{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,30]],"date-time":"2026-03-30T18:55:55Z","timestamp":1774896955875,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":30,"publisher":"ACM","license":[{"start":{"date-parts":[[2021,6,28]],"date-time":"2021-06-28T00:00:00Z","timestamp":1624838400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2021,6,28]]},"DOI":"10.1145\/3468218.3469039","type":"proceedings-article","created":{"date-parts":[[2021,6,21]],"date-time":"2021-06-21T17:52:26Z","timestamp":1624297946000},"page":"85-90","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":12,"title":["SWIPEGAN"],"prefix":"10.1145","author":[{"given":"Attaullah","family":"Buriro","sequence":"first","affiliation":[{"name":"Faculty of Computer Science, Free University of Bolzano, Bolzano, Italy"}]},{"given":"Francesco","family":"Ricci","sequence":"additional","affiliation":[{"name":"Faculty of Computer Science, Free University of Bolzano, Bolzano, Italy"}]},{"given":"Bruno","family":"Crispo","sequence":"additional","affiliation":[{"name":"University of Trento, Trento, Italy"}]}],"member":"320","published-online":{"date-parts":[[2021,6,28]]},"reference":[{"key":"e_1_3_2_1_1_1","volume-title":"Security of multimodal biometric systems against spoof attacks. Department of Electrical and Electronic Engineering","author":"Akhtar Zahid","year":"2012","unstructured":"Zahid Akhtar . 2012. Security of multimodal biometric systems against spoof attacks. Department of Electrical and Electronic Engineering , University of Cagliari , Cagliari, Italy 6( 2012 ). Zahid Akhtar. 2012. Security of multimodal biometric systems against spoof attacks. Department of Electrical and Electronic Engineering, University of Cagliari, Cagliari, Italy 6(2012)."},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1145\/581271.581272"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.cviu.2018.10.009"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jisa.2018.11.008"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1109\/SPW.2016.20"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/2702123.2702252"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1109\/SPW.2018.00011"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1145\/1966913.1966945"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICC.2018.8422223"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1145\/2207676.2208544"},{"key":"e_1_3_2_1_12_1","volume-title":"Proceedings of the 33rd Annual ACM Conference on Human Factors in Computing Systems. 1411--1414","author":"Luca Alexander De","year":"2015","unstructured":"Alexander De Luca , Alina Hang , Emanuel Von Zezschwitz , and Heinrich Hussmann . 2015 . I feel like I'm taking selfies all day! Towards understanding biometric authentication on smartphones . In Proceedings of the 33rd Annual ACM Conference on Human Factors in Computing Systems. 1411--1414 . Alexander De Luca, Alina Hang, Emanuel Von Zezschwitz, and Heinrich Hussmann. 2015. I feel like I'm taking selfies all day! Towards understanding biometric authentication on smartphones. In Proceedings of the 33rd Annual ACM Conference on Human Factors in Computing Systems. 1411--1414."},{"key":"e_1_3_2_1_13_1","volume-title":"Data augmentation using synthetic data for time series classification with deep residual networks. arXiv preprint arXiv:1808.02455","author":"Fawaz Hassan Ismail","year":"2018","unstructured":"Hassan Ismail Fawaz , Germain Forestier , Jonathan Weber , Lhassane Idoumghar , and Pierre-Alain Muller . 2018. Data augmentation using synthetic data for time series classification with deep residual networks. arXiv preprint arXiv:1808.02455 ( 2018 ). Hassan Ismail Fawaz, Germain Forestier, Jonathan Weber, Lhassane Idoumghar, and Pierre-Alain Muller. 2018. Data augmentation using synthetic data for time series classification with deep residual networks. arXiv preprint arXiv:1808.02455 (2018)."},{"key":"e_1_3_2_1_14_1","unstructured":"Ian Goodfellow Jean Pouget-Abadie Mehdi Mirza Bing Xu David Warde-Farley Sherjil Ozair Aaron Courville and Yoshua Bengio. 2014. Generative adversarial nets. In Advances in neural information processing systems. 2672--2680.  Ian Goodfellow Jean Pouget-Abadie Mehdi Mirza Bing Xu David Warde-Farley Sherjil Ozair Aaron Courville and Yoshua Bengio. 2014. Generative adversarial nets. In Advances in neural information processing systems. 2672--2680."},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2019.01.007"},{"key":"e_1_3_2_1_16_1","volume-title":"A chimerical dataset combining physiological and behavioral biometric traits for reliable user authentication on smart devices and ecosystems. Data in brief 28","author":"Gupta Sandeep","year":"2020","unstructured":"Sandeep Gupta , Attaullah Buriro , and Bruno Crispo . 2020. A chimerical dataset combining physiological and behavioral biometric traits for reliable user authentication on smart devices and ecosystems. Data in brief 28 ( 2020 ), 104924. Sandeep Gupta, Attaullah Buriro, and Bruno Crispo. 2020. A chimerical dataset combining physiological and behavioral biometric traits for reliable user authentication on smart devices and ecosystems. Data in brief 28 (2020), 104924."},{"key":"e_1_3_2_1_17_1","volume-title":"10th Symposium On Usable Privacy and Security ({SOUPS}","author":"Harbach Marian","year":"2014","unstructured":"Marian Harbach , Emanuel Von Zezschwitz , Andreas Fichtner , Alexander De Luca , and Matthew Smith . 2014 . It's a hard lock life: A field study of smartphone (un) locking behavior and risk perception . In 10th Symposium On Usable Privacy and Security ({SOUPS} 2014). 213--230. Marian Harbach, Emanuel Von Zezschwitz, Andreas Fichtner, Alexander De Luca, and Matthew Smith. 2014. It's a hard lock life: A field study of smartphone (un) locking behavior and risk perception. In 10th Symposium On Usable Privacy and Security ({SOUPS} 2014). 213--230."},{"key":"e_1_3_2_1_18_1","volume-title":"d.]","author":"Hayes Jamie","unstructured":"Jamie Hayes , Luca Melis , George Danezis , and Emiliano De Cristofaro . [n. d.] . LOGAN : Evaluating Information Leakage of Generative Models Using Generative Adversarial Networks . ([n. d.]). Jamie Hayes, Luca Melis, George Danezis, and Emiliano De Cristofaro. [n. d.]. LOGAN: Evaluating Information Leakage of Generative Models Using Generative Adversarial Networks. ([n. d.])."},{"key":"e_1_3_2_1_19_1","volume-title":"Adversarial learning for neural dialogue generation. arXiv preprint arXiv:1701.06547","author":"Li Jiwei","year":"2017","unstructured":"Jiwei Li , Will Monroe , Tianlin Shi , S\u00e9bastien Jean , Alan Ritter , and Dan Jurafsky . 2017. Adversarial learning for neural dialogue generation. arXiv preprint arXiv:1701.06547 ( 2017 ). Jiwei Li, Will Monroe, Tianlin Shi, S\u00e9bastien Jean, Alan Ritter, and Dan Jurafsky. 2017. Adversarial learning for neural dialogue generation. arXiv preprint arXiv:1701.06547 (2017)."},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2014.2386915"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1109\/BTAS.2015.7358795"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1109\/BTAS.2018.8698606"},{"key":"e_1_3_2_1_23_1","first-page":"439","article-title":"A survey of password attacks and comparative analysis on methods for secure authentication","volume":"19","author":"Raza Mudassar","year":"2012","unstructured":"Mudassar Raza , Muhammad Iqbal , Muhammad Sharif , and Waqas Haider . 2012 . A survey of password attacks and comparative analysis on methods for secure authentication . World Applied Sciences Journal 19 , 4 (2012), 439 -- 444 . Mudassar Raza, Muhammad Iqbal, Muhammad Sharif, and Waqas Haider. 2012. A survey of password attacks and comparative analysis on methods for secure authentication. World Applied Sciences Journal 19, 4 (2012), 439--444.","journal-title":"World Applied Sciences Journal"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2014.2302582"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2012.2223677"},{"key":"e_1_3_2_1_26_1","volume-title":"Generative Adversarial Network in the Air: Deep Adversarial Learning for Wireless Signal Spoofing","author":"Shi Yi","year":"2020","unstructured":"Yi Shi , Kemal Davaslioglu , and Yalin E Sagduyu . 2020. Generative Adversarial Network in the Air: Deep Adversarial Learning for Wireless Signal Spoofing . IEEE Transactions on Cognitive Communications and Networking ( 2020 ). Yi Shi, Kemal Davaslioglu, and Yalin E Sagduyu. 2020. Generative Adversarial Network in the Air: Deep Adversarial Learning for Wireless Signal Spoofing. IEEE Transactions on Cognitive Communications and Networking (2020)."},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2015.2506542"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICIP.2014.7026013"},{"key":"e_1_3_2_1_29_1","unstructured":"Carl Vondrick Hamed Pirsiavash and Antonio Torralba. 2016. Generating videos with scene dynamics. In Advances in neural information processing systems. 613--621.  Carl Vondrick Hamed Pirsiavash and Antonio Torralba. 2016. Generating videos with scene dynamics. In Advances in neural information processing systems. 613--621."},{"key":"e_1_3_2_1_30_1","volume-title":"Lr-gan: Layered recursive generative adversarial networks for image generation. arXiv preprint arXiv:1703.01560","author":"Yang Jianwei","year":"2017","unstructured":"Jianwei Yang , Anitha Kannan , Dhruv Batra , and Devi Parikh . 2017 . Lr-gan: Layered recursive generative adversarial networks for image generation. arXiv preprint arXiv:1703.01560 (2017). Jianwei Yang, Anitha Kannan, Dhruv Batra, and Devi Parikh. 2017. Lr-gan: Layered recursive generative adversarial networks for image generation. arXiv preprint arXiv:1703.01560 (2017)."},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.5555\/3298483.3298649"}],"event":{"name":"WiSec '21: 14th ACM Conference on Security and Privacy in Wireless and Mobile Networks","location":"Abu Dhabi United Arab Emirates","acronym":"WiSec '21","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control","SIGMOBILE ACM Special Interest Group on Mobility of Systems, Users, Data and Computing"]},"container-title":["Proceedings of the 3rd ACM Workshop on Wireless Security and Machine Learning"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3468218.3469039","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3468218.3469039","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T21:28:07Z","timestamp":1750195687000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3468218.3469039"}},"subtitle":["Swiping Data Augmentation Using Generative Adversarial Networks for Smartphone User Authentication"],"short-title":[],"issued":{"date-parts":[[2021,6,28]]},"references-count":30,"alternative-id":["10.1145\/3468218.3469039","10.1145\/3468218"],"URL":"https:\/\/doi.org\/10.1145\/3468218.3469039","relation":{},"subject":[],"published":{"date-parts":[[2021,6,28]]},"assertion":[{"value":"2021-06-28","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}