{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,3]],"date-time":"2026-04-03T15:37:27Z","timestamp":1775230647233,"version":"3.50.1"},"reference-count":107,"publisher":"Association for Computing Machinery (ACM)","issue":"3","license":[{"start":{"date-parts":[[2024,8,22]],"date-time":"2024-08-22T00:00:00Z","timestamp":1724284800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":["Proc. ACM Interact. Mob. Wearable Ubiquitous Technol."],"published-print":{"date-parts":[[2024,8,22]]},"abstract":"<jats:p>Eye gaze contains rich information about human attention and cognitive processes. This capability makes the underlying technology, known as gaze tracking, a critical enabler for many ubiquitous applications and has triggered the development of easy-to-use gaze estimation services. Indeed, by utilizing the ubiquitous cameras on tablets and smartphones, users can readily access many gaze estimation services. In using these services, users must provide their full-face images to the gaze estimator, which is often a black box. This poses significant privacy threats to the users, especially when a malicious service provider gathers a large collection of face images to classify sensitive user attributes. In this work, we present PrivateGaze, the first approach that can effectively preserve users' privacy in black-box gaze tracking services without compromising gaze estimation performance. Specifically, we proposed a novel framework to train a privacy preserver that converts full-face images into obfuscated counterparts, which are effective for gaze estimation while containing no privacy information. Evaluation on four datasets shows that the obfuscated image can protect users' private information, such as identity and gender, against unauthorized attribute classification. Meanwhile, when used directly by the black-box gaze estimator as inputs, the obfuscated images lead to comparable tracking performance to the conventional, unprotected full-face images.<\/jats:p>","DOI":"10.1145\/3678595","type":"journal-article","created":{"date-parts":[[2024,9,9]],"date-time":"2024-09-09T14:36:21Z","timestamp":1725892581000},"page":"1-28","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":6,"title":["PrivateGaze: Preserving User Privacy in Black-box Mobile Gaze Tracking Services"],"prefix":"10.1145","volume":"8","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-5479-7866","authenticated-orcid":false,"given":"Lingyu","family":"Du","sequence":"first","affiliation":[{"name":"Department of Software Technology, Delft University of Technology, Delft, The Netherlands"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-9785-7769","authenticated-orcid":false,"given":"Jinyuan","family":"Jia","sequence":"additional","affiliation":[{"name":"College of Information Sciences and Technology, The Pennsylvania State University, State College, The United States"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-8368-3542","authenticated-orcid":false,"given":"Xucong","family":"Zhang","sequence":"additional","affiliation":[{"name":"Department of Intelligent Systems, Delft University of Technology, Delft, The Netherlands"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-2190-9937","authenticated-orcid":false,"given":"Guohao","family":"Lan","sequence":"additional","affiliation":[{"name":"Department of Software Technology, Delft University of Technology, Delft, The Netherlands"}]}],"member":"320","published-online":{"date-parts":[[2024,9,9]]},"reference":[{"key":"e_1_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1145\/3351227"},{"key":"e_1_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1109\/TVCG.2021.3067784"},{"key":"e_1_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPRW63382.2024.00577"},{"key":"e_1_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1145\/3379156.3391364"},{"key":"e_1_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1109\/MPRV.2010.86"},{"key":"e_1_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1145\/3394171.3413630"},{"key":"e_1_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/3544548.3581174"},{"key":"e_1_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1145\/3131902"},{"key":"e_1_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.16910\/jemr.12.1.3"},{"key":"e_1_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2021.11.032"},{"key":"e_1_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPRW59228.2023.00074"},{"key":"e_1_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.3758\/s13428-013-0422-2"},{"key":"e_1_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1145\/3517031.3529618"},{"key":"e_1_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1109\/TVCG.2021.3067787"},{"key":"e_1_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1111\/rssb.12454"},{"key":"e_1_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2018.00957"},{"key":"e_1_2_1_17_1","unstructured":"Laura Van Doore. 2020. WeGaze. https:\/\/lauravandoore.com\/portfolio-item\/wegaze\/ accessed: 2023-11-09."},{"key":"e_1_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1145\/3304109.3325818"},{"key":"e_1_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1145\/3313831.3376394"},{"key":"e_1_2_1_20_1","doi-asserted-by":"crossref","unstructured":"Cynthia Dwork Aaron Roth et al. 2014. The algorithmic foundations of differential privacy. Foundations and Trends\u00ae in Theoretical Computer Science 9 3--4 (2014) 211--407.","DOI":"10.1561\/0400000042"},{"key":"e_1_2_1_21_1","volume-title":"Proceedings of The 1st Gaze Meets ML workshop. PMLR, 20--36","author":"Elfares Mayar","year":"2023","unstructured":"Mayar Elfares, Zhiming Hu, Pascal Reisert, Andreas Bulling, and Ralf K\u00fcsters. 2023. Federated Learning for Appearance-based Gaze Estimation in the Wild. In Proceedings of The 1st Gaze Meets ML workshop. PMLR, 20--36."},{"key":"e_1_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1145\/3448017.3457385"},{"key":"e_1_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1145\/2807442.2807499"},{"key":"e_1_2_1_24_1","unstructured":"EyeWare. 2016. EyeWare. https:\/\/eyeware.tech\/ accessed: 2023-11-09."},{"key":"e_1_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1186\/1866-1955-5-28"},{"key":"e_1_2_1_26_1","volume-title":"Image Pixelization with Differential Privacy. In 32th IFIP Annual Conference on Data and Applications Security and Privacy (DBSec). Springer International Publishing, 148--162","author":"Fan Liyue","year":"2018","unstructured":"Liyue Fan. 2018. Image Pixelization with Differential Privacy. In 32th IFIP Annual Conference on Data and Applications Security and Privacy (DBSec). Springer International Publishing, 148--162."},{"key":"e_1_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR52729.2023.01574"},{"key":"e_1_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1145\/3173574.3174226"},{"key":"e_1_2_1_29_1","unstructured":"GazeRecorder. 2009. GazeRecorder. https:\/\/gazerecorder.com\/ accessed: 2023-11-09."},{"key":"e_1_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1109\/MPRV.2022.3228660"},{"key":"e_1_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1109\/TBME.2005.863952"},{"key":"e_1_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1109\/TPAMI.2009.30"},{"key":"e_1_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2016.90"},{"key":"e_1_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-19665-7_35"},{"key":"e_1_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1007\/s00138-017-0852-4"},{"key":"e_1_2_1_36_1","volume-title":"Proceedings of the 35th International Conference on Machine Learning (ICML). 2137--2146","author":"Ilyas Andrew","year":"2018","unstructured":"Andrew Ilyas, Logan Engstrom, Anish Athalye, and Jessy Lin. 2018. Black-box Adversarial Attacks with Limited Queries and Information. In Proceedings of the 35th International Conference on Machine Learning (ICML). 2137--2146."},{"key":"e_1_2_1_37_1","volume-title":"FICGAN: facial identity controllable GAN for de-identification. arXiv preprint arXiv:2110.00740","author":"Jeong Yonghyun","year":"2021","unstructured":"Yonghyun Jeong, Jooyoung Choi, Sungwon Kim, Youngmin Ro, Tae-Hyun Oh, Doyeon Kim, Heonseok Ha, and Sungroh Yoon. 2021. FICGAN: facial identity controllable GAN for de-identification. arXiv preprint arXiv:2110.00740 (2021)."},{"key":"e_1_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.1109\/TVCG.2020.2973052"},{"key":"e_1_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.1145\/3379157.3390512"},{"key":"e_1_2_1_40_1","doi-asserted-by":"publisher","DOI":"10.1145\/2638728.2641695"},{"key":"e_1_2_1_41_1","doi-asserted-by":"publisher","DOI":"10.1145\/3313831.3376840"},{"key":"e_1_2_1_42_1","doi-asserted-by":"publisher","DOI":"10.1145\/3229434.3229452"},{"key":"e_1_2_1_43_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR52688.2022.01051"},{"key":"e_1_2_1_44_1","doi-asserted-by":"publisher","DOI":"10.1145\/3290605.3300780"},{"key":"e_1_2_1_45_1","volume-title":"Adam: A method for stochastic optimization. arXiv preprint arXiv:1412.6980","author":"Kingma Diederik P","year":"2014","unstructured":"Diederik P Kingma and Jimmy Ba. 2014. Adam: A method for stochastic optimization. arXiv preprint arXiv:1412.6980 (2014)."},{"key":"e_1_2_1_46_1","volume-title":"Auto-encoding variational bayes. arXiv preprint arXiv:1312.6114","author":"Kingma Diederik P","year":"2013","unstructured":"Diederik P Kingma and Max Welling. 2013. Auto-encoding variational bayes. arXiv preprint arXiv:1312.6114 (2013)."},{"key":"e_1_2_1_47_1","doi-asserted-by":"publisher","DOI":"10.1145\/3173574.3174010"},{"key":"e_1_2_1_48_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR46437.2021.00985"},{"key":"e_1_2_1_49_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2016.239"},{"key":"e_1_2_1_50_1","volume-title":"Otto Hans-Martin Lutz, and Florian M\u00fcller","author":"Kr\u00f6ger Jacob Leon","year":"2020","unstructured":"Jacob Leon Kr\u00f6ger, Otto Hans-Martin Lutz, and Florian M\u00fcller. 2020. What does your gaze reveal about you? On the privacy implications of eye tracking. Privacy and Identity Management. Data for Better Living: AI and Privacy: 14th IFIP WG 9.2, 9.6\/11.7, 11.6\/SIG 9.2. 2 International Summer School, Windisch, Switzerland, August 19-23, 2019, Revised Selected Papers 14 (2020), 226--241."},{"key":"e_1_2_1_51_1","doi-asserted-by":"publisher","DOI":"10.1145\/3474085.3475464"},{"key":"e_1_2_1_52_1","doi-asserted-by":"publisher","DOI":"10.1145\/3610206"},{"key":"e_1_2_1_53_1","doi-asserted-by":"publisher","DOI":"10.1145\/3384419.3430774"},{"key":"e_1_2_1_54_1","doi-asserted-by":"publisher","DOI":"10.1109\/IPSN54338.2022.00026"},{"key":"e_1_2_1_55_1","volume-title":"Proceedings of 30th USENIX Security Symposium (USENIX Security). 1793--1810","author":"Li Jingjie","year":"2021","unstructured":"Jingjie Li, Amrita Roy Chowdhury, Kassem Fawaz, and Younghyun Kim. 2021. Kaleido: Real-Time Privacy Control for Eye-Tracking Systems. In Proceedings of 30th USENIX Security Symposium (USENIX Security). 1793--1810."},{"key":"e_1_2_1_56_1","volume-title":"Differentially private imaging via latent space manipulation. arXiv preprint arXiv:2103.05472","author":"Li Tao","year":"2021","unstructured":"Tao Li and Chris Clifton. 2021. Differentially private imaging via latent space manipulation. arXiv preprint arXiv:2103.05472 (2021)."},{"key":"e_1_2_1_57_1","doi-asserted-by":"publisher","DOI":"10.1145\/2638728.2641688"},{"key":"e_1_2_1_58_1","doi-asserted-by":"publisher","DOI":"10.1145\/3359303"},{"key":"e_1_2_1_59_1","doi-asserted-by":"publisher","DOI":"10.1109\/TPAMI.2014.2313123"},{"key":"e_1_2_1_60_1","volume-title":"Towards deep learning models resistant to adversarial attacks. arXiv preprint arXiv:1706.06083","author":"Madry Aleksander","year":"2017","unstructured":"Aleksander Madry, Aleksandar Makelov, Ludwig Schmidt, Dimitris Tsipras, and Adrian Vladu. 2017. Towards deep learning models resistant to adversarial attacks. arXiv preprint arXiv:1706.06083 (2017)."},{"key":"e_1_2_1_61_1","doi-asserted-by":"publisher","DOI":"10.1145\/2702123.2702539"},{"key":"e_1_2_1_62_1","doi-asserted-by":"publisher","DOI":"10.1109\/IWOBI.2017.7985521"},{"key":"e_1_2_1_63_1","doi-asserted-by":"publisher","DOI":"10.1080\/10447318.2022.2047318"},{"key":"e_1_2_1_64_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-33709-3_12"},{"key":"e_1_2_1_65_1","doi-asserted-by":"publisher","DOI":"10.1145\/3544548.3580871"},{"key":"e_1_2_1_66_1","volume-title":"Computer Graphics Forum","author":"Naruniec Jacek","unstructured":"Jacek Naruniec, Leonhard Helminger, Christopher Schroers, and Romann M Weber. 2020. High-resolution neural face swapping for visual effects. In Computer Graphics Forum, Vol. 39. Wiley Online Library, 173--184."},{"key":"e_1_2_1_67_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV.2019.00728"},{"key":"e_1_2_1_68_1","doi-asserted-by":"publisher","DOI":"10.1109\/FG.2018.00024"},{"key":"e_1_2_1_69_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV.2017.165"},{"key":"e_1_2_1_70_1","volume-title":"Luis RP, Jian Jiang, et al.","author":"Perov Ivan","year":"2020","unstructured":"Ivan Perov, Daiheng Gao, Nikolay Chervoniy, Kunlin Liu, Sugasa Marangonda, Chris Um\u00e9, Mr Dpfks, Carl Shift Facenheim, Luis RP, Jian Jiang, et al. 2020. DeepFaceLab: Integrated, flexible and extensible face-swapping framework. arXiv preprint arXiv:2005.05535 (2020)."},{"key":"e_1_2_1_71_1","doi-asserted-by":"publisher","DOI":"10.1109\/WACV.2019.00089"},{"key":"e_1_2_1_72_1","doi-asserted-by":"publisher","DOI":"10.1145\/3491207"},{"key":"e_1_2_1_73_1","unstructured":"RealEye. 2017. RealEye. https:\/\/www.realeye.io\/ accessed: 2023-11-09."},{"key":"e_1_2_1_74_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2018.00474"},{"key":"e_1_2_1_75_1","doi-asserted-by":"publisher","DOI":"10.1109\/ITSC.2012.6338829"},{"key":"e_1_2_1_76_1","unstructured":"SeeSo. 2021. SeeSo. https:\/\/seeso.io\/ accessed: 2023-11-09."},{"key":"e_1_2_1_77_1","volume-title":"Proceedings of the 29th USENIX Security Symposium (USENIX Security). 1589--1604","author":"Shan Shawn","unstructured":"Shawn Shan, Emily Wenger, Jiayun Zhang, Huiying Li, Haitao Zheng, and Ben Y. Zhao. 2020. Fawkes: Protecting Privacy against Unauthorized Deep Learning Models. In Proceedings of the 29th USENIX Security Symposium (USENIX Security). 1589--1604."},{"key":"e_1_2_1_78_1","volume-title":"Very deep convolutional networks for large-scale image recognition. arXiv preprint arXiv:1409.1556","author":"Simonyan Karen","year":"2014","unstructured":"Karen Simonyan and Andrew Zisserman. 2014. Very deep convolutional networks for large-scale image recognition. arXiv preprint arXiv:1409.1556 (2014)."},{"key":"e_1_2_1_79_1","volume-title":"Proceedings of the ACM Symposium on User Interface Software and Technology (UIST). 271--280","author":"Smith B.A.","unstructured":"B.A. Smith, Q. Yin, S.K. Feiner, and S.K. Nayar. 2013. Gaze Locking: Passive Eye Contact Detection for Human?Object Interaction. In Proceedings of the ACM Symposium on User Interface Software and Technology (UIST). 271--280."},{"key":"e_1_2_1_80_1","doi-asserted-by":"publisher","DOI":"10.1145\/3287067"},{"key":"e_1_2_1_81_1","doi-asserted-by":"publisher","DOI":"10.1145\/3314111.3319915"},{"key":"e_1_2_1_82_1","doi-asserted-by":"publisher","DOI":"10.1145\/3314111.3319913"},{"key":"e_1_2_1_83_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACV.2002.1182180"},{"key":"e_1_2_1_84_1","volume-title":"Proceedings of the 36th International Conference on Machine Learning (ICML). PMLR, 6105--6114","author":"Tan Mingxing","year":"2019","unstructured":"Mingxing Tan and Quoc Le. 2019. EfficientNet: Rethinking Model Scaling for Convolutional Neural Networks. In Proceedings of the 36th International Conference on Machine Learning (ICML). PMLR, 6105--6114."},{"key":"e_1_2_1_85_1","unstructured":"VicarVison. 2007. VicarVison. https:\/\/vicarvision.nl\/blog\/eyereader-webcam-based-eye-tracking-technology\/ accessed: 2023-11-09."},{"key":"e_1_2_1_86_1","doi-asserted-by":"publisher","DOI":"10.1145\/3313831.3376132"},{"key":"e_1_2_1_87_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR52688.2022.01877"},{"key":"e_1_2_1_88_1","volume-title":"Proceedings of the Thrity-Seventh Asilomar Conference on Signals, Systems & Computers","volume":"2","author":"Wang Z.","unstructured":"Z. Wang, E.P. Simoncelli, and A.C. Bovik. 2003. Multiscale structural similarity for image quality assessment. In Proceedings of the Thrity-Seventh Asilomar Conference on Signals, Systems & Computers, Vol. 2. 1398--1402."},{"key":"e_1_2_1_89_1","doi-asserted-by":"publisher","DOI":"10.1145\/3161164"},{"key":"e_1_2_1_90_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.neucom.2022.06.039"},{"key":"e_1_2_1_91_1","doi-asserted-by":"publisher","DOI":"10.1145\/3588015.3588416"},{"key":"e_1_2_1_92_1","doi-asserted-by":"publisher","DOI":"10.1145\/3386901.3388917"},{"key":"e_1_2_1_93_1","doi-asserted-by":"publisher","DOI":"10.1145\/3442381.3449907"},{"key":"e_1_2_1_94_1","doi-asserted-by":"publisher","DOI":"10.1609\/aaai.v34i07.6930"},{"key":"e_1_2_1_95_1","volume-title":"Dp-image: Differential privacy for image data in feature space. arXiv preprint arXiv:2103.07073","author":"Xue Hanyu","year":"2021","unstructured":"Hanyu Xue, Bo Liu, Ming Ding, Tianqing Zhu, Dayong Ye, Li Song, and Wanlei Zhou. 2021. Dp-image: Differential privacy for image data in feature space. arXiv preprint arXiv:2103.07073 (2021)."},{"key":"e_1_2_1_96_1","doi-asserted-by":"publisher","DOI":"10.1002\/cpe.7554"},{"key":"e_1_2_1_97_1","doi-asserted-by":"publisher","DOI":"10.1145\/3081333.3081336"},{"key":"e_1_2_1_98_1","volume-title":"Swift-Eye: Towards Anti-blink Pupil Tracking for Precise and Robust High-Frequency Near-Eye Movement Analysis with Event Cameras","author":"Zhang Tongyu","year":"2024","unstructured":"Tongyu Zhang, Yiran Shen, Guangrong Zhao, Lin Wang, Xiaoming Chen, Lu Bai, and Yuanfeng Zhou. 2024. Swift-Eye: Towards Anti-blink Pupil Tracking for Precise and Robust High-Frequency Near-Eye Movement Analysis with Event Cameras. IEEE Transactions on Visualization and Computer Graphics (TVCG) (2024)."},{"key":"e_1_2_1_99_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-58558-7_22"},{"key":"e_1_2_1_100_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2015.7299081"},{"key":"e_1_2_1_101_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPRW.2017.284"},{"key":"e_1_2_1_102_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2018.00716"},{"key":"e_1_2_1_103_1","doi-asserted-by":"publisher","DOI":"10.1007\/s00779-015-0866-8"},{"key":"e_1_2_1_104_1","first-page":"62169","article-title":"EV-Eye: Rethinking high-frequency eye tracking through the lenses of event cameras","volume":"36","author":"Zhao Guangrong","year":"2024","unstructured":"Guangrong Zhao, Yurun Yang, Jingwei Liu, Ning Chen, Yiran Shen, Hongkai Wen, and Guohao Lan. 2024. EV-Eye: Rethinking high-frequency eye tracking through the lenses of event cameras. Advances in Neural Information Processing Systems (NeurIPS) 36 (2024), 62169--62182.","journal-title":"Advances in Neural Information Processing Systems (NeurIPS)"},{"key":"e_1_2_1_105_1","first-page":"13127","article-title":"Self-Learning Transformations for Improving Gaze and Head Redirection","volume":"33","author":"Zheng Yufeng","year":"2020","unstructured":"Yufeng Zheng, Seonwook Park, Xucong Zhang, Shalini De Mello, and Otmar Hilliges. 2020. Self-Learning Transformations for Improving Gaze and Head Redirection. In Proceedings of the Neural Information Processing Systems (NeurIPS), Vol. 33. 13127--13138.","journal-title":"Proceedings of the Neural Information Processing Systems (NeurIPS)"},{"key":"e_1_2_1_106_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR46437.2021.00480"},{"key":"e_1_2_1_107_1","doi-asserted-by":"publisher","DOI":"10.1109\/TBME.2007.895750"}],"container-title":["Proceedings of the ACM on Interactive, Mobile, Wearable and Ubiquitous Technologies"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3678595","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3678595","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,8,21]],"date-time":"2025-08-21T14:46:03Z","timestamp":1755787563000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3678595"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,8,22]]},"references-count":107,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2024,8,22]]}},"alternative-id":["10.1145\/3678595"],"URL":"https:\/\/doi.org\/10.1145\/3678595","relation":{},"ISSN":["2474-9567"],"issn-type":[{"value":"2474-9567","type":"electronic"}],"subject":[],"published":{"date-parts":[[2024,8,22]]},"assertion":[{"value":"2024-09-09","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}