{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,30]],"date-time":"2025-12-30T17:05:13Z","timestamp":1767114313894,"version":"3.48.0"},"publisher-location":"New York, NY, USA","reference-count":33,"publisher":"ACM","funder":[{"name":"National Key Research and Development Program of China","award":["2023YFB3107401"],"award-info":[{"award-number":["2023YFB3107401"]}]},{"name":"National Natural Science Foundation of China","award":["T2341003, 62376210, 62161160337, 62132011, U21B2018, U20A20177, 62206217, U24B20185"],"award-info":[{"award-number":["T2341003, 62376210, 62161160337, 62132011, U21B2018, U20A20177, 62206217, U24B20185"]}]},{"name":"Shaanxi Province Key Industry Innovation Program","award":["2023-ZDLGY-38"],"award-info":[{"award-number":["2023-ZDLGY-38"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2025,10,12]]},"DOI":"10.1145\/3714394.3756279","type":"proceedings-article","created":{"date-parts":[[2025,12,29]],"date-time":"2025-12-29T21:13:49Z","timestamp":1767042829000},"page":"1346-1352","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":0,"title":["Beyond One-Size-Fits-All: Fine-Grained Age Group Identification on Smartphones for Targeted Child Protection"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-6002-6080","authenticated-orcid":false,"given":"Shuxin","family":"Gao","sequence":"first","affiliation":[{"name":"School of Cyber Science and Engineering, Xi'an Jiaotong University, Xi'an, Shaanxi, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-6265-7345","authenticated-orcid":false,"given":"Chenhao","family":"Lin","sequence":"additional","affiliation":[{"name":"School of Cyber Science and Engineering Interdisciplinary Research Center of Frontier Science and Technology, Xi'an Jiaotong University, Xi'an, Shaanxi, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-1180-6734","authenticated-orcid":false,"given":"Junyi","family":"Zhao","sequence":"additional","affiliation":[{"name":"School of Information and Communication Engineering, Xi'an Jiaotong University, Xi'an, Shaanxi, China"}]},{"ORCID":"https:\/\/orcid.org\/0009-0001-2709-9173","authenticated-orcid":false,"given":"Jingyi","family":"Deng","sequence":"additional","affiliation":[{"name":"School of Cyber Science and Engineering, Xi'an Jiaotong University, Xi'an, Shaanxi, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-0745-4294","authenticated-orcid":false,"given":"Zhengyu","family":"Zhao","sequence":"additional","affiliation":[{"name":"School of Cyber Science and Engineering, Xi'an Jiaotong University, Xi'an, Shaanxi, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-9763-3351","authenticated-orcid":false,"given":"Chong","family":"Zhang","sequence":"additional","affiliation":[{"name":"School of Cyber Science and Engineering, Xi'an Jiaotong University, Xi'an, Shaanxi, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-8379-4915","authenticated-orcid":false,"given":"Le","family":"Yang","sequence":"additional","affiliation":[{"name":"School of Information and Communication Engineering, Xi'an Jiaotong University, Xi'an, Shaanxi, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-6959-0569","authenticated-orcid":false,"given":"Chao","family":"Shen","sequence":"additional","affiliation":[{"name":"School of Cyber Science and Engineering, Xi'an Jiaotong University, Xi'an, Shaanxi, China"}]}],"member":"320","published-online":{"date-parts":[[2025,12,29]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-23563-5_31"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1145\/3269206.3272034"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1145\/2632048.2636074"},{"key":"e_1_3_2_1_4_1","volume-title":"Monica Gemo, et al.","author":"Chaudron Stephane","year":"2018","unstructured":"Stephane Chaudron, GIOIA Rosanna DI, Monica Gemo, et al., 2018. Young children (0-8) and digital technology-A qualitative study across Europe. (2018)."},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/3544793.3560412"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1145\/3403574"},{"key":"e_1_3_2_1_7_1","volume-title":"Frequency spectral characteristics of standing balance in children and young adults. Medical engineering & physics","author":"Cherng R-J","year":"2003","unstructured":"R-J Cherng, H-Y Lee, and F-C Su. 2003. Frequency spectral characteristics of standing balance in children and young adults. Medical engineering & physics, Vol. 25, 6 (2003), 509-515."},{"key":"e_1_3_2_1_8_1","volume-title":"AuthentiSense: A Scalable Behavioral Biometrics Authentication Scheme using Few-Shot Learning for Mobile Platforms. arXiv preprint arXiv:2302.02740","author":"Fereidooni Hossein","year":"2023","unstructured":"Hossein Fereidooni, Jan K\u00f6nig, Phillip Rieger, Marco Chilese, Bora G\u00f6kbakan, Moritz Finke, Alexandra Dmitrienko, and Ahmad-Reza Sadeghi. 2023. AuthentiSense: A Scalable Behavioral Biometrics Authentication Scheme using Few-Shot Learning for Mobile Platforms. arXiv preprint arXiv:2302.02740 (2023)."},{"key":"e_1_3_2_1_9_1","volume-title":"Touchalytics: On the applicability of touchscreen input as a behavioral biometric for continuous authentication","author":"Frank Mario","year":"2012","unstructured":"Mario Frank, Ralf Biedert, Eugene Ma, Ivan Martinovic, and Dawn Song. 2012. Touchalytics: On the applicability of touchscreen input as a behavioral biometric for continuous authentication. IEEE transactions on information forensics and security, Vol. 8, 1 (2012), 136-148."},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1152\/jappl.1999.86.3.1040"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1049\/el.2017.0492"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.23919\/FRUCT.2019.8711941"},{"key":"e_1_3_2_1_13_1","volume-title":"FuMeAuth: Sensor-Based Continuous Authentication Using Fused Memory-Augmented Transformer Autoencoder","author":"Li Yantao","year":"2024","unstructured":"Yantao Li, Yue Huang, and Hongyu Huang. 2024. FuMeAuth: Sensor-Based Continuous Authentication Using Fused Memory-Augmented Transformer Autoencoder. IEEE Internet of Things Journal (2024)."},{"key":"e_1_3_2_1_14_1","volume-title":"ChildShield: An Implicit and Continuous Child Identification System on Smartphones","author":"Lin Chenhao","year":"2023","unstructured":"Chenhao Lin, Tianle Song, Yingmao Miao, Jingyi He, Minghui Yang, Huan Wang, and Chao Shen. 2023. ChildShield: An Implicit and Continuous Child Identification System on Smartphones. IEEE Transactions on Dependable and Secure Computing (2023)."},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1145\/3643832.3661872"},{"key":"e_1_3_2_1_16_1","volume-title":"SmartSpr: A Physics-informed Mobile Sprinkler Scheduling System for Reducing Urban Particulate Matter Pollution","author":"Luo Ji","year":"2025","unstructured":"Ji Luo, Zijian Xiao, Zuxin Li, Xuecheng Chen, Chaopeng Hong, Xiao-Ping Zhang, and Xinlei Chen. 2025. SmartSpr: A Physics-informed Mobile Sprinkler Scheduling System for Reducing Urban Particulate Matter Pollution. IEEE Transactions on Mobile Computing (2025)."},{"key":"e_1_3_2_1_17_1","volume-title":"Association between screen time and children's performance on a developmental screening test. JAMA pediatrics","author":"Madigan Sheri","year":"2019","unstructured":"Sheri Madigan, Dillon Browne, Nicole Racine, Camille Mori, and Suzanne Tough. 2019. Association between screen time and children's performance on a developmental screening test. JAMA pediatrics, Vol. 173, 3 (2019), 244-250."},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2019.04.001"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.11591\/ijphs.v12i4.23260"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1371\/journal.pone.0140235"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1109\/CCST.2017.8167823"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1515\/popets-2018-0021"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.chb.2018.01.012"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.2991\/secret-18.2018.5"},{"key":"e_1_3_2_1_25_1","unstructured":"Maria Santos. 2017. Changes in postural sway behavior across the life span. (2017)."},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.7717\/peerj-cs.197"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2022.3160361"},{"key":"e_1_3_2_1_28_1","volume-title":"Digital World: A rapid review of the evidence on children's internet use and outcomes.","author":"Stoilova Mariya","year":"2021","unstructured":"Mariya Stoilova, Sonia Livingstone, Rana Khazbak, et al., 2021. Investigating Risks and Opportunities for Children in a Digital World: A rapid review of the evidence on children's internet use and outcomes. (2021)."},{"key":"e_1_3_2_1_29_1","first-page":"1","volume-title":"Bamberg","author":"Vatavu Radu-Daniel","year":"2015","unstructured":"Radu-Daniel Vatavu, Lisa Anthony, and Quincy Brown. 2015. Child or adult? Inferring Smartphone users' age group from touch measurements alone. In Human-Computer Interaction-INTERACT 2015: 15th IFIP TC 13 International Conference, Bamberg, Germany, September 14-18, 2015, Proceedings, Part IV 15. Springer, 1-9."},{"key":"e_1_3_2_1_30_1","first-page":"1","article-title":"Is loot box presence in video games being correctly and consistently labelled? Comparing all age rating decisions made by the German USK, the American ESRB, and the European PEGI in 2023. In 2024 IEEE Gaming, Entertainment, and Media Conference (GEM)","author":"Xiao Leon Y","year":"2024","unstructured":"Leon Y Xiao. 2024. Is loot box presence in video games being correctly and consistently labelled? Comparing all age rating decisions made by the German USK, the American ESRB, and the European PEGI in 2023. In 2024 IEEE Gaming, Entertainment, and Media Conference (GEM). IEEE, 1-6.","journal-title":"IEEE"},{"key":"e_1_3_2_1_31_1","volume-title":"Child-smartphone interaction: Relevance and positive and negative implications. Universal access in the information society","author":"Yadav Savita","year":"2022","unstructured":"Savita Yadav and Pinaki Chakraborty. 2022. Child-smartphone interaction: Relevance and positive and negative implications. Universal access in the information society, Vol. 21, 3 (2022), 573-586."},{"key":"e_1_3_2_1_32_1","first-page":"27","article-title":"Minor's Internet Safety, the United States, and China: A Comparative Approach to the Efforts and Challenges of Lawmakers and the Society","volume":"1","author":"Zaynetdinova Olga","year":"2023","unstructured":"Olga Zaynetdinova. 2023. Minor's Internet Safety, the United States, and China: A Comparative Approach to the Efforts and Challenges of Lawmakers and the Society. J. Int'l L. & Comp. Stud., Vol. 1 (2023), 27.","journal-title":"J. Int'l L. & Comp. Stud."},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"crossref","unstructured":"Nan Zhou Yuxuan Liu Haoyang Wang Fanhang Man Jingao Xu Fan Dang Chaopeng Hong Yunhao Liu Xiao-Ping Zhang Yali Song et al. 2025. CatUA: Catalyzing Urban Air Quality Intelligence through Mobile Crowd-sensing. IEEE Transactions on Mobile Computing (2025).","DOI":"10.1109\/TMC.2025.3560120"}],"event":{"name":"UbiComp '25:The 2025 ACM International Joint Conference on Pervasive and Ubiquitous Computing \/ ISWC ACM International Symposium on Wearable Computers","sponsor":["SIGMOBILE ACM Special Interest Group on Mobility of Systems, Users, Data and Computing","SIGCHI ACM Special Interest Group on Computer-Human Interaction","SIGSPATIAL ACM Special Interest Group on Spatial Information"],"location":"Espoo Finland"},"container-title":["Companion of the 2025 ACM International Joint Conference on Pervasive and Ubiquitous Computing"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3714394.3756279","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,12,30]],"date-time":"2025-12-30T17:01:08Z","timestamp":1767114068000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3714394.3756279"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,10,12]]},"references-count":33,"alternative-id":["10.1145\/3714394.3756279","10.1145\/3714394"],"URL":"https:\/\/doi.org\/10.1145\/3714394.3756279","relation":{},"subject":[],"published":{"date-parts":[[2025,10,12]]},"assertion":[{"value":"2025-12-29","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}