{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,10]],"date-time":"2025-09-10T21:50:55Z","timestamp":1757541055298,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":28,"publisher":"ACM","license":[{"start":{"date-parts":[[2021,5,8]],"date-time":"2021-05-08T00:00:00Z","timestamp":1620432000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/100000001","name":"National Science Foundation","doi-asserted-by":"publisher","award":["CNS-1949650"],"award-info":[{"award-number":["CNS-1949650"]}],"id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2021,5,8]]},"DOI":"10.1145\/3411763.3451563","type":"proceedings-article","created":{"date-parts":[[2021,5,8]],"date-time":"2021-05-08T00:49:19Z","timestamp":1620434959000},"page":"1-5","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":2,"title":["Demonstrating User Authentication via Electrical Muscle Stimulation"],"prefix":"10.1145","author":[{"given":"Yuxin","family":"Chen","sequence":"first","affiliation":[{"name":"University of Chicago, United States"}]},{"given":"Zhuolin","family":"Yang","sequence":"additional","affiliation":[{"name":"University of Chicago, United States"}]},{"given":"Ruben","family":"Abbou","sequence":"additional","affiliation":[{"name":"University of Chicago, United States"}]},{"given":"Pedro","family":"Lopes","sequence":"additional","affiliation":[{"name":"University of Chicago, United States"}]},{"given":"Ben Y.","family":"Zhao","sequence":"additional","affiliation":[{"name":"University of Chicago, United States"}]},{"given":"Haitao","family":"Zheng","sequence":"additional","affiliation":[{"name":"University of Chicago, United States"}]}],"member":"320","published-online":{"date-parts":[[2021,5,8]]},"reference":[{"key":"e_1_3_2_2_1_1","unstructured":"Thomas Brewster. 2019. We Broke Into A Bunch Of Android Phones With A 3D-Printed Head. https:\/\/www.forbes.com\/sites\/thomasbrewster\/2018\/12\/13\/we-broke-into-a-bunch-of-android-phones-with-a-3d-printed-head\/#4a9a79213307."},{"key":"e_1_3_2_2_2_1","doi-asserted-by":"publisher","DOI":"10.1145\/3411764.3445441"},{"key":"e_1_3_2_2_3_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.ergon.2005.04.003"},{"key":"e_1_3_2_2_4_1","unstructured":"Carl Doersch. 2016. Tutorial on Variational Autoencoders. arxiv:1606.05908\u00a0[stat.ML]"},{"key":"e_1_3_2_2_5_1","volume-title":"Broken Hearted: How To Attack ECG Biometrics. In 24th Annual Network and Distributed System Security Symposium, NDSS 2017","author":"Eberz Simon","year":"2017","unstructured":"Simon Eberz, Nicola Paoletti, Marc Roeschlin, Andrea Patan\u00e9, Marta Kwiatkowska, and Ivan Martinovic. 2017. Broken Hearted: How To Attack ECG Biometrics. In 24th Annual Network and Distributed System Security Symposium, NDSS 2017, San Diego, California, USA, February 26 - March 1, 2017. The Internet Society. https:\/\/www.ndss-symposium.org\/ndss2017\/ndss-2017-programme\/broken-hearted-how-attack-ecg-biometrics\/"},{"key":"e_1_3_2_2_6_1","doi-asserted-by":"publisher","DOI":"10.1145\/1280720.1280873"},{"key":"e_1_3_2_2_7_1","unstructured":"[7] Hasomed.2020. https:\/\/hasomed.de\/en\/."},{"key":"e_1_3_2_2_8_1","unstructured":"[8] Report: Data\u00a0Breach in\u00a0Biometric Security Platform Affecting Millions\u00a0of Users.2019. https:\/\/www.vpnmentor.com\/blog\/report-biostar2-leak\/."},{"key":"e_1_3_2_2_9_1","doi-asserted-by":"publisher","DOI":"10.21437\/Interspeech.2017-1111"},{"key":"e_1_3_2_2_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/3130933"},{"key":"e_1_3_2_2_11_1","doi-asserted-by":"publisher","DOI":"10.1145\/3184743"},{"key":"e_1_3_2_2_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/3319535.3354242"},{"key":"e_1_3_2_2_13_1","doi-asserted-by":"publisher","DOI":"10.1145\/2470654.2481355"},{"key":"e_1_3_2_2_14_1","doi-asserted-by":"publisher","DOI":"10.1145\/2807442.2807443"},{"key":"e_1_3_2_2_15_1","doi-asserted-by":"publisher","DOI":"10.1145\/2702123.2702461"},{"key":"e_1_3_2_2_16_1","doi-asserted-by":"publisher","DOI":"10.1145\/2702123.2702128"},{"key":"e_1_3_2_2_17_1","doi-asserted-by":"publisher","DOI":"10.1145\/3025453.3025600"},{"key":"e_1_3_2_2_18_1","doi-asserted-by":"publisher","DOI":"10.1145\/3173574.3174020"},{"key":"e_1_3_2_2_19_1","doi-asserted-by":"publisher","DOI":"10.1145\/2984511.2984530"},{"key":"e_1_3_2_2_20_1","doi-asserted-by":"crossref","unstructured":"Patrick\u00a0Howell O\u2019Neill. 2019. Data leak exposes unchangeable biometric data of over 1 million people. https:\/\/www.technologyreview.com\/f\/614163\/data-leak-exposes-unchangeable-biometric-data-of-over-1-million-people\/.","DOI":"10.1016\/S0969-4765(19)30104-3"},{"key":"e_1_3_2_2_21_1","doi-asserted-by":"publisher","DOI":"10.3390\/s16010115"},{"key":"e_1_3_2_2_22_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.sigpro.2013.12.026"},{"key":"e_1_3_2_2_23_1","doi-asserted-by":"publisher","DOI":"10.1109\/TBME.1979.326520"},{"key":"e_1_3_2_2_24_1","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2018.2860592"},{"key":"e_1_3_2_2_25_1","doi-asserted-by":"publisher","DOI":"10.1145\/1978942.1979018"},{"key":"e_1_3_2_2_26_1","unstructured":"Davey Winder. 2019. Apple\u2019s iPhone FaceID Hacked In Less Than 120 Seconds. https:\/\/www.forbes.com\/sites\/daveywinder\/2019\/08\/10\/apples-iphone-faceid-hacked-in-less-than-120-seconds\/#449ff4b621bc."},{"key":"e_1_3_2_2_27_1","unstructured":"Davey Winder. 2019. Hackers Claim Any Smartphone Fingerprint Lock Can Be Broken In 20 Minutes. https:\/\/www.forbes.com\/sites\/daveywinder\/2019\/11\/02\/smartphone-security-alert-as-hackers-claim-any-fingerprint-lock-broken-in-20-minutes\/#588a90116853."},{"key":"e_1_3_2_2_28_1","volume-title":"25th USENIX Security Symposium, USENIX Security 16","author":"Xu Yi","year":"2016","unstructured":"Yi Xu, True Price, Jan-Michael Frahm, and Fabian Monrose. 2016. Virtual U: Defeating Face Liveness Detection by Building Virtual Models from Your Public Photos. In 25th USENIX Security Symposium, USENIX Security 16, Austin, TX, USA, August 10-12, 2016, Thorsten Holz and Stefan Savage (Eds.). USENIX Association, 497\u2013512."}],"event":{"name":"CHI '21: CHI Conference on Human Factors in Computing Systems","sponsor":["SIGCHI ACM Special Interest Group on Computer-Human Interaction"],"location":"Yokohama Japan","acronym":"CHI '21"},"container-title":["Extended Abstracts of the 2021 CHI Conference on Human Factors in Computing Systems"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3411763.3451563","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3411763.3451563","content-type":"application\/pdf","content-version":"vor","intended-application":"syndication"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3411763.3451563","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T21:28:25Z","timestamp":1750195705000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3411763.3451563"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,5,8]]},"references-count":28,"alternative-id":["10.1145\/3411763.3451563","10.1145\/3411763"],"URL":"https:\/\/doi.org\/10.1145\/3411763.3451563","relation":{},"subject":[],"published":{"date-parts":[[2021,5,8]]},"assertion":[{"value":"2021-05-08","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}