{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,31]],"date-time":"2026-03-31T21:34:00Z","timestamp":1774992840540,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":125,"publisher":"ACM","funder":[{"DOI":"10.13039\/501100003725","name":"National Research Foundation of Korea","doi-asserted-by":"publisher","award":["RS-2024-00464269, RS-2023-00277848"],"award-info":[{"award-number":["RS-2024-00464269, RS-2023-00277848"]}],"id":[{"id":"10.13039\/501100003725","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2025,9,28]]},"DOI":"10.1145\/3746059.3747611","type":"proceedings-article","created":{"date-parts":[[2025,9,27]],"date-time":"2025-09-27T07:50:36Z","timestamp":1758959436000},"page":"1-16","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":1,"title":["UniKey: Enabling Surface-Based Typing with Commodity Smartwatches via Cross-Modal Learning"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-6717-5310","authenticated-orcid":false,"given":"Sean Rui Xiang","family":"Tan","sequence":"first","affiliation":[{"name":"School of Computing, National University of Singapore, Singapore, Singapore"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-6563-275X","authenticated-orcid":false,"given":"Mun Choon","family":"Chan","sequence":"additional","affiliation":[{"name":"School of Computing, National University of Singapore, Singapore, Singapore"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-0798-704X","authenticated-orcid":false,"given":"Jun","family":"Han","sequence":"additional","affiliation":[{"name":"School of Computing, KAIST, Daejeon, Republic of Korea"}]}],"member":"320","published-online":{"date-parts":[[2025,9,27]]},"reference":[{"key":"e_1_3_3_3_2_2","unstructured":"2014. Improving Smart TV Security with Simpler and Stronger Authentication. https:\/\/www.secsign.com\/solving-smart-tv-security-simpler-stronger-authentication\/"},{"key":"e_1_3_3_3_3_2","unstructured":"2019. What comes after the keyboard?https:\/\/www.verizon.com\/about\/our-company\/fourth-industrial-revolution\/what-comes-after-keyboard"},{"key":"e_1_3_3_3_4_2","unstructured":"2022. Virtual Reality And The Input Problem. https:\/\/www.bruceb.com\/2022\/10\/virtual-reality-and-the-input-problem\/"},{"key":"e_1_3_3_3_5_2","unstructured":"2024. Input method (IME) \u2013 Google Input Tools. https:\/\/www.google.com\/inputtools\/services\/features\/input-method.html"},{"key":"e_1_3_3_3_6_2","unstructured":"2024. International language standards | Cambridge English. https:\/\/www.cambridgeenglish.org\/exams-and-tests\/cefr\/"},{"key":"e_1_3_3_3_7_2","unstructured":"2024. Microsoft Simplified Chinese IME - Microsoft Support. https:\/\/support.microsoft.com\/en-us\/windows\/microsoft-simplified-chinese-ime-9b962a3b-2fa4-4f37-811c-b1886320dd72"},{"key":"e_1_3_3_3_8_2","unstructured":"2024. Oculus Quest: All-in-One VR Headset | Oculus. https:\/\/www.oculus.com\/quest\/refurbished\/"},{"key":"e_1_3_3_3_9_2","unstructured":"2024. RayNeo Air2 AR Glasses. https:\/\/www.rayneo.com\/products\/rayneo-air-2-xr-glasses"},{"key":"e_1_3_3_3_10_2","unstructured":"2024. Virtual Keyboard for Smart TV and Internet Video. https:\/\/www.softcorporation.com\/smarttv\/"},{"key":"e_1_3_3_3_11_2","unstructured":"2024. XREAL Air | Elevate Your AR Experience with Cutting-Edge Smart Glasses. https:\/\/www.xreal.com\/"},{"key":"e_1_3_3_3_12_2","unstructured":"2025. Even Realities G1 Review | Prescription Smart Glasses with Display & AI. https:\/\/www.evenrealities.com\/g1"},{"key":"e_1_3_3_3_13_2","unstructured":"2025. More Than a Gesture: How Galaxy Watch\u2019s Universal Gestures Feature Enhances Accessibility. https:\/\/news.samsung.com\/global\/more-than-a-gesture-how-galaxy-watchs-universal-gestures-feature-enhances-accessibility"},{"key":"e_1_3_3_3_14_2","unstructured":"2025. Navigate your watch with wrist gestures - Wear OS by Google Help. https:\/\/support.google.com\/wearos\/answer\/6312406?hl=en"},{"key":"e_1_3_3_3_15_2","unstructured":"2025. Use AssistiveTouch on Apple Watch. https:\/\/support.apple.com\/en-sg\/guide\/watch\/apdec70bfd2d\/watchos"},{"key":"e_1_3_3_3_16_2","doi-asserted-by":"publisher","DOI":"10.1109\/SECON48991.2020.9158416"},{"key":"e_1_3_3_3_17_2","unstructured":"Saleh\u00a0M. Abu-Soud. 2016. PaSSIL: A New Keystroke Dynamics System for Password Strengthening Based on Inductive Learning. https:\/\/www.semanticscholar.org\/paper\/PaSSIL%3A-A-New-Keystroke-Dynamics-System-for-Based-Abu-Soud\/707ff05fce455a3e21c7c62273cc44a8cfb22683"},{"key":"e_1_3_3_3_18_2","doi-asserted-by":"publisher","unstructured":"Alejandro Acien Aythami Morales John\u00a0V. Monaco Ruben Vera-Rodriguez and Julian Fierrez. 2022. TypeNet: Deep Learning Keystroke Biometrics. IEEE Transactions on Biometrics Behavior and Identity Science 4 1 (Jan. 2022) 57\u201370. 10.1109\/TBIOM.2021.3112540Conference Name: IEEE Transactions on Biometrics Behavior and Identity Science.","DOI":"10.1109\/TBIOM.2021.3112540"},{"key":"e_1_3_3_3_19_2","doi-asserted-by":"publisher","DOI":"10.1109\/IJCB48548.2020.9304908"},{"key":"e_1_3_3_3_20_2","doi-asserted-by":"publisher","DOI":"10.1145\/3332165.3347883"},{"key":"e_1_3_3_3_21_2","doi-asserted-by":"publisher","unstructured":"Ohoud Alharbi Wolfgang Stuerzlinger and Felix Putze. 2020. The Effects of Predictive Features of Mobile Keyboards on Text Entry Speed and Errors. Proc. ACM Hum.-Comput. Interact. 4 ISS (Nov. 2020) 183:1\u2013183:16. 10.1145\/3427311","DOI":"10.1145\/3427311"},{"key":"e_1_3_3_3_22_2","doi-asserted-by":"publisher","unstructured":"A. AZZALINI and A.\u00a0DALLA VALLE. 1996. The multivariate skew-normal distribution. Biometrika 83 4 (Dec. 1996) 715\u2013726. 10.1093\/biomet\/83.4.715","DOI":"10.1093\/biomet\/83.4.715"},{"key":"e_1_3_3_3_23_2","doi-asserted-by":"publisher","DOI":"10.1145\/3474085.3475539"},{"key":"e_1_3_3_3_24_2","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-84882-385-3_14"},{"key":"e_1_3_3_3_25_2","doi-asserted-by":"publisher","unstructured":"Francesco Bergadano Daniele Gunetti and Claudia Picardi. 2002. User authentication through keystroke dynamics. ACM Trans. Inf. Syst. Secur. 5 4 (Nov. 2002) 367\u2013397. 10.1145\/581271.581272","DOI":"10.1145\/581271.581272"},{"key":"e_1_3_3_3_26_2","doi-asserted-by":"publisher","unstructured":"Bhaveer Bhana and Stephen Flowerday. 2020. Passphrase and keystroke dynamics authentication: Usable security. Computers & Security 96 (Sept. 2020) 101925. 10.1016\/j.cose.2020.101925","DOI":"10.1016\/j.cose.2020.101925"},{"key":"e_1_3_3_3_27_2","doi-asserted-by":"publisher","DOI":"10.1145\/3706598.3713382"},{"key":"e_1_3_3_3_28_2","doi-asserted-by":"publisher","unstructured":"M.\u00a0K. Bhuyan D. Ajay\u00a0Kumar Karl\u00a0F. MacDorman and Yuji Iwahori. 2014. A novel set of features for continuous hand gesture recognition. Journal on Multimodal User Interfaces 8 4 (Oct. 2014) 333\u2013343. 10.1007\/s12193-014-0165-0","DOI":"10.1007\/s12193-014-0165-0"},{"key":"e_1_3_3_3_29_2","unstructured":"Patrick Bours and Hafez Barghouthi. 2009. Continuous Authentication using Biometric Keystroke Dynamics. (2009)."},{"key":"e_1_3_3_3_30_2","unstructured":"Matt Burgess. 2024. I Stopped Using Passwords. It\u2019s Great\u2014and a Total Mess | WIRED. https:\/\/www.wired.com\/story\/stopped-using-passwords-passkeys\/"},{"key":"e_1_3_3_3_31_2","unstructured":"Pieter Buzing. 2003. Comparing Different Keyboard Layouts: Aspects of QWERTY DVORAK and alphabetical keyboards. (Jan. 2003)."},{"key":"e_1_3_3_3_32_2","doi-asserted-by":"publisher","unstructured":"Stefano Cecconello Alberto Compagno Mauro Conti Daniele Lain and Gene Tsudik. 2019. Skype & Type: Keyboard Eavesdropping in Voice-over-IP. ACM Trans. Priv. Secur. 22 4 (Dec. 2019) 24:1\u201324:34. 10.1145\/3365366","DOI":"10.1145\/3365366"},{"key":"e_1_3_3_3_33_2","first-page":"45","volume-title":"Proceedings of the Second Workshop on Advances in Text Input Methods","author":"Chen Long","year":"2012","unstructured":"Long Chen, Xianchao Wu, and Jingzhou He. 2012. Using Collocations and K-means Clustering to Improve the N-pos Model for Japanese IME. In Proceedings of the Second Workshop on Advances in Text Input Methods, Kalika Bali, Monojit Choudhury, and Yoh Okuno (Eds.). The COLING 2012 Organizing Committee, Mumbai, India, 45\u201356. https:\/\/aclanthology.org\/W12-4804"},{"key":"e_1_3_3_3_34_2","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM52122.2024.10621321"},{"key":"e_1_3_3_3_35_2","doi-asserted-by":"publisher","DOI":"10.1145\/3290607.3312762"},{"key":"e_1_3_3_3_36_2","doi-asserted-by":"publisher","unstructured":"Xiangxiang Chu Jianlin Su Bo Zhang and Chunhua Shen. 2024. VisionLLaMA: A Unified LLaMA Backbone for Vision Tasks. 10.48550\/arXiv.2403.00522arXiv:https:\/\/arXiv.org\/abs\/2403.00522 [cs].","DOI":"10.48550\/arXiv.2403.00522"},{"key":"e_1_3_3_3_37_2","unstructured":"Gennaro Costagliola Vittorio Fuccella and Michele Di\u00a0Capua. 2010. Interpreting Gestures for Text Entry on Touch Screen Devices.315\u2013320."},{"key":"e_1_3_3_3_38_2","doi-asserted-by":"publisher","DOI":"10.1109\/NWESP.2005.62"},{"key":"e_1_3_3_3_39_2","doi-asserted-by":"publisher","DOI":"10.15579\/gcsr.vol2.ch2"},{"key":"e_1_3_3_3_40_2","doi-asserted-by":"publisher","DOI":"10.1145\/3173574.3174220"},{"key":"e_1_3_3_3_41_2","doi-asserted-by":"publisher","DOI":"10.1145\/3173574.3174220"},{"key":"e_1_3_3_3_42_2","doi-asserted-by":"publisher","DOI":"10.1117\/12.271748"},{"key":"e_1_3_3_3_43_2","doi-asserted-by":"publisher","DOI":"10.5244\/C.19.27"},{"key":"e_1_3_3_3_44_2","doi-asserted-by":"publisher","DOI":"10.1145\/3544549.3585876"},{"key":"e_1_3_3_3_45_2","doi-asserted-by":"publisher","unstructured":"Yuyi Fang Zhiwei Zhao Zi Wang Geyong Min Yue Cao Haojun Huang and Hao Yin. 2018. Eavesdrop with PoKeMon: Position free keystroke monitoring using acoustic data. Future Generation Computer Systems 87 (Oct. 2018) 704\u2013711. 10.1016\/j.future.2017.10.039","DOI":"10.1016\/j.future.2017.10.039"},{"key":"e_1_3_3_3_46_2","doi-asserted-by":"publisher","DOI":"10.1145\/2858036.2858233"},{"key":"e_1_3_3_3_47_2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-60245-1_17"},{"key":"e_1_3_3_3_48_2","doi-asserted-by":"publisher","unstructured":"P.P. Gandhi and S.A. Kassam. 1994. Optimality of the cell averaging CFAR detector. IEEE Transactions on Information Theory 40 4 (July 1994) 1226\u20131228. 10.1109\/18.335950Conference Name: IEEE Transactions on Information Theory.","DOI":"10.1109\/18.335950"},{"key":"e_1_3_3_3_49_2","doi-asserted-by":"publisher","unstructured":"Yang Gao Wei Wang Vir\u00a0V. Phoha Wei Sun and Zhanpeng Jin. 2019. EarEcho: Using Ear Canal Echo for Wearable Authentication. Proc. ACM Interact. Mob. Wearable Ubiquitous Technol. 3 3 (Sept. 2019) 81:1\u201381:24. 10.1145\/3351239","DOI":"10.1145\/3351239"},{"key":"e_1_3_3_3_50_2","doi-asserted-by":"publisher","DOI":"10.1145\/3664647.3681488"},{"key":"e_1_3_3_3_51_2","doi-asserted-by":"publisher","unstructured":"Romain Giot Mohamad El-Abed Baptiste Hemery and Christophe Rosenberger. 2011. Unconstrained keystroke dynamics authentication with shared secret. Computers & Security 30 6 (Sept. 2011) 427\u2013445. 10.1016\/j.cose.2011.03.004","DOI":"10.1016\/j.cose.2011.03.004"},{"key":"e_1_3_3_3_52_2","doi-asserted-by":"publisher","DOI":"10.1109\/CTS.2009.5067478"},{"key":"e_1_3_3_3_53_2","doi-asserted-by":"publisher","DOI":"10.1145\/2047196.2047255"},{"key":"e_1_3_3_3_54_2","doi-asserted-by":"publisher","DOI":"10.1145\/3491102.3501838"},{"key":"e_1_3_3_3_55_2","unstructured":"Alex Hern. 2017. I tried to work all day in a VR headset and it was horrible. The Guardian (Jan. 2017). https:\/\/www.theguardian.com\/technology\/2017\/jan\/05\/i-tried-to-work-all-day-in-a-vr-headset-so-you-never-have-to"},{"key":"e_1_3_3_3_56_2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-74549-5_56"},{"key":"e_1_3_3_3_57_2","doi-asserted-by":"publisher","DOI":"10.1145\/3576915.3623088"},{"key":"e_1_3_3_3_58_2","doi-asserted-by":"publisher","unstructured":"Wenbo Hu Yifan Xu Yi Li Weiyue Li Zeyuan Chen and Zhuowen Tu. 2024. BLIVA: A Simple Multimodal LLM for Better Handling of Text-Rich Visual Questions. Proceedings of the AAAI Conference on Artificial Intelligence 38 3 (March 2024) 2256\u20132264. 10.1609\/aaai.v38i3.27999Number: 3.","DOI":"10.1609\/aaai.v38i3.27999"},{"key":"e_1_3_3_3_59_2","doi-asserted-by":"publisher","unstructured":"Yuqian Hu Beibei Wang Chenshu Wu and K.J.\u00a0Ray Liu. 2022. mmKey: Universal Virtual Keyboard Using A Single Millimeter-Wave Radio. IEEE Internet of Things Journal 9 1 (Jan. 2022) 510\u2013524. 10.1109\/JIOT.2021.3084560","DOI":"10.1109\/JIOT.2021.3084560"},{"key":"e_1_3_3_3_60_2","unstructured":"Jack. 2023. Next-Level Convenience: Smart and IoT Authentication Simplifies Login on Smart TVs Game Consoles. https:\/\/medium.com\/@jackforbesJF\/next-level-convenience-smart-and-iot-authentication-simplifies-login-on-smart-tvs-game-consoles-c25a34db74f4"},{"key":"e_1_3_3_3_61_2","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2012.19"},{"key":"e_1_3_3_3_62_2","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2012.19"},{"key":"e_1_3_3_3_63_2","unstructured":"Eric Jones Travis Oliphant Pearu Peterson et\u00a0al. 2001. SciPy: Open source scientific tools for Python. http:\/\/www.scipy.org\/"},{"key":"e_1_3_3_3_64_2","doi-asserted-by":"publisher","unstructured":"Jung\u00a0In Koh Josh Cherian Paul Taele and Tracy Hammond. 2019. Developing a Hand Gesture Recognition System for Mapping Symbolic Hand Gestures to Analogous Emojis in Computer-Mediated Communication. ACM Trans. Interact. Intell. Syst. 9 1 (March 2019) 6:1\u20136:35. 10.1145\/3297277","DOI":"10.1145\/3297277"},{"key":"e_1_3_3_3_65_2","unstructured":"Adrienne LaFrance. 2016. The Quest For the Next Human-Computer Interface. https:\/\/www.theatlantic.com\/technology\/archive\/2016\/07\/what-comes-after-keyboards\/490511\/ Section: Technology."},{"key":"e_1_3_3_3_66_2","doi-asserted-by":"publisher","DOI":"10.1145\/3460120.3484553"},{"key":"e_1_3_3_3_67_2","doi-asserted-by":"publisher","DOI":"10.1007\/978-981-97-4399-5_27"},{"key":"e_1_3_3_3_68_2","doi-asserted-by":"publisher","unstructured":"Alona Levy Ben Nassi Yuval Elovici and Erez Shmueli. 2018. Handwritten Signature Verification Using Wrist-Worn Devices. Proc. ACM Interact. Mob. Wearable Ubiquitous Technol. 2 3 (Sept. 2018) 119:1\u2013119:26. 10.1145\/3264929","DOI":"10.1145\/3264929"},{"key":"e_1_3_3_3_69_2","doi-asserted-by":"publisher","DOI":"10.1007\/978-981-97-4399-5_13"},{"key":"e_1_3_3_3_70_2","doi-asserted-by":"publisher","DOI":"10.1109\/COMPSAC48688.2020.00-28"},{"key":"e_1_3_3_3_71_2","doi-asserted-by":"publisher","DOI":"10.1145\/3526114.3558703"},{"key":"e_1_3_3_3_72_2","doi-asserted-by":"publisher","unstructured":"Xinye Lin Yixin Chen Xiao-Wen Chang Xue Liu and Xiaodong Wang. 2018. SHOW: Smart Handwriting on Watches. Proc. ACM Interact. Mob. Wearable Ubiquitous Technol. 1 4 (Jan. 2018) 151:1\u2013151:23. 10.1145\/3161412","DOI":"10.1145\/3161412"},{"key":"e_1_3_3_3_73_2","doi-asserted-by":"publisher","unstructured":"Moritz Lipp Daniel Gruss Michael Schwarz David Bidner Cl\u00e9mentine Maurice and Stefan Mangard. 2017. Practical Keystroke Timing Attacks in Sandboxed JavaScript. 191\u2013209. 10.1007\/978-3-319-66399-9_11","DOI":"10.1007\/978-3-319-66399-9_11"},{"key":"e_1_3_3_3_74_2","doi-asserted-by":"publisher","DOI":"10.1145\/2973750.2985624"},{"key":"e_1_3_3_3_75_2","doi-asserted-by":"publisher","DOI":"10.1145\/2789168.2790122"},{"key":"e_1_3_3_3_76_2","doi-asserted-by":"publisher","unstructured":"Khalid Mansour and Khaled Mahmoud. 2021. A New Approach for Textual Password Hardening Using Keystroke Latency Times. The International Arab Journal of Information Technology 18 3 (May 2021). 10.34028\/iajit\/18\/3\/10","DOI":"10.34028\/iajit\/18\/3\/10"},{"key":"e_1_3_3_3_77_2","doi-asserted-by":"publisher","DOI":"10.1145\/2046707.2046771"},{"key":"e_1_3_3_3_78_2","doi-asserted-by":"publisher","DOI":"10.25080\/Majora-7b98e3ed-003"},{"key":"e_1_3_3_3_79_2","doi-asserted-by":"publisher","DOI":"10.1057\/9780230242258_12"},{"key":"e_1_3_3_3_80_2","unstructured":"Miodec. 2025. Monkeytype | A minimalistic customizable typing test. https:\/\/monkeytype.com\/"},{"key":"e_1_3_3_3_81_2","doi-asserted-by":"publisher","DOI":"10.1145\/319709.319720"},{"key":"e_1_3_3_3_82_2","doi-asserted-by":"publisher","DOI":"10.1145\/266420.266434"},{"key":"e_1_3_3_3_83_2","volume-title":"Proceedings of the Eleventh International Conference on Language Resources and Evaluation (LREC 2018)","author":"M\u00fcller Lydia","year":"2018","unstructured":"Lydia M\u00fcller, Uwe Quasthoff, and Maciej Sumalvico. 2018. Corpora of Typical Sentences. In Proceedings of the Eleventh International Conference on Language Resources and Evaluation (LREC 2018), Nicoletta Calzolari, Khalid Choukri, Christopher Cieri, Thierry Declerck, Sara Goggi, Koiti Hasida, Hitoshi Isahara, Bente Maegaard, Joseph Mariani, H\u00e9l\u00e8ne Mazo, Asuncion Moreno, Jan Odijk, Stelios Piperidis, and Takenobu Tokunaga (Eds.). European Language Resources Association (ELRA), Miyazaki, Japan. https:\/\/aclanthology.org\/L18-1688"},{"key":"e_1_3_3_3_84_2","doi-asserted-by":"publisher","DOI":"10.1145\/2742647.2742665"},{"key":"e_1_3_3_3_85_2","doi-asserted-by":"publisher","DOI":"10.1145\/2162081.2162095"},{"key":"e_1_3_3_3_86_2","doi-asserted-by":"publisher","unstructured":"Sourav Panda Yuanzhen Liu Gerhard\u00a0Petrus Hancke and Umair\u00a0Mujtaba Qureshi. 2020. Behavioral Acoustic Emanations: Attack and Verification of PIN Entry Using Keypress Sounds. Sensors 20 11 (Jan. 2020) 3015. 10.3390\/s20113015Number: 11 Publisher: Multidisciplinary Digital Publishing Institute.","DOI":"10.3390\/s20113015"},{"key":"e_1_3_3_3_87_2","doi-asserted-by":"publisher","unstructured":"Simon Parkinson Saad Khan Alexandru-Mihai Badea Andrew Crampton Na Liu and Qing Xu. 2023. An empirical analysis of keystroke dynamics in passwords: A longitudinal study. IET Biometrics 12 1 (2023) 25\u201337. 10.1049\/bme2.12087_eprint: https:\/\/onlinelibrary.wiley.com\/doi\/pdf\/10.1049\/bme2.12087.","DOI":"10.1049\/bme2.12087"},{"key":"e_1_3_3_3_88_2","doi-asserted-by":"publisher","unstructured":"Adam Paszke Sam Gross Francisco Massa Adam Lerer James Bradbury Gregory Chanan Trevor Killeen Zeming Lin Natalia Gimelshein Luca Antiga Alban Desmaison Andreas K\u00f6pf Edward Yang Zach DeVito Martin Raison Alykhan Tejani Sasank Chilamkurthy Benoit Steiner Lu Fang Junjie Bai and Soumith Chintala. 2019. PyTorch: An Imperative Style High-Performance Deep Learning Library. 10.48550\/arXiv.1912.01703arXiv:https:\/\/arXiv.org\/abs\/1912.01703 [cs stat].","DOI":"10.48550\/arXiv.1912.01703"},{"key":"e_1_3_3_3_89_2","unstructured":"F. Pedregosa G. Varoquaux A. Gramfort V. Michel B. Thirion O. Grisel M. Blondel P. Prettenhofer R. Weiss V. Dubourg J. Vanderplas A. Passos D. Cournapeau M. Brucher M. Perrot and E. Duchesnay. 2011. Scikit-learn: Machine Learning in Python. Journal of Machine Learning Research 12 (2011) 2825\u20132830."},{"key":"e_1_3_3_3_90_2","unstructured":"Svetlana Pinet. 2024. What are you looking at? Beyond typing speed and formal training for assessing typing expertise. Proceedings of the Annual Meeting of the Cognitive Science Society 46 0 (2024). https:\/\/escholarship.org\/uc\/item\/3fv0t3nq"},{"key":"e_1_3_3_3_91_2","unstructured":"Alec Radford Jeff Wu Rewon Child David Luan Dario Amodei and Ilya Sutskever. 2019. Language Models are Unsupervised Multitask Learners. (2019)."},{"key":"e_1_3_3_3_92_2","doi-asserted-by":"publisher","DOI":"10.1007\/978-981-15-0324-5_13"},{"key":"e_1_3_3_3_93_2","doi-asserted-by":"publisher","DOI":"10.1007\/11608288_88"},{"key":"e_1_3_3_3_94_2","doi-asserted-by":"publisher","unstructured":"Kenneth Revett Florin Gorunescu Marina Gorunescu Marius Ene Sergio Magalhaes and Henrique Santos. 2007. A machine learning approach to keystroke dynamics based user authentication. International Journal of Electronic Security and Digital Forensics 1 1 (Jan. 2007) 55\u201370. 10.1504\/IJESDF.2007.013592Publisher: Inderscience Publishers.","DOI":"10.1504\/IJESDF.2007.013592"},{"key":"e_1_3_3_3_95_2","doi-asserted-by":"publisher","DOI":"10.1145\/3379337.3415816"},{"key":"e_1_3_3_3_96_2","doi-asserted-by":"publisher","DOI":"10.1145\/765891.765944"},{"key":"e_1_3_3_3_97_2","unstructured":"Russ Rolfe. 2007. What is an IME (Input Method Editor) and how do I use it ? (2007)."},{"key":"e_1_3_3_3_98_2","unstructured":"John Sadowsky. 1996. Investigation of Signal Characteristics Using the Continuous Wavelet Transform. JOHNS HOPKINS APL TECHNICAL DIGEST 17 3 (1996)."},{"key":"e_1_3_3_3_99_2","doi-asserted-by":"publisher","unstructured":"Timothy\u00a0A. Salthouse. 1984. Effects of age and skill in typing. Journal of Experimental Psychology: General 113 3 (1984) 345\u2013371. 10.1037\/0096-3445.113.3.345Place: US Publisher: American Psychological Association.","DOI":"10.1037\/0096-3445.113.3.345"},{"key":"e_1_3_3_3_100_2","doi-asserted-by":"publisher","DOI":"10.1145\/3359789.3359816"},{"key":"e_1_3_3_3_101_2","unstructured":"D. Song D. Wagner and Xuqing Tian. 2001. Timing Analysis of Keystrokes and Timing Attacks on SSH. https:\/\/www.semanticscholar.org\/paper\/Timing-Analysis-of-Keystrokes-and-Timing-Attacks-on-Song-Wagner\/23613cf6a3f1fbb5ec86de7f1f1ba3f535a68e21"},{"key":"e_1_3_3_3_102_2","doi-asserted-by":"publisher","DOI":"10.1145\/3173574.3174221"},{"key":"e_1_3_3_3_103_2","doi-asserted-by":"publisher","DOI":"10.1145\/3491102.3501878"},{"key":"e_1_3_3_3_104_2","doi-asserted-by":"publisher","DOI":"10.1109\/HASE.2011.16"},{"key":"e_1_3_3_3_105_2","series-title":"Studies in language testing","volume-title":"Multilingualism and assessment: achieving transparency, assuring quality, sustaining diversity: proceedings of the ALTE Berlin conference, May 2005 (1. publ ed.)","author":"Taylor Lynda\u00a0B.","year":"2008","unstructured":"Lynda\u00a0B. Taylor, Cyril\u00a0J. Weir, and Association of Language Testers in Europe (Eds.). 2008. Multilingualism and assessment: achieving transparency, assuring quality, sustaining diversity: proceedings of the ALTE Berlin conference, May 2005 (1. publ ed.). Number\u00a027 in Studies in language testing. Cambridge Univ. Press, Cambridge."},{"key":"e_1_3_3_3_106_2","unstructured":"Martin Vuagnoux and S. Pasini. 2009. Compromising Electromagnetic Emanations of Wired and Wireless Keyboards. https:\/\/www.semanticscholar.org\/paper\/Compromising-Electromagnetic-Emanations-of-Wired-Vuagnoux-Pasini\/fcede4144d229e7474e72b3c37192b7525570ada"},{"key":"e_1_3_3_3_107_2","doi-asserted-by":"publisher","DOI":"10.5220\/0010191200330042"},{"key":"e_1_3_3_3_108_2","doi-asserted-by":"publisher","DOI":"10.1145\/2789168.2790121"},{"key":"e_1_3_3_3_109_2","doi-asserted-by":"publisher","DOI":"10.1109\/MSN.2016.010"},{"key":"e_1_3_3_3_110_2","doi-asserted-by":"publisher","DOI":"10.1145\/2594368.2594384"},{"key":"e_1_3_3_3_111_2","doi-asserted-by":"publisher","DOI":"10.1145\/2594368.2594384"},{"key":"e_1_3_3_3_112_2","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOMWKSHPS57453.2023.10225861"},{"key":"e_1_3_3_3_113_2","doi-asserted-by":"publisher","unstructured":"Thomas Wolf Lysandre Debut Victor Sanh Julien Chaumond Clement Delangue Anthony Moi Pierric Cistac Tim Rault R\u00e9mi Louf Morgan Funtowicz Joe Davison Sam Shleifer Patrick von Platen Clara Ma Yacine Jernite Julien Plu Canwen Xu Teven\u00a0Le Scao Sylvain Gugger Mariama Drame Quentin Lhoest and Alexander\u00a0M. Rush. 2020. HuggingFace\u2019s Transformers: State-of-the-art Natural Language Processing. 10.48550\/arXiv.1910.03771arXiv:https:\/\/arXiv.org\/abs\/1910.03771 [cs].","DOI":"10.48550\/arXiv.1910.03771"},{"key":"e_1_3_3_3_114_2","doi-asserted-by":"publisher","DOI":"10.1109\/ISMAR.2019.00026"},{"key":"e_1_3_3_3_115_2","doi-asserted-by":"publisher","unstructured":"Edwin Yang Song Fang Ian Markwood Yao Liu Shangqing Zhao Zhuo Lu and Haojin Zhu. 2022. Wireless Training-Free Keystroke Inference Attack and Defense. IEEE\/ACM Transactions on Networking 30 4 (Aug. 2022) 1733\u20131748. 10.1109\/TNET.2022.3147721Conference Name: IEEE\/ACM Transactions on Networking.","DOI":"10.1109\/TNET.2022.3147721"},{"key":"e_1_3_3_3_116_2","doi-asserted-by":"publisher","DOI":"10.1145\/3286978.3287030"},{"key":"e_1_3_3_3_117_2","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM.2016.7524542"},{"key":"e_1_3_3_3_118_2","doi-asserted-by":"publisher","unstructured":"Xin Yi Chun Yu Weinan Shi and Yuanchun Shi. 2017. Is it too small?: Investigating the performances and preferences of users when typing on tiny QWERTY keyboards. International Journal of Human-Computer Studies 106 (Oct. 2017) 44\u201362. 10.1016\/j.ijhcs.2017.05.001","DOI":"10.1016\/j.ijhcs.2017.05.001"},{"key":"e_1_3_3_3_119_2","doi-asserted-by":"publisher","unstructured":"Caglar Yildirim. 2023. Point and Select: Effects of Multimodal Feedback on Text Entry Performance in Virtual Reality. International Journal of Human\u2013Computer Interaction 39 19 (Nov. 2023) 3815\u20133829. 10.1080\/10447318.2022.2107330Publisher: Taylor & Francis _eprint: https:\/\/doi.org\/10.1080\/10447318.2022.2107330.","DOI":"10.1080\/10447318.2022.2107330"},{"key":"e_1_3_3_3_120_2","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM.2016.7524400"},{"key":"e_1_3_3_3_121_2","doi-asserted-by":"publisher","unstructured":"Yafeng Yin Qun Li Lei Xie Shanhe Yi Ed Novak and Sanglu Lu. 2018. CamK: Camera-Based Keystroke Detection and Localization for Small Mobile Devices. IEEE Transactions on Mobile Computing 17 10 (Oct. 2018) 2236\u20132251. 10.1109\/TMC.2018.2798635Conference Name: IEEE Transactions on Mobile Computing.","DOI":"10.1109\/TMC.2018.2798635"},{"key":"e_1_3_3_3_122_2","doi-asserted-by":"publisher","unstructured":"Lishuang Zhan Tianyang Xiong Hongwei Zhang Shihui Guo Xiaowei Chen Jiangtao Gong Juncong Lin and Yipeng Qin. 2024. TouchEditor: Interaction Design and Evaluation of a Flexible Touchpad for Text Editing of Head-Mounted Displays in Speech-unfriendly Environments. Proc. ACM Interact. Mob. Wearable Ubiquitous Technol. 7 4 (Jan. 2024) 198:1\u2013198:29. 10.1145\/3631454","DOI":"10.1145\/3631454"},{"key":"e_1_3_3_3_123_2","series-title":"(SSYM\u201909)","first-page":"17","volume-title":"Proceedings of the 18th Conference on USENIX Security Symposium","author":"Zhang Kehuan","year":"2009","unstructured":"Kehuan Zhang and XiaoFeng Wang. 2009. Peeping Tom in the Neighborhood: Keystroke Eavesdropping on Multi-User Systems. In Proceedings of the 18th Conference on USENIX Security Symposium(SSYM\u201909). USENIX Association, USA, 17\u201332."},{"key":"e_1_3_3_3_124_2","doi-asserted-by":"publisher","DOI":"10.1145\/3491102.3517686"},{"key":"e_1_3_3_3_125_2","doi-asserted-by":"publisher","unstructured":"Yanchao Zhao Yiming Zhao Si Li Hao Han and Lei Xie. 2023. UltraSnoop: Placement-agnostic Keystroke Snooping via Smartphone-based Ultrasonic Sonar. ACM Trans. Internet Things 4 4 (Nov. 2023) 22:1\u201322:24. 10.1145\/3614440","DOI":"10.1145\/3614440"},{"key":"e_1_3_3_3_126_2","doi-asserted-by":"publisher","DOI":"10.1145\/3173574.3174013"}],"event":{"name":"UIST '25: The 38th Annual ACM Symposium on User Interface Software and Technology","location":"Busan Republic of Korea","acronym":"UIST '25","sponsor":["SIGCHI ACM Special Interest Group on Computer-Human Interaction","SIGGRAPH ACM Special Interest Group on Computer Graphics and Interactive Techniques"]},"container-title":["Proceedings of the 38th Annual ACM Symposium on User Interface Software and Technology"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3746059.3747611","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,9,27]],"date-time":"2025-09-27T22:14:35Z","timestamp":1759011275000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3746059.3747611"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,9,27]]},"references-count":125,"alternative-id":["10.1145\/3746059.3747611","10.1145\/3746059"],"URL":"https:\/\/doi.org\/10.1145\/3746059.3747611","relation":{},"subject":[],"published":{"date-parts":[[2025,9,27]]},"assertion":[{"value":"2025-09-27","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}