{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,1]],"date-time":"2026-02-01T04:17:50Z","timestamp":1769919470908,"version":"3.49.0"},"publisher-location":"New York, NY, USA","reference-count":90,"publisher":"ACM","license":[{"start":{"date-parts":[[2021,5,6]],"date-time":"2021-05-06T00:00:00Z","timestamp":1620259200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/100000001","name":"National Science Foundation","doi-asserted-by":"publisher","award":["CNS-194965"],"award-info":[{"award-number":["CNS-194965"]}],"id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2021,5,6]]},"DOI":"10.1145\/3411764.3445441","type":"proceedings-article","created":{"date-parts":[[2021,5,8]],"date-time":"2021-05-08T05:28:50Z","timestamp":1620451730000},"page":"1-15","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":26,"title":["User Authentication via Electrical Muscle Stimulation"],"prefix":"10.1145","author":[{"given":"Yuxin","family":"Chen","sequence":"first","affiliation":[{"name":"University of Chicago, United States"}]},{"given":"Zhuolin","family":"Yang","sequence":"additional","affiliation":[{"name":"University of Chicago, United States"}]},{"given":"Ruben","family":"Abbou","sequence":"additional","affiliation":[{"name":"University of Chicago, United States"}]},{"given":"Pedro","family":"Lopes","sequence":"additional","affiliation":[{"name":"University of Chicago, United States"}]},{"given":"Ben Y.","family":"Zhao","sequence":"additional","affiliation":[{"name":"University of Chicago, United States"}]},{"given":"Haitao","family":"Zheng","sequence":"additional","affiliation":[{"name":"University of Chicago, United States"}]}],"member":"320","published-online":{"date-parts":[[2021,5,7]]},"reference":[{"key":"e_1_3_2_2_1_1","volume-title":"International Journal of Medical and Applied Sciences 3 (feb","author":"Ahanger Ali","year":"2014","unstructured":"Ali Ahanger and Anil Kumar . 2014. Effect of Anthropometric Factors on Motor Nerve Conduction Velovity in Healthy Kashmiri Population . International Journal of Medical and Applied Sciences 3 (feb 2014 ), 125\u2013132. Ali Ahanger and Anil Kumar. 2014. Effect of Anthropometric Factors on Motor Nerve Conduction Velovity in Healthy Kashmiri Population. International Journal of Medical and Applied Sciences 3 (feb 2014), 125\u2013132."},{"key":"e_1_3_2_2_2_1","doi-asserted-by":"publisher","DOI":"10.1145\/3214260"},{"key":"e_1_3_2_2_3_1","volume-title":"Multiple Fake Classes GAN for Data Augmentation in Face Image Dataset. In 2019 International Joint Conference on Neural Networks (IJCNN). 1\u20138.","author":"Ali-Gombe A.","unstructured":"A. Ali-Gombe , E. Elyan , and C. Jayne . 2019 . Multiple Fake Classes GAN for Data Augmentation in Face Image Dataset. In 2019 International Joint Conference on Neural Networks (IJCNN). 1\u20138. A. Ali-Gombe, E. Elyan, and C. Jayne. 2019. Multiple Fake Classes GAN for Data Augmentation in Face Image Dataset. In 2019 International Joint Conference on Neural Networks (IJCNN). 1\u20138."},{"key":"e_1_3_2_2_4_1","unstructured":"Aware. 2020. Voice Authentication. https:\/\/www.aware.com\/voice-authentication\/.  Aware. 2020. Voice Authentication. https:\/\/www.aware.com\/voice-authentication\/."},{"key":"e_1_3_2_2_5_1","volume-title":"Electrode placement on the forearm for selective stimulation of finger extension\/flexion. PloS one 13, 1","author":"Bao Xueliang","year":"2018","unstructured":"Xueliang Bao , Yuxuan Zhou , Yunlong Wang , Jianjun Zhang , Xiaoying L\u00fc , and Zhigong Wang . 2018. Electrode placement on the forearm for selective stimulation of finger extension\/flexion. PloS one 13, 1 ( 2018 ). Xueliang Bao, Yuxuan Zhou, Yunlong Wang, Jianjun Zhang, Xiaoying L\u00fc, and Zhigong Wang. 2018. Electrode placement on the forearm for selective stimulation of finger extension\/flexion. PloS one 13, 1 (2018)."},{"key":"e_1_3_2_2_6_1","unstructured":"Thomas Brewster. 2019. We Broke Into A Bunch Of Android Phones With A 3D-Printed Head. https:\/\/www.forbes.com\/sites\/thomasbrewster\/2018\/12\/13\/we-broke-into-a-bunch-of-android-phones-with-a-3d-printed-head\/#4a9a79213307.  Thomas Brewster. 2019. We Broke Into A Bunch Of Android Phones With A 3D-Printed Head. https:\/\/www.forbes.com\/sites\/thomasbrewster\/2018\/12\/13\/we-broke-into-a-bunch-of-android-phones-with-a-3d-printed-head\/#4a9a79213307."},{"key":"e_1_3_2_2_7_1","unstructured":"Saikiran Bulusu Bhavya Kailkhura Bo Li Pramod\u00a0K. Varshney and Dawn Song. 2020. Anomalous Instance Detection in Deep Learning: A Survey. arxiv:2003.06979\u00a0[cs.LG]  Saikiran Bulusu Bhavya Kailkhura Bo Li Pramod\u00a0K. Varshney and Dawn Song. 2020. Anomalous Instance Detection in Deep Learning: A Survey. arxiv:2003.06979\u00a0[cs.LG]"},{"key":"e_1_3_2_2_8_1","doi-asserted-by":"publisher","DOI":"10.1109\/5.628714"},{"key":"e_1_3_2_2_9_1","volume-title":"OpenPose: Realtime Multi-Person 2D Pose Estimation using Part Affinity Fields","author":"Cao Z.","year":"2019","unstructured":"Z. Cao , G. Hidalgo Martinez , T. Simon , S. Wei , and Y.\u00a0 A. Sheikh . 2019. OpenPose: Realtime Multi-Person 2D Pose Estimation using Part Affinity Fields . IEEE Transactions on Pattern Analysis and Machine Intelligence ( 2019 ). Z. Cao, G. Hidalgo Martinez, T. Simon, S. Wei, and Y.\u00a0A. Sheikh. 2019. OpenPose: Realtime Multi-Person 2D Pose Estimation using Part Affinity Fields. IEEE Transactions on Pattern Analysis and Machine Intelligence (2019)."},{"key":"e_1_3_2_2_10_1","unstructured":"R. Chandler C. Clauser J. McConville Herbert Reynolds and J. Young. 1975. Investigation of Inertial Properties of the Human Body. (03 1975) 171.  R. Chandler C. Clauser J. McConville Herbert Reynolds and J. Young. 1975. Investigation of Inertial Properties of the Human Body. (03 1975) 171."},{"key":"e_1_3_2_2_11_1","volume-title":"Journal of Occupational and Environmental Medicine","author":"Clauser E","year":"1971","unstructured":"Charles\u00a0 E Clauser , John\u00a0 T McConville , and J\u00a0W Young . 1971. Weight, Volumn, and Center of Mass of Segments of The Human Body. Journal of Occupational and Environmental Medicine ( 1971 ). Charles\u00a0E Clauser, John\u00a0T McConville, and J\u00a0W Young. 1971. Weight, Volumn, and Center of Mass of Segments of The Human Body. Journal of Occupational and Environmental Medicine (1971)."},{"key":"e_1_3_2_2_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/2594368.2594369"},{"key":"e_1_3_2_2_13_1","doi-asserted-by":"publisher","DOI":"10.1016\/S0021-9290(99)00039-1"},{"key":"e_1_3_2_2_14_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.ergon.2005.04.003"},{"key":"e_1_3_2_2_15_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSMCC.2008.923862"},{"key":"e_1_3_2_2_16_1","unstructured":"Carl Doersch. 2016. Tutorial on Variational Autoencoders. arxiv:1606.05908\u00a0[stat.ML]  Carl Doersch. 2016. Tutorial on Variational Autoencoders. arxiv:1606.05908\u00a0[stat.ML]"},{"key":"e_1_3_2_2_17_1","volume-title":"Body Segment Parameters","author":"Drillis R","year":"1964","unstructured":"R Drillis , R Contini , and M Bluestein . 1964. Body Segment Parameters ; A Survey of Measurement Techniques. Artificial limbs 8( 1964 ), 44\u201366. http:\/\/europepmc.org\/abstract\/MED\/14208177 R Drillis, R Contini, and M Bluestein. 1964. Body Segment Parameters; A Survey of Measurement Techniques. Artificial limbs 8(1964), 44\u201366. http:\/\/europepmc.org\/abstract\/MED\/14208177"},{"key":"e_1_3_2_2_18_1","volume-title":"Broken Hearted: How To Attack ECG Biometrics. In 24th Annual Network and Distributed System Security Symposium, NDSS 2017","author":"Eberz Simon","year":"2017","unstructured":"Simon Eberz , Nicola Paoletti , Marc Roeschlin , Andrea Patan\u00e9 , Marta Kwiatkowska , and Ivan Martinovic . 2017 . Broken Hearted: How To Attack ECG Biometrics. In 24th Annual Network and Distributed System Security Symposium, NDSS 2017 , San Diego, California, USA, February 26 - March 1, 2017. The Internet Society. https:\/\/www.ndss-symposium.org\/ndss2017\/ndss-2017-programme\/broken-hearted-how-attack-ecg-biometrics\/ Simon Eberz, Nicola Paoletti, Marc Roeschlin, Andrea Patan\u00e9, Marta Kwiatkowska, and Ivan Martinovic. 2017. Broken Hearted: How To Attack ECG Biometrics. In 24th Annual Network and Distributed System Security Symposium, NDSS 2017, San Diego, California, USA, February 26 - March 1, 2017. The Internet Society. https:\/\/www.ndss-symposium.org\/ndss2017\/ndss-2017-programme\/broken-hearted-how-attack-ecg-biometrics\/"},{"key":"e_1_3_2_2_19_1","unstructured":"[\n  19\n  ]  Basic\u00a0VAE Example.2019. https:\/\/github.com\/pytorch\/examples\/tree\/master\/vae.  [19] Basic\u00a0VAE Example.2019. https:\/\/github.com\/pytorch\/examples\/tree\/master\/vae."},{"key":"e_1_3_2_2_20_1","doi-asserted-by":"publisher","DOI":"10.1145\/1280720.1280873"},{"key":"e_1_3_2_2_21_1","volume-title":"Viscoelastic properties of the human wrist during the stabilization phase of a targeted movement. Master\u2019s thesis","author":"Grey J.","unstructured":"Michael\u00a0 J. Grey . 1997. Viscoelastic properties of the human wrist during the stabilization phase of a targeted movement. Master\u2019s thesis . Simon Fraser University, Burnaby , Canada . Michael\u00a0J. Grey. 1997. Viscoelastic properties of the human wrist during the stabilization phase of a targeted movement. Master\u2019s thesis. Simon Fraser University, Burnaby, Canada."},{"key":"e_1_3_2_2_22_1","doi-asserted-by":"publisher","DOI":"10.1145\/2817721.2817722"},{"key":"e_1_3_2_2_23_1","doi-asserted-by":"publisher","DOI":"10.1007\/s004240050215"},{"key":"e_1_3_2_2_24_1","unstructured":"[\n  24\n  ]  Hasomed.2020. https:\/\/hasomed.de\/en\/.  [24] Hasomed.2020. https:\/\/hasomed.de\/en\/."},{"key":"e_1_3_2_2_25_1","volume-title":"A novel approach to create synthetic biomedical signals using BiRNN","author":"Hernandez-Matamorosb Andres","year":"2020","unstructured":"Andres Hernandez-Matamorosb , Hamido Fujita , and Hector Perez-Meanac . 2020. A novel approach to create synthetic biomedical signals using BiRNN . Elsevier Information Sciences 541 ( Dec 2020 ), 218\u2013241. Andres Hernandez-Matamorosb, Hamido Fujita, and Hector Perez-Meanac. 2020. A novel approach to create synthetic biomedical signals using BiRNN. Elsevier Information Sciences 541 (Dec 2020), 218\u2013241."},{"key":"e_1_3_2_2_26_1","doi-asserted-by":"publisher","DOI":"10.1016\/S0021-9290(98)00062-1"},{"key":"e_1_3_2_2_27_1","doi-asserted-by":"publisher","DOI":"10.1145\/2501988.2502021"},{"key":"e_1_3_2_2_28_1","doi-asserted-by":"publisher","DOI":"10.1145\/2807442.2807458"},{"key":"e_1_3_2_2_29_1","doi-asserted-by":"publisher","DOI":"10.1145\/2459236.2459241"},{"key":"e_1_3_2_2_30_1","unstructured":"[\n  30\n  ] Report: Data\u00a0Breach in\u00a0Biometric Security Platform Affecting Millions\u00a0of Users.2019. https:\/\/www.vpnmentor.com\/blog\/report-biostar2-leak\/.  [30] Report: Data\u00a0Breach in\u00a0Biometric Security Platform Affecting Millions\u00a0of Users.2019. https:\/\/www.vpnmentor.com\/blog\/report-biostar2-leak\/."},{"key":"e_1_3_2_2_31_1","doi-asserted-by":"publisher","DOI":"10.1504\/IJCB.2012.046514"},{"key":"e_1_3_2_2_32_1","doi-asserted-by":"publisher","DOI":"10.1145\/1966913.1966983"},{"key":"e_1_3_2_2_33_1","volume-title":"New Multi-Channel Transcutaneous Electrical Stimulation Technology for Rehabilitation. In 2006 International Conference of the IEEE Engineering in Medicine and Biology Society. 194\u2013197","author":"Keller T.","unstructured":"T. Keller , M. Lawrence , A. Kuhn , and M. Morari . 2006 . New Multi-Channel Transcutaneous Electrical Stimulation Technology for Rehabilitation. In 2006 International Conference of the IEEE Engineering in Medicine and Biology Society. 194\u2013197 . T. Keller, M. Lawrence, A. Kuhn, and M. Morari. 2006. New Multi-Channel Transcutaneous Electrical Stimulation Technology for Rehabilitation. In 2006 International Conference of the IEEE Engineering in Medicine and Biology Society. 194\u2013197."},{"key":"e_1_3_2_2_34_1","doi-asserted-by":"publisher","DOI":"10.1145\/2380116.2380139"},{"key":"e_1_3_2_2_35_1","doi-asserted-by":"publisher","DOI":"10.21437\/Interspeech.2017-1111"},{"key":"e_1_3_2_2_36_1","doi-asserted-by":"publisher","DOI":"10.1145\/3130933"},{"key":"e_1_3_2_2_37_1","doi-asserted-by":"publisher","DOI":"10.1145\/3184743"},{"key":"e_1_3_2_2_38_1","doi-asserted-by":"publisher","DOI":"10.1109\/FG.2019.8756576"},{"key":"e_1_3_2_2_39_1","doi-asserted-by":"publisher","DOI":"10.1145\/1180495.1180558"},{"key":"e_1_3_2_2_40_1","doi-asserted-by":"publisher","DOI":"10.1145\/3319535.3354242"},{"key":"e_1_3_2_2_41_1","doi-asserted-by":"publisher","DOI":"10.1016\/S0167-8760(96)00713-1"},{"key":"e_1_3_2_2_42_1","doi-asserted-by":"publisher","DOI":"10.1145\/3210240.3210344"},{"key":"e_1_3_2_2_43_1","doi-asserted-by":"publisher","DOI":"10.1145\/2470654.2481355"},{"key":"e_1_3_2_2_44_1","doi-asserted-by":"publisher","DOI":"10.1145\/2807442.2807443"},{"key":"e_1_3_2_2_45_1","doi-asserted-by":"publisher","DOI":"10.1145\/2702123.2702461"},{"key":"e_1_3_2_2_46_1","doi-asserted-by":"publisher","DOI":"10.1145\/2702123.2702128"},{"key":"e_1_3_2_2_47_1","doi-asserted-by":"publisher","DOI":"10.1145\/3025453.3025600"},{"key":"e_1_3_2_2_48_1","doi-asserted-by":"publisher","DOI":"10.1145\/3173574.3174020"},{"key":"e_1_3_2_2_49_1","doi-asserted-by":"publisher","DOI":"10.1145\/2984511.2984530"},{"key":"e_1_3_2_2_50_1","volume-title":"2018 40th Annual International Conference of the IEEE Engineering in Medicine and Biology Society (EMBC). 2535\u20132538","author":"Luo Y.","unstructured":"Y. Luo and B. Lu . 2018. EEG Data Augmentation for Emotion Recognition Using a Conditional Wasserstein GAN . In 2018 40th Annual International Conference of the IEEE Engineering in Medicine and Biology Society (EMBC). 2535\u20132538 . Y. Luo and B. Lu. 2018. EEG Data Augmentation for Emotion Recognition Using a Conditional Wasserstein GAN. In 2018 40th Annual International Conference of the IEEE Engineering in Medicine and Biology Society (EMBC). 2535\u20132538."},{"key":"e_1_3_2_2_51_1","volume-title":"Handbook of fingerprint recognition","author":"Maltoni Davide","unstructured":"Davide Maltoni , Dario Maio , Anil\u00a0 K Jain , and Salil Prabhakar . 2009. Handbook of fingerprint recognition . Springer Science & Business Media . Davide Maltoni, Dario Maio, Anil\u00a0K Jain, and Salil Prabhakar. 2009. Handbook of fingerprint recognition. Springer Science & Business Media."},{"key":"e_1_3_2_2_52_1","doi-asserted-by":"publisher","DOI":"10.1145\/3173574.3174062"},{"key":"e_1_3_2_2_53_1","volume-title":"Distribution of body weight and height: comparison of estimates based on self-reported and observed measures.Journal of Epidemiology & Community Health 40, 4","author":"Millar J","year":"1986","unstructured":"Wayne\u00a0 J Millar . 1986. Distribution of body weight and height: comparison of estimates based on self-reported and observed measures.Journal of Epidemiology & Community Health 40, 4 ( 1986 ), 319\u2013323. Wayne\u00a0J Millar. 1986. Distribution of body weight and height: comparison of estimates based on self-reported and observed measures.Journal of Epidemiology & Community Health 40, 4 (1986), 319\u2013323."},{"key":"e_1_3_2_2_54_1","doi-asserted-by":"publisher","DOI":"10.1145\/3180445.3180450"},{"key":"e_1_3_2_2_55_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jbiomech.2007.06.016"},{"key":"e_1_3_2_2_56_1","unstructured":"Oculus. 2019. Introducing Hand Tracking on Oculus Quest-Bringing Your Real Hands into VR. https:\/\/www.oculus.com\/blog\/introducing-hand-tracking-on-oculus-quest-bringing-your-real-hands-into-vr\/.  Oculus. 2019. Introducing Hand Tracking on Oculus Quest-Bringing Your Real Hands into VR. https:\/\/www.oculus.com\/blog\/introducing-hand-tracking-on-oculus-quest-bringing-your-real-hands-into-vr\/."},{"key":"e_1_3_2_2_57_1","doi-asserted-by":"crossref","unstructured":"Patrick\u00a0Howell O\u2019Neill. 2019. Data leak exposes unchangeable biometric data of over 1 million people. https:\/\/www.technologyreview.com\/f\/614163\/data-leak-exposes-unchangeable-biometric-data-of-over-1-million-people\/.  Patrick\u00a0Howell O\u2019Neill. 2019. Data leak exposes unchangeable biometric data of over 1 million people. https:\/\/www.technologyreview.com\/f\/614163\/data-leak-exposes-unchangeable-biometric-data-of-over-1-million-people\/.","DOI":"10.1016\/S0969-4765(19)30104-3"},{"key":"e_1_3_2_2_58_1","doi-asserted-by":"publisher","DOI":"10.3390\/s16010115"},{"key":"e_1_3_2_2_59_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jvlc.2009.01.006"},{"key":"e_1_3_2_2_60_1","doi-asserted-by":"publisher","DOI":"10.1145\/1029632.1029658"},{"key":"e_1_3_2_2_61_1","doi-asserted-by":"publisher","DOI":"10.1146\/annurev.bioeng.6.040803.140103"},{"key":"e_1_3_2_2_62_1","doi-asserted-by":"publisher","DOI":"10.1145\/3290605.3300340"},{"key":"e_1_3_2_2_63_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.sigpro.2013.12.026"},{"key":"e_1_3_2_2_64_1","doi-asserted-by":"publisher","DOI":"10.1109\/TNSRE.2007.909816"},{"key":"e_1_3_2_2_65_1","doi-asserted-by":"publisher","DOI":"10.1111\/j.1525-1594.2005.29075.x"},{"key":"e_1_3_2_2_66_1","doi-asserted-by":"publisher","DOI":"10.1145\/3027063.3053070"},{"key":"e_1_3_2_2_67_1","volume-title":"Authentication Using Pulse-Response Biometrics. In 21st Annual Network and Distributed System Security Symposium, NDSS 2014","author":"Rasmussen Kasper\u00a0Bonne","year":"2014","unstructured":"Kasper\u00a0Bonne Rasmussen , Marc Roeschlin , Ivan Martinovic , and Gene Tsudik . 2014 . Authentication Using Pulse-Response Biometrics. In 21st Annual Network and Distributed System Security Symposium, NDSS 2014 , San Diego, California, USA , February 23-26, 2014. The Internet Society. https:\/\/www.ndss-symposium.org\/ndss2014\/authentication-using-pulse-response-biometrics Kasper\u00a0Bonne Rasmussen, Marc Roeschlin, Ivan Martinovic, and Gene Tsudik. 2014. Authentication Using Pulse-Response Biometrics. In 21st Annual Network and Distributed System Security Symposium, NDSS 2014, San Diego, California, USA, February 23-26, 2014. The Internet Society. https:\/\/www.ndss-symposium.org\/ndss2014\/authentication-using-pulse-response-biometrics"},{"key":"e_1_3_2_2_68_1","doi-asserted-by":"publisher","DOI":"10.1097\/00001577-199700930-00002"},{"key":"e_1_3_2_2_69_1","unstructured":"Tim Salimans Andrej Karpathy Xi Chen and Diederik\u00a0P. Kingma. 2017. PixelCNN++: A PixelCNN Implementation with Discretized Logistic Mixture Likelihood and Other Modifications. In ICLR.  Tim Salimans Andrej Karpathy Xi Chen and Diederik\u00a0P. Kingma. 2017. PixelCNN++: A PixelCNN Implementation with Discretized Logistic Mixture Likelihood and Other Modifications. In ICLR."},{"key":"e_1_3_2_2_70_1","doi-asserted-by":"publisher","DOI":"10.1145\/3025453.3025536"},{"key":"e_1_3_2_2_71_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2017.494"},{"key":"e_1_3_2_2_72_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2016.450"},{"key":"e_1_3_2_2_73_1","doi-asserted-by":"publisher","DOI":"10.1145\/2976749.2978311"},{"key":"e_1_3_2_2_74_1","volume-title":"Spiceworks Study Reveals Nearly 90 Percent of Businesses Will Use Biometric Authentication Technology by","year":"2020","unstructured":"Spiceworks. 2018. Spiceworks Study Reveals Nearly 90 Percent of Businesses Will Use Biometric Authentication Technology by 2020 . https:\/\/www.spiceworks.com\/press\/releases\/spiceworks-study-reveals-nearly-90-percent-businesses-will-use-biometric-authentication-technology-2020\/. Spiceworks. 2018. Spiceworks Study Reveals Nearly 90 Percent of Businesses Will Use Biometric Authentication Technology by 2020. https:\/\/www.spiceworks.com\/press\/releases\/spiceworks-study-reveals-nearly-90-percent-businesses-will-use-biometric-authentication-technology-2020\/."},{"key":"e_1_3_2_2_75_1","doi-asserted-by":"publisher","DOI":"10.1002\/mus.880151007"},{"key":"e_1_3_2_2_76_1","doi-asserted-by":"publisher","DOI":"10.1109\/TBME.1979.326520"},{"key":"e_1_3_2_2_77_1","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2018.2860592"},{"key":"e_1_3_2_2_78_1","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2018.2860592"},{"key":"e_1_3_2_2_79_1","doi-asserted-by":"publisher","DOI":"10.1145\/1978942.1979018"},{"key":"e_1_3_2_2_80_1","doi-asserted-by":"publisher","DOI":"10.1155\/2013"},{"key":"e_1_3_2_2_81_1","unstructured":"The Muscle Physiology\u00a0Laboratory UCSD. 2008. Fundamental Functional Properties of Skeletal Muscle. http:\/\/muscle.ucsd.edu\/musintro\/props.shtml.  The Muscle Physiology\u00a0Laboratory UCSD. 2008. Fundamental Functional Properties of Skeletal Muscle. http:\/\/muscle.ucsd.edu\/musintro\/props.shtml."},{"key":"e_1_3_2_2_82_1","volume-title":"Biomedicine: An International Journal Devoted to the Development and Application of Magnetic Resonance In Vivo 17, 4","author":"Uffmann Kai","year":"2004","unstructured":"Kai Uffmann , Stefan Maderwald , Waleed Ajaj , Craig\u00a0 G Galban , Serban Mateiescu , Harald\u00a0 H Quick , and Mark\u00a0 E Ladd . 2004 . In vivo elasticity measurements of extremity skeletal muscle with MR elastography. NMR in Biomedicine: An International Journal Devoted to the Development and Application of Magnetic Resonance In Vivo 17, 4 (2004), 181\u2013190. Kai Uffmann, Stefan Maderwald, Waleed Ajaj, Craig\u00a0G Galban, Serban Mateiescu, Harald\u00a0H Quick, and Mark\u00a0E Ladd. 2004. In vivo elasticity measurements of extremity skeletal muscle with MR elastography. NMR in Biomedicine: An International Journal Devoted to the Development and Application of Magnetic Resonance In Vivo 17, 4 (2004), 181\u2013190."},{"key":"e_1_3_2_2_83_1","doi-asserted-by":"publisher","DOI":"10.1145\/3191771"},{"key":"e_1_3_2_2_84_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2019.01111"},{"key":"e_1_3_2_2_85_1","doi-asserted-by":"publisher","DOI":"10.1109\/5.628669"},{"key":"e_1_3_2_2_86_1","unstructured":"Davey Winder. 2019. Apple\u2019s iPhone FaceID Hacked In Less Than 120 Seconds. https:\/\/www.forbes.com\/sites\/daveywinder\/2019\/08\/10\/apples-iphone-faceid-hacked-in-less-than-120-seconds\/#449ff4b621bc.  Davey Winder. 2019. Apple\u2019s iPhone FaceID Hacked In Less Than 120 Seconds. https:\/\/www.forbes.com\/sites\/daveywinder\/2019\/08\/10\/apples-iphone-faceid-hacked-in-less-than-120-seconds\/#449ff4b621bc."},{"key":"e_1_3_2_2_87_1","unstructured":"Davey Winder. 2019. Hackers Claim Any Smartphone Fingerprint Lock Can Be Broken In 20 Minutes. https:\/\/www.forbes.com\/sites\/daveywinder\/2019\/11\/02\/smartphone-security-alert-as-hackers-claim-any-fingerprint-lock-broken-in-20-minutes\/#588a90116853.  Davey Winder. 2019. Hackers Claim Any Smartphone Fingerprint Lock Can Be Broken In 20 Minutes. https:\/\/www.forbes.com\/sites\/daveywinder\/2019\/11\/02\/smartphone-security-alert-as-hackers-claim-any-fingerprint-lock-broken-in-20-minutes\/#588a90116853."},{"key":"e_1_3_2_2_88_1","volume-title":"25th USENIX Security Symposium, USENIX Security 16","author":"Xu Yi","year":"2016","unstructured":"Yi Xu , True Price , Jan-Michael Frahm , and Fabian Monrose . 2016 . Virtual U: Defeating Face Liveness Detection by Building Virtual Models from Your Public Photos . In 25th USENIX Security Symposium, USENIX Security 16 , Austin, TX, USA , August 10-12, 2016, Thorsten Holz and Stefan Savage (Eds.). USENIX Association, 497\u2013512. Yi Xu, True Price, Jan-Michael Frahm, and Fabian Monrose. 2016. Virtual U: Defeating Face Liveness Detection by Building Virtual Models from Your Public Photos. In 25th USENIX Security Symposium, USENIX Security 16, Austin, TX, USA, August 10-12, 2016, Thorsten Holz and Stefan Savage (Eds.). USENIX Association, 497\u2013512."},{"key":"e_1_3_2_2_89_1","doi-asserted-by":"publisher","DOI":"10.5555\/3294771.3294778"},{"key":"e_1_3_2_2_90_1","doi-asserted-by":"publisher","DOI":"10.1145\/2984511.2984568"}],"event":{"name":"CHI '21: CHI Conference on Human Factors in Computing Systems","location":"Yokohama Japan","acronym":"CHI '21","sponsor":["SIGCHI ACM Special Interest Group on Computer-Human Interaction"]},"container-title":["Proceedings of the 2021 CHI Conference on Human Factors in Computing Systems"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3411764.3445441","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3411764.3445441","content-type":"application\/pdf","content-version":"vor","intended-application":"syndication"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3411764.3445441","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T21:28:48Z","timestamp":1750195728000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3411764.3445441"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,5,6]]},"references-count":90,"alternative-id":["10.1145\/3411764.3445441","10.1145\/3411764"],"URL":"https:\/\/doi.org\/10.1145\/3411764.3445441","relation":{},"subject":[],"published":{"date-parts":[[2021,5,6]]},"assertion":[{"value":"2021-05-07","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}