{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T05:01:20Z","timestamp":1750309280490,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":51,"publisher":"ACM","license":[{"start":{"date-parts":[[2024,6,3]],"date-time":"2024-06-03T00:00:00Z","timestamp":1717372800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"funder":[{"DOI":"10.13039\/100000144","name":"Division of Computer and Network Systems","doi-asserted-by":"publisher","award":["CNS2114220","CNS2120396","CNS2120276","CNS2145389"],"award-info":[{"award-number":["CNS2114220","CNS2120396","CNS2120276","CNS2145389"]}],"id":[{"id":"10.13039\/100000144","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100000145","name":"Division of Information and Intelligent Systems","doi-asserted-by":"publisher","award":["IIS2311597"],"award-info":[{"award-number":["IIS2311597"]}],"id":[{"id":"10.13039\/100000145","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100000143","name":"Division of Computing and Communication Foundations","doi-asserted-by":"publisher","award":["CCF2211163"],"award-info":[{"award-number":["CCF2211163"]}],"id":[{"id":"10.13039\/100000143","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2024,6,3]]},"DOI":"10.1145\/3643832.3661884","type":"proceedings-article","created":{"date-parts":[[2024,6,4]],"date-time":"2024-06-04T17:14:23Z","timestamp":1717521263000},"page":"141-154","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":2,"title":["TouchTone: Smartwatch Privacy Protection via Unobtrusive Finger Touch Gestures"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-3970-9917","authenticated-orcid":false,"given":"Yilin","family":"Yang","sequence":"first","affiliation":[{"name":"Rutgers University, Piscataway, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-3984-6973","authenticated-orcid":false,"given":"Yan","family":"Wang","sequence":"additional","affiliation":[{"name":"Temple University, Philadelphia, United States"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-3994-766X","authenticated-orcid":false,"given":"Yingying","family":"Chen","sequence":"additional","affiliation":[{"name":"Rutgers University, Piscataway, United States"}]},{"ORCID":"https:\/\/orcid.org\/0009-0003-5528-0783","authenticated-orcid":false,"given":"Zhengkun","family":"Ye","sequence":"additional","affiliation":[{"name":"Temple University, Philadelphia, United States"}]},{"ORCID":"https:\/\/orcid.org\/0009-0002-1718-8938","authenticated-orcid":false,"given":"Xin","family":"Li","sequence":"additional","affiliation":[{"name":"Rutgers University, Piscataway, USA"}]},{"ORCID":"https:\/\/orcid.org\/0009-0007-9920-3308","authenticated-orcid":false,"given":"Zhiliang","family":"Xia","sequence":"additional","affiliation":[{"name":"University of Electronic Science and Technology of China, Chengdu, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-2286-1384","authenticated-orcid":false,"given":"Yanzhi","family":"Ren","sequence":"additional","affiliation":[{"name":"University of Electronic Science and Technology of China, Chengdu, China"}]}],"member":"320","published-online":{"date-parts":[[2024,6,4]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-74549-5_80"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1145\/3384419.3430773"},{"key":"e_1_3_2_1_3_1","first-page":"417","volume-title":"Seventeenth Symposium on Usable Privacy and Security (SOUPS 2021)","author":"Bailey D. V.","year":"2021","unstructured":"Bailey, D. V., Markert, P., and Aviv, A. J. \"i have no idea what they're trying to accomplish:\" enthusiastic and casual signal users' understanding of signal PINs. In Seventeenth Symposium on Usable Privacy and Security (SOUPS 2021) (Aug. 2021), USENIX Association, pp. 417--436."},{"key":"e_1_3_2_1_4_1","first-page":"10","volume-title":"Proceedings of the 2019 ACM International Symposium on Wearable Computers (New York, NY, USA, 2019), ISWC '19, Association for Computing Machinery","author":"Becker V.","unstructured":"Becker, V., Fessler, L., and S\u00f6r\u00f6s, G. Gestear: combining audio and motion sensing for gesture recognition on smartwatches. In Proceedings of the 2019 ACM International Symposium on Wearable Computers (New York, NY, USA, 2019), ISWC '19, Association for Computing Machinery, p. 10--19."},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1016\/0165-0114(86)90004-7"},{"key":"e_1_3_2_1_6_1","volume-title":"Random forests. Machine learning 45","author":"Breiman L.","year":"2001","unstructured":"Breiman, L. Random forests. Machine learning 45 (2001), 5--32."},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1109\/5.628714"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1007\/s00779-011-0415-z"},{"key":"e_1_3_2_1_9_1","first-page":"474","volume-title":"An optimized privacy inference attack based on smartwatch motion sensors. In 2016 IEEE International Conference on Internet of Things (iThings) and IEEE Green Computing and Communications","author":"Dai J.","year":"2016","unstructured":"Dai, J., Duan, Y., and Yang, F. An optimized privacy inference attack based on smartwatch motion sensors. In 2016 IEEE International Conference on Internet of Things (iThings) and IEEE Green Computing and Communications (GreenCom) and IEEE Cyber, Physical and Social Computing (CPSCom) and IEEE Smart Data (SmartData) (2016), pp. 474--479."},{"key":"e_1_3_2_1_10_1","unstructured":"Dogtiev A. Push notifications statistics. https:\/\/www.businessofapps.com\/marketplace\/push-notifications\/research\/push-notifications-statistics\/."},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-49127-9_37"},{"key":"e_1_3_2_1_12_1","volume-title":"Navigate your watch with wrist gestures","author":"Help G.","year":"2023","unstructured":"Help, G. Navigate your watch with wrist gestures, 2023. https:\/\/support.google.com\/wearos\/answer\/6312406?hl=en."},{"key":"e_1_3_2_1_13_1","volume-title":"Silence or unblock notifications on your watch","author":"Help G.","year":"2023","unstructured":"Help, G. Silence or unblock notifications on your watch, 2023. https:\/\/support.google.com\/wearos\/answer\/6056843."},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2020.2969513"},{"key":"e_1_3_2_1_15_1","unstructured":"IOS A. Siri 2019. https:\/\/www.apple.com\/ios\/siri\/."},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1145\/3531447"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1145\/3491102.3501935"},{"key":"e_1_3_2_1_18_1","volume-title":"Comparison and combination of iris matchers for reliable personal authentication. Pattern recognition 43, 3","author":"Kumar A.","year":"2010","unstructured":"Kumar, A., and Passi, A. Comparison and combination of iris matchers for reliable personal authentication. Pattern recognition 43, 3 (2010), 1016--1026."},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1145\/3460120.3484553"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1145\/3478094"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1051\/itmconf\/20171101003"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1145\/3211960.3211977"},{"key":"e_1_3_2_1_23_1","first-page":"1273","volume-title":"Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security (New York, NY, USA, 2015), CCS '15, Association for Computing Machinery","author":"Liu X.","unstructured":"Liu, X., Zhou, Z., Diao, W., Li, Z., and Zhang, K. When good becomes evil: Keystroke inference with smartwatch. In Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security (New York, NY, USA, 2015), CCS '15, Association for Computing Machinery, p. 1273--1285."},{"key":"e_1_3_2_1_24_1","unstructured":"Ltd W. Watch battery monitor. https:\/\/play.google.com\/store\/apps\/details?id=strange.watch.longevity.ion&hl=en_US&gl=US."},{"key":"e_1_3_2_1_25_1","first-page":"2","article-title":"Vocallock: Sensing vocal tract for passphrase-independent user authentication leveraging acoustic signals on smartphones. Proceedings of the ACM on Interactive, Mobile","volume":"4","author":"Lu L.","year":"2020","unstructured":"Lu, L., Yu, J., Chen, Y., and Wang, Y. Vocallock: Sensing vocal tract for passphrase-independent user authentication leveraging acoustic signals on smartphones. Proceedings of the ACM on Interactive, Mobile, Wearable and Ubiquitous Technologies 4, 2 (2020), 1--24.","journal-title":"Wearable and Ubiquitous Technologies"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10044-005-0022-6"},{"key":"e_1_3_2_1_27_1","volume-title":"Best smartwatches and trackers for parents to keep track of their kids","author":"McCullagh A.","year":"2023","unstructured":"McCullagh, A. Best smartwatches and trackers for parents to keep track of their kids, 2023. https:\/\/www.parentmap.com\/article\/smart-watches-keep-track-your-child."},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1145\/3550284"},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1145\/3055031.3055063"},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1145\/3196494.3196555"},{"key":"e_1_3_2_1_31_1","volume-title":"Spotify music and podcasts","author":"Google Play A.","year":"2022","unstructured":"on Google Play, A. Spotify music and podcasts, 2022. https:\/\/play.google.com\/store\/apps\/details?id=com.spotify.music&hl=en_US&gl=US."},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1145\/3386901.3388939"},{"key":"e_1_3_2_1_33_1","article-title":"User verification leveraging gait recognition for smartphone enabled mobile healthcare systems","author":"Ren Y.","year":"2014","unstructured":"Ren, Y., Chen, Y., Chuah, M. C., and Yang, J. User verification leveraging gait recognition for smartphone enabled mobile healthcare systems. IEEE Transactions on Mobile Computing (2014).","journal-title":"IEEE Transactions on Mobile Computing ("},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1007\/s12555-009-0102-2"},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1109\/89.365379"},{"key":"e_1_3_2_1_36_1","volume-title":"Smartwatch statistics 2023: How many people use smartwatches?","author":"Ruby D.","year":"2023","unstructured":"Ruby, D. Smartwatch statistics 2023: How many people use smartwatches?, 2023. https:\/\/www.demandsage.com\/smartwatch-statistics\/."},{"key":"e_1_3_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.1145\/3427228.3427259"},{"key":"e_1_3_2_1_38_1","first-page":"741","volume-title":"Proceedings of the 33rd Annual ACM Symposium on Applied Computing (New York, NY, USA, 2018), SAC '18, Association for Computing Machinery","author":"Siboni S.","unstructured":"Siboni, S., Shabtai, A., and Elovici, Y. Leaking data from enterprise networks using a compromised smartwatch device. In Proceedings of the 33rd Annual ACM Symposium on Applied Computing (New York, NY, USA, 2018), SAC '18, Association for Computing Machinery, p. 741--750."},{"key":"e_1_3_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-031-05563-8_17"},{"key":"e_1_3_2_1_40_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-031-05563-8_17"},{"key":"e_1_3_2_1_41_1","doi-asserted-by":"publisher","DOI":"10.1080\/10447318.2022.2049144"},{"key":"e_1_3_2_1_42_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICASSP.2014.6854363"},{"key":"e_1_3_2_1_43_1","unstructured":"WeChat. Voiceprint 2015. https:\/\/www.digitalnewsasia.com\/personal-tech\/wechat-gets-voice-login-6-update."},{"key":"e_1_3_2_1_44_1","doi-asserted-by":"publisher","DOI":"10.1109\/PERCOMW.2015.7134097"},{"key":"e_1_3_2_1_45_1","first-page":"772","volume-title":"Proceedings of the 15th ACM Asia Conference on Computer and Communications Security (New York, NY, USA, 2020), ASIA CCS '20, Association for Computing Machinery","author":"Yang Y.","unstructured":"Yang, Y., Wang, Y., Chen, Y., and Wang, C. Echolock: Towards low-effort mobile user identification leveraging structure-borne echos. In Proceedings of the 15th ACM Asia Conference on Computer and Communications Security (New York, NY, USA, 2020), ASIA CCS '20, Association for Computing Machinery, p. 772--783."},{"key":"e_1_3_2_1_46_1","doi-asserted-by":"publisher","DOI":"10.1109\/PerCom45495.2020.9127367"},{"key":"e_1_3_2_1_47_1","doi-asserted-by":"publisher","DOI":"10.1109\/PerCom45495.2020.9127367"},{"key":"e_1_3_2_1_48_1","doi-asserted-by":"publisher","DOI":"10.1109\/WoWMoM.2017.7974305"},{"key":"e_1_3_2_1_49_1","doi-asserted-by":"publisher","DOI":"10.1145\/2976749.2978296"},{"key":"e_1_3_2_1_50_1","doi-asserted-by":"publisher","DOI":"10.1145\/2046707.2046725"},{"key":"e_1_3_2_1_51_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-031-34609-5_34"}],"event":{"name":"MOBISYS '24: 22nd Annual International Conference on Mobile Systems, Applications and Services","sponsor":["SIGMOBILE ACM Special Interest Group on Mobility of Systems, Users, Data and Computing","SIGOPS ACM Special Interest Group on Operating Systems"],"location":"Minato-ku, Tokyo Japan","acronym":"MOBISYS '24"},"container-title":["Proceedings of the 22nd Annual International Conference on Mobile Systems, Applications and Services"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3643832.3661884","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3643832.3661884","content-type":"application\/pdf","content-version":"vor","intended-application":"syndication"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3643832.3661884","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T00:03:07Z","timestamp":1750291387000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3643832.3661884"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,6,3]]},"references-count":51,"alternative-id":["10.1145\/3643832.3661884","10.1145\/3643832"],"URL":"https:\/\/doi.org\/10.1145\/3643832.3661884","relation":{},"subject":[],"published":{"date-parts":[[2024,6,3]]},"assertion":[{"value":"2024-06-04","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}