{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,9]],"date-time":"2026-04-09T14:30:33Z","timestamp":1775745033589,"version":"3.50.1"},"reference-count":50,"publisher":"Association for Computing Machinery (ACM)","issue":"2","license":[{"start":{"date-parts":[[2025,3,23]],"date-time":"2025-03-23T00:00:00Z","timestamp":1742688000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"crossref","award":["62472054 and 62072061"],"award-info":[{"award-number":["62472054 and 62072061"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"crossref"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":["ACM Trans. Sen. Netw."],"published-print":{"date-parts":[[2025,3,31]]},"abstract":"<jats:p>Nowadays, with the widespread adoption of mobile devices, information security has become particularly important. Existing sensor-based continuous authentication systems ensure the security of mobile devices to some extent, but most have drawbacks, such as lacking end-to-end structure or requiring data from both legitimate users and imposters for training. In this article, we present RPWAEAuth, a sensor-based continuous Authentication system using Reconstruction Probability in Wasserstein AutoEncoder. RPWAEAuth implicitly collects user behavior patterns from the built-in accelerometer, gyroscope, and magnetometer of mobile devices. The Wasserstein autoencoder maps the sensor data into a continuous latent space close to a prior distribution and reconstructs them using reconstruction probability for better authentication. In the registration stage, RPWAEAuth collects and preprocesses the sensor data from a legitimate user for RPWAE training. In the authentication stage, when a user interacts with the device, RPWAEAuth collects and preprocesses the sensor data, and then feeds them into the trained RPWAE to generate a reconstruction probability. This probability is then compared with a predefined threshold for user authentication. We evaluate the performance of RPWAEAuth on our dataset in terms of the effectiveness of RPWAEAuth, impact of sensor numbers, effectiveness of reconstruction probability, authentication time, resilience to mimic attacks, comparison with different AEs, and comparison with state-of-the-art methods. The experimental results demonstrate that RPWAEAuth achieves superior authentication performance compared to other methods, with an accuracy of 99.34% and an EER of 0.66% on 69 unseen users.<\/jats:p>","DOI":"10.1145\/3717065","type":"journal-article","created":{"date-parts":[[2025,2,12]],"date-time":"2025-02-12T11:15:01Z","timestamp":1739358901000},"page":"1-18","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":2,"title":["RPWAEAuth: Sensor-Based Continuous Authentication Using Reconstruction Probability in Wasserstein Autoencoder"],"prefix":"10.1145","volume":"21","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-7648-5671","authenticated-orcid":false,"given":"Yantao","family":"Li","sequence":"first","affiliation":[{"name":"College of Computer Science, Chongqing University, Chongqing, China"}]},{"ORCID":"https:\/\/orcid.org\/0009-0008-2778-1499","authenticated-orcid":false,"given":"Yichao","family":"Wang","sequence":"additional","affiliation":[{"name":"College of Computer Science, Chongqing University, Chongqing, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-9052-4868","authenticated-orcid":false,"given":"Hongyu","family":"Huang","sequence":"additional","affiliation":[{"name":"College of Computer Science, Chongqing University, Chongqing, China"}]}],"member":"320","published-online":{"date-parts":[[2025,3,23]]},"reference":[{"key":"e_1_3_1_2_2","doi-asserted-by":"crossref","first-page":"372","DOI":"10.1145\/3052973.3053031","volume-title":"Proceedings of the 2017 ACM on Asia Conference on Computer and Communications Security (AsiaCCS)","author":"Wang Ding","year":"2017","unstructured":"Ding Wang, Qianchen Gu, Xinyi Huang, and Ping Wang. 2017. Understanding human-chosen pins: characteristics, distribution and security. In Proceedings of the 2017 ACM on Asia Conference on Computer and Communications Security (AsiaCCS). 372\u2013385."},{"key":"e_1_3_1_3_2","doi-asserted-by":"crossref","first-page":"411","DOI":"10.1007\/978-981-99-6568-7_38","volume-title":"ICT Analysis and Applications","author":"Patil Nikhil","year":"2023","unstructured":"Nikhil Patil, Ganesh Bhutkar, Priyanshi Patil, Parth Pishte, and Apoorva Popalghat. 2023. Graphical-based password authentication. In ICT Analysis and Applications, Simon Fong, Nilanjan Dey, and Amit Joshi (Eds.). 411\u2013419."},{"key":"e_1_3_1_4_2","doi-asserted-by":"publisher","DOI":"10.1145\/1133265.1133303"},{"key":"e_1_3_1_5_2","first-page":"1","volume-title":"Proceedings of the 4th USENIX Workshop on Offensive Technologies (WOOT\u201910)","author":"Aviv Adam J.","year":"2010","unstructured":"Adam J. Aviv, Katherine Gibson, Evan Mossop, Matt Blaze, and Jonathan M. Smith. 2010. Smudge attacks on smartphone touch screens. In Proceedings of the 4th USENIX Workshop on Offensive Technologies (WOOT\u201910). 1\u20137."},{"key":"e_1_3_1_6_2","first-page":"1775","volume-title":"Proceedings of the ACM SIGSAC Conference on Computer and Communications Security (CCS\u201918)","author":"Zhou Man","year":"2018","unstructured":"Man Zhou, Qian Wang, Jingxiao Yang, Qi Li, Feng Xiao, Zhibo Wang, and Xiaofeng Chen. 2018. Patternlistener: Cracking android pattern lock using acoustic signals. In Proceedings of the ACM SIGSAC Conference on Computer and Communications Security (CCS\u201918). 1775\u20131787."},{"key":"e_1_3_1_7_2","doi-asserted-by":"crossref","first-page":"109","DOI":"10.1145\/2594368.2594373","volume-title":"Proceedings of the 12th Annual International Conference on Mobile Systems, Applications, and Services (MobiSys\u201914)","author":"Chen Shaxun","year":"2014","unstructured":"Shaxun Chen, Amit Pande, and Prasant Mohapatra. 2014. Sensor-assisted facial recognition: An enhanced biometric authentication system for smartphones. In Proceedings of the 12th Annual International Conference on Mobile Systems, Applications, and Services (MobiSys\u201914). 109\u2013122."},{"key":"e_1_3_1_8_2","first-page":"1411","volume-title":"Proceedings of the 33rd Annual ACM Conference on Human Factors in Computing Systems (CHI\u201915)","author":"Luca Alexander De","year":"2015","unstructured":"Alexander De Luca, Alina Hang, Emanuel Von Zezschwitz, and Heinrich Hussmann. 2015. I feel like I\u2019m taking selfies all day! Towards understanding biometric authentication on smartphones. In Proceedings of the 33rd Annual ACM Conference on Human Factors in Computing Systems (CHI\u201915). 1411\u20131414."},{"key":"e_1_3_1_9_2","first-page":"1687","volume-title":"Proceedings of the IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP\u201915)","author":"Fathy Mohammed E.","year":"2015","unstructured":"Mohammed E. Fathy, Vishal M. Patel, and Rama Chellappa. 2015. Face-based active authentication on mobile devices. In Proceedings of the IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP\u201915). 1687\u20131691."},{"key":"e_1_3_1_10_2","first-page":"2991","volume-title":"IEEE International Conference on Image Processing (ICIP\u201916)","author":"Mahbub Upal","year":"2016","unstructured":"Upal Mahbub, Vishal M. Patel, Deepak Chandra, Brandon Barbello, and Rama Chellappa. 2016. Partial face detection for continuous authentication. In Proceedings of theIEEE International Conference on Image Processing (ICIP\u201916). 2991\u20132995."},{"key":"e_1_3_1_11_2","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2017.2691658"},{"key":"e_1_3_1_12_2","first-page":"85","volume-title":"7th International Conference of Information and Communication Technology for Embedded Systems (IC-ICTES\u201916)","author":"Shabrina Nabilah","year":"2016","unstructured":"Nabilah Shabrina, Tsuyoshi Isshiki, and Hiroaki Kunieda. 2016. Fingerprint authentication on touch sensor using phase-only correlation method. In Proceedings of the7th International Conference of Information and Communication Technology for Embedded Systems (IC-ICTES\u201916). 85\u201389."},{"key":"e_1_3_1_13_2","first-page":"1","volume-title":"Proceedings of the 6th International Conference of Information and Communication Technology for Embedded Systems (IC-ICTES\u201915)","author":"Yamazaki Masao","year":"2015","unstructured":"Masao Yamazaki, Dongju Li, Tsuyoshi Isshiki, and Hiroaki Kunieda. 2015. SIFT-based algorithm for fingerprint authentication on smartphone. In Proceedings of the 6th International Conference of Information and Communication Technology for Embedded Systems (IC-ICTES\u201915). 1\u20135."},{"key":"e_1_3_1_14_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.patcog.2009.08.016"},{"key":"e_1_3_1_15_2","doi-asserted-by":"publisher","DOI":"10.1109\/TCE.2015.7150600"},{"key":"e_1_3_1_16_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.patrec.2014.09.006"},{"key":"e_1_3_1_17_2","first-page":"5","volume-title":"2006 Symposium on VLSI Circuits","author":"Hashimoto Junichi","year":"2006","unstructured":"Junichi Hashimoto. 2006. Finger vein authentication technology and its future. In Proceedings of the2006 Symposium on VLSI Circuits. 5\u20138."},{"key":"e_1_3_1_18_2","doi-asserted-by":"publisher","DOI":"10.1109\/TCE.2012.6227456"},{"key":"e_1_3_1_19_2","first-page":"458","volume-title":"IEEE International Conference on Biometrics (ICB\u201915)","author":"Mondal Soumik","year":"2015","unstructured":"Soumik Mondal and Patrick Bours. 2015. Swipe gesture based continuous authentication for mobile devices. In Proceedings of theIEEE International Conference on Biometrics (ICB\u201915). 458\u2013465."},{"key":"e_1_3_1_20_2","first-page":"1","volume-title":"Proceedings of the 10th International Conference on Ubiquitous Information Management and Communication (IMCOM\u201916)","author":"Nohara Takumi","year":"2016","unstructured":"Takumi Nohara and Ryuya Uda. 2016. Personal identification by flick input using self-organizing maps with acceleration sensor and gyroscope. In Proceedings of the 10th International Conference on Ubiquitous Information Management and Communication (IMCOM\u201916). 1\u20136."},{"key":"e_1_3_1_21_2","doi-asserted-by":"publisher","DOI":"10.1109\/TCSS.2016.2517648"},{"key":"e_1_3_1_22_2","doi-asserted-by":"publisher","DOI":"10.1109\/TMC.2018.2828816"},{"key":"e_1_3_1_23_2","doi-asserted-by":"publisher","DOI":"10.1109\/JSEN.2017.2723840"},{"key":"e_1_3_1_24_2","doi-asserted-by":"publisher","DOI":"10.1145\/2857705.2857748"},{"key":"e_1_3_1_25_2","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2015.2506542"},{"key":"e_1_3_1_26_2","doi-asserted-by":"publisher","DOI":"10.1109\/TMC.2017.2686855"},{"key":"e_1_3_1_27_2","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2017.2737969"},{"key":"e_1_3_1_28_2","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2018.2851185"},{"key":"e_1_3_1_29_2","doi-asserted-by":"publisher","DOI":"10.1109\/MIC.2020.2971447"},{"key":"e_1_3_1_30_2","first-page":"1","volume-title":"Proceedings of the 2018 IEEE International Conference on Networking, Architecture and Storage (NAS)","author":"Hu Hailong","unstructured":"Hailong Hu, Yantao Li, Zhangqian Zhu, and Gang Zhou. CNNAuth: Continuous authentication via two-stream convolutional neural networks. In Proceedings of the 2018 IEEE International Conference on Networking, Architecture and Storage (NAS). IEEE, 1\u20139."},{"issue":"4","key":"e_1_3_1_31_2","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1145\/3432203","article-title":"Contauth: Continual learning framework for behavioral-based user authentication","volume":"4","author":"Chauhan Jagmohan","year":"2020","unstructured":"Jagmohan Chauhan, Young D. Kwon, Pan Hui, and Cecilia Mascolo. 2020. Contauth: Continual learning framework for behavioral-based user authentication. ACM on Interactive, Mobile, Wearable and Ubiquitous Technologies (IMWUT) 4, 4 (2020), 1\u201323.","journal-title":"ACM on Interactive, Mobile, Wearable and Ubiquitous Technologies (IMWUT)"},{"key":"e_1_3_1_32_2","doi-asserted-by":"publisher","DOI":"10.1145\/3212725.3212732"},{"key":"e_1_3_1_33_2","first-page":"1","volume-title":"IEEE Conference on Computer Communications (INFOCOM\u201923)","author":"Cao Yetong","year":"2023","unstructured":"Yetong Cao, Chao Cai, Fan Li, Zhe Chen, and Jun Luo. 2023. HeartPrint: Passive heart sounds authentication exploiting in-ear microphones. In Proceedings of theIEEE Conference on Computer Communications (INFOCOM\u201923). 1\u201310."},{"key":"e_1_3_1_34_2","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2024.3429574"},{"key":"e_1_3_1_35_2","doi-asserted-by":"crossref","first-page":"169","DOI":"10.1007\/978-3-030-86890-1_10","volume-title":"Proceedings of the 23rd International Conference on Information and Communications Security (ICICS\u201921)","author":"Deng Shaojiang","year":"2021","unstructured":"Shaojiang Deng, Jiaxing Luo, and Yantao Li. 2021. Cnn-based continuous authentication on smartphones with auto augmentation search. In Proceedings of the 23rd International Conference on Information and Communications Security (ICICS\u201921). 169\u2013186."},{"issue":"6","key":"e_1_3_1_36_2","first-page":"4708","article-title":"Multisensor-based continuous authentication of smartphone users with two-stage feature extraction","volume":"10","author":"Hu Mingming","year":"2022","unstructured":"Mingming Hu, Kun Zhang, Ruibang You, and Bibo Tu. 2022. Multisensor-based continuous authentication of smartphone users with two-stage feature extraction. IEEE Internet of Things Journal 10, 6 (2022), 4708\u20134724.","journal-title":"IEEE Internet of Things Journal"},{"issue":"2","key":"e_1_3_1_37_2","first-page":"1","article-title":"DeFFusion: CNN-based continuous authentication using deep feature fusion","volume":"18","author":"Li Yantao","year":"2021","unstructured":"Yantao Li, Peng Tao, Shaojiang Deng, and Gang Zhou. 2021. DeFFusion: CNN-based continuous authentication using deep feature fusion. ACM Transactions on Sensor Networks 18, 2 (2021), 1\u201320.","journal-title":"ACM Transactions on Sensor Networks"},{"key":"e_1_3_1_38_2","doi-asserted-by":"publisher","DOI":"10.1109\/TMC.2022.3186614"},{"key":"e_1_3_1_39_2","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2020.2975779"},{"key":"e_1_3_1_40_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.patrec.2021.03.010"},{"key":"e_1_3_1_41_2","doi-asserted-by":"publisher","DOI":"10.1109\/TMC.2023.3290834"},{"issue":"1","key":"e_1_3_1_42_2","first-page":"1","article-title":"Variational autoencoder based anomaly detection using reconstruction probability","volume":"2","author":"An Jinwon","year":"2015","unstructured":"Jinwon An and Sungzoon Cho. 2015. Variational autoencoder based anomaly detection using reconstruction probability. Special Lecture on IE 2, 1 (2015), 1\u201318.","journal-title":"Special Lecture on IE"},{"key":"e_1_3_1_43_2","first-page":"4322","volume-title":"Proceedings of the IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP\u201920)","author":"Lin Shuyu","year":"2020","unstructured":"Shuyu Lin, Ronald Clark, Robert Birke, Sandro Sch\u00f6nborn, Niki Trigoni, and Stephen Roberts. 2020. Anomaly detection for time series using VAE-LSTM hybrid model. In Proceedings of the IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP\u201920). 4322\u20134326."},{"key":"e_1_3_1_44_2","doi-asserted-by":"publisher","DOI":"10.1145\/3178876.3185996"},{"key":"e_1_3_1_45_2","article-title":"Auto-encoding variational bayes","author":"Kingma Diederik P.","year":"2013","unstructured":"Diederik P. Kingma and Max Welling. 2013. Auto-encoding variational bayes. arXiv preprint arXiv:1312.6114 (2013).","journal-title":"arXiv preprint arXiv:1312.6114"},{"key":"e_1_3_1_46_2","doi-asserted-by":"crossref","first-page":"111","DOI":"10.1145\/3485730.3485932","volume-title":"Proceedings of the 19th ACM Conference on Embedded Networked Sensor Systems (SenSys\u201921)","author":"Zheng Tianyue","year":"2021","unstructured":"Tianyue Zheng, Zhe Chen, Shujie Zhang, Chao Cai, and Jun Luo. 2021. MoRe-Fi: Motion-robust and fine-grained respiration monitoring via deep-learning UWB radar. In Proceedings of the 19th ACM Conference on Embedded Networked Sensor Systems (SenSys\u201921). 111\u2013124."},{"key":"e_1_3_1_47_2","doi-asserted-by":"publisher","DOI":"10.1109\/TMC.2022.3197416"},{"key":"e_1_3_1_48_2","article-title":"Wasserstein auto-encoders","author":"Tolstikhin Ilya","year":"2017","unstructured":"Ilya Tolstikhin, Olivier Bousquet, Sylvain Gelly, and Bernhard Schoelkopf. 2017. Wasserstein auto-encoders. arXiv preprint arXiv:1711.01558 (2017).","journal-title":"arXiv preprint arXiv:1711.01558"},{"key":"e_1_3_1_49_2","first-page":"1718","volume-title":"International Conference on Machine Learning","author":"Li Yujia","year":"2015","unstructured":"Yujia Li, Kevin Swersky, and Rich Zemel. 2015. Generative moment matching networks. In Proceedings of theInternational Conference on Machine Learning. 1718\u20131727."},{"key":"e_1_3_1_50_2","doi-asserted-by":"publisher","DOI":"10.1145\/3599727"},{"key":"e_1_3_1_51_2","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2021.3108822"}],"container-title":["ACM Transactions on Sensor Networks"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3717065","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3717065","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T01:18:55Z","timestamp":1750295935000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3717065"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,3,23]]},"references-count":50,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2025,3,31]]}},"alternative-id":["10.1145\/3717065"],"URL":"https:\/\/doi.org\/10.1145\/3717065","relation":{},"ISSN":["1550-4859","1550-4867"],"issn-type":[{"value":"1550-4859","type":"print"},{"value":"1550-4867","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025,3,23]]},"assertion":[{"value":"2024-08-15","order":0,"name":"received","label":"Received","group":{"name":"publication_history","label":"Publication History"}},{"value":"2025-02-09","order":2,"name":"accepted","label":"Accepted","group":{"name":"publication_history","label":"Publication History"}},{"value":"2025-03-23","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}