{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,30]],"date-time":"2025-10-30T22:26:56Z","timestamp":1761863216252,"version":"build-2065373602"},"reference-count":11,"publisher":"Association for Computing Machinery (ACM)","issue":"3","content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":["GetMobile: Mobile Comp. and Comm."],"published-print":{"date-parts":[[2025,10,29]]},"abstract":"<jats:p>It's common to use the face or fingerprint to unlock the smartphone or log into an app. While convenient, these methods can be fooled. Researchers have shown that things like high-quality photos, 3D-printed masks, or fake fingerprints can trick these systems [10]. To prevent this, developers often add extra security steps, like asking you to blink your eyes during a face scan [4]. Existing research has explored the integration of user authentication and liveness detection, such as speech-induced facial vibration [7]. However, those designs even require sophisticated hardware design or specialized sensors [10]. Even worse, among those using the onboard camera for collecting sensitive facial information as biometrics [2], users' privacy is inevitably compromised.<\/jats:p>","DOI":"10.1145\/3774505.3774516","type":"journal-article","created":{"date-parts":[[2025,10,30]],"date-time":"2025-10-30T22:19:07Z","timestamp":1761862747000},"page":"29-34","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":0,"title":["Behaviors Speak More: Achieving User Authentication Leveraging Facial Activities via mmWave Sensing"],"prefix":"10.1145","volume":"29","author":[{"given":"Chenxu","family":"Jiang","sequence":"first","affiliation":[{"name":"Clemson University, Clemson, SC, USA"}]},{"given":"Sihan","family":"Yu","sequence":"additional","affiliation":[{"name":"Rowan University, Glassboro, NJ, USA"}]},{"given":"Chun-Chih","family":"Lin","sequence":"additional","affiliation":[{"name":"Clemson University, Clemson, SC, USA"}]},{"given":"Huadi","family":"Zhu","sequence":"additional","affiliation":[{"name":"Georgia State University, Atlanta, GA, USA"}]},{"given":"Xiaolong","family":"Ma","sequence":"additional","affiliation":[{"name":"University of Arizona, Tucson, AZ, USA"}]},{"given":"Ming","family":"Li","sequence":"additional","affiliation":[{"name":"University of Texas at Arlington, Arlington, TX, USA"}]},{"given":"Linke","family":"Guo","sequence":"additional","affiliation":[{"name":"Clemson University, Clemson, SC, USA"}]}],"member":"320","published-online":{"date-parts":[[2025,10,30]]},"reference":[{"key":"e_1_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1145\/3666025.3699330"},{"key":"e_1_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2024.3471673"},{"key":"e_1_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2021.3137387"},{"key":"e_1_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1145\/2810103.2813612"},{"key":"e_1_2_1_5_1","doi-asserted-by":"crossref","unstructured":"S. Liang et al. 2024. mmFingerprint: A new application fingerprinting technique via mmWave sensing and its use in rowhammer detection.","DOI":"10.1007\/978-3-031-51630-6_3"},{"key":"e_1_2_1_6_1","unstructured":"X. Shi et al. 2015. Convolutional LSTM network: A machine learning approach for precipitation nowcasting. Advances in Neural Information Processing Systems (2015)."},{"key":"e_1_2_1_7_1","volume-title":"et al","author":"Srivastava T.","year":"2023","unstructured":"T. Srivastava, T. et al. 2023. Jawthenticate: Microphone-free speech-based authentication using jaw motion and facial vibrations."},{"key":"e_1_2_1_8_1","doi-asserted-by":"publisher","unstructured":"N.G. Xiao et al. 2014. On the facilitative effects of face motion on face recognition and its development. Frontiers in Psychology 5 (Jun 2014). https:\/\/doi.org\/10.3389\/fpsyg.2014.00633.","DOI":"10.3389\/fpsyg.2014.00633"},{"key":"e_1_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1145\/3581791.3596839"},{"key":"e_1_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/3495243.3560515"},{"key":"e_1_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1145\/3197517.3201292"}],"container-title":["GetMobile: Mobile Computing and Communications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3774505.3774516","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,10,30]],"date-time":"2025-10-30T22:19:12Z","timestamp":1761862752000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3774505.3774516"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,10,29]]},"references-count":11,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2025,10,29]]}},"alternative-id":["10.1145\/3774505.3774516"],"URL":"https:\/\/doi.org\/10.1145\/3774505.3774516","relation":{},"ISSN":["2375-0529","2375-0537"],"issn-type":[{"value":"2375-0529","type":"print"},{"value":"2375-0537","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025,10,29]]},"assertion":[{"value":"2025-10-30","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}