{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,8,22]],"date-time":"2025-08-22T05:40:09Z","timestamp":1755841209726,"version":"3.44.0"},"publisher-location":"New York, NY, USA","reference-count":12,"publisher":"ACM","license":[{"start":{"date-parts":[[2024,10,5]],"date-time":"2024-10-05T00:00:00Z","timestamp":1728086400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2024,10,5]]},"DOI":"10.1145\/3675094.3678450","type":"proceedings-article","created":{"date-parts":[[2024,9,22]],"date-time":"2024-09-22T00:31:48Z","timestamp":1726965108000},"page":"525-530","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":0,"title":["User Authentication Method for Smart Glasses using Gaze Information of Registered Known Images and AI-generated Unknown Images"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0009-0007-6567-2480","authenticated-orcid":false,"given":"Masaya","family":"Inoue","sequence":"first","affiliation":[{"name":"Ritsumeikan University, Osaka, Japan"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-3777-8399","authenticated-orcid":false,"given":"Kazuya","family":"Murao","sequence":"additional","affiliation":[{"name":"Ritsumeikan University, Osaka, Japan"}]}],"member":"320","published-online":{"date-parts":[[2024,10,5]]},"reference":[{"key":"e_1_3_2_1_1_1","volume-title":"Proceedings of the 11th Symposium On Usable Privacy and Security (SOUPS","author":"Hang Alina","year":"2015","unstructured":"Alina Hang and Alexander De Luca and Matthew Smith and Michael Richter and Heinrich Hussmann. 2015. Where have you been? using location-based security questions for fallback authentication. In Proceedings of the 11th Symposium On Usable Privacy and Security (SOUPS 2015), 169--183."},{"key":"e_1_3_2_1_2_1","volume-title":"2012 IEEE International Conference on Per- vasive Computing and Communications Workshops","author":"Gupta Payas","year":"2012","unstructured":"Payas Gupta, Tan Kiat Wee, Narayan Ramasubbu, D. Lo, Debin Gao, and Rajesh Krishna Balan. 2012. HuMan: Creating memorable fin- gerprints of mobile users. 2012 IEEE International Conference on Per- vasive Computing and Communications Workshops (2012), 479--482. https:\/\/api.semanticscholar.org\/CorpusID:12946525"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1145\/3594738.3611357"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1145\/3287052"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/3191751"},{"key":"e_1_3_2_1_6_1","volume-title":"CEA'10 (1","author":"Sepasian Mojtaba","year":"2010","unstructured":"Mojtaba Sepasian and Cristinel Mares and Wamadeva Balachandran. 2010. Live- ness and spoofing in fingerprint identification: issues and challenges. In Pro- ceedings of the 4th WSEAS international conference on Computer engineering and applications, CEA'10 (1 2010), 150--158."},{"key":"e_1_3_2_1_7_1","volume-title":"Digital memories based mobile user authentication for IoT. In 2015 IEEE International Conference on Computer and Information Technology","author":"Shone Nathan","year":"2015","unstructured":"Nathan Shone and Chelsea Dobbins and William Hurst and Qi Shi. 2015. Digital memories based mobile user authentication for IoT. In 2015 IEEE International Conference on Computer and Information Technology; Ubiquitous Computing and Communications; Dependable, Autonomic and Secure Computing; Pervasive Intel- ligence and Computing (10 2015), 1796--1802."},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.3390\/s18082601"},{"key":"e_1_3_2_1_9_1","volume-title":"A systematic literature re- view on Virtual Reality and Augmented Reality in terms of pri- vacy, authorization and data-leaks. ArXiv abs\/2212.04621","author":"Patel Parthit","year":"2022","unstructured":"Parthit Patel and Prem Trivedi. 2022. A systematic literature re- view on Virtual Reality and Augmented Reality in terms of pri- vacy, authorization and data-leaks. ArXiv abs\/2212.04621 (2022), 9. https:\/\/api.semanticscholar.org\/CorpusID:254535605"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1016\/0031--3203(94)90081--7"},{"key":"e_1_3_2_1_11_1","volume-title":"Staudemeyer and Eric Rothstein Morris","author":"Ralf","year":"2019","unstructured":"Ralf C. Staudemeyer and Eric Rothstein Morris. 2019. Understand- ing LSTM - a tutorial into Long Short-Term Memory Recurrent Neural Networks. ArXiv abs\/1909.09586 (2019), 42. arXiv:1909.09586 [cs.NE] https:\/\/api.semanticscholar.org\/CorpusID:268130517"},{"key":"e_1_3_2_1_12_1","volume-title":"Silhouette transforma- tion based on walking speed for gait identification. 2010 IEEE Computer So- ciety Conference on Computer Vision and Pattern Recognition","author":"Tsuji Akira","year":"2010","unstructured":"Akira Tsuji, Yasushi Makihara, and Yasushi Yagi. 2010. Silhouette transforma- tion based on walking speed for gait identification. 2010 IEEE Computer So- ciety Conference on Computer Vision and Pattern Recognition (2010), 717--722. https:\/\/api.semanticscholar.org\/CorpusID:4665276 Received 20 February 2007; revised 12 March 2009; accepted 5 June 2009"}],"event":{"name":"UbiComp '24: The 2024 ACM International Joint Conference on Pervasive and Ubiquitous Computing","sponsor":["SIGMOBILE ACM Special Interest Group on Mobility of Systems, Users, Data and Computing","SIGCHI ACM Special Interest Group on Computer-Human Interaction","SIGSPATIAL ACM Special Interest Group on Spatial Information"],"location":"Melbourne VIC Australia","acronym":"UbiComp '24"},"container-title":["Companion of the 2024 on ACM International Joint Conference on Pervasive and Ubiquitous Computing"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3675094.3678450","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3675094.3678450","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,8,22]],"date-time":"2025-08-22T05:10:16Z","timestamp":1755839416000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3675094.3678450"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,10,5]]},"references-count":12,"alternative-id":["10.1145\/3675094.3678450","10.1145\/3675094"],"URL":"https:\/\/doi.org\/10.1145\/3675094.3678450","relation":{},"subject":[],"published":{"date-parts":[[2024,10,5]]},"assertion":[{"value":"2024-10-05","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}