{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,5,9]],"date-time":"2026-05-09T04:45:53Z","timestamp":1778301953502,"version":"3.51.4"},"publisher-location":"New York, NY, USA","reference-count":36,"publisher":"ACM","license":[{"start":{"date-parts":[[2022,10,3]],"date-time":"2022-10-03T00:00:00Z","timestamp":1664755200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2022,10,3]]},"DOI":"10.1145\/3492866.3549718","type":"proceedings-article","created":{"date-parts":[[2022,9,21]],"date-time":"2022-09-21T16:34:33Z","timestamp":1663778073000},"page":"191-200","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":11,"title":["BioTag"],"prefix":"10.1145","author":[{"given":"Bin","family":"Hu","sequence":"first","affiliation":[{"name":"Rutgers University"}]},{"given":"Tianming","family":"Zhao","sequence":"additional","affiliation":[{"name":"Temple University"}]},{"given":"Yan","family":"Wang","sequence":"additional","affiliation":[{"name":"Temple University"}]},{"given":"Jerry","family":"Cheng","sequence":"additional","affiliation":[{"name":"New York Institute of Technology"}]},{"given":"Richard","family":"Howard","sequence":"additional","affiliation":[{"name":"Rutgers University"}]},{"given":"Yingying","family":"Chen","sequence":"additional","affiliation":[{"name":"Rutgers University"}]},{"given":"Hao","family":"Wan","sequence":"additional","affiliation":[{"name":"New York Institute of Technology"}]}],"member":"320","published-online":{"date-parts":[[2022,10,3]]},"reference":[{"key":"e_1_3_2_2_1_1","doi-asserted-by":"publisher","DOI":"10.1145\/2702123.2702200"},{"key":"e_1_3_2_2_2_1","first-page":"1","article-title":"Smudge attacks on smartphone touch screens","volume":"10","author":"Aviv Adam J","year":"2010","unstructured":"Adam J Aviv, Katherine L Gibson, Evan Mossop, Matt Blaze, and Jonathan M Smith. 2010. Smudge attacks on smartphone touch screens. Woot 10 (2010), 1--7.","journal-title":"Woot"},{"key":"e_1_3_2_2_3_1","volume-title":"Respiratory rate and pattern. Clinical Methods: The History, Physical, and Laboratory Examinations","author":"Braun Sheldon R","year":"1990","unstructured":"Sheldon R Braun. 1990. Respiratory rate and pattern. Clinical Methods: The History, Physical, and Laboratory Examinations. 3rd edition (1990).","edition":"3"},{"key":"e_1_3_2_2_4_1","volume-title":"ECML PKDD Workshop: Languages for Data Mining and Machine Learning. 108--122","author":"Buitinck Lars","year":"2013","unstructured":"Lars Buitinck, Gilles Louppe, Mathieu Blondel, Fabian Pedregosa, Andreas Mueller, Olivier Grisel, Vlad Niculae, Peter Prettenhofer, Alexandre Gramfort, Jaques Grobler, Robert Layton, Jake VanderPlas, Arnaud Joly, Brian Holt, and Ga\u00ebl Varoquaux. 2013. API design for machine learning software: experiences from the scikit-learn project. In ECML PKDD Workshop: Languages for Data Mining and Machine Learning. 108--122."},{"key":"e_1_3_2_2_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/3081333.3081355"},{"key":"e_1_3_2_2_6_1","volume-title":"Greedy function approximation: a gradient boosting machine. Annals of statistics","author":"Friedman Jerome H","year":"2001","unstructured":"Jerome H Friedman. 2001. Greedy function approximation: a gradient boosting machine. Annals of statistics (2001), 1189--1232."},{"key":"e_1_3_2_2_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/3328919"},{"key":"e_1_3_2_2_8_1","volume-title":"Introduction to multifractal detrended fluctuation analysis in Matlab. Frontiers in physiology 3","author":"Ihlen Espen Alexander","year":"2012","unstructured":"Espen Alexander F\u00fcrst EAFI Ihlen. 2012. Introduction to multifractal detrended fluctuation analysis in Matlab. Frontiers in physiology 3 (2012), 141."},{"key":"e_1_3_2_2_9_1","doi-asserted-by":"publisher","DOI":"10.1109\/BHI.2017.7897297"},{"key":"e_1_3_2_2_10_1","doi-asserted-by":"publisher","DOI":"10.3390\/s131012852"},{"key":"e_1_3_2_2_11_1","volume-title":"Driver drowsiness classification using fuzzy wavelet-packet-based feature-extraction algorithm","author":"Khushaba Rami N","year":"2010","unstructured":"Rami N Khushaba, Sarath Kodagoda, Sara Lal, and Gamini Dissanayake. 2010. Driver drowsiness classification using fuzzy wavelet-packet-based feature-extraction algorithm. IEEE transactions on biomedical engineering 58, 1 (2010), 121--131."},{"key":"e_1_3_2_2_12_1","unstructured":"Arash Habibi Lashkari Samaneh Farmand Dr Zakaria Omar Bin Dr Saleh et al. 2009. Shoulder surfing attack in graphical password authentication. arXiv preprint arXiv:0912.0951 (2009)."},{"key":"e_1_3_2_2_13_1","doi-asserted-by":"publisher","DOI":"10.1145\/3117811.3117839"},{"key":"e_1_3_2_2_14_1","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM41043.2020.9155258"},{"key":"e_1_3_2_2_15_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2014.51"},{"key":"e_1_3_2_2_16_1","first-page":"1049","article-title":"Cubic spline interpolation","volume":"45","author":"McKinley Sky","year":"1998","unstructured":"Sky McKinley and Megan Levine. 1998. Cubic spline interpolation. College of the Redwoods 45, 1 (1998), 1049--1060.","journal-title":"College of the Redwoods"},{"key":"e_1_3_2_2_17_1","doi-asserted-by":"publisher","DOI":"10.1145\/1135777.1135961"},{"key":"e_1_3_2_2_18_1","doi-asserted-by":"publisher","DOI":"10.5555\/1324818"},{"key":"e_1_3_2_2_19_1","volume-title":"RF-Badge: Vital Sign-based Authentication via RFID Tag Array on Badges","author":"Ning Jingyi","year":"2021","unstructured":"Jingyi Ning, Lei Xie, Chuyu Wang, Yanling Bu, Fengyuan Xu, Da-Wei Zhou, Sanglu Lu, and Baoliu Ye. 2021. RF-Badge: Vital Sign-based Authentication via RFID Tag Array on Badges. IEEE Transactions on Mobile Computing (2021)."},{"key":"e_1_3_2_2_20_1","doi-asserted-by":"publisher","DOI":"10.1590\/S1413-35552010000500010"},{"key":"e_1_3_2_2_21_1","doi-asserted-by":"publisher","DOI":"10.1109\/BCC.2006.4341628"},{"key":"e_1_3_2_2_22_1","doi-asserted-by":"publisher","DOI":"10.1159\/000087456"},{"key":"e_1_3_2_2_23_1","volume-title":"EPC global ratifies Gen 2 standard. RFID Journal 16","author":"Roberti Mark","year":"2004","unstructured":"Mark Roberti. 2004. EPC global ratifies Gen 2 standard. RFID Journal 16 (2004)."},{"key":"e_1_3_2_2_24_1","volume-title":"David A Greenberg, et al.","author":"Simon Roger P","year":"2009","unstructured":"Roger P Simon, Michael Jeffrey Aminoff, David A Greenberg, et al. 2009. Clinical neurology. Lange Medical Books\/McGraw-Hill."},{"key":"e_1_3_2_2_25_1","volume-title":"Combining mouse and keystroke dynamics biometrics for risk-based authentication in web environments. In 2012 fourth international conference on digital home","author":"Traore Issa","unstructured":"Issa Traore, Isaac Woungang, Mohammad S Obaidat, Youssef Nakkabi, and Iris Lai. 2012. Combining mouse and keystroke dynamics biometrics for risk-based authentication in web environments. In 2012 fourth international conference on digital home. IEEE, 138--145."},{"key":"e_1_3_2_2_26_1","doi-asserted-by":"publisher","DOI":"10.1145\/2601097.2601225"},{"key":"e_1_3_2_2_27_1","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1145\/3214288","article-title":"Rf-ecg: Heart rate variability assessment based on cots rfid tag array","volume":"2","author":"Wang Chuyu","year":"2018","unstructured":"Chuyu Wang, Lei Xie, Wei Wang, Yingying Chen, Yanling Bu, and Sanglu Lu. 2018. Rf-ecg: Heart rate variability assessment based on cots rfid tag array. Proceedings of the ACM on Interactive, Mobile, Wearable and Ubiquitous Technologies 2, 2 (2018), 1--26.","journal-title":"Proceedings of the ACM on Interactive, Mobile, Wearable and Ubiquitous Technologies"},{"key":"e_1_3_2_2_28_1","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2019.2916777"},{"key":"e_1_3_2_2_29_1","doi-asserted-by":"publisher","DOI":"10.1109\/TMC.2019.2900214"},{"key":"e_1_3_2_2_30_1","unstructured":"Greg Welch Gary Bishop et al. 1995. An introduction to the Kalman filter. (1995)."},{"key":"e_1_3_2_2_31_1","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM42981.2021.9488737"},{"key":"e_1_3_2_2_32_1","doi-asserted-by":"publisher","DOI":"10.1109\/GLOCOM.2018.8648073"},{"key":"e_1_3_2_2_33_1","doi-asserted-by":"publisher","DOI":"10.1145\/2639108.2639111"},{"key":"e_1_3_2_2_34_1","doi-asserted-by":"publisher","DOI":"10.1109\/IPSN.2016.7460727"},{"key":"e_1_3_2_2_35_1","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2020.3020604"},{"key":"e_1_3_2_2_36_1","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM41043.2020.9155526"}],"event":{"name":"MobiHoc '22: The Twenty-third International Symposium on Theory, Algorithmic Foundations, and Protocol Design for Mobile Networks and Mobile Computing","location":"Seoul Republic of Korea","acronym":"MobiHoc '22","sponsor":["SIGMOBILE ACM Special Interest Group on Mobility of Systems, Users, Data and Computing"]},"container-title":["Proceedings of the Twenty-Third International Symposium on Theory, Algorithmic Foundations, and Protocol Design for Mobile Networks and Mobile Computing"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3492866.3549718","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3492866.3549718","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T20:48:27Z","timestamp":1750193307000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3492866.3549718"}},"subtitle":["robust RFID-based continuous user verification using physiological features from respiration"],"short-title":[],"issued":{"date-parts":[[2022,10,3]]},"references-count":36,"alternative-id":["10.1145\/3492866.3549718","10.1145\/3492866"],"URL":"https:\/\/doi.org\/10.1145\/3492866.3549718","relation":{},"subject":[],"published":{"date-parts":[[2022,10,3]]},"assertion":[{"value":"2022-10-03","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}