{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,13]],"date-time":"2026-04-13T18:18:49Z","timestamp":1776104329281,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":72,"publisher":"ACM","license":[{"start":{"date-parts":[[2024,5,11]],"date-time":"2024-05-11T00:00:00Z","timestamp":1715385600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"funder":[{"DOI":"10.13039\/https:\/\/doi.org\/10.13039\/501100001659","name":"Deutsche Forschungsgemeinschaft","doi-asserted-by":"publisher","award":["426052422, 425869382"],"award-info":[{"award-number":["426052422, 425869382"]}],"id":[{"id":"10.13039\/https:\/\/doi.org\/10.13039\/501100001659","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2024,5,11]]},"DOI":"10.1145\/3613904.3642471","type":"proceedings-article","created":{"date-parts":[[2024,5,11]],"date-time":"2024-05-11T08:38:25Z","timestamp":1715416705000},"page":"1-19","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":15,"title":["Kinetic Signatures: A Systematic Investigation of Movement-Based User Identification in Virtual Reality"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-6923-9066","authenticated-orcid":false,"given":"Jonathan","family":"Liebers","sequence":"first","affiliation":[{"name":"HCI Group, University of Duisburg-Essen, Germany"}]},{"ORCID":"https:\/\/orcid.org\/0009-0001-4212-8657","authenticated-orcid":false,"given":"Patrick","family":"Laskowski","sequence":"additional","affiliation":[{"name":"HCI Group, University of Duisburg-Essen, Germany"}]},{"ORCID":"https:\/\/orcid.org\/0009-0009-6705-5165","authenticated-orcid":false,"given":"Florian","family":"Rademaker","sequence":"additional","affiliation":[{"name":"HCI Group, University of Duisburg-Essen, Germany"}]},{"ORCID":"https:\/\/orcid.org\/0009-0002-7154-2870","authenticated-orcid":false,"given":"Leon","family":"Sabel","sequence":"additional","affiliation":[{"name":"HCI Group, University of Duisburg-Essen, Germany"}]},{"ORCID":"https:\/\/orcid.org\/0009-0002-4555-4763","authenticated-orcid":false,"given":"Jordan","family":"Hoppen","sequence":"additional","affiliation":[{"name":"HCI Group, University of Duisburg-Essen, Germany"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-5671-1640","authenticated-orcid":false,"given":"Uwe","family":"Gruenefeld","sequence":"additional","affiliation":[{"name":"HCI Group, University of Duisburg-Essen, Germany"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-0132-4934","authenticated-orcid":false,"given":"Stefan","family":"Schneegass","sequence":"additional","affiliation":[{"name":"HCI Group, University of Duisburg-Essen, Germany"}]}],"member":"320","published-online":{"date-parts":[[2024,5,11]]},"reference":[{"key":"e_1_3_3_3_1_1","doi-asserted-by":"publisher","DOI":"10.1109\/AIVR46125.2019.00012"},{"key":"e_1_3_3_3_2_1","doi-asserted-by":"publisher","DOI":"10.1145\/3603555.3603574"},{"key":"e_1_3_3_3_3_1","volume-title":"The Biophysical Foundations of Human Movement. Human Kinetics","author":"Abernethy Bruce","unstructured":"Bruce Abernethy, Vaughan Kippers, Laurel\u00a0Traeger Mackinnon, Robert\u00a0J. Neal, and Stephanie Hanrahan. 1997. The Biophysical Foundations of Human Movement. Human Kinetics, Champaign, Illinois, USA."},{"key":"e_1_3_3_3_4_1","doi-asserted-by":"publisher","DOI":"10.1145\/322796.322806"},{"key":"e_1_3_3_3_5_1","doi-asserted-by":"publisher","DOI":"10.1109\/MSEC.2021.3127459"},{"key":"e_1_3_3_3_6_1","volume-title":"Proceedings of 10th IADIS International Conference e-Society. IADIS Press","author":"Asif Muhammad","year":"2012","unstructured":"Muhammad Asif and John Krogstie. 2012. Taxonomy of personalization in mobile services. In Proceedings of 10th IADIS International Conference e-Society. IADIS Press, Berlin, Germany, 343\u2013350."},{"key":"e_1_3_3_3_7_1","doi-asserted-by":"publisher","unstructured":"Mirjam Augstein Eelco Herder and Wolfgang W\u00f6rndl (Eds.). 2019. Personalized human-computer interaction. De Gruyter Berlin and Boston. https:\/\/doi.org\/10.1515\/9783110552485","DOI":"10.1515\/9783110552485"},{"key":"e_1_3_3_3_8_1","volume-title":"2022. Anatomy and Physiology 2e. OpenStax","author":"Betts Gordon","unstructured":"J.\u00a0Gordon Betts, Kelly\u00a0A. Young, James\u00a0A. Wise, Eddie Johnson, Brandon Poe, Dean\u00a0H. Kruse, Oksana Korol, Jody\u00a0E. Johnson, Mark Womble, and Peter\u00a0DeSaix et al.2022. Anatomy and Physiology 2e. OpenStax, Chapter 10.4 Nervous System Control of Muscle Tension. Available online at https:\/\/openstax.org\/books\/anatomy-and-physiology-2e\/pages\/10-4-nervous-system-control-of-muscle-tension. Access for free at http:\/\/openstax.org, last retrieved on 2024\/03\/08 15:51:15."},{"key":"e_1_3_3_3_9_1","volume-title":"2022. Anatomy and Physiology 2e. OpenStax","author":"Betts Gordon","unstructured":"J.\u00a0Gordon Betts, Kelly\u00a0A. Young, James\u00a0A. Wise, Eddie Johnson, Brandon Poe, Dean\u00a0H. Kruse, Oksana Korol, Jody\u00a0E. Johnson, Mark Womble, and Peter\u00a0DeSaix et al.2022. Anatomy and Physiology 2e. OpenStax, Chapter 10.4 Nervous System Control of Muscle Tension, Figure 10.13. Figure licensed under CC-BY-4.0. Figure available online at https:\/\/openstax.org\/books\/anatomy-and-physiology-2e\/pages\/10-4-nervous-system-control-of-muscle-tension#fig-ch10_04_01. Access for free at http:\/\/openstax.org. Figure was adapted into a horizontal layout by splitting it into Figures\u00a02(a), 2(b), and 3(a) of this work and by changing its color to greyscale. Hyperlinks last retrieved on 2024\/03\/08 15:51:15."},{"key":"e_1_3_3_3_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/2699390"},{"key":"e_1_3_3_3_11_1","volume-title":"Workshop on Human-Computer Interaction and Security Systems at CHI 2003","author":"Brostoff Sascha","year":"2003","unstructured":"Sascha Brostoff and M.\u00a0Angela Sasse. 2003. \u201cTen strikes and you\u2019re out\u201d: Increasing the number of login attempts can improve password usability. In Workshop on Human-Computer Interaction and Security Systems at CHI 2003. ACM, Fort Lauderdale, Florida, 4\u00a0pages. https:\/\/discovery.ucl.ac.uk\/id\/eprint\/19826\/"},{"key":"e_1_3_3_3_12_1","doi-asserted-by":"publisher","DOI":"10.14722\/usec.2017.23028"},{"key":"e_1_3_3_3_13_1","doi-asserted-by":"publisher","DOI":"10.3758\/BF03337021"},{"key":"e_1_3_3_3_14_1","doi-asserted-by":"publisher","DOI":"10.1145\/3543758.3547571"},{"key":"e_1_3_3_3_15_1","doi-asserted-by":"publisher","DOI":"10.1145\/3472749.3474810"},{"key":"e_1_3_3_3_16_1","doi-asserted-by":"publisher","DOI":"10.1016\/S0969-4765(16)30049-2"},{"key":"e_1_3_3_3_17_1","unstructured":"David\u00a0L. Gallahue Jackie Goodway and John\u00a0C. Ozmun. 2020. Understanding motor development: Infants children adolescents adults (eighth edition ed.). Jones & Bartlett Learning Burlington MA."},{"key":"e_1_3_3_3_18_1","doi-asserted-by":"publisher","unstructured":"Gonzalo\u00a0Munilla Garrido Vivek Nair and Dawn Song. 2023. SoK: Data Privacy in Virtual Reality. https:\/\/doi.org\/10.48550\/arXiv.2301.05940","DOI":"10.48550\/arXiv.2301.05940"},{"key":"e_1_3_3_3_19_1","doi-asserted-by":"publisher","unstructured":"Marc\u00a0D. Gellman (Ed.). 2020. Encyclopedia of Behavioral Medicine. Springer International Publishing Cham. https:\/\/doi.org\/10.1007\/978-3-030-39903-0","DOI":"10.1007\/978-3-030-39903-0"},{"key":"e_1_3_3_3_20_1","volume-title":"Augmented Reality, Virtual Reality, and Computer Graphics, Lucio\u00a0Tommaso de\u00a0Paolis and Patrick Bourdot (Eds.)","author":"George Ceenu","unstructured":"Ceenu George, Daniel Buschek, Andrea Ngao, and Mohamed Khamis. 2020. GazeRoomLock: Using Gaze and Head-Pose to Improve the Usability and Observation Resistance of 3D Passwords in Virtual Reality. In Augmented Reality, Virtual Reality, and Computer Graphics, Lucio\u00a0Tommaso de\u00a0Paolis and Patrick Bourdot (Eds.). Springer International Publishing, Cham, 61\u201381."},{"key":"e_1_3_3_3_21_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10618-019-00619-1"},{"key":"e_1_3_3_3_22_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-0-387-77326-1_1"},{"key":"e_1_3_3_3_23_1","doi-asserted-by":"publisher","DOI":"10.5555\/1855628.1855637"},{"key":"e_1_3_3_3_24_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-05710-7_5"},{"key":"e_1_3_3_3_25_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-35374-2_1"},{"key":"e_1_3_3_3_26_1","doi-asserted-by":"publisher","DOI":"10.1145\/3411764.3445528"},{"key":"e_1_3_3_3_27_1","doi-asserted-by":"publisher","DOI":"10.1080\/10447318.2022.2120845"},{"key":"e_1_3_3_3_28_1","doi-asserted-by":"publisher","DOI":"10.1145\/3611659.3615696"},{"key":"e_1_3_3_3_29_1","doi-asserted-by":"publisher","DOI":"10.1145\/3489849.3489880"},{"key":"e_1_3_3_3_30_1","doi-asserted-by":"publisher","DOI":"10.1145\/3379157.3391421"},{"key":"e_1_3_3_3_31_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICCES48766.2020.9137914"},{"key":"e_1_3_3_3_32_1","doi-asserted-by":"publisher","DOI":"10.1145\/3334480.3382827"},{"key":"e_1_3_3_3_33_1","doi-asserted-by":"publisher","unstructured":"M.\u00a0R. Miller E. Han C. DeVeaux E. Jones R. Chen and J.\u00a0N. Bailenson. 2023. A Large-Scale Study of Personal Identifiability of Virtual Reality Motion Over Time. https:\/\/doi.org\/10.48550\/arXiv.2303.01430","DOI":"10.48550\/arXiv.2303.01430"},{"key":"e_1_3_3_3_34_1","doi-asserted-by":"publisher","DOI":"10.1038\/s41598-020-74486-y"},{"key":"e_1_3_3_3_35_1","doi-asserted-by":"publisher","unstructured":"R. Miller A. Ajit N.\u00a0K. Banerjee and S. Banerjee. 2019. Realtime Behavior-Based Continual Authentication of Users in Virtual Reality Environments. In 2019 IEEE International Conference on Artificial Intelligence and Virtual Reality (AIVR). IEEE Computer Society Los Alamitos CA USA 253\u20132531. https:\/\/doi.org\/10.1109\/AIVR46125.2019.00058","DOI":"10.1109\/AIVR46125.2019.00058"},{"key":"e_1_3_3_3_36_1","doi-asserted-by":"publisher","unstructured":"R. Miller N.\u00a0K. Banerjee and S. Banerjee. 2021. Using Siamese Neural Networks to Perform Cross-System Behavioral Authentication in Virtual Reality. In 2021 IEEE Virtual Reality and 3D User Interfaces (VR). IEEE Lisboa Portugal 140\u2013149. https:\/\/doi.org\/10.1109\/VR50410.2021.00035","DOI":"10.1109\/VR50410.2021.00035"},{"key":"e_1_3_3_3_37_1","doi-asserted-by":"publisher","DOI":"10.1109\/VR51125.2022.00060"},{"key":"e_1_3_3_3_38_1","doi-asserted-by":"publisher","DOI":"10.1109\/VR51125.2022.00076"},{"key":"e_1_3_3_3_39_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jacc.2005.02.015"},{"key":"e_1_3_3_3_40_1","doi-asserted-by":"publisher","DOI":"10.1016\/0735-1097(94)90841-9"},{"key":"e_1_3_3_3_41_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-18178-8_31"},{"key":"e_1_3_3_3_42_1","doi-asserted-by":"publisher","DOI":"10.1109\/ISMAR52148.2021.00037"},{"key":"e_1_3_3_3_43_1","doi-asserted-by":"publisher","DOI":"10.1145\/3180445.3180450"},{"key":"e_1_3_3_3_44_1","unstructured":"Vivek Nair Wenbo Guo Justus Mattern Rui Wang James\u00a0F. O\u2019Brien Louis Rosenberg and Dawn Song. 2023. Unique Identification of 50 000+ Virtual Reality Users from Head & Hand Motion Data. http:\/\/arxiv.org\/pdf\/2302.08927v1"},{"key":"e_1_3_3_3_45_1","doi-asserted-by":"publisher","unstructured":"Vivek Nair Wenbo Guo Rui Wang James\u00a0F. O\u2019Brien Louis Rosenberg and Dawn Song. 2023. Berkeley Open Extended Reality Recordings 2023 (BOXRR-23): 4.7 Million Motion Capture Recordings from 105 852 Extended Reality Device Users. https:\/\/doi.org\/10.48550\/arXiv.2310.00430","DOI":"10.48550\/arXiv.2310.00430"},{"key":"e_1_3_3_3_46_1","doi-asserted-by":"crossref","unstructured":"Vivek Nair Christian Rack Wenbo Guo Rui Wang Shuixian Li Brandon Huang Atticus Cull James\u00a0F. O\u2019Brien Marc Latoschik Louis Rosenberg and Dawn Song. 2023. Inferring Private Personal Attributes of Virtual Reality Users from Head and Hand Motion Data. arxiv:2305.19198\u00a0[cs.HC]","DOI":"10.1109\/VRW62533.2024.00094"},{"key":"e_1_3_3_3_47_1","doi-asserted-by":"publisher","DOI":"10.1145\/3586183.3606754"},{"key":"e_1_3_3_3_48_1","volume-title":"Secure Knowledge Management In The Artificial Intelligence Era, Ram Krishnan, H.\u00a0Raghav Rao, Sanjay\u00a0K","author":"Nosenko Alex","unstructured":"Alex Nosenko, Yuan Cheng, and Haiquan Chen. 2022. Learning Password Modification Patterns with\u00a0Recurrent Neural Networks. In Secure Knowledge Management In The Artificial Intelligence Era, Ram Krishnan, H.\u00a0Raghav Rao, Sanjay\u00a0K. Sahay, Sagar Samtani, and Ziming Zhao (Eds.). Springer International Publishing, Cham, 110\u2013129."},{"key":"e_1_3_3_3_49_1","doi-asserted-by":"publisher","DOI":"10.3390\/s20102944"},{"key":"e_1_3_3_3_50_1","doi-asserted-by":"publisher","DOI":"10.1177\/1941738113491386"},{"key":"e_1_3_3_3_51_1","doi-asserted-by":"publisher","DOI":"10.1037\/bul0000229"},{"key":"e_1_3_3_3_52_1","doi-asserted-by":"publisher","DOI":"10.1145\/3290605.3300340"},{"key":"e_1_3_3_3_53_1","doi-asserted-by":"publisher","DOI":"10.1109\/VRW50115.2020.00070"},{"key":"e_1_3_3_3_54_1","doi-asserted-by":"publisher","DOI":"10.3389\/frvir.2023.1272234"},{"key":"e_1_3_3_3_55_1","unstructured":"Christian Rack Konstantin Kobs Tamara Fernando Andreas Hotho and Marc\u00a0Erich Latoschik. 2023. Extensible Motion-based Identification of XR Users using Non-Specific Motion Data. arxiv:2302.07517\u00a0[cs.HC]"},{"key":"e_1_3_3_3_56_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2022.3197756"},{"key":"e_1_3_3_3_57_1","doi-asserted-by":"publisher","DOI":"10.1177\/154193120605000909"},{"key":"e_1_3_3_3_58_1","doi-asserted-by":"publisher","DOI":"10.1016\/s0166-4115(08)62386-9"},{"key":"e_1_3_3_3_59_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-07308-8_23"},{"key":"e_1_3_3_3_60_1","doi-asserted-by":"publisher","unstructured":"Christian Schell Andreas Hotho and Marc\u00a0Erich Latoschik. 2022. Comparison of Data Encodings and Machine Learning Architectures for User Identification on Arbitrary Motion Sequences. In 2022 IEEE International Conference on Artificial Intelligence and Virtual Reality (AIVR). IEEE CA USA 11\u201319. https:\/\/doi.org\/10.1109\/AIVR56993.2022.00010","DOI":"10.1109\/AIVR56993.2022.00010"},{"key":"e_1_3_3_3_61_1","doi-asserted-by":"publisher","DOI":"10.1007\/BF01324126"},{"key":"e_1_3_3_3_62_1","doi-asserted-by":"publisher","unstructured":"E. Shi Y. Niu M. Jakobsson and R. Chow. 2011. Implicit Authentication through Learning User Behavior. In Information Security M.\u00a0Burmester G.\u00a0Tsudik S.\u00a0Magliveras and I.\u00a0Ili\u0107 (Eds.). Springer Berlin Heidelberg Berlin Heidelberg 99\u2013113. https:\/\/doi.org\/10.1007\/978-3-642-18178-8_9","DOI":"10.1007\/978-3-642-18178-8_9"},{"key":"e_1_3_3_3_63_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP46214.2022.9833742"},{"key":"e_1_3_3_3_64_1","doi-asserted-by":"publisher","DOI":"10.1145\/3190618"},{"key":"e_1_3_3_3_65_1","doi-asserted-by":"crossref","unstructured":"Issa Traore and Ahmed Awad\u00a0E. Ahmed (Eds.). 2012. Continuous Authentication Using Biometrics: Data Models and Metrics. IGI Global Hershey PA USA.","DOI":"10.4018\/978-1-61350-129-0"},{"key":"e_1_3_3_3_66_1","doi-asserted-by":"publisher","DOI":"10.4018\/978-1-61350-129-0.ch001"},{"key":"e_1_3_3_3_67_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2023.3240071"},{"key":"e_1_3_3_3_68_1","doi-asserted-by":"publisher","DOI":"10.1145\/3411763.3451769"},{"key":"e_1_3_3_3_69_1","doi-asserted-by":"publisher","unstructured":"Elliott Wen Chitralekha Gupta Prasanth Sasikumar Mark Billinghurst James Wilmott Emily Skow Arindam Dey and Suranga Nanayakkara. 2023. VR.net: A Real-world Dataset for Virtual Reality Motion Sickness Research. https:\/\/doi.org\/10.48550\/arXiv.2306.03381","DOI":"10.48550\/arXiv.2306.03381"},{"key":"e_1_3_3_3_70_1","doi-asserted-by":"publisher","DOI":"10.1109\/ISMAR-Adjunct57072.2022.00090"},{"key":"e_1_3_3_3_71_1","doi-asserted-by":"publisher","DOI":"10.1145\/1978942.1978963"},{"key":"e_1_3_3_3_72_1","doi-asserted-by":"publisher","DOI":"10.1109\/APCCAS.2016.7804002"}],"event":{"name":"CHI '24: CHI Conference on Human Factors in Computing Systems","location":"Honolulu HI USA","acronym":"CHI '24","sponsor":["SIGCHI ACM Special Interest Group on Computer-Human Interaction","SIGACCESS ACM Special Interest Group on Accessible Computing"]},"container-title":["Proceedings of the CHI Conference on Human Factors in Computing Systems"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3613904.3642471","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3613904.3642471","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T23:56:48Z","timestamp":1750291008000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3613904.3642471"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,5,11]]},"references-count":72,"alternative-id":["10.1145\/3613904.3642471","10.1145\/3613904"],"URL":"https:\/\/doi.org\/10.1145\/3613904.3642471","relation":{},"subject":[],"published":{"date-parts":[[2024,5,11]]},"assertion":[{"value":"2024-05-11","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}