed El-Sawy Hazem El-Bakry and Mohamed Loey. 2016. CNN for Handwritten Arabic Digits Recognition Based on LeNet-5. (2016).  Ahmed El-Sawy Hazem El-Bakry and Mohamed Loey. 2016. CNN for Handwritten Arabic Digits Recognition Based on LeNet-5. (2016).","DOI":"10.1007\/978-3-319-48308-5_54"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1145\/1143844.1143891"},{"key":"e_1_3_2_1_9_1","first-page":"1","article-title":"Keyboard acoustic side channel attacks: exploring realistic and security-sensitive scenarios","volume":"14","author":"Halevi Tzipora","year":"2014","unstructured":"Tzipora Halevi and Nitesh Saxena . 2014 . Keyboard acoustic side channel attacks: exploring realistic and security-sensitive scenarios . International Journal of Information Security 14 , 5 (2014), 1 \u2013 14 . Tzipora Halevi and Nitesh Saxena. 2014. Keyboard acoustic side channel attacks: exploring realistic and security-sensitive scenarios. International Journal of Information Security 14, 5 (2014), 1\u201314.","journal-title":"International Journal of Information Security"},{"key":"e_1_3_2_1_10_1","volume-title":"International Conference on Mobile Computing & Networking.","author":"He Wang","year":"2015","unstructured":"Wang He , Tsung\u00a0Te Lai , and Romit\u00a0Roy Choudhury . 2015 . MoLe: Motion Leaks through Smartwatch Sensors . In International Conference on Mobile Computing & Networking. Wang He, Tsung\u00a0Te Lai, and Romit\u00a0Roy Choudhury. 2015. MoLe: Motion Leaks through Smartwatch Sensors. In International Conference on Mobile Computing & Networking."},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1162\/neco.1997.9.8.1735"},{"key":"e_1_3_2_1_12_1","volume-title":"International Conference on International Conference on Machine Learning.","author":"Jozefowicz Rafal","year":"2015","unstructured":"Rafal Jozefowicz , Wojciech Zaremba , and Ilya Sutskever . 2015 . An empirical exploration of recurrent network architectures . In International Conference on International Conference on Machine Learning. Rafal Jozefowicz, Wojciech Zaremba, and Ilya Sutskever. 2015. An empirical exploration of recurrent network architectures. In International Conference on International Conference on Machine Learning."},{"key":"e_1_3_2_1_13_1","unstructured":"Mobvoi\u00a0AI Lab. 2012. Ticwatch. https:\/\/www.mobvoi.com\/  Mobvoi\u00a0AI Lab. 2012. Ticwatch. https:\/\/www.mobvoi.com\/"},{"key":"e_1_3_2_1_14_1","volume-title":"Iapr Asian Conference on Pattern Recognition.","author":"Li Chen","year":"2015","unstructured":"Chen Li , Wang Song , Fan Wei , Jun Sun , and Satoshi Naoi . 2015 . Beyond human recognition: A CNN-based framework for handwritten character recognition . In Iapr Asian Conference on Pattern Recognition. Chen Li, Wang Song, Fan Wei, Jun Sun, and Satoshi Naoi. 2015. Beyond human recognition: A CNN-based framework for handwritten character recognition. In Iapr Asian Conference on Pattern Recognition."},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1145\/3161412"},{"key":"e_1_3_2_1_16_1","volume-title":"Acm International Symposium on Wearable Computers.","author":"Maiti Anindya","year":"2015","unstructured":"Anindya Maiti , Murtuza Jadliwala , Jibo He , and Igor Bilogrevic . 2015 . (Smart)watch your taps:side-channel keystroke inference attacks using smartwatches . In Acm International Symposium on Wearable Computers. Anindya Maiti, Murtuza Jadliwala, Jibo He, and Igor Bilogrevic. 2015. (Smart)watch your taps:side-channel keystroke inference attacks using smartwatches. In Acm International Symposium on Wearable Computers."},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"crossref","unstructured":"Arik Poznanski and Lior Wolf. 2016. CNN-N-Gram for HandwritingWord Recognition. (2016).  Arik Poznanski and Lior Wolf. 2016. CNN-N-Gram for HandwritingWord Recognition. (2016).","DOI":"10.1109\/CVPR.2016.253"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"crossref","unstructured":"Mike Schuster and Kuldip\u00a0K Paliwal. 1997. Bidirectional recurrent neural networks. 2673\u20132681 pages.  Mike Schuster and Kuldip\u00a0K Paliwal. 1997. Bidirectional recurrent neural networks. 2673\u20132681 pages.","DOI":"10.1109\/78.650093"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOMW.2018.8406879"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.patcog.2017.06.032"},{"key":"e_1_3_2_1_21_1","volume-title":"Acm International Joint Conference on Pervasive & Ubiquitous Computing.","author":"Yu Tuo","year":"2016","unstructured":"Tuo Yu , Haiming Jin , and Klara Nahrstedt . 2016 . WritingHacker:audio based eavesdropping of handwriting via mobile devices . In Acm International Joint Conference on Pervasive & Ubiquitous Computing. Tuo Yu, Haiming Jin, and Klara Nahrstedt. 2016. WritingHacker:audio based eavesdropping of handwriting via mobile devices. In Acm International Joint Conference on Pervasive & Ubiquitous Computing."},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1145\/2797044.2797045"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1145\/1102120.1102169"}],"event":{"name":"ICMI '19: INTERNATIONAL CONFERENCE ON MULTIMODAL INTERACTION","acronym":"ICMI '19","location":"Suzhou China"},"container-title":["2019 International Conference on Multimodal Interaction"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3340555.3353740","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3340555.3353740","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T23:13:28Z","timestamp":1750202008000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3340555.3353740"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,10,14]]},"references-count":23,"alternative-id":["10.1145\/3340555.3353740","10.1145\/3340555"],"URL":"https:\/\/doi.org\/10.1145\/3340555.3353740","relation":{},"subject":[],"published":{"date-parts":[[2019,10,14]]},"assertion":[{"value":"2019-10-14","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}