{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,26]],"date-time":"2025-12-26T07:10:26Z","timestamp":1766733026752,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":56,"publisher":"ACM","license":[{"start":{"date-parts":[[2025,5,6]],"date-time":"2025-05-06T00:00:00Z","timestamp":1746489600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"NSFC","award":["62202180","62272348"],"award-info":[{"award-number":["62202180","62272348"]}]},{"DOI":"10.13039\/100000001","name":"NSF (National Science Foundation)","doi-asserted-by":"publisher","award":["2426470"],"award-info":[{"award-number":["2426470"]}],"id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2025,5,6]]},"DOI":"10.1145\/3715014.3722046","type":"proceedings-article","created":{"date-parts":[[2025,5,4]],"date-time":"2025-05-04T23:37:21Z","timestamp":1746401841000},"page":"560-573","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":1,"title":["CaphandAuth: Robust and Anti-spoofing Hand Authentication via COTS Capacitive Touchscreens"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0009-0009-5929-8298","authenticated-orcid":false,"given":"Xiaojing","family":"Zhu","sequence":"first","affiliation":[{"name":"Wuhan University, Wuhan City, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-1602-7369","authenticated-orcid":false,"given":"Man","family":"Zhou","sequence":"additional","affiliation":[{"name":"Huazhong University of Science and Technology, Wuhan, China"}]},{"ORCID":"https:\/\/orcid.org\/0009-0008-3612-2962","authenticated-orcid":false,"given":"Xiaoxiao","family":"Qiao","sequence":"additional","affiliation":[{"name":"Wuhan University, Wuhan City, China"}]},{"ORCID":"https:\/\/orcid.org\/0009-0008-0927-4661","authenticated-orcid":false,"given":"Zijian","family":"Ling","sequence":"additional","affiliation":[{"name":"Huazhong University of Science and Technology, Wuhan, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-8979-5094","authenticated-orcid":false,"given":"Qin","family":"Liu","sequence":"additional","affiliation":[{"name":"Wuhan University, Wuhan City, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-2773-5050","authenticated-orcid":false,"given":"Houzhen","family":"Wang","sequence":"additional","affiliation":[{"name":"Wuhan University, Wuhan City, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-6363-3209","authenticated-orcid":false,"given":"Xiaojing","family":"Ma","sequence":"additional","affiliation":[{"name":"Huazhong University of Science and Technology, Wuhan, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-1880-5096","authenticated-orcid":false,"given":"Zhengxiong","family":"Li","sequence":"additional","affiliation":[{"name":"University of Colorado Denver, Denver City, USA"}]}],"member":"320","published-online":{"date-parts":[[2025,5,6]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"2021. Amazon One: An easier way through your day. https:\/\/m.media-amazon.com\/images\/I\/C1dxNKQphuL.mp4."},{"key":"e_1_3_2_1_2_1","unstructured":"2023. Add a Fingerprint on your Galaxy Phone. https:\/\/www.youtube.com\/watch?v=Bizj9zn_tUc."},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11042-019-7424-8"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2019.2917156"},{"key":"e_1_3_2_1_5_1","volume-title":"Privacy and Identity Management for Life: 7th IFIP WG 9.2, 9.6\/11.7, 11.4, 11.6\/PrimeLife International Summer School, Trento, Italy, September 5--9","author":"Angulo Julio","year":"2011","unstructured":"Julio Angulo and Erik W\u00e4stlund. 2012. Exploring touch-screen biometrics for user identification on smart phones. In Privacy and Identity Management for Life: 7th IFIP WG 9.2, 9.6\/11.7, 11.4, 11.6\/PrimeLife International Summer School, Trento, Italy, September 5--9, 2011, Revised Selected Papers 7. Springer, 130--143."},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2018.01.010"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1145\/3411809","article-title":"Listen to Your Fingers: User Authentication Based on Geometry Biometrics of Touch Gesture","volume":"4","author":"Chen Huijie","year":"2020","unstructured":"Huijie Chen, Fan Li, Wan Du, Song Yang, Matthew Conn, and Yu Wang. 2020. Listen to Your Fingers: User Authentication Based on Geometry Biometrics of Touch Gesture. Proceedings of the ACM on Interactive, Mobile, Wearable and Ubiquitous Technologies 4, 3 (2020), 1--23.","journal-title":"Proceedings of the ACM on Interactive, Mobile, Wearable and Ubiquitous Technologies"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1145\/3569478"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR42600.2020.00670"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/3447526.3472045"},{"key":"e_1_3_2_1_11_1","unstructured":"Jason Cipriani. 2020. Set up Face ID on your iPhone or iPad in under 2 minutes. https:\/\/www.cnet.com\/tech\/mobile\/set-up-face-id-on-your-iphone-or-ipad-in-under-two-minutes\/."},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1587\/transinf.2017MUI0001"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2014.2322255"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.patcog.2023.109422"},{"key":"e_1_3_2_1_15_1","unstructured":"Barry AJ Fisher and David R Fisher. 2012. Techniques of crime scene investigation."},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1145\/2817721.2817722"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1145\/2702123.2702518"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jisa.2022.103290"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2017.243"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1145\/3447993.3483277"},{"key":"e_1_3_2_1_21_1","unstructured":"Glenn Jocher. 2023. YOLOv8. https:\/\/github.com\/ultralytics\/ultralytics."},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2011.2121062"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.patcog.2017.08.017"},{"key":"e_1_3_2_1_24_1","volume-title":"Proceedings of ACM Conference on Human Factors in Computing Systems (CHI). 1--13","author":"Le Huy Viet","year":"2018","unstructured":"Huy Viet Le, Thomas Kosch, Patrick Bader, Sven Mayer, and Niels Henze. 2018. PalmTouch: Using the palm as an additional input modality on commodity smart-phones. In Proceedings of ACM Conference on Human Factors in Computing Systems (CHI). 1--13."},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2021.3074315"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSMC.2022.3146777"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV48922.2021.00986"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1145\/3132272.3134130"},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1145\/3411764.3445703"},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1016\/S0020-7373(86)80060-8"},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIM.2023.3261909"},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1109\/PCCC.2016.7820656"},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2018.00723"},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1145\/3544548.3580987"},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2018.00356"},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1145\/3025453.3025663"},{"key":"e_1_3_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP46214.2022.9833718"},{"key":"e_1_3_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2023.3277879"},{"key":"e_1_3_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2017.54"},{"key":"e_1_3_2_1_40_1","doi-asserted-by":"publisher","DOI":"10.1145\/3411764.3445621"},{"key":"e_1_3_2_1_41_1","volume-title":"Proceedings of ACM Symposium on User Interface Software and Technology (UIST). 67--68","author":"Tartz Robert","year":"2015","unstructured":"Robert Tartz and Ted Gooding. 2015. Hand biometrics using capacitive touch-screens. In Proceedings of ACM Symposium on User Interface Software and Technology (UIST). 67--68."},{"key":"e_1_3_2_1_42_1","first-page":"82","article-title":"Using of hand geometry in biometric security systems","volume":"16","author":"Varchol Peter","year":"2007","unstructured":"Peter Varchol and Dusan Levicky. 2007. Using of hand geometry in biometric security systems. Radioengineering 16, 4 (2007), 82.","journal-title":"Radioengineering"},{"key":"e_1_3_2_1_43_1","volume-title":"Proceedings of USENIX Security Symposium (USENIX Security). 1543--1559","author":"Wang Kai","year":"2022","unstructured":"Kai Wang, Richard Mitev, Chen Yan, Xiaoyu Ji, Ahmad-Reza Sadeghi, and Wenyuan Xu. 2022. GhostTouch: Targeted Attacks on Touchscreens without Physical Touch. In Proceedings of USENIX Security Symposium (USENIX Security). 1543--1559."},{"key":"e_1_3_2_1_44_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR46437.2021.01593"},{"key":"e_1_3_2_1_45_1","doi-asserted-by":"publisher","DOI":"10.3390\/s18103265"},{"key":"e_1_3_2_1_46_1","doi-asserted-by":"publisher","DOI":"10.23919\/cje.2022.00.031"},{"key":"e_1_3_2_1_47_1","doi-asserted-by":"publisher","DOI":"10.1145\/3548606.3560553"},{"key":"e_1_3_2_1_48_1","doi-asserted-by":"publisher","DOI":"10.1109\/TMC.2022.3214846"},{"key":"e_1_3_2_1_49_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2018.2833032"},{"key":"e_1_3_2_1_50_1","doi-asserted-by":"publisher","DOI":"10.1145\/2992154.2992182"},{"key":"e_1_3_2_1_51_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR46437.2021.01493"},{"key":"e_1_3_2_1_52_1","doi-asserted-by":"publisher","DOI":"10.1145\/3581791.3596841"},{"key":"e_1_3_2_1_53_1","doi-asserted-by":"publisher","DOI":"10.1145\/3643832.3661884"},{"key":"e_1_3_2_1_54_1","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2024.24618"},{"key":"e_1_3_2_1_55_1","doi-asserted-by":"publisher","DOI":"10.1109\/TMC.2024.3367781"},{"key":"e_1_3_2_1_56_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2023.3254432"}],"event":{"name":"SenSys '25: 23rd ACM Conference on Embedded Networked Sensor Systems","sponsor":["SIGARCH ACM Special Interest Group on Computer Architecture","SIGMETRICS ACM Special Interest Group on Measurement and Evaluation","SIGOPS ACM Special Interest Group on Operating Systems","SIGMOBILE ACM Special Interest Group on Mobility of Systems, Users, Data and Computing","SIGBED ACM Special Interest Group on Embedded Systems"],"location":"UC Irvine Student Center. Irvine CA USA","acronym":"SenSys '25"},"container-title":["Proceedings of the 23rd ACM Conference on Embedded Networked Sensor Systems"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3715014.3722046","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/abs\/10.1145\/3715014.3722046","content-type":"text\/html","content-version":"vor","intended-application":"syndication"}],"deposited":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T01:17:57Z","timestamp":1750295877000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3715014.3722046"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,5,6]]},"references-count":56,"alternative-id":["10.1145\/3715014.3722046","10.1145\/3715014"],"URL":"https:\/\/doi.org\/10.1145\/3715014.3722046","relation":{},"subject":[],"published":{"date-parts":[[2025,5,6]]},"assertion":[{"value":"2025-05-06","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}