{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,8,27]],"date-time":"2025-08-27T15:38:40Z","timestamp":1756309120699,"version":"3.44.0"},"publisher-location":"New York, NY, USA","reference-count":89,"publisher":"ACM","license":[{"start":{"date-parts":[[2024,5,27]],"date-time":"2024-05-27T00:00:00Z","timestamp":1716768000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by-sa\/4.0\/"}],"funder":[{"DOI":"10.13039\/501100006374","name":"National Science Foundation","doi-asserted-by":"publisher","award":["1943351"],"award-info":[{"award-number":["1943351"]}],"id":[{"id":"10.13039\/501100006374","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2024,5,27]]},"DOI":"10.1145\/3643833.3656135","type":"proceedings-article","created":{"date-parts":[[2024,5,20]],"date-time":"2024-05-20T19:25:07Z","timestamp":1716233107000},"page":"54-65","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":1,"title":["De-anonymizing VR Avatars using Non-VR Motion Side-channels"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0009-0008-9607-1327","authenticated-orcid":false,"given":"Mohd","family":"Sabra","sequence":"first","affiliation":[{"name":"University of Texas at San Antonio, San Antonio, TX, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-5378-4609","authenticated-orcid":false,"given":"Nisha","family":"Vinayaga-Sureshkanth","sequence":"additional","affiliation":[{"name":"University of Texas at San Antonio, San Antonio, TX, USA"}]},{"ORCID":"https:\/\/orcid.org\/0009-0000-5044-6906","authenticated-orcid":false,"given":"Ari","family":"Sharma","sequence":"additional","affiliation":[{"name":"University of Texas at Austin, Austin, TX, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-6461-2805","authenticated-orcid":false,"given":"Anindya","family":"Maiti","sequence":"additional","affiliation":[{"name":"University of Oklahoma, Norman, OK, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-9316-1943","authenticated-orcid":false,"given":"Murtuza","family":"Jadliwala","sequence":"additional","affiliation":[{"name":"University of Texas at San Antonio, San Antonio, TX, USA"}]}],"member":"320","published-online":{"date-parts":[[2024,5,27]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"Online; accessed 2023. 25 Amazing Virtual Reality Statistics. https:\/\/www. zippia.com\/advice\/virtual-reality-statistics."},{"key":"e_1_3_2_1_2_1","unstructured":"Online; accessed 2023. 7 Great Virtual Reality Travel Experiences. https:\/\/www. lifewire.com\/virtual-reality-tourism-4129394."},{"key":"e_1_3_2_1_3_1","unstructured":"Online; accessed 2023. Can an employer force you to download apps for work on your personal phones? https:\/\/www.reddit.com\/r\/LegalAdviceUK\/comments\/ n0em70\/can_an_employer_force_you_to_download_apps_for\/."},{"key":"e_1_3_2_1_4_1","unstructured":"Online; accessed 2023. Churches are demanding members download ?invasive spyware' to check if they are watching porn. https:\/\/flipboard.com\/topic\/ conormcgregor\/churches-are-demanding-members-download-apps-thatspy-on-their-activity\/a-IQ2TlaPMRcKAP4RIzkSmtg%3Aa%3A114859074-692d111f36%2Fthe-sun.com."},{"key":"e_1_3_2_1_5_1","unstructured":"Online; accessed 2023. Carnegie Mellon University Graphics Lab Motion Capture Database. http: \/\/mocap.cs.cmu.edu."},{"key":"e_1_3_2_1_6_1","unstructured":"Online; accessed 2023. GAN-for-tabular-data. https:\/\/github.com\/Diyago\/GANfor-tabular-data."},{"key":"e_1_3_2_1_7_1","unstructured":"Online; accessed 2023. Google Blocks. https:\/\/arvr.google.com\/blocks."},{"key":"e_1_3_2_1_8_1","unstructured":"Online; accessed 2023. Legs are finally coming to Mark Zuckerberg's metaverse. https:\/\/www.vox.com\/recode\/2022\/10\/11\/23399439\/metaverse-markzuckerberg-connect-avatar-legs-meta-microsoft-apple-vr-ar."},{"key":"e_1_3_2_1_9_1","unstructured":"Online; accessed 2023. MeetinVR. https:\/\/www.meetinvr.com."},{"key":"e_1_3_2_1_10_1","unstructured":"Online; accessed 2023. Meta Horizon Worlds. https:\/\/www.meta.com\/ experiences\/2532035600194083\/."},{"key":"e_1_3_2_1_11_1","unstructured":"Online; accessed 2023. Mozilla Hubs. https:\/\/hubs.mozilla.com."},{"key":"e_1_3_2_1_12_1","unstructured":"Online; accessed 2023. MrDeepFakes. https:\/\/mrdeepfakes.com."},{"key":"e_1_3_2_1_13_1","unstructured":"Online; accessed 2023. My school made us download an app and the app tracks us. Is this legal? If not what do I do and how do I confront them? https:\/\/www.quora.com\/My-school-made-us-download-an-app-and-the-apptracks-us-Is-this-legal-If-not-what-do-I-do-and-how-do-I-confront-them."},{"key":"e_1_3_2_1_14_1","unstructured":"Online; accessed 2023. OBS Studio. https:\/\/obsproject.com."},{"key":"e_1_3_2_1_15_1","unstructured":"Online; accessed 2023. ocrnet-hrnet-w48-paddle. https:\/\/docs.openvino.ai\/latest\/ omz_models_model_ocrnet_hrnet_w48_paddle.html."},{"key":"e_1_3_2_1_16_1","unstructured":"Online; accessed 2023. Oculus Store. https:\/\/www.oculus.com\/experiences\/ quest\/."},{"key":"e_1_3_2_1_17_1","unstructured":"Online; accessed 2023. Should you make your employees download an app? https:\/\/www.teamsense.com\/blog\/should-you-make-your-employeesdownload-an-app."},{"key":"e_1_3_2_1_18_1","unstructured":"Online; accessed 2023. Sketchfab Virtual Reality. https:\/\/sketchfab.com\/virtualreality."},{"key":"e_1_3_2_1_19_1","unstructured":"Online; accessed 2023. Spatial. https:\/\/www.spatial.io."},{"key":"e_1_3_2_1_20_1","unstructured":"Online; accessed 2023. Unity Real-Time Development Platform. https:\/\/unity. com."},{"key":"e_1_3_2_1_21_1","unstructured":"Online; accessed 2023. VRChat. https:\/\/hello.vrchat.com\/."},{"key":"e_1_3_2_1_22_1","unstructured":"Online; accessed 2023. VRChat's estimated total players. https:\/\/mmostats.com\/ game\/vrchat."},{"key":"e_1_3_2_1_23_1","unstructured":"Devon Adams Alseny Bah Catherine Barwulor Nureli Musaby Kadeem Pitkin and Elissa M Redmiles. 2018. Ethics emerging: the story of privacy and security perceptions in virtual reality. In ACM SOUPS."},{"key":"e_1_3_2_1_24_1","volume-title":"Contact tracing apps for the COVID-19 pandemic: a systematic literature review of challenges and future directions for neo-liberal societies. Health Information Science and Systems","author":"Akinbi Alex","year":"2021","unstructured":"Alex Akinbi, Mark Forshaw, and Victoria Blinkhorn. 2021. Contact tracing apps for the COVID-19 pandemic: a systematic literature review of challenges and future directions for neo-liberal societies. Health Information Science and Systems (2021)."},{"key":"e_1_3_2_1_25_1","volume-title":"Human activity recognition using temporal convolutional neural network architecture. Expert Systems with Applications","author":"Andrade-Ambriz Yair A","year":"2022","unstructured":"Yair A Andrade-Ambriz, Sergio Ledesma, Mario-Alberto Ibarra-Manzano, Marvella I Oros-Flores, and Dora-Luz Almanza-Ojeda. 2022. Human activity recognition using temporal convolutional neural network architecture. Expert Systems with Applications (2022)."},{"key":"e_1_3_2_1_26_1","volume-title":"Ongoing human action recognition with motion capture. Pattern Recognition 47","author":"Barnachon Mathieu","year":"2014","unstructured":"Mathieu Barnachon, Sa\u00efda Bouakaz, Boubakeur Boufama, and Erwan Guillou. 2014. Ongoing human action recognition with motion capture. Pattern Recognition 47 (2014)."},{"key":"e_1_3_2_1_27_1","unstructured":"Liang Cai and Hao Chen. 2011. {TouchLogger}: Inferring Keystrokes on Touch Screen from Smartphone Motion. In USENIX HotSec."},{"volume-title":"Body sensor networks for human activity recognition","author":"Chetty Girija","key":"e_1_3_2_1_28_1","unstructured":"Girija Chetty and Matthew White. 2016. Body sensor networks for human activity recognition. In IEEE SPIN."},{"key":"e_1_3_2_1_29_1","unstructured":"PaddlePaddle Contributors. Online; accessed 2023. PaddleSeg End-to-end image segmentation kit based on PaddlePaddle. https:\/\/github.com\/PaddlePaddle\/ PaddleSeg."},{"key":"e_1_3_2_1_30_1","unstructured":"Anupam Das Joseph Bonneau Matthew Caesar Nikita Borisov and XiaoFeng Wang. 2014. The tangled web of password reuse. In NDSS."},{"key":"e_1_3_2_1_31_1","volume-title":"Onur Dincer, and Emin Anarim.","author":"Davarci Erhan","year":"2017","unstructured":"Erhan Davarci, Betul Soysal, Imran Erguler, Sabri Orhun Aydin, Onur Dincer, and Emin Anarim. 2017. Age group detection using smartphone motion sensors. In IEEE EUSIPCO."},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1109\/WACVW54805.2022.00018"},{"volume-title":"The integration of optical flow and deformable models with applications to human face shape and motion estimation","author":"DeCarlo Douglas","key":"e_1_3_2_1_33_1","unstructured":"Douglas DeCarlo and Dimitris Metaxas. 1996. The integration of optical flow and deformable models with applications to human face shape and motion estimation. In IEEE CVPR."},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1177\/1461444820925811"},{"key":"e_1_3_2_1_35_1","volume-title":"Albert Jin Chung, and Patrick Tague","author":"Han Jun","year":"2017","unstructured":"Jun Han, Albert Jin Chung, and Patrick Tague. 2017. Pitchln: eavesdropping via intelligible speech reconstruction using non-acoustic sensor fusion. In ACM\/IEEE IPSN."},{"key":"e_1_3_2_1_36_1","volume-title":"Accomplice: Location inference using accelerometers on smartphones","author":"Han Jun","year":"2012","unstructured":"Jun Han, Emmanuel Owusu, Le T Nguyen, Adrian Perrig, and Joy Zhang. 2012. Accomplice: Location inference using accelerometers on smartphones. In IEEE COMSNETS."},{"key":"e_1_3_2_1_37_1","volume-title":"Reconstructing what you said: Text inference using smartphone motion","author":"Hodges Duncan","year":"2018","unstructured":"Duncan Hodges and Oliver Buckley. 2018. Reconstructing what you said: Text inference using smartphone motion. IEEE Transactions on Mobile Computing (2018)."},{"key":"e_1_3_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.1016\/0004-3702(81)90024-2"},{"key":"e_1_3_2_1_39_1","doi-asserted-by":"crossref","unstructured":"Daesung Jang Joon-Seok Kim Ki-Joune Li and Chi-Hyun Joo. 2011. Overlapping and synchronizing two worlds. In ACM GIS.","DOI":"10.1145\/2093973.2094057"},{"key":"e_1_3_2_1_40_1","volume-title":"Artificial intelligence in digital media: The era of deepfakes","author":"Karnouskos Stamatis","year":"2020","unstructured":"Stamatis Karnouskos. 2020. Artificial intelligence in digital media: The era of deepfakes. IEEE Transactions on Technology and Society (2020)."},{"key":"e_1_3_2_1_41_1","volume-title":"Otto Hans-Martin Lutz, and Florian M\u00fcller","author":"Kr\u00f6ger Jacob Leon","year":"2019","unstructured":"Jacob Leon Kr\u00f6ger, Otto Hans-Martin Lutz, and Florian M\u00fcller. 2019. What does your gaze reveal about you? On the privacy implications of eye tracking. In IFIP International Summer School on Privacy and Identity Management."},{"key":"e_1_3_2_1_42_1","doi-asserted-by":"publisher","DOI":"10.1145\/3266157.3266219"},{"key":"e_1_3_2_1_43_1","volume-title":"A comprehensive review of recent deep learning techniques for human activity recognition. Computational Intelligence and Neuroscience","author":"Le Viet-Tuan","year":"2022","unstructured":"Viet-Tuan Le, Kiet Tran-Trung, and Vinh Truong Hoang. 2022. A comprehensive review of recent deep learning techniques for human activity recognition. Computational Intelligence and Neuroscience (2022)."},{"volume-title":"Handwritten signature authentication using smartwatch motion sensors","author":"Li Gen","key":"e_1_3_2_1_44_1","unstructured":"Gen Li and Hiroyuki Sato. 2020. Handwritten signature authentication using smartwatch motion sensors. In IEEE COMPSAC."},{"key":"e_1_3_2_1_45_1","volume-title":"aleak: Context-free side-channel from your smart watch leaks your typing privacy","author":"Liu Yang","year":"2019","unstructured":"Yang Liu and Zhenjiang Li. 2019. aleak: Context-free side-channel from your smart watch leaks your typing privacy. IEEE Transactions on Mobile Computing (2019)."},{"key":"e_1_3_2_1_46_1","doi-asserted-by":"publisher","DOI":"10.1145\/3161196"},{"key":"e_1_3_2_1_47_1","doi-asserted-by":"crossref","unstructured":"Anindya Maiti Oscar Armbruster Murtuza Jadliwala and Jibo He. 2016. Smartwatch-based keystroke inference attacks and context-aware protection mechanisms. In ACM ASIACCS.","DOI":"10.1145\/2897845.2897905"},{"key":"e_1_3_2_1_48_1","doi-asserted-by":"crossref","unstructured":"Anindya Maiti Ryan Heard Mohd Sabra and Murtuza Jadliwala. 2018. Towards inferring mechanical lock combinations using wrist-wearables as a side-channel. In ACM WiSec.","DOI":"10.1145\/3212480.3212498"},{"key":"e_1_3_2_1_49_1","volume-title":"Sidechannel inference attacks on mobile keypads using smartwatches","author":"Maiti Anindya","year":"2018","unstructured":"Anindya Maiti, Murtuza Jadliwala, Jibo He, and Igor Bilogrevic. 2018. Sidechannel inference attacks on mobile keypads using smartwatches. IEEE Transactions on Mobile Computing (2018)."},{"key":"e_1_3_2_1_50_1","doi-asserted-by":"crossref","unstructured":"Philip Marquardt Arunabh Verma Henry Carter and Patrick Traynor. 2011. (sp) iphone: Decoding vibrations from nearby keyboards using mobile phone accelerometers. In ACM CCS.","DOI":"10.1145\/2046707.2046771"},{"key":"e_1_3_2_1_51_1","doi-asserted-by":"crossref","unstructured":"Oge Marques. 2020. Machine Learning with Core ML. In Image Processing and Computer Vision in iOS.","DOI":"10.1007\/978-3-030-54032-6"},{"key":"e_1_3_2_1_52_1","volume-title":"USENIX Security Symposium.","author":"Michalevsky Yan","year":"2014","unstructured":"Yan Michalevsky, Dan Boneh, and Gabi Nakibly. 2014. Gyrophone: Recognizing speech from gyroscope signals. In USENIX Security Symposium."},{"key":"e_1_3_2_1_53_1","volume-title":"Personal identifiability of user tracking data during observation of 360-degree VR video. Scientific Reports","author":"Miller Mark Roman","year":"2020","unstructured":"Mark Roman Miller, Fernanda Herrera, Hanseul Jun, James A Landay, and Jeremy N Bailenson. 2020. Personal identifiability of user tracking data during observation of 360-degree VR video. Scientific Reports (2020)."},{"key":"e_1_3_2_1_54_1","volume-title":"Natasha Kholgade Banerjee, and Sean Banerjee","author":"Miller Robert","year":"2022","unstructured":"Robert Miller, Natasha Kholgade Banerjee, and Sean Banerjee. 2022. Combining Real-World Constraints on User Behavior with Deep Neural Networks for Virtual Reality (VR) Biometrics. In IEEE VR."},{"key":"e_1_3_2_1_55_1","doi-asserted-by":"crossref","unstructured":"Emiliano Miluzzo Alexander Varshavsky Suhrid Balakrishnan and Romit Roy Choudhury. 2012. Tapprints: your finger taps have fingerprints. In ACM MobiSys.","DOI":"10.1145\/2307636.2307666"},{"key":"e_1_3_2_1_56_1","unstructured":"Clinton Mo Kun Hu Shaohui Mei Zebin Chen and Zhiyong Wang. 2021. Keyframe extraction from motion capture sequences with graph based deep reinforcement learning. In ACM Multimedia."},{"key":"e_1_3_2_1_57_1","doi-asserted-by":"publisher","DOI":"10.56553\/popets-2023-0042"},{"key":"e_1_3_2_1_58_1","volume-title":"Pinme: Tracking a smartphone user around the world","author":"Mosenia Arsalan","year":"2017","unstructured":"Arsalan Mosenia, Xiaoliang Dai, Prateek Mittal, and Niraj K Jha. 2017. Pinme: Tracking a smartphone user around the world. IEEE Transactions on Multi-Scale Computing Systems (2017)."},{"key":"e_1_3_2_1_59_1","volume-title":"Gonzalo Munilla Garrido, and Dawn Song","author":"Nair Vivek","year":"2022","unstructured":"Vivek Nair, Gonzalo Munilla Garrido, and Dawn Song. 2022. Exploring the Unprecedented Privacy Risks of the Metaverse. arXiv preprint arXiv:2207.13176 (2022)."},{"key":"e_1_3_2_1_60_1","volume-title":"Kenneth Block, and Guevara Noubir","author":"Narain Sashank","year":"2016","unstructured":"Sashank Narain, Triet D Vo-Huu, Kenneth Block, and Guevara Noubir. 2016. Inferring user routes and locations using zero-permission mobile sensors. In IEEE S&P."},{"key":"e_1_3_2_1_61_1","volume-title":"Savitzky-Golay smoothing filters. Computers in Physics","author":"Press William H","year":"1990","unstructured":"William H Press and Saul A Teukolsky. 1990. Savitzky-Golay smoothing filters. Computers in Physics (1990)."},{"key":"e_1_3_2_1_62_1","volume-title":"Multi-sensor information fusion based on machine learning for real applications in human activity recognition: State-of-the-art and research challenges. Information Fusion","author":"Qiu Sen","year":"2022","unstructured":"Sen Qiu, Hongkai Zhao, Nan Jiang, Zhelong Wang, Long Liu, Yi An, Hongyu Zhao, Xin Miao, Ruichen Liu, and Giancarlo Fortino. 2022. Multi-sensor information fusion based on machine learning for real applications in human activity recognition: State-of-the-art and research challenges. Information Fusion (2022)."},{"key":"e_1_3_2_1_63_1","doi-asserted-by":"crossref","unstructured":"Mohd Sabra Anindya Maiti and Murtuza Jadliwala. 2018. Keystroke inference using ambient light sensor on wrist-wearables: a feasibility study. In ACMWearSys.","DOI":"10.1145\/3211960.3211973"},{"volume-title":"WristSnoop: Smartphone PINs prediction using smartwatch motion sensors","author":"Sarkisyan Allen","key":"e_1_3_2_1_64_1","unstructured":"Allen Sarkisyan, Ryan Debbiny, and Ani Nahapetian. 2015. WristSnoop: Smartphone PINs prediction using smartwatch motion sensors. In IEEE WIFS."},{"key":"e_1_3_2_1_65_1","volume":"201","author":"Sigal Leonid","unstructured":"Leonid Sigal, Alexandru O Balan, and Michael J Black. 2010. Humaneva: Synchronized video and motion capture dataset and baseline algorithm for evaluation of articulated human motion. International journal of computer vision (2010).","journal-title":"Michael J Black."},{"key":"e_1_3_2_1_66_1","doi-asserted-by":"publisher","DOI":"10.1145\/3356250.3361939"},{"key":"e_1_3_2_1_67_1","volume-title":"andWenyao Xu","author":"Song Chen","year":"2016","unstructured":"Chen Song, Feng Lin, Zhongjie Ba, Kui Ren, Chi Zhou, andWenyao Xu. 2016. My smartphone knows what you print: Exploring smartphone-based side-channel attacks against 3d printers. In ACM CCS."},{"volume-title":"SoK: Authentication in Augmented and Virtual Reality","author":"Stephenson Sophie","key":"e_1_3_2_1_68_1","unstructured":"Sophie Stephenson, Bijeeta Pal, Stephen Fan, Earlence Fernandes, Yuhang Zhao, and Rahul Chatterjee. 2022. SoK: Authentication in Augmented and Virtual Reality. In IEEE S&P."},{"key":"e_1_3_2_1_69_1","volume-title":"Human activity recognition using an ensemble learning algorithm with smartphone sensor data. Electronics","author":"Tan Tan-Hsu","year":"2022","unstructured":"Tan-Hsu Tan, Jie-Ying Wu, Shing-Hong Liu, and Munkhjargal Gochoo. 2022. Human activity recognition using an ensemble learning algorithm with smartphone sensor data. Electronics (2022)."},{"key":"e_1_3_2_1_70_1","volume-title":"Multiscale deep feature learning for human activity recognition usingwearable sensors","author":"Tang Yin","year":"2022","unstructured":"Yin Tang, Lei Zhang, Fuhong Min, and Jun He. 2022. Multiscale deep feature learning for human activity recognition usingwearable sensors. IEEE Transactions on Industrial Electronics (2022)."},{"key":"e_1_3_2_1_71_1","volume-title":"An integration of feature extraction and guided regularized random forest feature selection for smartphone based human activity recognition. Journal of Network and Computer Applications","author":"Thakur Dipanwita","year":"2022","unstructured":"Dipanwita Thakur and Suparna Biswas. 2022. An integration of feature extraction and guided regularized random forest feature selection for smartphone based human activity recognition. Journal of Network and Computer Applications (2022)."},{"key":"e_1_3_2_1_72_1","volume-title":"OVRseen: Auditing Network Traffic and Privacy Policies in Oculus VR. In USENIX Security Symposium.","author":"Trimananda Rahmadi","year":"2022","unstructured":"Rahmadi Trimananda, Hieu Le, Hao Cui, Janice Tran Ho, Anastasia Shuba, and Athina Markopoulou. 2022. OVRseen: Auditing Network Traffic and Privacy Policies in Oculus VR. In USENIX Security Symposium."},{"key":"e_1_3_2_1_73_1","volume-title":"Javier Del Ser, Sung Wook Baik, and Victor Hugo C De Albuquerque.","author":"Ullah Waseem","year":"2022","unstructured":"Waseem Ullah, Amin Ullah, Tanveer Hussain, Khan Muhammad, Ali Asghar Heidari, Javier Del Ser, Sung Wook Baik, and Victor Hugo C De Albuquerque. 2022. Artificial Intelligence of Things-assisted two-stream neural network for anomaly detection in surveillance Big Video Data. Future Generation Computer Systems (2022)."},{"key":"e_1_3_2_1_74_1","volume-title":"Human activity classification using the 3DCNN architecture. Applied Sciences","author":"Vrskova Roberta","year":"2022","unstructured":"Roberta Vrskova, Robert Hudec, Patrik Kamencay, and Peter Sykora. 2022. Human activity classification using the 3DCNN architecture. Applied Sciences (2022)."},{"key":"e_1_3_2_1_75_1","doi-asserted-by":"crossref","unstructured":"Chen Wang Xiaonan Guo Yan Wang Yingying Chen and Bo Liu. 2016. Friend or foe? Your wearable devices reveal your personal pin. In ACM ASIACCS.","DOI":"10.1145\/2897845.2897847"},{"key":"e_1_3_2_1_76_1","volume-title":"Ted Tsung-Te Lai, and Romit Roy Choudhury","author":"Wang He","year":"2015","unstructured":"He Wang, Ted Tsung-Te Lai, and Romit Roy Choudhury. 2015. Mole: Motion leaks through smartwatch sensors. In ACM MOBICOM."},{"volume-title":"AudioWrite: A Handwriting Recognition System Using Acoustic Signals","author":"Wang Lin","key":"e_1_3_2_1_77_1","unstructured":"Lin Wang, Junbao Zhang, Yue Li, and Haoyu Wang. 2023. AudioWrite: A Handwriting Recognition System Using Acoustic Signals. In IEEE ICPADS."},{"key":"e_1_3_2_1_78_1","volume-title":"The emergence of deepfake technology: A review. Technology Innovation Management Review","author":"Westerlund Mika","year":"2019","unstructured":"Mika Westerlund. 2019. The emergence of deepfake technology: A review. Technology Innovation Management Review (2019)."},{"key":"e_1_3_2_1_79_1","doi-asserted-by":"crossref","unstructured":"Raveen Wijewickrama Anindya Maiti and Murtuza Jadliwala. 2019. deWristified: handwriting inference using wrist-based motion sensors revisited. In ACM WiSec.","DOI":"10.1145\/3317549.3319722"},{"key":"e_1_3_2_1_80_1","doi-asserted-by":"crossref","unstructured":"Raveen Wijewickrama Anindya Maiti and Murtuza Jadliwala. 2021. Write to know: on the feasibility of wrist motion based user-authentication from handwriting. In ACM WiSec.","DOI":"10.1145\/3448300.3468290"},{"key":"e_1_3_2_1_81_1","volume-title":"The deepfake threat to face biometrics. Biometric Technology Today","author":"Wojewidka John","year":"2020","unstructured":"John Wojewidka. 2020. The deepfake threat to face biometrics. Biometric Technology Today (2020)."},{"volume-title":"Privacy Leakage via Unrestricted Motion-Position Sensors in the Age of Virtual Reality: A Study of Snooping Typed Input on Virtual Keyboards","author":"Wu Yi","key":"e_1_3_2_1_82_1","unstructured":"Yi Wu, Cong Shi, Tianfang Zhang, Payton Walker, Jian Liu, Nitesh Saxena, and Yingying Chen. 2023. Privacy Leakage via Unrestricted Motion-Position Sensors in the Age of Virtual Reality: A Study of Snooping Typed Input on Virtual Keyboards. In IEEE S&P."},{"key":"e_1_3_2_1_83_1","volume-title":"Modeling tabular data using conditional GAN. Advances in Neural Information Processing Systems","author":"Xu Lei","year":"2019","unstructured":"Lei Xu, Maria Skoularidou, Alfredo Cuesta-Infante, and Kalyan Veeramachaneni. 2019. Modeling tabular data using conditional GAN. Advances in Neural Information Processing Systems (2019)."},{"key":"e_1_3_2_1_84_1","volume-title":"Walkie-talkie: Motion-assisted automatic key generation for secure on-body device communication","author":"Xu Weitao","year":"2016","unstructured":"Weitao Xu, Girish Revadigar, Chengwen Luo, Neil Bergmann, and Wen Hu. 2016. Walkie-talkie: Motion-assisted automatic key generation for secure on-body device communication. In ACM\/IEEE IPSN."},{"key":"e_1_3_2_1_85_1","doi-asserted-by":"publisher","DOI":"10.1145\/2185448.2185465"},{"key":"e_1_3_2_1_86_1","doi-asserted-by":"publisher","DOI":"10.1109\/WACVW54805.2022.00017"},{"key":"e_1_3_2_1_87_1","doi-asserted-by":"publisher","DOI":"10.1145\/3351278"},{"key":"e_1_3_2_1_88_1","unstructured":"Jerrold H Zar. 1972. Significance testing of the Spearman rank correlation coefficient. J. Amer. Statist. Assoc. (1972)."},{"key":"e_1_3_2_1_89_1","volume-title":"Proceedings of the ACM on Interactive, Mobile, Wearable and Ubiquitous Technologies","author":"Zhang Shijia","year":"2023","unstructured":"Shijia Zhang, Yilin Liu, and Mahanth Gowda. 2023. I Spy You: Eavesdropping Continuous Speech on Smartphones via Motion Sensors. Proceedings of the ACM on Interactive, Mobile, Wearable and Ubiquitous Technologies (2023)."}],"event":{"name":"WiSec '24: 17th ACM Conference on Security and Privacy in Wireless and Mobile Networks","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control","SIGMOBILE ACM Special Interest Group on Mobility of Systems, Users, Data and Computing"],"location":"Seoul Republic of Korea","acronym":"WiSec '24"},"container-title":["Proceedings of the 17th ACM Conference on Security and Privacy in Wireless and Mobile Networks"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3643833.3656135","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3643833.3656135","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,8,22]],"date-time":"2025-08-22T23:59:51Z","timestamp":1755907191000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3643833.3656135"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,5,27]]},"references-count":89,"alternative-id":["10.1145\/3643833.3656135","10.1145\/3643833"],"URL":"https:\/\/doi.org\/10.1145\/3643833.3656135","relation":{},"subject":[],"published":{"date-parts":[[2024,5,27]]},"assertion":[{"value":"2024-05-27","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}