{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,7,15]],"date-time":"2025-07-15T03:28:19Z","timestamp":1752550099882,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":12,"publisher":"ACM","license":[{"start":{"date-parts":[[2019,9,9]],"date-time":"2019-09-09T00:00:00Z","timestamp":1567987200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2019,9,9]]},"DOI":"10.1145\/3341162.3343756","type":"proceedings-article","created":{"date-parts":[[2019,9,11]],"date-time":"2019-09-11T16:16:21Z","timestamp":1568218581000},"page":"274-277","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":6,"title":["ASSV"],"prefix":"10.1145","author":[{"given":"Feng","family":"Ding","sequence":"first","affiliation":[{"name":"Shanghai Jiao Tong University, Shanghai, China"}]},{"given":"Dong","family":"Wang","sequence":"additional","affiliation":[{"name":"Shanghai Jiao Tong University, Shanghai, China"}]},{"given":"Qian","family":"Zhang","sequence":"additional","affiliation":[{"name":"Shanghai Jiao Tong University, Shanghai, China"}]},{"given":"Run","family":"Zhao","sequence":"additional","affiliation":[{"name":"Shanghai Jiao Tong University, Shanghai, China"}]}],"member":"320","published-online":{"date-parts":[[2019,9,9]]},"reference":[{"volume-title":"2013 ABA Deposit Account Fraud Survey. Retrieved","year":"2019","key":"e_1_3_2_2_1_1","unstructured":"2013. 2013 ABA Deposit Account Fraud Survey. Retrieved Jan. 4, 2019 from https:\/\/www.aba.com\/Products\/Surveys\/Pages\/2013DepositAccount.aspx 2013. 2013 ABA Deposit Account Fraud Survey. Retrieved Jan. 4, 2019 from https:\/\/www.aba.com\/Products\/Surveys\/Pages\/2013DepositAccount.aspx"},{"volume-title":"2015 AFP Payments Fraud and Control Survey. Retrieved","year":"2019","key":"e_1_3_2_2_2_1","unstructured":"2015. 2015 AFP Payments Fraud and Control Survey. Retrieved Jan. 4, 2019 from http:\/\/wwtug.org\/instmem.html 2015. 2015 AFP Payments Fraud and Control Survey. Retrieved Jan. 4, 2019 from http:\/\/wwtug.org\/instmem.html"},{"key":"e_1_3_2_2_3_1","volume-title":"Off-line cursive handwriting recognition using hidden Markov models. Pattern recognition 28, 9","author":"Bunke Horst","year":"1995","unstructured":"Horst Bunke , Markus Roth , and Ernst G\u00fcnter Schukat-Talamazzini . 1995. Off-line cursive handwriting recognition using hidden Markov models. Pattern recognition 28, 9 ( 1995 ), 1399--1413. Horst Bunke, Markus Roth, and Ernst G\u00fcnter Schukat-Talamazzini. 1995. Off-line cursive handwriting recognition using hidden Markov models. Pattern recognition 28, 9 (1995), 1399--1413."},{"key":"e_1_3_2_2_4_1","doi-asserted-by":"publisher","DOI":"10.1109\/TCSVT.2003.818349"},{"key":"e_1_3_2_2_5_1","doi-asserted-by":"publisher","DOI":"10.1142\/9789812797803_0002"},{"key":"e_1_3_2_2_6_1","doi-asserted-by":"publisher","DOI":"10.1145\/3264929"},{"key":"e_1_3_2_2_7_1","doi-asserted-by":"publisher","DOI":"10.1109\/5.554220"},{"key":"e_1_3_2_2_8_1","unstructured":"MC Schoeman-Malan. 2015. Fraud and forgery of the testator's will or signature: the flight from formalities to no formalities. JS Afr. L. (2015) 125.  MC Schoeman-Malan. 2015. Fraud and forgery of the testator's will or signature: the flight from formalities to no formalities. JS Afr. L . (2015) 125."},{"volume-title":"Fundamentals of wireless communication","author":"Tse David","key":"e_1_3_2_2_9_1","unstructured":"David Tse and Pramod Viswanath . 2005. Fundamentals of wireless communication . Cambridge university press . David Tse and Pramod Viswanath. 2005. Fundamentals of wireless communication. Cambridge university press."},{"key":"e_1_3_2_2_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/2973750.2973764"},{"key":"e_1_3_2_2_11_1","doi-asserted-by":"publisher","DOI":"10.1145\/2789168.2790113"},{"key":"e_1_3_2_2_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/2742647.2742662"}],"event":{"name":"UbiComp '19: The 2019 ACM International Joint Conference on Pervasive and Ubiquitous Computing","sponsor":["SIGMOBILE ACM Special Interest Group on Mobility of Systems, Users, Data and Computing","SIGCHI ACM Special Interest Group on Computer-Human Interaction"],"location":"London United Kingdom","acronym":"UbiComp '19"},"container-title":["Adjunct Proceedings of the 2019 ACM International Joint Conference on Pervasive and Ubiquitous Computing and Proceedings of the 2019 ACM International Symposium on Wearable Computers"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3341162.3343756","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3341162.3343756","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T00:26:05Z","timestamp":1750206365000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3341162.3343756"}},"subtitle":["handwritten signature verification using acoustic signals"],"short-title":[],"issued":{"date-parts":[[2019,9,9]]},"references-count":12,"alternative-id":["10.1145\/3341162.3343756","10.1145\/3341162"],"URL":"https:\/\/doi.org\/10.1145\/3341162.3343756","relation":{},"subject":[],"published":{"date-parts":[[2019,9,9]]},"assertion":[{"value":"2019-09-09","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}