{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,6]],"date-time":"2026-02-06T05:43:29Z","timestamp":1770356609458,"version":"3.49.0"},"reference-count":56,"publisher":"Association for Computing Machinery (ACM)","issue":"4","license":[{"start":{"date-parts":[[2021,12,27]],"date-time":"2021-12-27T00:00:00Z","timestamp":1640563200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"Startup Fund for Youngman Research at SJTU"},{"DOI":"10.13039\/501100012247","name":"Program of Shanghai Academic Research Leader","doi-asserted-by":"publisher","award":["20XD1402100"],"award-info":[{"award-number":["20XD1402100"]}],"id":[{"id":"10.13039\/501100012247","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"NSFC","doi-asserted-by":"crossref","award":["61936015, U1736207, 62072306"],"award-info":[{"award-number":["61936015, U1736207, 62072306"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"crossref"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":["Proc. ACM Interact. Mob. Wearable Ubiquitous Technol."],"published-print":{"date-parts":[[2021,12,27]]},"abstract":"<jats:p>The convenience of laptops brings with it the risk of information leakage, and conventional security systems based on the password or the explicit biometric do little to alleviate this problem. Biometric identification based on anatomical features provides far stronger security; however, a lack of suitable sensors on laptops limits the applicability of this technology. In this paper, we developed a behavior-irrelevant user identification system applicable to laptops with a metal casing. The proposed scheme, referred to as LeakPrint, is based on leakage current, wherein the system uses an earphone to capture current leaking through the body and then transmits the corresponding signal to a server for identification. The user identification is achieved via denoising, dimension reduction, and feature extraction. Compared to other biometric identification methods, the proposed system is less dependent on external hardware and more robust to environmental noise. The experiments in real-world environments demonstrated that LeakPrint can verify user identity with high accuracy (93.6%), while providing effective defense against replay attacks (96.5%) and mimicry attacks (90.9%).<\/jats:p>","DOI":"10.1145\/3494984","type":"journal-article","created":{"date-parts":[[2021,12,30]],"date-time":"2021-12-30T17:40:33Z","timestamp":1640886033000},"page":"1-23","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":11,"title":["Leakage or Identification"],"prefix":"10.1145","volume":"5","author":[{"given":"Dian","family":"Ding","sequence":"first","affiliation":[{"name":"Shanghai Jiao Tong University, China"}]},{"given":"Lanqing","family":"Yang","sequence":"additional","affiliation":[{"name":"Shanghai Jiao Tong University, China"}]},{"given":"Yi-Chao","family":"Chen","sequence":"additional","affiliation":[{"name":"Shanghai Jiao Tong University, China"}]},{"given":"Guangtao","family":"Xue","sequence":"additional","affiliation":[{"name":"Shanghai Jiao Tong University, China"}]}],"member":"320","published-online":{"date-parts":[[2021,12,30]]},"reference":[{"key":"e_1_2_1_1_1","unstructured":"A Ahlbom U Bergqvist JH Bernhardt JP Cesarini M Grandolfo M Hietanen AF Mckinlay MH Repacholi David H Sliney J AJ Stolwijk etal 1998. Guidelines for limiting exposure to time-varying electric magnetic and electromagnetic fields (up to 300 GHz). Health physics 74 4 (1998) 494--521.  A Ahlbom U Bergqvist JH Bernhardt JP Cesarini M Grandolfo M Hietanen AF Mckinlay MH Repacholi David H Sliney J AJ Stolwijk et al. 1998. Guidelines for limiting exposure to time-varying electric magnetic and electromagnetic fields (up to 300 GHz). Health physics 74 4 (1998) 494--521."},{"key":"e_1_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1109\/BTAS.2018.8698539"},{"key":"e_1_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1145\/3081333.3081355"},{"key":"e_1_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1145\/3411809"},{"key":"e_1_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/3411764.3445441"},{"key":"e_1_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1111\/j.1467-9868.2008.00674.x"},{"key":"e_1_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.patcog.2014.05.021"},{"key":"e_1_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2016.90"},{"key":"e_1_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1145\/2807442.2807458"},{"key":"e_1_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICASSP.2002.5745591"},{"key":"e_1_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1145\/3323679.3326518"},{"key":"e_1_2_1_12_1","volume-title":"Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition (CVPR).","author":"Lea Colin","unstructured":"Colin Lea , Michael D. Flynn , Rene Vidal , Austin Reiter , and Gregory D. Hager . 2017. Temporal Convolutional Networks for Action Segmentation and Detection . In Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition (CVPR). Colin Lea, Michael D. Flynn, Rene Vidal, Austin Reiter, and Gregory D. Hager. 2017. Temporal Convolutional Networks for Action Segmentation and Detection. In Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition (CVPR)."},{"key":"e_1_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1080\/01621459.2012.695654"},{"key":"e_1_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1145\/3117811.3117839"},{"key":"e_1_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1145\/3307334.3326093"},{"key":"e_1_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPRW50498.2020.00417"},{"key":"e_1_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM.2018.8486283"},{"key":"e_1_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1145\/3397320"},{"key":"e_1_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM.2019.8737591"},{"key":"e_1_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1145\/2046707.2046771"},{"key":"e_1_2_1_21_1","first-page":"6","article-title":"Pulse-Response: Exploring Human Body Impedance for Biometric Recognition","volume":"20","author":"Martinovic Ivan","year":"2017","unstructured":"Ivan Martinovic , Kasper B. Rasmussen , Marc Roeschlin , and Gene Tsudik . 2017 . Pulse-Response: Exploring Human Body Impedance for Biometric Recognition . Acm Transaction on Information System Security 20 , 2 (2017), 6 .1-6.31. Ivan Martinovic, Kasper B. Rasmussen, Marc Roeschlin, and Gene Tsudik. 2017. Pulse-Response: Exploring Human Body Impedance for Biometric Recognition. Acm Transaction on Information System Security 20, 2 (2017), 6.1-6.31.","journal-title":"Acm Transaction on Information System Security"},{"key":"e_1_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2018.05.010"},{"key":"e_1_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1145\/3241539.3241550"},{"key":"e_1_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1145\/3372224.3419197"},{"key":"e_1_2_1_25_1","volume-title":"Guibas","author":"Qi Charles R.","year":"2017","unstructured":"Charles R. Qi , Hao Su , Kaichun Mo , and Leonidas J . Guibas . 2017 . PointNet: Deep Learning on Point Sets for 3D Classification and Segmentation . arXiv:1612.00593 [cs.CV] Charles R. Qi, Hao Su, Kaichun Mo, and Leonidas J. Guibas. 2017. PointNet: Deep Learning on Point Sets for 3D Classification and Segmentation. arXiv:1612.00593 [cs.CV]"},{"key":"e_1_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1145\/3386901.3388939"},{"key":"e_1_2_1_27_1","volume-title":"Applied bioelectricity: from electrical stimulation to electropathology","author":"Reilly J Patrick","unstructured":"J Patrick Reilly . 2012. Applied bioelectricity: from electrical stimulation to electropathology . Springer Science & Business Media . J Patrick Reilly. 2012. Applied bioelectricity: from electrical stimulation to electropathology. Springer Science & Business Media."},{"key":"e_1_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1145\/2858036.2858152"},{"key":"e_1_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2015.7298682"},{"key":"e_1_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2932400"},{"key":"e_1_2_1_31_1","volume-title":"29th USENIX Security Symposium (USENIX Security 20)","author":"Shan Shawn","unstructured":"Shawn Shan , Emily Wenger , Jiayun Zhang , Huiying Li , Haitao Zheng , and Ben Y. Zhao . 2020. Fawkes: Protecting Privacy against Unauthorized Deep Learning Models . In 29th USENIX Security Symposium (USENIX Security 20) . USENIX Association, 1589--1604. https:\/\/www.usenix.org\/conference\/usenixsecurity20\/presentation\/shan Shawn Shan, Emily Wenger, Jiayun Zhang, Huiying Li, Haitao Zheng, and Ben Y. Zhao. 2020. Fawkes: Protecting Privacy against Unauthorized Deep Learning Models. In 29th USENIX Security Symposium (USENIX Security 20). USENIX Association, 1589--1604. https:\/\/www.usenix.org\/conference\/usenixsecurity20\/presentation\/shan"},{"key":"e_1_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1145\/3410048.3410094"},{"key":"e_1_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2017.2771295"},{"key":"e_1_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1145\/3084041.3084061"},{"key":"e_1_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1214\/009053607000000505"},{"key":"e_1_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1109\/APEC.1995.469028"},{"key":"e_1_2_1_37_1","first-page":"2579","article-title":"Visualizing Data using t-SNE","volume":"9","author":"van der Maaten Laurens","year":"2008","unstructured":"Laurens van der Maaten and Geoffrey Hinton . 2008 . Visualizing Data using t-SNE . Journal of Machine Learning Research 9 , 86 (2008), 2579 -- 2605 . http:\/\/jmlr.org\/papers\/v9\/vandermaaten08a.html Laurens van der Maaten and Geoffrey Hinton. 2008. Visualizing Data using t-SNE. Journal of Machine Learning Research 9, 86 (2008), 2579--2605. http:\/\/jmlr.org\/papers\/v9\/vandermaaten08a.html","journal-title":"Journal of Machine Learning Research"},{"key":"e_1_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.1145\/3161180"},{"key":"e_1_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.1145\/3242587.3242622"},{"key":"e_1_2_1_40_1","doi-asserted-by":"publisher","DOI":"10.1145\/3126594.3126623"},{"key":"e_1_2_1_41_1","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2019.2916777"},{"key":"e_1_2_1_42_1","volume-title":"Voiceprint: The New Wechat Password. https:\/\/blog.wechat.com\/2015\/05\/21\/voiceprint-the-new-wechat-password\/","year":"2015","unstructured":"Wechat. 2015 . Voiceprint: The New Wechat Password. https:\/\/blog.wechat.com\/2015\/05\/21\/voiceprint-the-new-wechat-password\/ Wechat. 2015. Voiceprint: The New Wechat Password. https:\/\/blog.wechat.com\/2015\/05\/21\/voiceprint-the-new-wechat-password\/"},{"key":"e_1_2_1_43_1","doi-asserted-by":"publisher","DOI":"10.1109\/94.326654"},{"key":"e_1_2_1_44_1","unstructured":"Wikipedia. 2021. Wikipedia Equal-loudness contour. https:\/\/en.wikipedia.org\/wiki\/Equal-loudness_contour  Wikipedia. 2021. Wikipedia Equal-loudness contour. https:\/\/en.wikipedia.org\/wiki\/Equal-loudness_contour"},{"key":"e_1_2_1_45_1","doi-asserted-by":"publisher","DOI":"10.1109\/97.720560"},{"key":"e_1_2_1_46_1","unstructured":"Xiaomi. 2021. https:\/\/www.mi.com\/index.html  Xiaomi. 2021. https:\/\/www.mi.com\/index.html"},{"key":"e_1_2_1_47_1","doi-asserted-by":"publisher","DOI":"10.1145\/3372224.3380901"},{"key":"e_1_2_1_48_1","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2004.81"},{"key":"e_1_2_1_49_1","doi-asserted-by":"publisher","DOI":"10.1145\/3300061.3300118"},{"key":"e_1_2_1_50_1","doi-asserted-by":"publisher","DOI":"10.1145\/3130984"},{"key":"e_1_2_1_51_1","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM41043.2020.9155534"},{"key":"e_1_2_1_52_1","unstructured":"Fisher Yu and Vladlen Koltun. 2016. Multi-Scale Context Aggregation by Dilated Convolutions. arXiv:1511.07122 [cs.CV]  Fisher Yu and Vladlen Koltun. 2016. Multi-Scale Context Aggregation by Dilated Convolutions. arXiv:1511.07122 [cs.CV]"},{"key":"e_1_2_1_53_1","doi-asserted-by":"publisher","DOI":"10.1145\/3081333.3081336"},{"key":"e_1_2_1_54_1","doi-asserted-by":"publisher","DOI":"10.1145\/2493190.2493231"},{"key":"e_1_2_1_55_1","doi-asserted-by":"publisher","DOI":"10.1145\/3133956.3133962"},{"key":"e_1_2_1_56_1","doi-asserted-by":"publisher","DOI":"10.1145\/3381008"}],"container-title":["Proceedings of the ACM on Interactive, Mobile, Wearable and Ubiquitous Technologies"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3494984","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3494984","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T20:18:59Z","timestamp":1750191539000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3494984"}},"subtitle":["Behavior-irrelevant User Identification Leveraging Leakage Current on Laptops"],"short-title":[],"issued":{"date-parts":[[2021,12,27]]},"references-count":56,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2021,12,27]]}},"alternative-id":["10.1145\/3494984"],"URL":"https:\/\/doi.org\/10.1145\/3494984","relation":{},"ISSN":["2474-9567"],"issn-type":[{"value":"2474-9567","type":"electronic"}],"subject":[],"published":{"date-parts":[[2021,12,27]]},"assertion":[{"value":"2021-12-30","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}