{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,31]],"date-time":"2026-03-31T21:34:53Z","timestamp":1774992893474,"version":"3.50.1"},"reference-count":97,"publisher":"Association for Computing Machinery (ACM)","issue":"3","license":[{"start":{"date-parts":[[2023,9,7]],"date-time":"2023-09-07T00:00:00Z","timestamp":1694044800000},"content-version":"vor","delay-in-days":366,"URL":"http:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/100000001","name":"NSF","doi-asserted-by":"publisher","award":["CNS-1856380, CNS-2016415, CNS-2107093, CNS-2144669, CNS-1953073, CNS-1850278, CNS-2204785, CNS-2205868"],"award-info":[{"award-number":["CNS-1856380, CNS-2016415, CNS-2107093, CNS-2144669, CNS-1953073, CNS-1850278, CNS-2204785, CNS-2205868"]}],"id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":["Proc. ACM Interact. Mob. Wearable Ubiquitous Technol."],"published-print":{"date-parts":[[2022,9,6]]},"abstract":"<jats:p>Implicit authentication for traditional objects, such as doors and dumbbells, has rich applications but is rarely studied. An ongoing trend is that traditional objects are retrofitted to smart environments; for instance, a contact sensor is attached to a door to detect door opening (but cannot tell \"who is opening the door\"). We present the first accurate implicit-authentication system for retrofitted everyday objects, named MoMatch. It makes an authentication decision based on a single natural object use, unlike prior work that requires shaking objects. MoMatch is built on the observation that an object has a motion typically because a human hand moves it; thus, the object's motion and the legitimate user's hand movement should correlate. The main challenge is, given the small amount of data collected during one object use, how to measure the correlation accurately. We convert the correlation measurement problem into an image comparison problem and resolve it using neural networks successfully. MoMatch does not need to profile the user's biometric information and is resilient to mimicry attacks.<\/jats:p>","DOI":"10.1145\/3550322","type":"journal-article","created":{"date-parts":[[2022,9,7]],"date-time":"2022-09-07T14:54:27Z","timestamp":1662562467000},"page":"1-25","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":8,"title":["Use It-No Need to Shake It!"],"prefix":"10.1145","volume":"6","author":[{"given":"Chuxiong","family":"Wu","sequence":"first","affiliation":[{"name":"University of South Carolina, Columbia, South Carolina, USA"}]},{"given":"Xiaopeng","family":"Li","sequence":"additional","affiliation":[{"name":"University of South Carolina, Columbia, South Carolina, USA"}]},{"given":"Fei","family":"Zuo","sequence":"additional","affiliation":[{"name":"University of South Carolina, Columbia, South Carolina, USA"}]},{"given":"Lannan","family":"Luo","sequence":"additional","affiliation":[{"name":"University of South Carolina, Columbia, South Carolina, USA"}]},{"given":"Xiaojiang","family":"Du","sequence":"additional","affiliation":[{"name":"Stevens Institute of Technology, Hoboken, New Jersey, USA"}]},{"given":"Jia","family":"Di","sequence":"additional","affiliation":[{"name":"University of Arkansas, Fayetteville, Arkansas, USA"}]},{"given":"Qiang","family":"Zeng","sequence":"additional","affiliation":[{"name":"University of South Carolina, Columbia, South Carolina, USA"}]}],"member":"320","published-online":{"date-parts":[[2022,9,7]]},"reference":[{"key":"e_1_2_1_1_1","unstructured":"Apple. 2021. Add a HomeKit accessory to the Home app. https:\/\/support.apple.com\/en-us\/HT204893."},{"key":"e_1_2_1_2_1","unstructured":"Apple Inc. 2019. Apple Watch. https:\/\/www.apple.com\/watch\/."},{"key":"e_1_2_1_3_1","unstructured":"Apple Inc. 2019. How to unlock your Mac with your Apple Watch. https:\/\/support.apple.com\/en-us\/HT206995."},{"key":"e_1_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.5555\/1370624.1370626"},{"key":"e_1_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1109\/PERCOMW.2016.7457169"},{"key":"e_1_2_1_6_1","volume-title":"Denial-of-Service attacks and countermeasures in IEEE 802.11 wireless networks. Computer Standards & Interfaces 31, 5","author":"Bicakci Kemal","year":"2009","unstructured":"Kemal Bicakci and Bulent Tavli. 2009. Denial-of-Service attacks and countermeasures in IEEE 802.11 wireless networks. Computer Standards & Interfaces 31, 5 (2009)."},{"key":"e_1_2_1_7_1","unstructured":"Bosch Sensortec. 2022. Bosch launches smart ultra-low power IMU BMI270 optimized for wearables. https:\/\/www.bosch-sensortec.com\/news\/bosch-launches-smart-ultra-low-power-imu-bmi270.html."},{"key":"e_1_2_1_8_1","doi-asserted-by":"crossref","unstructured":"Jane Bromley Isabelle Guyon Yann LeCun Eduard S\u00e4ckinger and Roopak Shah. 1994. Signature verification using a \"Siamese\" time delay neural network. In NIPS.","DOI":"10.1142\/9789812797926_0003"},{"key":"e_1_2_1_9_1","volume-title":"A real-time human-robot interaction system based on gestures for assistive scenarios. Computer Vision and Image Understanding 149","author":"Canal Gerard","year":"2016","unstructured":"Gerard Canal, Sergio Escalera, and Cecilio Angulo. 2016. A real-time human-robot interaction system based on gestures for assistive scenarios. Computer Vision and Image Understanding 149 (2016)."},{"key":"e_1_2_1_10_1","unstructured":"LLC Cao Gadgets. 2017. Wireless Sensor Tag System: Monitor Everything from the Internet."},{"key":"e_1_2_1_11_1","volume-title":"Xiaofan Jiang, and Feng Zhao.","author":"Cheng Yun","year":"2012","unstructured":"Yun Cheng, Kaifei Chen, Ben Zhang, Chieh-Jan Mike Liang, Xiaofan Jiang, and Feng Zhao. 2012. Accurate Real-Time Occupant Energy-Footprinting in Commercial Buildings. In BuildSys."},{"key":"e_1_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/3403574"},{"key":"e_1_2_1_13_1","unstructured":"Nian Shong Chok. 2010. Pearson's Versus Spearman's and Kendall's Correlation Coefficients for Continuous Data. (2010). http:\/\/d-scholarship.pitt.edu\/8056\/"},{"key":"e_1_2_1_14_1","unstructured":"Sumit Chopra Raia Hadsell and Yann LeCun. 2005. Learning a similarity metric discriminatively with application to face verification. In CVPR."},{"key":"e_1_2_1_15_1","unstructured":"Jason Cipriani. 2018. 13 new things you can do with your Android Wear smartwatch. https:\/\/www.cnet.com\/how-to\/tips-and-tricks-for-android-wear-2-0\/."},{"key":"e_1_2_1_16_1","volume-title":"Noble","author":"Corner Mark D.","year":"2002","unstructured":"Mark D. Corner and Brian D. Noble. 2002. Zero-interaction Authentication. In MobiCom."},{"key":"e_1_2_1_17_1","unstructured":"Christopher David. 2020. Guide to reduce the Arduino Power Consumption. https:\/\/diyi0t.com\/arduino-reduce-power-consumption\/"},{"key":"e_1_2_1_18_1","doi-asserted-by":"crossref","unstructured":"Alexander De Luca Alina Hang Frederik Brudy Christian Lindner and Heinrich Hussmann. 2012. Touch me once and i know it's you!: implicit authentication based on touch screen patterns. In CHI.","DOI":"10.1145\/2207676.2208544"},{"key":"e_1_2_1_19_1","volume-title":"Stork","author":"Duda Richard O.","year":"2000","unstructured":"Richard O. Duda, Peter E. Hart, and David G. Stork. 2000. Pattern Classification (2Nd Edition). New York, NY, USA."},{"key":"e_1_2_1_20_1","volume-title":"SI","author":"Elson Jeremy","year":"2002","unstructured":"Jeremy Elson, Lewis Girod, and Deborah Estrin. 2002. Fine-grained Network Time Synchronization Using Reference Broadcasts. SIGOPS Oper. Syst. Rev. 36, SI (2002)."},{"key":"e_1_2_1_21_1","volume-title":"Avoiding non-independence in fMRI data analysis: leave one subject out. Neuroimage 50, 2","author":"Esterman Michael","year":"2010","unstructured":"Michael Esterman, Benjamin J Tamber-Rosenau, Yu-Chin Chiu, and Steven Yantis. 2010. Avoiding non-independence in fMRI data analysis: leave one subject out. Neuroimage 50, 2 (2010)."},{"key":"e_1_2_1_22_1","volume-title":"Working Set Selection Using Second Order Information for Training Support Vector Machines. J. Mach. Learn. Res. 6","author":"Fan Rong-En","year":"2005","unstructured":"Rong-En Fan, Pai-Hsuen Chen, and Chih-Jen Lin. 2005. Working Set Selection Using Second Order Information for Training Support Vector Machines. J. Mach. Learn. Res. 6 (2005)."},{"key":"e_1_2_1_23_1","volume-title":"Human arm motion imitation by a humanoid robot","author":"Filiatrault Sylvain","unstructured":"Sylvain Filiatrault and Ana-Maria Cretu. 2014. Human arm motion imitation by a humanoid robot. In IEEE ROSE."},{"key":"e_1_2_1_24_1","doi-asserted-by":"crossref","unstructured":"R. D. Findling M. Muaaz D. Hintze and R. Mayrhofer. 2017. ShakeUnlock: Securely Transfer Authentication States Between Mobile Devices. TMC 16 4 (2017).","DOI":"10.1109\/TMC.2016.2582489"},{"key":"e_1_2_1_25_1","unstructured":"Forbes. 2018. Smartwatch Popularity Booms With Fitness Trackers On The Slide. https:\/\/www.forbes.com\/sites\/paullamkin\/2018\/02\/22\/smartwatch-popularity-booms-with-fitness-trackers-on-the-slide\/#6929d3087d96."},{"key":"e_1_2_1_26_1","unstructured":"NFC Forum. 2018. NFC and Contactless Technologies. https:\/\/nfc-forum.org\/what-is-nfc\/about-the-technology\/."},{"key":"e_1_2_1_27_1","unstructured":"Aur\u00e9lien Francillon Boris Danev and Srdjan Capkun. 2011. Relay attacks on passive keyless entry and start systems in modern cars. In NDSS."},{"key":"e_1_2_1_28_1","doi-asserted-by":"crossref","unstructured":"Lishoy Francis Gerhard Hancke Keith Mayes and Konstantinos Markantonakis. 2010. Practical NFC Peer-to-peer Relay Attack Using Mobile Phones. In RFIDSec.","DOI":"10.1007\/978-3-642-16822-2_4"},{"key":"e_1_2_1_29_1","volume-title":"Practical Relay Attack on Contactless Transactions by Using NFC Mobile Phones. IACR Cryptology ePrint Archive 2011","author":"Francis Lishoy","year":"2011","unstructured":"Lishoy Francis, Gerhard P. Hancke, Keith Mayes, and Konstantinos Markantonakis. 2011. Practical Relay Attack on Contactless Transactions by Using NFC Mobile Phones. IACR Cryptology ePrint Archive 2011 (2011)."},{"key":"e_1_2_1_30_1","volume-title":"Touchalytics: On the applicability of touchscreen input as a behavioral biometric for continuous authentication. TIFS 8, 1","author":"Frank Mario","year":"2013","unstructured":"Mario Frank, Ralf Biedert, Eugene Ma, Ivan Martinovic, and Dawn Song. 2013. Touchalytics: On the applicability of touchscreen input as a behavioral biometric for continuous authentication. TIFS 8, 1 (2013)."},{"key":"e_1_2_1_31_1","article-title":"A Comparative Study of Visual Reaction Time in Basketball Players and Healthy Controls","volume":"3","author":"Ghuntla T. P.","year":"2012","unstructured":"T. P. Ghuntla, H. B. Mehta, P. A. Gokhale, and C. J. Shah. 2012. A Comparative Study of Visual Reaction Time in Basketball Players and Healthy Controls. National Journal of Integrated Research in Medicine 3, 1 (2012).","journal-title":"National Journal of Integrated Research in Medicine"},{"key":"e_1_2_1_32_1","volume-title":"Explaining and harnessing adversarial examples. arXiv preprint arXiv:1412.6572","author":"Goodfellow Ian J","year":"2014","unstructured":"Ian J Goodfellow, Jonathon Shlens, and Christian Szegedy. 2014. Explaining and harnessing adversarial examples. arXiv preprint arXiv:1412.6572 (2014)."},{"key":"e_1_2_1_33_1","unstructured":"Google. 2021. Connect smart home devices in the Google Home app. https:\/\/support.google.com\/googlenest\/answer\/9159862?hl=en."},{"key":"e_1_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1145\/2428955.2428989"},{"key":"e_1_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1016\/S0167-8760(96)00038-4"},{"key":"e_1_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1145\/1506409.1506429"},{"key":"e_1_2_1_37_1","unstructured":"Dianqi Han Yimin Chen Tao Li Rui Zhang Yaochao Zhang and Terri Hedgpeth. 2018. Proximity-Proof: Secure and Usable Mobile Two-Factor Authentication. In MobiCom."},{"key":"e_1_2_1_38_1","volume-title":"Hae Young Noh, Pei Zhang, and Patrick Tague.","author":"Han Jun","year":"2017","unstructured":"Jun Han, Shijia Pan, Manal Kumar Sinha, Hae Young Noh, Pei Zhang, and Patrick Tague. 2017. SenseTribute: Smart Home Occupant Identification via Fusion Across On-Object Sensing Devices. In BuildSys."},{"key":"e_1_2_1_39_1","unstructured":"Gerhard Hancke. 2005. A practical relay attack on ISO 14443 proximity cards. Technical Report."},{"key":"e_1_2_1_40_1","unstructured":"Kaiming He Xiangyu Zhang Shaoqing Ren and Jian Sun. 2015. Delving Deep into Rectifiers: Surpassing Human-Level Performance on ImageNet Classiication. In ICCV."},{"key":"e_1_2_1_41_1","volume-title":"Long short-term memory. Neural computation 9, 8","author":"Hochreiter Sepp","year":"1997","unstructured":"Sepp Hochreiter and J\u00fcrgen Schmidhuber. 1997. Long short-term memory. Neural computation 9, 8 (1997)."},{"key":"e_1_2_1_42_1","volume-title":"Pollack","author":"Hodges Mark R.","year":"2007","unstructured":"Mark R. Hodges and Martha E. Pollack. 2007. An 'Object-Use Fingerprint': The Use of Electronic Sensors for Human Identification. In UbiComp."},{"key":"e_1_2_1_43_1","unstructured":"JACLYN DIAZ. 2021. High Gun Sales And More Time At Home Have Led To More Accidental Shootings By Kids. https:\/\/www.npr.org\/2021\/08\/31\/1032725392\/guns-death-children."},{"key":"e_1_2_1_44_1","doi-asserted-by":"publisher","DOI":"10.4103\/2229-516X.157168"},{"key":"e_1_2_1_45_1","unstructured":"Nikolaos Karapanos Claudio Marforio Claudio Soriente and Srdjan Capkun. 2015. Sound-Proof: Usable Two-Factor Authentication Based on Ambient Sound. In USENIX Security."},{"key":"e_1_2_1_46_1","doi-asserted-by":"publisher","DOI":"10.1109\/TBME.2015.2468589"},{"key":"e_1_2_1_47_1","volume-title":"37th Annual International Conference of the IEEE Engineering in Medicine and Biology Society (EMBC).","author":"Kiranyaz Serkan","year":"2015","unstructured":"Serkan Kiranyaz, Turker Ince, Ridha Hamila, and Moncef Gabbouj. 2015. Convolutional neural networks for patient-specific ECG classiication. In 37th Annual International Conference of the IEEE Engineering in Medicine and Biology Society (EMBC)."},{"key":"e_1_2_1_48_1","unstructured":"Alex Krizhevsky Ilya Sutskever and Geoffrey E Hinton. 2012. ImageNet Classification with Deep Convolutional Neural Networks. In NeurIPS."},{"key":"e_1_2_1_49_1","volume-title":"A comparative study of secure device pairing methods. Pervasive and Mobile Computing 5, 6","author":"Kumar Arun","year":"2009","unstructured":"Arun Kumar, Nitesh Saxena, Gene Tsudik, and Ersin Uzun. 2009. A comparative study of secure device pairing methods. Pervasive and Mobile Computing 5, 6 (2009)."},{"key":"e_1_2_1_50_1","doi-asserted-by":"publisher","DOI":"10.1145\/1964897.1964918"},{"key":"e_1_2_1_51_1","unstructured":"Lingjun Li Xinxin Zhao and Guoliang Xue. 2013. Unobservable Re-authentication for Smartphones. In NDSS."},{"key":"e_1_2_1_52_1","unstructured":"Xiaopeng Li Fengyao Yan Fei Zuo Qiang Zeng and Lannan Luo. 2019. Touch Well Before Use: Intuitive and Secure Authentication for IoT Devices. In MobiCom."},{"key":"e_1_2_1_53_1","unstructured":"Xiaopeng Li Qiang Zeng Lannan Luo and Tongbo Luo. 2020. T2pair: Secure and usable pairing for heterogeneous iot devices. In CCS."},{"key":"e_1_2_1_54_1","volume-title":"Exponentially weighted moving average control schemes: properties and enhancements. Technometrics 32, 1","author":"Lucas James M","year":"1990","unstructured":"James M Lucas and Michael S Saccucci. 1990. Exponentially weighted moving average control schemes: properties and enhancements. Technometrics 32, 1 (1990)."},{"key":"e_1_2_1_55_1","volume-title":"ZEBRA: Zero-Effort Bilateral Recurring Authentication. In S&P.","author":"Mare S.","year":"2014","unstructured":"S. Mare, A. M. Markham, C. Cornelius, R. Peterson, and D. Kotz. 2014. ZEBRA: Zero-Effort Bilateral Recurring Authentication. In S&P."},{"key":"e_1_2_1_56_1","volume-title":"SAW: Wristband-based Authentication for Desktop Computers. IMWUT 2, 3","author":"Mare Shrirang","year":"2018","unstructured":"Shrirang Mare, Reza Rawassizadeh, Ronald Peterson, and David Kotz. 2018. SAW: Wristband-based Authentication for Desktop Computers. IMWUT 2, 3 (2018)."},{"key":"e_1_2_1_57_1","doi-asserted-by":"publisher","DOI":"10.14722\/usec.2019.23013"},{"key":"e_1_2_1_58_1","doi-asserted-by":"crossref","unstructured":"R. Mayrhofer and H. Gellersen. 2009. Shake Well Before Use: Intuitive and Secure Pairing of Mobile Devices. TMC 8 6 (2009).","DOI":"10.1109\/TMC.2009.51"},{"key":"e_1_2_1_59_1","volume-title":"HFES Annual Meeting 44","author":"McGehee Daniel V.","year":"2000","unstructured":"Daniel V. McGehee, Elizabeth N. Mazzae, and G.H. Scott Baldwin. 2000. Driver Reaction Time in Crash Avoidance Research: Validation of a Driving Simulator Study on a Test Track. HFES Annual Meeting 44, 20 (2000)."},{"key":"e_1_2_1_60_1","doi-asserted-by":"crossref","unstructured":"Yuxin Meng Duncan S Wong Roman Schlegel et al. 2012. Touch gestures based biometric authentication scheme for touchscreen mobile phones. In ICISC.","DOI":"10.1007\/978-3-642-38519-3_21"},{"key":"e_1_2_1_61_1","volume-title":"Ahmad-Reza Sadeghi, and Majid Sobhani.","author":"Miettinen Markus","year":"2014","unstructured":"Markus Miettinen, N. Asokan, Thien Duc Nguyen, Ahmad-Reza Sadeghi, and Majid Sobhani. 2014. Context-Based Zero-Interaction Pairing and Key Evolution for Advanced Personal Devices. In CCS."},{"key":"e_1_2_1_62_1","doi-asserted-by":"publisher","DOI":"10.1109\/26.103043"},{"key":"e_1_2_1_63_1","doi-asserted-by":"crossref","unstructured":"Fabian Monrose and Aviel Rubin. 1997. Authentication via Keystroke Dynamics. In CCS.","DOI":"10.1145\/266420.266434"},{"key":"e_1_2_1_64_1","doi-asserted-by":"publisher","DOI":"10.5555\/1324818"},{"key":"e_1_2_1_65_1","unstructured":"Notion. 2019. Monitor your home wherever you are. https:\/\/getnotion.com\/."},{"key":"e_1_2_1_66_1","doi-asserted-by":"publisher","DOI":"10.5555\/1953048.2078195"},{"key":"e_1_2_1_67_1","volume-title":"David MJ Tax, and Laurens van der Maaten","author":"Pei Wenjie","year":"2016","unstructured":"Wenjie Pei, David MJ Tax, and Laurens van der Maaten. 2016. Modeling time series similarity with siamese recurrent networks. arXiv preprint arXiv:1603.04713 (2016)."},{"key":"e_1_2_1_68_1","volume-title":"Denial of service attacks in wireless networks: The case of jammers","author":"Pelechrinis Konstantinos","year":"2010","unstructured":"Konstantinos Pelechrinis, Marios Iliofotou, and Srikanth V Krishnamurthy. 2010. Denial of service attacks in wireless networks: The case of jammers. IEEE Communications Surveys & Tutorials 13, 2 (2010)."},{"key":"e_1_2_1_69_1","doi-asserted-by":"crossref","unstructured":"Aanjhan Ranganathan and Srdjan Capkun. 2017. Are we really close? verifying proximity in wireless systems. In S&P.","DOI":"10.1109\/MSP.2017.56"},{"key":"e_1_2_1_70_1","doi-asserted-by":"crossref","unstructured":"Juhi Ranjan Erin Griffiths and Kamin Whitehouse. 2014. Discerning Electrical and Water Usage by Individuals in Homes. In BuildSys.","DOI":"10.1145\/2674061.2674066"},{"key":"e_1_2_1_71_1","doi-asserted-by":"publisher","DOI":"10.1145\/2750858.2804263"},{"key":"e_1_2_1_72_1","unstructured":"RobotoLab. 2020. NAO V6 price is $9000. https:\/\/www.robotlab.com\/store\/nao-power-v6-educator-pack."},{"key":"e_1_2_1_73_1","doi-asserted-by":"crossref","unstructured":"Napa Sae-Bae Kowsar Ahmed Katherine Isbister and Nasir Memon. 2012. Biometric-rich gestures: a novel approach to authentication on multi-touch devices. In CHI.","DOI":"10.1145\/2207676.2208543"},{"key":"e_1_2_1_74_1","doi-asserted-by":"crossref","unstructured":"Hataichanok Saevanee and Pattarasinee Bhatarakosol. 2008. User authentication using combination of behavioral biometrics over the touchpad acting like touch screen of mobile device. In ICCEE.","DOI":"10.1109\/ICCEE.2008.157"},{"key":"e_1_2_1_75_1","doi-asserted-by":"publisher","DOI":"10.1109\/TMC.2011.271"},{"key":"e_1_2_1_76_1","article-title":"Biometric authentication using fast correlation of near infrared hand vein patterns","volume":"2","author":"Shahin Mohamed","year":"2007","unstructured":"Mohamed Shahin, Ahmed Badawi, and Mohamed Kamel. 2007. Biometric authentication using fast correlation of near infrared hand vein patterns. International Journal of Biological and Medical Sciences 2, 3 (2007).","journal-title":"International Journal of Biological and Medical Sciences"},{"key":"e_1_2_1_77_1","doi-asserted-by":"publisher","DOI":"10.1016\/0167-8760(84)90045-X"},{"key":"e_1_2_1_78_1","volume-title":"HMOG: New behavioral biometric features for continuous authentication of smartphone users. TIFS 11, 5","author":"Sitov\u00e1 Zde\u0148ka","year":"2016","unstructured":"Zde\u0148ka Sitov\u00e1, Jaroslav \u0160ed\u011bnka, Qing Yang, Ge Peng, Gang Zhou, Paolo Gasti, and Kiran S Balagani. 2016. HMOG: New behavioral biometric features for continuous authentication of smartphone users. TIFS 11, 5 (2016)."},{"key":"e_1_2_1_79_1","unstructured":"Samsung SmartThings. 2017. SmartThings Multipurpose Sensor. https:\/\/support.smartthings.com\/hc\/en-us\/articles\/205382174-Samsung-SmartThings-Multipurpose-Sensor."},{"key":"e_1_2_1_80_1","doi-asserted-by":"crossref","unstructured":"Christian Szegedy Wei Liu Yangqing Jia Pierre Sermanet Scott Reed Dragomir Anguelov Dumitru Erhan Vincent Vanhoucke and Andrew Rabinovich. 2015. Going Deeper With Convolutions. In CVPR.","DOI":"10.1109\/CVPR.2015.7298594"},{"key":"e_1_2_1_81_1","unstructured":"Emmanuel Munguia Tapia Stephen S. Intille and Kent Larson. 2004. Activity Recognition in the Home Using Simple and Ubiquitous Sensors. In Pervasive Computing."},{"key":"e_1_2_1_82_1","unstructured":"Texas Instruments. 2021. CC2652R SimpleLinkTM Multiprotocol 2.4 GHz Wireless MCU. Technical Report."},{"key":"e_1_2_1_83_1","unstructured":"TripWire. 2017. Relay Attack against Keyless Vehicle Entry Systems Caught on Film. https:\/\/www.tripwire.com\/state-of-security\/security-awareness\/relay-attack-keyless-vehicle-entry-systems-caught-film\/."},{"key":"e_1_2_1_84_1","article-title":"Visualizing data using t-SNE","volume":"9","author":"der Maaten Laurens Van","year":"2008","unstructured":"Laurens Van der Maaten and Geoffrey Hinton. 2008. Visualizing data using t-SNE. Journal of machine learning research 9, 11 (2008).","journal-title":"Journal of machine learning research"},{"key":"e_1_2_1_85_1","doi-asserted-by":"crossref","unstructured":"Rahul Rama Varior Mrinal Haloi and Gang Wang. 2016. Gated Siamese Convolutional Neural Network Architecture for Human Re-identiication. In ECCV.","DOI":"10.1007\/978-3-319-46484-8_48"},{"key":"e_1_2_1_86_1","volume-title":"Rodr\u00edguez","author":"Vila Jos\u00e9","year":"2015","unstructured":"Jos\u00e9 Vila and Ricardo J. Rodr\u00edguez. 2015. Practical Experiences on NFC Relay Attacks with Android. In Radio Frequency Identification."},{"key":"e_1_2_1_87_1","doi-asserted-by":"crossref","unstructured":"Wei Wang Lin Yang and Qian Zhang. 2016. Touch-and-guard: secure pairing through hand resonance. In UbiComp.","DOI":"10.1145\/2971648.2971688"},{"key":"e_1_2_1_88_1","doi-asserted-by":"publisher","DOI":"10.1109\/TAU.1967.1161901"},{"key":"e_1_2_1_89_1","unstructured":"Wired. 2017. Just a Pair of These $11 Radio Gadgets Can Steal a Car. https:\/\/www.wired.com\/2017\/04\/just-pair-11-radio-gadgets-can-steal-car\/."},{"key":"e_1_2_1_90_1","unstructured":"Chuxiong Wu Xiaopeng Li Lannan Luo and Qiang Zeng. 2022. G2Auth: secure mutual authentication for drone delivery without special user-side hardware. In MobiSys."},{"key":"e_1_2_1_91_1","doi-asserted-by":"crossref","unstructured":"Wei Xi Chen Qian Jinsong Han Kun Zhao Sheng Zhong Xiang-Yang Li and Jizhong Zhao. 2016. Instant and Robust Authentication and Key Agreement Among Mobile Devices. In CCS.","DOI":"10.1145\/2976749.2978298"},{"key":"e_1_2_1_92_1","doi-asserted-by":"publisher","DOI":"10.1145\/3023954"},{"key":"e_1_2_1_93_1","unstructured":"Zhenyu Yan Qun Song Rui Tan Yang Li and Adams Wai Kin Kong. 2019. Towards Touch-to-Access Device Authentication Using Induced Body Electric Potentials. In MobiComp."},{"key":"e_1_2_1_94_1","volume-title":"Phyo Phyo San, Xiaoli Li, and Shonali Krishnaswamy.","author":"Yang Jianbo","year":"2015","unstructured":"Jianbo Yang, Minh Nhut Nguyen, Phyo Phyo San, Xiaoli Li, and Shonali Krishnaswamy. 2015. Deep Convolutional Neural Networks on Multichannel Time Series for Human Activity Recognition. In IJCAI."},{"key":"e_1_2_1_95_1","doi-asserted-by":"crossref","unstructured":"Nan Zheng Aaron Paloski and Haining Wang. 2011. An Efficient User Verification System via Mouse Movements. In CCS.","DOI":"10.1145\/2046707.2046725"},{"key":"e_1_2_1_96_1","volume-title":"Nauth: Secure face-to-face device authentication via nonlinearity. In Infocom.","author":"Zhou Xinyan","year":"2019","unstructured":"Xinyan Zhou, Xiaoyu Ji, Chen Yan, Jiangyi Deng, and Wenyuan Xu. 2019. Nauth: Secure face-to-face device authentication via nonlinearity. In Infocom."},{"key":"e_1_2_1_97_1","doi-asserted-by":"crossref","unstructured":"Fei Zuo Xiaopeng Li Patrick Young Lannan Luo Qiang Zeng and Zhexin Zhang. 2019. Neural machine translation inspired binary code similarity comparison beyond function pairs. In NDSS.","DOI":"10.14722\/ndss.2019.23492"}],"container-title":["Proceedings of the ACM on Interactive, Mobile, Wearable and Ubiquitous Technologies"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3550322","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3550322","content-type":"application\/pdf","content-version":"vor","intended-application":"syndication"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3550322","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,7,14]],"date-time":"2025-07-14T04:41:55Z","timestamp":1752468115000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3550322"}},"subtitle":["Accurate Implicit Authentication for Everyday Objects with Smart Sensing"],"short-title":[],"issued":{"date-parts":[[2022,9,6]]},"references-count":97,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2022,9,6]]}},"alternative-id":["10.1145\/3550322"],"URL":"https:\/\/doi.org\/10.1145\/3550322","relation":{},"ISSN":["2474-9567"],"issn-type":[{"value":"2474-9567","type":"electronic"}],"subject":[],"published":{"date-parts":[[2022,9,6]]},"assertion":[{"value":"2022-09-07","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}