{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,7]],"date-time":"2026-03-07T18:09:37Z","timestamp":1772906977902,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":67,"publisher":"ACM","license":[{"start":{"date-parts":[[2021,11,12]],"date-time":"2021-11-12T00:00:00Z","timestamp":1636675200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"National Research Foundation of Korea (NRF)","award":["NRF-2021R1A2C2014428"],"award-info":[{"award-number":["NRF-2021R1A2C2014428"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2021,11,12]]},"DOI":"10.1145\/3460120.3484553","type":"proceedings-article","created":{"date-parts":[[2021,11,13]],"date-time":"2021-11-13T12:05:34Z","timestamp":1636805134000},"page":"304-319","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":37,"title":["Usable User Authentication on a Smartwatch using Vibration"],"prefix":"10.1145","author":[{"given":"Sunwoo","family":"Lee","sequence":"first","affiliation":[{"name":"Korea University, Seoul, Republic of Korea"}]},{"given":"Wonsuk","family":"Choi","sequence":"additional","affiliation":[{"name":"Hansung University, Seoul, Republic of Korea"}]},{"given":"Dong Hoon","family":"Lee","sequence":"additional","affiliation":[{"name":"Korea University, Seoul, Republic of Korea"}]}],"member":"320","published-online":{"date-parts":[[2021,11,13]]},"reference":[{"key":"e_1_3_2_2_1_1","volume-title":"https:\/\/www.cbc.ca\/news\/technology\/apple-iphone-5s-fingerprint-sensor-hacked-1.1864995 [Online","author":"Apple","year":"2020","unstructured":"Apple iphone 5s fingerprint sensor hacked. https:\/\/www.cbc.ca\/news\/technology\/apple-iphone-5s-fingerprint-sensor-hacked-1.1864995 [Online; accessed 2020-07--30]."},{"key":"e_1_3_2_2_2_1","volume-title":"https:\/\/www.apple.com\/kr\/apple-watch-series-3\/ [Online","author":"Apple","year":"2020","unstructured":"Apple watch series 3. https:\/\/www.apple.com\/kr\/apple-watch-series-3\/ [Online; accessed 2020-07--30]."},{"key":"e_1_3_2_2_3_1","volume-title":"https:\/\/www.forbes.com\/sites\/daveywinder\/2019\/08\/10\/apples-iphone-faceid-hacked-in-less-than-120-seconds\/#3d55683b21bc [Online","author":"Apple's","year":"2020","unstructured":"Apple's iphone faceID hacked in less than 120 seconds. https:\/\/www.forbes.com\/sites\/daveywinder\/2019\/08\/10\/apples-iphone-faceid-hacked-in-less-than-120-seconds\/#3d55683b21bc [Online; accessed 2020-07--30]."},{"key":"e_1_3_2_2_4_1","volume-title":"Voice authentication is broken, researchers say. https:\/\/threatpost.com\/black-hat-2018-voice-authentication-is-broken-researchers-say\/134926\/ [Online","author":"Black","year":"2020","unstructured":"Black hat 2018: Voice authentication is broken, researchers say. https:\/\/threatpost.com\/black-hat-2018-voice-authentication-is-broken-researchers-say\/134926\/ [Online; accessed 2020-07--30]."},{"key":"e_1_3_2_2_5_1","volume-title":"https:\/\/en.wikipedia.org\/wiki\/Body_fat_percentage [Online","author":"Body","year":"2021","unstructured":"Body fat rate. https:\/\/en.wikipedia.org\/wiki\/Body_fat_percentage [Online; accessed 2021-03-09]."},{"key":"e_1_3_2_2_6_1","volume-title":"contact lens. https:\/\/techxplore.com\/news\/2017-05-ccc-members-iris-recognition-bypass.html [Online","author":"CCC","year":"2020","unstructured":"CCC members show iris recognition bypass using photo, contact lens. https:\/\/techxplore.com\/news\/2017-05-ccc-members-iris-recognition-bypass.html [Online; accessed 2020-07--30]."},{"key":"e_1_3_2_2_7_1","volume-title":"https:\/\/www.wired.com\/story\/cheap-3d-printer-trick-smartphone-fingerprint-locks\/ [Online","author":"A","year":"2020","unstructured":"A cheap 3D printer can trick smartphone fingerprint locks. https:\/\/www.wired.com\/story\/cheap-3d-printer-trick-smartphone-fingerprint-locks\/ [Online; accessed 2020-07--30]."},{"key":"e_1_3_2_2_8_1","volume-title":"https:\/\/developer.apple.com\/documentation\/coremotion [Online","author":"Core","year":"2020","unstructured":"Core motion. https:\/\/developer.apple.com\/documentation\/coremotion [Online; accessed 2020-07--30]."},{"key":"e_1_3_2_2_9_1","volume-title":"How they work and the best on the market. https:\/\/www.wareable.com\/health-and-wellbeing\/ecg-heart-rate-monitor-watch-guide-6508 [Online","author":"ECG","year":"2020","unstructured":"ECG wearables: How they work and the best on the market. https:\/\/www.wareable.com\/health-and-wellbeing\/ecg-heart-rate-monitor-watch-guide-6508 [Online; accessed 2020-07--30]."},{"key":"e_1_3_2_2_10_1","volume-title":"http:\/\/extrasensory.ucsd.edu\/#tutorial [Online","author":"The","year":"2021","unstructured":"The extrasensory dataset. http:\/\/extrasensory.ucsd.edu\/#tutorial [Online; accessed 2021-03-09]."},{"key":"e_1_3_2_2_11_1","volume-title":"https:\/\/www.youtube.com\/watch?v=sw-OCo48F9s [Online","author":"DELYS","year":"2020","unstructured":"FiDELYS - the world's first iris recognition enabled smartwatch. https:\/\/www.youtube.com\/watch?v=sw-OCo48F9s [Online; accessed 2020-07--30]."},{"key":"e_1_3_2_2_12_1","volume-title":"https:\/\/www.fitbit.com\/global\/us\/home [Online","year":"2021","unstructured":"Fitbit. https:\/\/www.fitbit.com\/global\/us\/home [Online; accessed 2021-03--19]."},{"key":"e_1_3_2_2_13_1","volume-title":"https:\/\/dev.fitbit.com\/build\/guides\/sensors\/accelerometer\/ [Online","author":"Fitbit","year":"2021","unstructured":"Fitbit accelerometer sensor guide. https:\/\/dev.fitbit.com\/build\/guides\/sensors\/accelerometer\/ [Online; accessed 2021-03--19]."},{"key":"e_1_3_2_2_14_1","volume-title":"https:\/\/dev.fitbit.com\/build\/reference\/device-api\/haptics\/ [Online","author":"Fitbit","year":"2021","unstructured":"Fitbit haptics api. https:\/\/dev.fitbit.com\/build\/reference\/device-api\/haptics\/ [Online; accessed 2021-03--19]."},{"key":"e_1_3_2_2_15_1","volume-title":"note = https:\/\/www.wired.co.uk\/article\/hackers-trick-apple-iphone-x-face-id-3d-mask-security [online","author":"Phone X's Hackers","year":"2020","unstructured":"Hackers just broke the iPhone X's Face ID using a 3D-printed mask, note = https:\/\/www.wired.co.uk\/article\/hackers-trick-apple-iphone-x-face-id-3d-mask-security [online; accessed 2020-07--30]."},{"key":"e_1_3_2_2_16_1","volume-title":"https:\/\/www.vice.com\/en_us\/article\/59v8dk\/hackers-fake-hand-vein-authentication-biometrics-chaos-communication-congress [Online","author":"Hackers","year":"2020","unstructured":"Hackers make a fake hand to beat vein authentication. https:\/\/www.vice.com\/en_us\/article\/59v8dk\/hackers-fake-hand-vein-authentication-biometrics-chaos-communication-congress [Online; accessed 2020-07--30]."},{"key":"e_1_3_2_2_17_1","volume-title":"https:\/\/developer.apple.com\/design\/human-interface-guidelines\/watchos\/interaction\/haptics\/ [Online","year":"2020","unstructured":"Haptics. https:\/\/developer.apple.com\/design\/human-interface-guidelines\/watchos\/interaction\/haptics\/ [Online; accessed 2020-07--30]."},{"key":"e_1_3_2_2_18_1","volume-title":"https:\/\/interestingengineering.com\/a-look-at-how-easily-3d-printed-heads-can-hack-facial-recognition [Online","author":"A","year":"2020","unstructured":"A look at how easily 3D-printed heads can hack facial recognition. https:\/\/interestingengineering.com\/a-look-at-how-easily-3d-printed-heads-can-hack-facial-recognition [Online; accessed 2020-07--30]."},{"key":"e_1_3_2_2_19_1","volume-title":"https:\/\/www.digikey.kr\/ko\/product-highlight\/j\/jinlong\/z-axis-lra-coin-vibration-motor [Online","author":"LRA","year":"2020","unstructured":"LRA coin vibration motor. https:\/\/www.digikey.kr\/ko\/product-highlight\/j\/jinlong\/z-axis-lra-coin-vibration-motor [Online; accessed 2020-07--30]."},{"key":"e_1_3_2_2_20_1","volume-title":"https:\/\/www.murata.com\/en-eu\/products\/info\/mechatronics\/actuator\/2017\/0321 [Online","author":"Murata","year":"2020","unstructured":"Murata introduces piezo vibe for wearable device. https:\/\/www.murata.com\/en-eu\/products\/info\/mechatronics\/actuator\/2017\/0321 [Online; accessed 2020-07--30]."},{"key":"e_1_3_2_2_21_1","volume-title":"https:\/\/nymi.com\/ [Online","author":"Nymi","year":"2020","unstructured":"Nymi band. https:\/\/nymi.com\/ [Online; accessed 2020-07--30]."},{"key":"e_1_3_2_2_22_1","volume-title":"https:\/\/www.python.org\/ [Online","year":"2020","unstructured":"Python. https:\/\/www.python.org\/ [Online; accessed 2020-07--30]."},{"key":"e_1_3_2_2_23_1","volume-title":"https:\/\/www.patentlymobile.com\/2018\/11\/samsung-patent-illustrates-continued-work-on-under-display-fingerprint-scanning-for-future-smartphones-and-galaxy-watch.html [Online","author":"Samsung","year":"2020","unstructured":"Samsung patent illustrates continued work on under-display fingerprint scanning for future smartphones and galaxy watch. https:\/\/www.patentlymobile.com\/2018\/11\/samsung-patent-illustrates-continued-work-on-under-display-fingerprint-scanning-for-future-smartphones-and-galaxy-watch.html [Online; accessed 2020-07--30]."},{"key":"e_1_3_2_2_24_1","volume-title":"https:\/\/www.planetbiometrics.com\/article-details\/i\/4121\/desc\/samsung-patents-smartwatch-with-vein-authentication\/ [Online","author":"Samsung","year":"2020","unstructured":"Samsung patents smartwatch with vein authentication. https:\/\/www.planetbiometrics.com\/article-details\/i\/4121\/desc\/samsung-patents-smartwatch-with-vein-authentication\/ [Online; accessed 2020-07--30]."},{"key":"e_1_3_2_2_25_1","volume-title":"https:\/\/www.theverge.com\/2019\/4\/7\/18299366\/samsung-galaxy-s10-fingerprint-sensor-fooled-3d-printed-fingerprint [Online","author":"Samsung's","year":"2020","unstructured":"Samsung's galaxy S10 fingerprint sensor fooled by 3d printed fingerprint. https:\/\/www.theverge.com\/2019\/4\/7\/18299366\/samsung-galaxy-s10-fingerprint-sensor-fooled-3d-printed-fingerprint [Online; accessed 2020-07--30]."},{"key":"e_1_3_2_2_26_1","volume-title":"https:\/\/en.wikipedia.org\/wiki\/Skeletal_muscle [Online","author":"Skeletal","year":"2021","unstructured":"Skeletal muscle rate. https:\/\/en.wikipedia.org\/wiki\/Skeletal_muscle [Online; accessed 2021-03-09]."},{"key":"e_1_3_2_2_27_1","volume-title":"https:\/\/www.displaydaily.com\/article\/press-releases\/strategy-analytics-global-smartwatch-shipments-grow-20-percent-to-14-million-in-q1--2020 [Online","author":"Strategy","year":"2020","unstructured":"Strategy analytics. https:\/\/www.displaydaily.com\/article\/press-releases\/strategy-analytics-global-smartwatch-shipments-grow-20-percent-to-14-million-in-q1--2020 [Online; accessed 2020-07--30]."},{"key":"e_1_3_2_2_28_1","unstructured":"U.S. wearable ownership by demographics. https:\/\/www.npd.com\/wps\/portal\/npd\/us\/news\/press-releases\/2015\/the-demographic-divide-fitness-trackers-and-smartwatches-attracting-very-different-segments-of-the-market-according-to-the-npd-group\/ [Online; accessed 2021-03--19]."},{"key":"e_1_3_2_2_29_1","volume-title":"https:\/\/www.forbes.com\/sites\/thomasbrewster\/2018\/12\/13\/we-broke-into-a-bunch-of-android-phones-with-a-3d-printed-head\/#4bd67e6d1330 [Online","author":"We","year":"2020","unstructured":"We broke into a bunch of android phones with a 3d-printed head. https:\/\/www.forbes.com\/sites\/thomasbrewster\/2018\/12\/13\/we-broke-into-a-bunch-of-android-phones-with-a-3d-printed-head\/#4bd67e6d1330 [Online; accessed 2020-07--30]."},{"key":"e_1_3_2_2_30_1","volume-title":"https:\/\/developer.apple.com\/xcode [Online","year":"2020","unstructured":"Xcode. https:\/\/developer.apple.com\/xcode [Online; accessed 2020-07--30]."},{"key":"e_1_3_2_2_31_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-30115-8_7"},{"key":"e_1_3_2_2_32_1","doi-asserted-by":"publisher","DOI":"10.2139\/ssrn.1424949"},{"key":"e_1_3_2_2_33_1","volume-title":"USENIX Security Symposium","author":"Ballard Lucas","year":"2006","unstructured":"Lucas Ballard, Fabian Monrose, and Daniel P Lopresti. Biometric authentication revisited: Understanding the impact of wolves in sheep's clothing. In USENIX Security Symposium, 2006."},{"issue":"3","key":"e_1_3_2_2_34_1","first-page":"13","article-title":"Biometric authentication: A review. International Journal of u-and e-Service","volume":"2","author":"Bhattacharyya Debnath","year":"2009","unstructured":"Debnath Bhattacharyya, Rahul Ranjan, Farkhod Alisherov, Minkyu Choi, et al. Biometric authentication: A review. International Journal of u-and e-Service, Science and Technology, 2(3):13--28, 2009.","journal-title":"Science and Technology"},{"key":"e_1_3_2_2_35_1","doi-asserted-by":"publisher","DOI":"10.1023\/A:1010933404324"},{"key":"e_1_3_2_2_36_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-04372-8_3"},{"key":"e_1_3_2_2_37_1","doi-asserted-by":"publisher","DOI":"10.1109\/CCST.2018.8585571"},{"key":"e_1_3_2_2_38_1","doi-asserted-by":"publisher","DOI":"10.1023\/A:1022627411411"},{"key":"e_1_3_2_2_39_1","volume-title":"Vibration energy absorption (vea) in human fingers-hand-arm system. Medical engineering & physics, 26(6):483--492","author":"Dong Ren G","year":"2004","unstructured":"Ren G Dong, Aaron W Schopper, TW McDowell, Daniel E Welcome, JZ Wu, W Paul Smutz, C Warren, and Subhash Rakheja. Vibration energy absorption (vea) in human fingers-hand-arm system. Medical engineering & physics, 26(6):483--492, 2004."},{"key":"e_1_3_2_2_40_1","volume-title":"Broken hearted: How to attack ecg biometrics","author":"Eberz Simon","year":"2017","unstructured":"Simon Eberz, Nicola Paoletti, Marc Roeschlin, Marta Kwiatkowska, I Martinovic, and A Patan\u00e9. Broken hearted: How to attack ecg biometrics. 2017."},{"key":"e_1_3_2_2_41_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2007.902030"},{"issue":"4","key":"e_1_3_2_2_42_1","first-page":"42","article-title":"An overview of classification algorithms for imbalanced datasets","volume":"2","author":"Ganganwar Vaishali","year":"2012","unstructured":"Vaishali Ganganwar. An overview of classification algorithms for imbalanced datasets. International Journal of Emerging Technology and Advanced Engineering, 2(4):42--47, 2012.","journal-title":"International Journal of Emerging Technology and Advanced Engineering"},{"key":"e_1_3_2_2_43_1","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2019.2952858"},{"key":"e_1_3_2_2_44_1","doi-asserted-by":"publisher","DOI":"10.1109\/MC.2012.364"},{"key":"e_1_3_2_2_45_1","doi-asserted-by":"publisher","DOI":"10.1109\/BTAS.2015.7358794"},{"key":"e_1_3_2_2_46_1","doi-asserted-by":"publisher","DOI":"10.5555\/1939047.1939070"},{"key":"e_1_3_2_2_47_1","doi-asserted-by":"publisher","DOI":"10.3390\/s131012852"},{"key":"e_1_3_2_2_48_1","first-page":"2017","article-title":"A sequential approach to the biodynamic modeling of a human finger","author":"Knez Luka","year":"2017","unstructured":"Luka Knez, Janko Slavivc, and Miha Boltevz ar. A sequential approach to the biodynamic modeling of a human finger. Shock and Vibration, 2017, 2017.","journal-title":"Shock and Vibration"},{"key":"e_1_3_2_2_49_1","doi-asserted-by":"publisher","DOI":"10.1145\/2984511.2984582"},{"key":"e_1_3_2_2_50_1","doi-asserted-by":"publisher","DOI":"10.1145\/3319535.3354242"},{"key":"e_1_3_2_2_51_1","doi-asserted-by":"publisher","DOI":"10.1145\/3133956.3133964"},{"key":"e_1_3_2_2_52_1","first-page":"1","volume-title":"Ismir","volume":"270","author":"Beth","year":"2000","unstructured":"Beth Logan et al. Mel frequency cepstral coefficients for music modeling. In Ismir, volume 270, pages 1--11, 2000."},{"key":"e_1_3_2_2_53_1","doi-asserted-by":"publisher","DOI":"10.1145\/3139243.3139251"},{"key":"e_1_3_2_2_54_1","doi-asserted-by":"publisher","DOI":"10.1080\/01449290410001669914"},{"key":"e_1_3_2_2_55_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-29133-8_25"},{"key":"e_1_3_2_2_56_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2018.07.001"},{"key":"e_1_3_2_2_57_1","volume-title":"SOUPS","author":"Nguyen Toan","year":"2017","unstructured":"Toan Nguyen and Nasir D Memon. Smartwatches locking methods: A comparative study. In SOUPS, 2017."},{"key":"e_1_3_2_2_58_1","doi-asserted-by":"publisher","DOI":"10.1109\/T-AIEE.1928.5055024"},{"key":"e_1_3_2_2_59_1","doi-asserted-by":"publisher","DOI":"10.1177\/1077546315577312"},{"key":"e_1_3_2_2_60_1","volume-title":"Enhancing security and privacy in biometrics-based authentication systems. IBM systems Journal, 40(3):614--634","author":"Ratha Nalini K.","year":"2001","unstructured":"Nalini K. Ratha, Jonathan H. Connell, and Ruud M. Bolle. Enhancing security and privacy in biometrics-based authentication systems. IBM systems Journal, 40(3):614--634, 2001."},{"key":"e_1_3_2_2_61_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.specom.2011.11.004"},{"key":"e_1_3_2_2_62_1","article-title":"Identity recognition based on bioacoustics of human body","author":"Sim Joo Yong","year":"2019","unstructured":"Joo Yong Sim, Hyung Wook Noh, Woonhoe Goo, Namkeun Kim, Seung-Hoon Chae, and Chang-Geun Ahn. Identity recognition based on bioacoustics of human body. IEEE Transactions on Cybernetics, 2019.","journal-title":"IEEE Transactions on Cybernetics"},{"key":"e_1_3_2_2_63_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-15887-3"},{"key":"e_1_3_2_2_64_1","doi-asserted-by":"publisher","DOI":"10.1109\/EuroSP.2017.42"},{"key":"e_1_3_2_2_65_1","doi-asserted-by":"publisher","DOI":"10.4324\/9780429273872"},{"key":"e_1_3_2_2_66_1","volume-title":"Using random forest for reliable classification and cost-sensitive learning for medical diagnosis. BMC bioinformatics, 10(S1):S22","author":"Yang Fan","year":"2009","unstructured":"Fan Yang, Hua-zhen Wang, Hong Mi, Wei-wen Cai, et al. Using random forest for reliable classification and cost-sensitive learning for medical diagnosis. BMC bioinformatics, 10(S1):S22, 2009."},{"key":"e_1_3_2_2_67_1","doi-asserted-by":"publisher","DOI":"10.1145\/3123021.3123049"}],"event":{"name":"CCS '21: 2021 ACM SIGSAC Conference on Computer and Communications Security","location":"Virtual Event Republic of Korea","acronym":"CCS '21","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"]},"container-title":["Proceedings of the 2021 ACM SIGSAC Conference on Computer and Communications Security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3460120.3484553","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3460120.3484553","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,11,18]],"date-time":"2025-11-18T20:54:00Z","timestamp":1763499240000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3460120.3484553"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,11,12]]},"references-count":67,"alternative-id":["10.1145\/3460120.3484553","10.1145\/3460120"],"URL":"https:\/\/doi.org\/10.1145\/3460120.3484553","relation":{},"subject":[],"published":{"date-parts":[[2021,11,12]]},"assertion":[{"value":"2021-11-13","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}