{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,25]],"date-time":"2026-04-25T15:14:50Z","timestamp":1777130090746,"version":"3.51.4"},"publisher-location":"New York, NY, USA","reference-count":54,"publisher":"ACM","license":[{"start":{"date-parts":[[2020,12,7]],"date-time":"2020-12-07T00:00:00Z","timestamp":1607299200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/501100004801","name":"National Science Foundation","doi-asserted-by":"publisher","award":["CCF2028876, CCF1909963, CCF2000480, CNS1714807, CNS1526524, CNS1547350, CNS1814590"],"award-info":[{"award-number":["CCF2028876, CCF1909963, CCF2000480, CNS1714807, CNS1526524, CNS1547350, CNS1814590"]}],"id":[{"id":"10.13039\/501100004801","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100000183","name":"Army Research Office","doi-asserted-by":"publisher","award":["W911NF1810221"],"award-info":[{"award-number":["W911NF1810221"]}],"id":[{"id":"10.13039\/100000183","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2020,12,7]]},"DOI":"10.1145\/3427228.3427259","type":"proceedings-article","created":{"date-parts":[[2020,12,9]],"date-time":"2020-12-09T22:20:18Z","timestamp":1607552418000},"page":"829-842","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":21,"title":["WearID: Low-Effort Wearable-Assisted Authentication of Voice Commands via Cross-Domain Comparison without Training"],"prefix":"10.1145","author":[{"given":"Cong","family":"Shi","sequence":"first","affiliation":[{"name":"Rutgers University, United States of America"}]},{"given":"Yan","family":"Wang","sequence":"additional","affiliation":[{"name":"Temple University, United States of America"}]},{"given":"Yingying","family":"Chen","sequence":"additional","affiliation":[{"name":"Rutgers University, United States of America"}]},{"given":"Nitesh","family":"Saxena","sequence":"additional","affiliation":[{"name":"The University of Alabama at Birmingham, United States of America"}]},{"given":"Chen","family":"Wang","sequence":"additional","affiliation":[{"name":"Louisiana State University, United States of America"}]}],"member":"320","published-online":{"date-parts":[[2020,12,8]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"2015. Wearable ID: Is it a fit for your campus?https:\/\/www.cr80news.com\/news-item\/wearable-id-is-it-a-fit-for-your-campus\/.  2015. Wearable ID: Is it a fit for your campus?https:\/\/www.cr80news.com\/news-item\/wearable-id-is-it-a-fit-for-your-campus\/."},{"key":"e_1_3_2_1_2_1","unstructured":"2016. Hidden Voice Commands Example. http:\/\/www.hiddenvoicecommands.com\/white-box.  2016. Hidden Voice Commands Example. http:\/\/www.hiddenvoicecommands.com\/white-box."},{"key":"e_1_3_2_1_3_1","unstructured":"Amazon. 2020. Alexa Uses Voice Profiles to Recognize Your Voice and Personalize Your Experience. https:\/\/www.amazon.com\/gp\/help\/customer\/display.html?nodeId=202199440.  Amazon. 2020. Alexa Uses Voice Profiles to Recognize Your Voice and Personalize Your Experience. https:\/\/www.amazon.com\/gp\/help\/customer\/display.html?nodeId=202199440."},{"key":"e_1_3_2_1_4_1","volume-title":"Speechless: Analyzing the Threat to Speech Privacy from Smartphone Motion Sensors.","author":"Anand S\u00a0Abhishek","year":"2011","unstructured":"S\u00a0Abhishek Anand and Nitesh Saxena . 2011 . Speechless: Analyzing the Threat to Speech Privacy from Smartphone Motion Sensors. (2011). S\u00a0Abhishek Anand and Nitesh Saxena. 2011. Speechless: Analyzing the Threat to Speech Privacy from Smartphone Motion Sensors. (2011)."},{"key":"e_1_3_2_1_5_1","volume-title":"Spearphone: A speech privacy exploit via accelerometer-sensed reverberations from smartphone loudspeakers. arXiv preprint arXiv:1907.05972(2019).","author":"Anand S\u00a0Abhishek","year":"2019","unstructured":"S\u00a0Abhishek Anand , Chen Wang , Jian Liu , Nitesh Saxena , and Yingying Chen . 2019 . Spearphone: A speech privacy exploit via accelerometer-sensed reverberations from smartphone loudspeakers. arXiv preprint arXiv:1907.05972(2019). S\u00a0Abhishek Anand, Chen Wang, Jian Liu, Nitesh Saxena, and Yingying Chen. 2019. Spearphone: A speech privacy exploit via accelerometer-sensed reverberations from smartphone loudspeakers. arXiv preprint arXiv:1907.05972(2019)."},{"key":"e_1_3_2_1_6_1","first-page":"668","article-title":"Joint acoustic and modulation frequency","volume":"2003","author":"Atlas Les","year":"2003","unstructured":"Les Atlas and Shihab\u00a0 A Shamma . 2003 . Joint acoustic and modulation frequency . EURASIP Journal on Applied Signal Processing 2003 (2003), 668 \u2013 675 . Les Atlas and Shihab\u00a0A Shamma. 2003. Joint acoustic and modulation frequency. EURASIP Journal on Applied Signal Processing 2003 (2003), 668\u2013675.","journal-title":"EURASIP Journal on Applied Signal Processing"},{"key":"e_1_3_2_1_7_1","unstructured":"Anna Attkisson. 2016. Siri vs. Alexa: Why Amazon Won Our 300-Question Showdown. https:\/\/www.tomsguide.com\/us\/siri-vs-alexa review-3681.html.  Anna Attkisson. 2016. Siri vs. Alexa: Why Amazon Won Our 300-Question Showdown. https:\/\/www.tomsguide.com\/us\/siri-vs-alexa review-3681.html."},{"key":"e_1_3_2_1_8_1","unstructured":"Android Authority. 2020. Google Home and Assistant commands \u2013 here\u2019s the ones you need to know. https:\/\/www.androidauthority.com\/google-assistant-commands-727911\/.  Android Authority. 2020. Google Home and Assistant commands \u2013 here\u2019s the ones you need to know. https:\/\/www.androidauthority.com\/google-assistant-commands-727911\/."},{"key":"e_1_3_2_1_9_1","unstructured":"JenniferE Bellemare. 2018. Consumers Need Answers to Amazon Echo Privacy Concerns. https:\/\/www.identityforce.com\/blog\/amazon-echo-privacy-concerns.  JenniferE Bellemare. 2018. Consumers Need Answers to Amazon Echo Privacy Concerns. https:\/\/www.identityforce.com\/blog\/amazon-echo-privacy-concerns."},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/3196494.3196545"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1109\/5.628714"},{"key":"e_1_3_2_1_12_1","volume-title":"Hidden Voice Commands. In USENIX Security Symposium. 513\u2013530","author":"Carlini Nicholas","year":"2016","unstructured":"Nicholas Carlini , Pratyush Mishra , Tavish Vaidya , Yuankai Zhang , Micah Sherr , Clay Shields , David Wagner , and Wenchao Zhou . 2016 . Hidden Voice Commands. In USENIX Security Symposium. 513\u2013530 . Nicholas Carlini, Pratyush Mishra, Tavish Vaidya, Yuankai Zhang, Micah Sherr, Clay Shields, David Wagner, and Wenchao Zhou. 2016. Hidden Voice Commands. In USENIX Security Symposium. 513\u2013530."},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1109\/SPW.2018.00009"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICDCS.2017.133"},{"key":"e_1_3_2_1_15_1","volume-title":"International Workshop on Information Security Applications. Springer, 197\u2013209","author":"Cho Geumhwan","year":"2018","unstructured":"Geumhwan Cho , Jusop Choi , Hyoungshick Kim , Sangwon Hyun , and Jungwoo Ryoo . 2018 . Threat modeling and analysis of voice assistant applications . In International Workshop on Information Security Applications. Springer, 197\u2013209 . Geumhwan Cho, Jusop Choi, Hyoungshick Kim, Sangwon Hyun, and Jungwoo Ryoo. 2018. Threat modeling and analysis of voice assistant applications. In International Workshop on Information Security Applications. Springer, 197\u2013209."},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.14722\/eurousec.2017.23013"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1109\/TASL.2012.2201472"},{"key":"e_1_3_2_1_18_1","unstructured":"Pyramid Electronics. 2018. Pyramid Car Audio 300 Watt Aluminum Bullet Horn in Enclosure with Swivel Housing. http:\/\/www.pyramidcaraudio.com\/sku\/TW28\/300-Watt-Aluminum-Bullet-Horn-in-Enclosure-wSwivel-Housing.  Pyramid Electronics. 2018. Pyramid Car Audio 300 Watt Aluminum Bullet Horn in Enclosure with Swivel Housing. http:\/\/www.pyramidcaraudio.com\/sku\/TW28\/300-Watt-Aluminum-Bullet-Horn-in-Enclosure-wSwivel-Housing."},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1145\/2335356.2335360"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1145\/3117811.3117823"},{"key":"e_1_3_2_1_21_1","unstructured":"Google. 2019. How you sign in with 2-Step Verification. https:\/\/support.google.com\/accounts\/answer\/1085463?hl=en.  Google. 2019. How you sign in with 2-Step Verification. https:\/\/support.google.com\/accounts\/answer\/1085463?hl=en."},{"key":"e_1_3_2_1_22_1","unstructured":"Google. 2020. Voice Match and media on Google Nest and Google Home speakers and displays. https:\/\/support.google.com\/googlenest\/answer\/7342711?hl=en.  Google. 2020. Voice Match and media on Google Nest and Google Home speakers and displays. https:\/\/support.google.com\/googlenest\/answer\/7342711?hl=en."},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-33167-1_22"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1145\/3055031.3055088"},{"key":"e_1_3_2_1_25_1","volume-title":"Text-dependent speaker recognition","author":"H\u00e9bert Matthieu","unstructured":"Matthieu H\u00e9bert . 2008. Text-dependent speaker recognition . In Springer handbook of speech processing. Springer , 743\u2013762. Matthieu H\u00e9bert. 2008. Text-dependent speaker recognition. In Springer handbook of speech processing. Springer, 743\u2013762."},{"key":"e_1_3_2_1_26_1","unstructured":"Apple IOS. 2019. Siri. https:\/\/www.apple.com\/ios\/siri\/.  Apple IOS. 2019. Siri. https:\/\/www.apple.com\/ios\/siri\/."},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1109\/TITB.2005.856864"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-74549-5_7"},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-30119-6_17"},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.21437\/Eurospeech.1999-283"},{"key":"e_1_3_2_1_31_1","unstructured":"Logitech. 2018. Logitech S120 speaker. https:\/\/www.logitech.com\/en-us\/product\/s120-stereo-speakers.  Logitech. 2018. Logitech S120 speaker. https:\/\/www.logitech.com\/en-us\/product\/s120-stereo-speakers."},{"key":"e_1_3_2_1_32_1","volume-title":"USENIX Security Symposium. 1053\u20131067","author":"Michalevsky Yan","year":"2014","unstructured":"Yan Michalevsky , Dan Boneh , and Gabi Nakibly . 2014 . Gyrophone: Recognizing Speech from Gyroscope Signals . In USENIX Security Symposium. 1053\u20131067 . Yan Michalevsky, Dan Boneh, and Gabi Nakibly. 2014. Gyrophone: Recognizing Speech from Gyroscope Signals. In USENIX Security Symposium. 1053\u20131067."},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1109\/LSP.2005.860538"},{"key":"e_1_3_2_1_34_1","unstructured":"Murray Newlands. 2017. THE TOP WEARABLE PAYMENT TECHNOLOGY. https:\/\/due.com\/blog\/wearable-payment-technology\/.  Murray Newlands. 2017. THE TOP WEARABLE PAYMENT TECHNOLOGY. https:\/\/due.com\/blog\/wearable-payment-technology\/."},{"key":"e_1_3_2_1_35_1","unstructured":"Yao Qin Nicholas Carlini Ian Goodfellow Garrison Cottrell and Colin Raffel. 2019. Imperceptible robust and targeted adversarial examples for automatic speech recognition. arXiv preprint arXiv:1903.10346(2019).  Yao Qin Nicholas Carlini Ian Goodfellow Garrison Cottrell and Colin Raffel. 2019. Imperceptible robust and targeted adversarial examples for automatic speech recognition. arXiv preprint arXiv:1903.10346(2019)."},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1109\/89.365379"},{"key":"e_1_3_2_1_37_1","unstructured":"Duo Security. 2019. Secure Authentication With the Duo Mobile App. https:\/\/duo.com\/product\/multi-factor-authentication-mfa\/duo-mobile-app.  Duo Security. 2019. Secure Authentication With the Duo Mobile App. https:\/\/duo.com\/product\/multi-factor-authentication-mfa\/duo-mobile-app."},{"key":"e_1_3_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.1109\/MAHSS.2005.1542879"},{"key":"e_1_3_2_1_39_1","doi-asserted-by":"crossref","unstructured":"David Snyder Daniel Garcia-Romero Daniel Povey and Sanjeev Khudanpur. 2017. Deep Neural Network Embeddings for Text-Independent Speaker Verification. In Interspeech. 999\u20131003.  David Snyder Daniel Garcia-Romero Daniel Povey and Sanjeev Khudanpur. 2017. Deep Neural Network Embeddings for Text-Independent Speaker Verification. In Interspeech. 999\u20131003.","DOI":"10.21437\/Interspeech.2017-620"},{"key":"e_1_3_2_1_40_1","volume-title":"Number of connected wearable devices worldwide from 2016 to","year":"2021","unstructured":"Statista. 2018. Number of connected wearable devices worldwide from 2016 to 2021 . https:\/\/www.statista.com\/statistics\/487291\/global-connected-wearable-devices\/. Statista. 2018. Number of connected wearable devices worldwide from 2016 to 2021. https:\/\/www.statista.com\/statistics\/487291\/global-connected-wearable-devices\/."},{"key":"e_1_3_2_1_41_1","unstructured":"Keysight Technologies. 2018. Keysight Technologies 33509B. https:\/\/www.alliedelec.com\/keysight-technologies-33509b.  Keysight Technologies. 2018. Keysight Technologies 33509B. https:\/\/www.alliedelec.com\/keysight-technologies-33509b."},{"key":"e_1_3_2_1_42_1","volume-title":"An overview of speaker identification: Accuracy and robustness issues","author":"Togneri Roberto","year":"2011","unstructured":"Roberto Togneri and Daniel Pullella . 2011. An overview of speaker identification: Accuracy and robustness issues . IEEE circuits and systems magazine 11, 2 ( 2011 ), 23\u201361. Roberto Togneri and Daniel Pullella. 2011. An overview of speaker identification: Accuracy and robustness issues. IEEE circuits and systems magazine 11, 2 (2011), 23\u201361."},{"key":"e_1_3_2_1_43_1","volume-title":"Informatics, Vol.\u00a05","author":"Twomey Niall","unstructured":"Niall Twomey , Tom Diethe , Xenofon Fafoutis , Atis Elsts , Ryan McConville , Peter Flach , and Ian Craddock . 2018. A comprehensive study of activity recognition using accelerometers . In Informatics, Vol.\u00a05 . Multidisciplinary Digital Publishing Institute , 27. Niall Twomey, Tom Diethe, Xenofon Fafoutis, Atis Elsts, Ryan McConville, Peter Flach, and Ian Craddock. 2018. A comprehensive study of activity recognition using accelerometers. In Informatics, Vol.\u00a05. Multidisciplinary Digital Publishing Institute, 27."},{"key":"e_1_3_2_1_44_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICASSP.2014.6854363"},{"key":"e_1_3_2_1_45_1","unstructured":"Kathryn Vasel. 2015. How your voice can protect you from credit card fraud. https:\/\/money.cnn.com\/2015\/11\/02\/pf\/voice-biometrics-customer-fraud\/index.html.  Kathryn Vasel. 2015. How your voice can protect you from credit card fraud. https:\/\/money.cnn.com\/2015\/11\/02\/pf\/voice-biometrics-customer-fraud\/index.html."},{"key":"e_1_3_2_1_46_1","doi-asserted-by":"publisher","DOI":"10.1145\/3359789.3359830"},{"key":"e_1_3_2_1_47_1","volume-title":"2016 13th Annual IEEE International Conference on. IEEE, 1\u20139.","author":"Wang Xiaohui","year":"2016","unstructured":"Xiaohui Wang , Yanjing Wu , and Wenyuan Xu . 2016 . WindCompass: Determine Wind Direction Using Smartphones. In Sensing, Communication, and Networking (SECON) , 2016 13th Annual IEEE International Conference on. IEEE, 1\u20139. Xiaohui Wang, Yanjing Wu, and Wenyuan Xu. 2016. WindCompass: Determine Wind Direction Using Smartphones. In Sensing, Communication, and Networking (SECON), 2016 13th Annual IEEE International Conference on. IEEE, 1\u20139."},{"key":"e_1_3_2_1_48_1","unstructured":"WeChat. 2017. Voiceprint. https:\/\/thenextweb.com\/apps\/2015\/03\/25\/wechat-on-ios-now-lets-you-log-in-using-just-your-voice\/.  WeChat. 2017. Voiceprint. https:\/\/thenextweb.com\/apps\/2015\/03\/25\/wechat-on-ios-now-lets-you-log-in-using-just-your-voice\/."},{"key":"e_1_3_2_1_49_1","volume-title":"Commandersong: A systematic approach for practical adversarial voice recognition. In 27th {USENIX} Security Symposium ({USENIX} Security 18). 49\u201364.","author":"Yuan Xuejing","year":"2018","unstructured":"Xuejing Yuan , Yuxuan Chen , Yue Zhao , Yunhui Long , Xiaokang Liu , Kai Chen , Shengzhi Zhang , Heqing Huang , XiaoFeng Wang , and Carl\u00a0 A Gunter . 2018 . Commandersong: A systematic approach for practical adversarial voice recognition. In 27th {USENIX} Security Symposium ({USENIX} Security 18). 49\u201364. Xuejing Yuan, Yuxuan Chen, Yue Zhao, Yunhui Long, Xiaokang Liu, Kai Chen, Shengzhi Zhang, Heqing Huang, XiaoFeng Wang, and Carl\u00a0A Gunter. 2018. Commandersong: A systematic approach for practical adversarial voice recognition. In 27th {USENIX} Security Symposium ({USENIX} Security 18). 49\u201364."},{"key":"e_1_3_2_1_50_1","doi-asserted-by":"crossref","unstructured":"Hossein Zeinali Luk\u00e1\u0161 Burget Jan \u010cernock\u1ef3 2019. A Multi Purpose and Large Scale Speech Corpus in Persian and English for Speaker and Speech Recognition: the DeepMine Database. arXiv preprint arXiv:1912.03627(2019).  Hossein Zeinali Luk\u00e1\u0161 Burget Jan \u010cernock\u1ef3 2019. A Multi Purpose and Large Scale Speech Corpus in Persian and English for Speaker and Speech Recognition: the DeepMine Database. arXiv preprint arXiv:1912.03627(2019).","DOI":"10.1109\/ASRU46091.2019.9003882"},{"key":"e_1_3_2_1_51_1","doi-asserted-by":"publisher","DOI":"10.1145\/3133956.3134052"},{"key":"e_1_3_2_1_52_1","doi-asserted-by":"publisher","DOI":"10.1145\/2742647.2742658"},{"key":"e_1_3_2_1_53_1","doi-asserted-by":"publisher","DOI":"10.1145\/3133956.3133962"},{"key":"e_1_3_2_1_54_1","doi-asserted-by":"publisher","DOI":"10.1145\/2976749.2978296"}],"event":{"name":"ACSAC '20: Annual Computer Security Applications Conference","location":"Austin USA","acronym":"ACSAC '20"},"container-title":["Annual Computer Security Applications Conference"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3427228.3427259","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3427228.3427259","content-type":"application\/pdf","content-version":"vor","intended-application":"syndication"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3427228.3427259","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T22:02:24Z","timestamp":1750197744000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3427228.3427259"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,12,7]]},"references-count":54,"alternative-id":["10.1145\/3427228.3427259","10.1145\/3427228"],"URL":"https:\/\/doi.org\/10.1145\/3427228.3427259","relation":{},"subject":[],"published":{"date-parts":[[2020,12,7]]},"assertion":[{"value":"2020-12-08","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}