{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,7]],"date-time":"2026-03-07T18:22:20Z","timestamp":1772907740935,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":44,"publisher":"ACM","license":[{"start":{"date-parts":[[2020,4,16]],"date-time":"2020-04-16T00:00:00Z","timestamp":1586995200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/501100012659","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["No.61772338"],"award-info":[{"award-number":["No.61772338"]}],"id":[{"id":"10.13039\/501100012659","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2020,4,16]]},"DOI":"10.1145\/3372224.3380901","type":"proceedings-article","created":{"date-parts":[[2020,5,4]],"date-time":"2020-05-04T07:34:53Z","timestamp":1588577693000},"page":"1-13","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":95,"title":["TouchPass"],"prefix":"10.1145","author":[{"given":"Xiangyu","family":"Xu","sequence":"first","affiliation":[{"name":"Shanghai Jiao Tong University"}]},{"given":"Jiadi","family":"Yu","sequence":"additional","affiliation":[{"name":"Shanghai Jiao Tong University"}]},{"given":"Yingying","family":"chen","sequence":"additional","affiliation":[{"name":"Rutgers University"}]},{"given":"Qin","family":"Hua","sequence":"additional","affiliation":[{"name":"Shanghai Jiao Tong University"}]},{"given":"Yanmin","family":"Zhu","sequence":"additional","affiliation":[{"name":"Shanghai Jiao Tong University"}]},{"given":"Yi-Chao","family":"Chen","sequence":"additional","affiliation":[{"name":"Shanghai Jiao Tong University"}]},{"given":"Minglu","family":"Li","sequence":"additional","affiliation":[{"name":"Shanghai Jiao Tong University"}]}],"member":"320","published-online":{"date-parts":[[2020,4,17]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1145\/2500423.2504572"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1109\/SAHCN.2018.8397098"},{"key":"e_1_3_2_1_3_1","volume-title":"Proc. MobiCom'19(Preprint)","author":"Chen W. C.","year":"2019","unstructured":"W. C. Chen , L. Chen , Y. Huang , X. Zhang , : Secure text input for commodity smart wristbands . In Proc. MobiCom'19(Preprint) , 2019 . W. C. Chen, L. Chen, Y. Huang, X. Zhang, et al. Taprint: Secure text input for commodity smart wristbands. In Proc. MobiCom'19(Preprint), 2019."},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1109\/PROC.1977.10747"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2005.202"},{"key":"e_1_3_2_1_6_1","volume-title":"The wavelet transform, time-frequency localization and signal analysis","author":"Daubechies I.","year":"1990","unstructured":"I. Daubechies . The wavelet transform, time-frequency localization and signal analysis . IEEE transactions on information theory, 36(5):961--1005, 1990 . I. Daubechies. The wavelet transform, time-frequency localization and signal analysis. IEEE transactions on information theory, 36(5):961--1005, 1990."},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/2207676.2208544"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1109\/TASL.2010.2064307"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1109\/THS.2012.6459891"},{"key":"e_1_3_2_1_10_1","first-page":"9","volume-title":"Proc. HotMobile'14","author":"Feng T.","unstructured":"T. Feng , J. Yang , Z. Yan , E. M. Tapia , and W. Shi . Tips: Context-aware implicit user identification using touch screen in uncontrolled environments . In Proc. HotMobile'14 , page 9 . ACM, 2014. T. Feng, J. Yang, Z. Yan, E. M. Tapia, and W. Shi. Tips: Context-aware implicit user identification using touch screen in uncontrolled environments. In Proc. HotMobile'14, page 9. ACM, 2014."},{"key":"e_1_3_2_1_11_1","volume-title":"Touchalytics: On the applicability of touchscreen input as a behavioral biometric for continuous authentication","author":"Frank M.","year":"2013","unstructured":"M. Frank , R. Biedert , E. Ma , I. Martinovic , and D. Song . Touchalytics: On the applicability of touchscreen input as a behavioral biometric for continuous authentication . IEEE transactions on information forensics and security, 8(1):136--148, 2013 . M. Frank, R. Biedert, E. Ma, I. Martinovic, and D. Song. Touchalytics: On the applicability of touchscreen input as a behavioral biometric for continuous authentication. IEEE transactions on information forensics and security, 8(1):136--148, 2013."},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"crossref","DOI":"10.1201\/9781315273372","volume-title":"Vibrations and waves","author":"French A. P.","year":"2017","unstructured":"A. P. French . Vibrations and waves . CRC press , 2017 . A. P. French. Vibrations and waves. CRC press, 2017."},{"key":"e_1_3_2_1_13_1","volume-title":"Distilling the knowledge in a neural network. arXiv preprint arXiv:1503.02531","author":"Hinton G.","year":"2015","unstructured":"G. Hinton , O. Vinyals , and J. Dean . Distilling the knowledge in a neural network. arXiv preprint arXiv:1503.02531 , 2015 . G. Hinton, O. Vinyals, and J. Dean. Distilling the knowledge in a neural network. arXiv preprint arXiv:1503.02531, 2015."},{"key":"e_1_3_2_1_14_1","volume-title":"A theoretical and experimental investigation of modulation sidebands of planetary gear sets. Journal of sound and vibration, 323(3--5):677--696","author":"Inalpolat M.","year":"2009","unstructured":"M. Inalpolat and A. Kahraman . A theoretical and experimental investigation of modulation sidebands of planetary gear sets. Journal of sound and vibration, 323(3--5):677--696 , 2009 . M. Inalpolat and A. Kahraman. A theoretical and experimental investigation of modulation sidebands of planetary gear sets. Journal of sound and vibration, 323(3--5):677--696, 2009."},{"key":"e_1_3_2_1_15_1","volume-title":"Batch normalization: Accelerating deep network training by reducing internal covariate shift. arXiv preprint arXiv:1502.03167","author":"Ioffe S.","year":"2015","unstructured":"S. Ioffe and C. Szegedy . Batch normalization: Accelerating deep network training by reducing internal covariate shift. arXiv preprint arXiv:1502.03167 , 2015 . S. Ioffe and C. Szegedy. Batch normalization: Accelerating deep network training by reducing internal covariate shift. arXiv preprint arXiv:1502.03167, 2015."},{"key":"e_1_3_2_1_16_1","volume-title":"avaliable: https:\/\/www.idtheftcenter.org\/lost-electronic-devices-can-lead-to-data-breaches\/","author":"ITRC.","year":"2015","unstructured":"ITRC. Lost electronic devices can lead to data breaches. [online]. avaliable: https:\/\/www.idtheftcenter.org\/lost-electronic-devices-can-lead-to-data-breaches\/ , 2015 . ITRC. Lost electronic devices can lead to data breaches. [online]. avaliable: https:\/\/www.idtheftcenter.org\/lost-electronic-devices-can-lead-to-data-breaches\/, 2015."},{"key":"e_1_3_2_1_17_1","volume-title":"Filterbank-based fingerprint matching","author":"Jain A. K.","year":"2000","unstructured":"A. K. Jain , S. Prabhakar , L. Hong , and S. Pankanti . Filterbank-based fingerprint matching . IEEE transactions on Image Processing , 9(5):846--859, 2000 . A. K. Jain, S. Prabhakar, L. Hong, and S. Pankanti. Filterbank-based fingerprint matching. IEEE transactions on Image Processing, 9(5):846--859, 2000."},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1145\/2906388.2906404"},{"key":"e_1_3_2_1_19_1","volume-title":"Proc.ICML'15","author":"Koch G.","year":"2015","unstructured":"G. Koch , R. Zemel , and R. Salakhutdinov . Siamese neural networks for one-shot image recognition . In Proc.ICML'15 , 2015 . G. Koch, R. Zemel, and R. Salakhutdinov. Siamese neural networks for one-shot image recognition. In Proc.ICML'15, 2015."},{"key":"e_1_3_2_1_20_1","first-page":"1097","volume-title":"Advances in neural information processing systems","author":"Krizhevsky A.","year":"2012","unstructured":"A. Krizhevsky , I. Sutskever , and G. E. Hinton . Imagenet classification with deep convolutional neural networks . In Advances in neural information processing systems , pages 1097 -- 1105 , 2012 . A. Krizhevsky, I. Sutskever, and G. E. Hinton. Imagenet classification with deep convolutional neural networks. In Advances in neural information processing systems, pages 1097--1105, 2012."},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.patcog.2009.08.016"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1145\/2984511.2984582"},{"key":"e_1_3_2_1_23_1","first-page":"57","volume-title":"Proc. NDSS'13","volume":"56","author":"Li L.","year":"2013","unstructured":"L. Li , X. Zhao , and G. Xue . Unobservable re-authentication for smartphones . In Proc. NDSS'13 , volume 56 , pages 57 -- 59 , 2013 . L. Li, X. Zhao, and G. Xue. Unobservable re-authentication for smartphones. In Proc. NDSS'13, volume 56, pages 57--59, 2013."},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1109\/SAHCN.2017.7964907"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1145\/3133956.3133964"},{"key":"e_1_3_2_1_26_1","volume-title":"v. d. Maaten and G. Hinton. Visualizing data using t-sne. Journal of machine learning research, 9(Nov):2579--2605","author":"L.","year":"2008","unstructured":"L. v. d. Maaten and G. Hinton. Visualizing data using t-sne. Journal of machine learning research, 9(Nov):2579--2605 , 2008 . L. v. d. Maaten and G. Hinton. Visualizing data using t-sne. Journal of machine learning research, 9(Nov):2579--2605, 2008."},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1109\/89.928915"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1145\/2858036.2858547"},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1145\/359168.359172"},{"key":"e_1_3_2_1_30_1","volume-title":"Naukovi Visti NTUU KPI, (1):69--78","author":"Romanuke V.","year":"2017","unstructured":"V. Romanuke . Appropriate number and allocation of relus in convolutional neural networks. Naukovi Visti NTUU KPI, (1):69--78 , 2017 . V. Romanuke. Appropriate number and allocation of relus in convolutional neural networks. Naukovi Visti NTUU KPI, (1):69--78, 2017."},{"key":"e_1_3_2_1_31_1","first-page":"671","volume-title":"Proc. NSDI'16","author":"Roy N.","year":"2016","unstructured":"N. Roy and R. R. Choudhury . Ripple {II}: Faster communication through physical vibration . In Proc. NSDI'16 , pages 671 -- 684 , 2016 . N. Roy and R. R. Choudhury. Ripple {II}: Faster communication through physical vibration. In Proc. NSDI'16, pages 671--684, 2016."},{"key":"e_1_3_2_1_32_1","volume-title":"Proc. NSDI'15","author":"Roy N.","year":"2015","unstructured":"N. Roy , M. Gowda , and R. R. Choudhury . Ripple: Communicating through physical vibration . In Proc. NSDI'15 . USENIX, 2015 . N. Roy, M. Gowda, and R. R. Choudhury. Ripple: Communicating through physical vibration. In Proc. NSDI'15. USENIX, 2015."},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1145\/2508859.2516659"},{"key":"e_1_3_2_1_34_1","first-page":"239","volume-title":"Advances in biological and medical physics","author":"Siri W. E.","year":"1956","unstructured":"W. E. Siri . The gross composition of the body . In Advances in biological and medical physics , volume 4 , pages 239 -- 280 . Elsevier , 1956 . W. E. Siri. The gross composition of the body. In Advances in biological and medical physics, volume 4, pages 239--280. Elsevier, 1956."},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICCE.2014.6776135"},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2017.54"},{"key":"e_1_3_2_1_37_1","volume-title":"iphone x face id slower than touch id. [online]. avaliable: https:\/\/www.tomsguide.com\/us\/iphone-x-face-id-speed-up,news-26060.html","author":"Spoonauer M.","year":"2017","unstructured":"M. Spoonauer . iphone x face id slower than touch id. [online]. avaliable: https:\/\/www.tomsguide.com\/us\/iphone-x-face-id-speed-up,news-26060.html , 2017 . M. Spoonauer. iphone x face id slower than touch id. [online]. avaliable: https:\/\/www.tomsguide.com\/us\/iphone-x-face-id-speed-up,news-26060.html, 2017."},{"key":"e_1_3_2_1_38_1","first-page":"10","volume-title":"Proc. ACSAC'05","author":"Suo X.","unstructured":"X. Suo , Y. Zhu , and G. S. Owen . Graphical passwords: A survey . In Proc. ACSAC'05 , pages 10 --pp. IEEE, 2005. X. Suo, Y. Zhu, and G. S. Owen. Graphical passwords: A survey. In Proc. ACSAC'05, pages 10--pp. IEEE, 2005."},{"key":"e_1_3_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.1145\/1143120.1143128"},{"key":"e_1_3_2_1_40_1","first-page":"35","volume-title":"Architectures and Applications","author":"Waibel A.","year":"1995","unstructured":"A. Waibel , T. Hanazawa , G. Hinton , K. Shikano , and K. J. Lang . Phoneme recognition using time-delay neural networks. Backpropagation: Theory , Architectures and Applications , pages 35 -- 61 , 1995 . A. Waibel, T. Hanazawa, G. Hinton, K. Shikano, and K. J. Lang. Phoneme recognition using time-delay neural networks. Backpropagation: Theory, Architectures and Applications, pages 35--61, 1995."},{"key":"e_1_3_2_1_41_1","doi-asserted-by":"publisher","DOI":"10.1109\/TAU.1967.1161901"},{"key":"e_1_3_2_1_42_1","doi-asserted-by":"publisher","DOI":"10.1145\/2858036.2858466"},{"key":"e_1_3_2_1_43_1","volume-title":"Proc. IPSN'16, page 11","author":"Yang L.","year":"2016","unstructured":"L. Yang , W. Wang , and Q. Zhang . Vibid: user identification through bio-vibrometry . In Proc. IPSN'16, page 11 . IEEE Press , 2016 . L. Yang, W. Wang, and Q. Zhang. Vibid: user identification through bio-vibrometry. In Proc. IPSN'16, page 11. IEEE Press, 2016."},{"key":"e_1_3_2_1_44_1","doi-asserted-by":"publisher","DOI":"10.1145\/2976749.2978296"}],"event":{"name":"MobiCom '20: The 26th Annual International Conference on Mobile Computing and Networking","location":"London United Kingdom","acronym":"MobiCom '20","sponsor":["SIGMOBILE ACM Special Interest Group on Mobility of Systems, Users, Data and Computing"]},"container-title":["Proceedings of the 26th Annual International Conference on Mobile Computing and Networking"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3372224.3380901","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3372224.3380901","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T23:53:04Z","timestamp":1750204384000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3372224.3380901"}},"subtitle":["towards behavior-irrelevant on-touch user authentication on smartphones leveraging vibrations"],"short-title":[],"issued":{"date-parts":[[2020,4,16]]},"references-count":44,"alternative-id":["10.1145\/3372224.3380901","10.1145\/3372224"],"URL":"https:\/\/doi.org\/10.1145\/3372224.3380901","relation":{},"subject":[],"published":{"date-parts":[[2020,4,16]]},"assertion":[{"value":"2020-04-17","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}