{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2022,4,6]],"date-time":"2022-04-06T01:15:49Z","timestamp":1649207749730},"reference-count":36,"publisher":"Institute of Electronics, Information and Communications Engineers (IEICE)","issue":"10","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEICE Trans. Inf. &amp; Syst."],"published-print":{"date-parts":[[2019,10,1]]},"DOI":"10.1587\/transinf.2019edp7024","type":"journal-article","created":{"date-parts":[[2019,10,1]],"date-time":"2019-10-01T02:48:49Z","timestamp":1569898129000},"page":"1976-1992","source":"Crossref","is-referenced-by-count":1,"title":["WearAuth: Wristwear-Assisted User Authentication for Smartphones Using Wavelet-Based Multi-Resolution Analysis"],"prefix":"10.1587","volume":"E102.D","author":[{"given":"Taeho","family":"KANG","sequence":"first","affiliation":[{"name":"Pohang University of Science and Technology (POSTECH)"}]},{"given":"Sangwoo","family":"JI","sequence":"additional","affiliation":[{"name":"Pohang University of Science and Technology (POSTECH)"}]},{"given":"Hayoung","family":"JEONG","sequence":"additional","affiliation":[{"name":"Pohang University of Science and Technology (POSTECH)"}]},{"given":"Bin","family":"ZHU","sequence":"additional","affiliation":[{"name":"Microsoft Research Asia"}]},{"given":"Jong","family":"KIM","sequence":"additional","affiliation":[{"name":"Pohang University of Science and Technology (POSTECH)"}]}],"member":"532","reference":[{"key":"1","unstructured":"[1] S. Mare, \u201cSeamless Authentication for Ubiquitous Devices,\u201d Tech. Rep. TR2016-793, Dartmouth College, Computer Science, Hanover, NH, May 2016."},{"key":"2","doi-asserted-by":"crossref","unstructured":"[2] S. Mare, A.M. Markham, C. Cornelius, R. Peterson, and D. Kotz, \u201cZEBRA: Zero-effort bilateral recurring authentication,\u201d IEEE Symposium on Security and Privacy, pp.705-720, May 2014. 10.1109\/sp.2014.51","DOI":"10.1109\/SP.2014.51"},{"key":"3","doi-asserted-by":"publisher","unstructured":"[3] D.P. Percival, \u201cOn estimation of the wavelet variance,\u201d Biometrika, vol.82, no.3, pp.619-631, 1995. 10.1093\/biomet\/82.3.619","DOI":"10.1093\/biomet\/82.3.619"},{"key":"4","doi-asserted-by":"publisher","unstructured":"[4] D.B. Percival and H.O. Mofjeld, \u201cAnalysis of subtidal coastal sea level fluctuations using wavelets,\u201d Journal of the American Statistical Association, vol.92, no.439, pp.868-880, 1997. 10.1080\/01621459.1997.10474042","DOI":"10.1080\/01621459.1997.10474042"},{"key":"5","doi-asserted-by":"crossref","unstructured":"[5] A. Mueen, S. Nath, and J. Liu, \u201cFast approximate correlation for massive time-series data,\u201d Proc. 2010 ACM SIGMOD International Conference on Management of Data, SIGMOD &apos;10, pp.171-182, 2010. 10.1145\/1807167.1807188","DOI":"10.1145\/1807167.1807188"},{"key":"6","unstructured":"[6] D.B. Percival and A.T. Walden, Wavelet Methods for Time Series Analysis, Cambridge Series in Statistical and Probabilistic Mathematics, Cambridge University Press, 2000."},{"key":"7","unstructured":"[7] S. Mallat, A Wavelet Tour of Signal Processing, Academic Press, 2009."},{"key":"8","doi-asserted-by":"crossref","unstructured":"[8] I. Daubechies, Ten Lectures on Wavelets, Society for Industrial and Applied Mathematics, 1992.","DOI":"10.1137\/1.9781611970104"},{"key":"9","doi-asserted-by":"crossref","unstructured":"[9] O. Huhta, P. Shrestha, S. Udar, M. Juuti, N. Saxena, and N. Asokan, \u201cPitfalls in designing zero-effort deauthentication: Opportunistic human observation attacks,\u201d The Network and Distributed System Security Symposium, 2016.","DOI":"10.14722\/ndss.2016.23199"},{"key":"10","doi-asserted-by":"publisher","unstructured":"[10] E. Sejdi\u0107, K.A. Lowry, J. Bellanca, M.S. Redfern, and J.S. Brach, \u201cA Comprehensive Assessment of Gait Accelerometry Signals in Time, Frequency and Time-Frequency Domains,\u201d IEEE Trans. Neural Syst. Rehabil. Eng., vol.22, no.3, pp.603-612, 2014. 10.1109\/tnsre.2013.2265887","DOI":"10.1109\/TNSRE.2013.2265887"},{"key":"11","doi-asserted-by":"publisher","unstructured":"[11] M. Kojima, S. Obuchi, O. Henmi, and N. Ikeda, \u201cComparison of Smoothness during Gait between Community Dwelling Elderly Fallers and Non-Fallers Using Power Spectrum Entropy of Acceleration Time-Series,\u201d Journal of Physical Therapy Science, vol.20, no.4, pp.243-248, 2008. 10.1589\/jpts.20.243","DOI":"10.1589\/jpts.20.243"},{"key":"12","unstructured":"[12] L. Breiman, J. Friedman, C. Stone, and R. Olshen, Classification and Regression Trees, The Wadsworth and Brooks-Cole statistics-probability series, Taylor &amp; Francis, 1984."},{"key":"13","doi-asserted-by":"crossref","unstructured":"[13] T. Hastie, R. Tibshirani, and J. Friedman, The Elements of Statistical Learning, Springer-Verlag, New York, 2009.","DOI":"10.1007\/978-0-387-84858-7"},{"key":"14","doi-asserted-by":"crossref","unstructured":"[14] N. Cristianini and J. Shawe-Taylor, An Introduction to Support Vector Machines: And Other Kernel-based Learning Methods,Cambridge University Press, New York, NY, USA, 2000.","DOI":"10.1017\/CBO9780511801389"},{"key":"15","doi-asserted-by":"publisher","unstructured":"[15] L. Breiman, \u201cRandom forests,\u201d Machine Learning, vol.45, no.1, pp.5-32, Oct. 2001. 10.1023\/a:1010933404324","DOI":"10.1023\/A:1010933404324"},{"key":"16","doi-asserted-by":"crossref","unstructured":"[16] Y. Freund and R.E. Schapire, \u201cA decision-theoretic generalization of on-line learning and an application to boosting,\u201d Journal of Computer and System Sciences, vol.55, no.1, pp.119-139, 1997. 10.1006\/jcss.1997.1504","DOI":"10.1006\/jcss.1997.1504"},{"key":"17","unstructured":"[17] NTP: The Network Time Protocol, http:\/\/www.ntp.org\/."},{"key":"18","doi-asserted-by":"crossref","unstructured":"[18] D. Bichler, G. Stromberg, M. Huemer, and M. L\u00f6w, \u201cKey generation based on acceleration data of shaking processes,\u201d Proc. 9th International Conference of Ubiquitous Computing, pp.304-317, 2007.","DOI":"10.1007\/978-3-540-74853-3_18"},{"key":"19","doi-asserted-by":"crossref","unstructured":"[19] A. Ivanov and G. Riccardi, \u201cKolmogorov-smirnov test for feature selection in emotion recognition from speech,\u201d 2012 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp.5125-5128, March 2012. 10.1109\/icassp.2012.6289074","DOI":"10.1109\/ICASSP.2012.6289074"},{"key":"20","unstructured":"[20] MathWorks, MATLAB, https:\/\/www.mathworks.com\/products\/matlab.html."},{"key":"21","unstructured":"[21] \u201cHow Do Users Really Hold Mobile Devices,\u201d https:\/\/www.uxmatters.com\/mt\/archives\/2013\/02\/how-do-users-really-hold-mobile-devices.php."},{"key":"22","doi-asserted-by":"crossref","unstructured":"[22] J. Zhang, Z. Wang, Z. Yang, and Q. Zhang, \u201cProximity based iot device authentication,\u201d IEEE INFOCOM 2017-IEEE Conference on Computer Communications, pp.1-9, May 2017. 10.1109\/infocom.2017.8057145","DOI":"10.1109\/INFOCOM.2017.8057145"},{"key":"23","doi-asserted-by":"publisher","unstructured":"[23] Y. Ren, Y. Chen, M.C. Chuah, and J. Yang, \u201cUser verification leveraging gait recognition for smartphone enabled mobile healthcare systems,\u201d IEEE Trans. Mobile Comput., vol.14, no.9, pp.1961-1974, Sept. 2015. 10.1109\/tmc.2014.2365185","DOI":"10.1109\/TMC.2014.2365185"},{"key":"24","doi-asserted-by":"crossref","unstructured":"[24] D. Buschek, A. De Luca, and F. Alt, \u201cImproving accuracy, applicability and usability of keystroke biometrics on mobile touchscreen devices,\u201d Proc. 33rd Annual ACM Conference on Human Factors in Computing Systems, pp.1393-1402, 2015. 10.1145\/2702123.2702252","DOI":"10.1145\/2702123.2702252"},{"key":"25","unstructured":"[25] L. Li, X. Zhao, and G. Xue, \u201cUnobservable re-authentication for smartphones,\u201d The Network and Distributed System Security Symposium, 2013."},{"key":"26","unstructured":"[26] Google: Smart lock, https:\/\/get.google.com\/smartlock\/."},{"key":"27","unstructured":"[27] \u201cHow to unlock your mac with your apple watch,\u201d https:\/\/support.apple.com\/en-us\/HT206995."},{"key":"28","doi-asserted-by":"publisher","unstructured":"[28] W. Xu, C. Javali, G. Revadigar, C. Luo, N. Bergmann, and W. Hu, \u201cGait-key: A gait-based shared secret key generation protocol for wearable devices,\u201d ACM Trans. Sen. Netw., vol.13, no.1, pp.6:1-6:27, Jan. 2017. 10.1145\/3023954","DOI":"10.1145\/3023954"},{"key":"29","doi-asserted-by":"publisher","unstructured":"[29] R. Mayrhofer and H. Gellersen, \u201cShake well before use: Intuitive and secure pairing of mobile devices,\u201d IEEE Trans. Mobile Comput., vol.8, no.6, pp.792-806, June 2009. 10.1109\/tmc.2009.51","DOI":"10.1109\/TMC.2009.51"},{"key":"30","doi-asserted-by":"publisher","unstructured":"[30] L. Li, X. Zhao, and G. Xue, \u201cA proximity authentication system for smartphones,\u201d IEEE Transactions on Dependable and Secure Computing, vol.13, no.6, pp.605-616, Nov. 2016. 10.1109\/tdsc.2015.2427848","DOI":"10.1109\/TDSC.2015.2427848"},{"key":"31","unstructured":"[31] N. Karapanos, C. Marforio, C. Soriente, and S. \u010capkun, \u201cSound-proof: Usable two-factor authentication based on ambient sound,\u201d 24th USENIX Security Symposium, pp.483-498, 2015."},{"key":"32","doi-asserted-by":"crossref","unstructured":"[32] T. Li, Y. Chen, J. Sun, X. Jin, and Y. Zhang, \u201ciLock: Immediate and automatic locking of mobile devices against data theft,\u201d Proc. ACM SIGSAC Conference on Computer and Communications Security, pp.933-944, 2016. 10.1145\/2976749.2978294","DOI":"10.1145\/2976749.2978294"},{"key":"33","doi-asserted-by":"crossref","unstructured":"[33] A. Kalamandeen, A. Scannell, E. de Lara, A. Sheth, and A. LaMarca, \u201cEnsemble: Cooperative proximity-based authentication,\u201d Proc. 8th International Conference on Mobile Systems, Applications, and Services, pp.331-344, 2010. 10.1145\/1814433.1814466","DOI":"10.1145\/1814433.1814466"},{"key":"34","doi-asserted-by":"crossref","unstructured":"[34] M. Miettinen, N. Asokan, T.D. Nguyen, A.-R. Sadeghi, and M.Sobhani, \u201cContext-based zero-interaction pairing and key evolution for advanced personal devices,\u201d Proc. ACM SIGSAC Conference on Computer and Communications Security, pp.880-891, 2014. 10.1145\/2660267.2660334","DOI":"10.1145\/2660267.2660334"},{"key":"35","doi-asserted-by":"crossref","unstructured":"[35] W.-H. Lee and R. Lee, \u201cImplicit sensor-based authentication of smartphone users with smartwatch,\u201d Proc. Hardware and Architectural Support for Security and Privacy 2016, pp.9:1-9:8, 2016. 10.1145\/2948618.2948627","DOI":"10.1145\/2948618.2948627"},{"key":"36","doi-asserted-by":"crossref","unstructured":"[36] W.-H. Lee and R.B. Lee, \u201cSensor-based implicit authentication of smartphone users,\u201d 2017 47th Annual IEEE\/IFIP International Conference on Dependable Systems and Networks (DSN), pp.309-320, June 2017. 10.1109\/dsn.2017.21","DOI":"10.1109\/DSN.2017.21"}],"container-title":["IEICE Transactions on Information and Systems"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.jstage.jst.go.jp\/article\/transinf\/E102.D\/10\/E102.D_2019EDP7024\/_pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,10,5]],"date-time":"2019-10-05T03:26:35Z","timestamp":1570245995000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.jstage.jst.go.jp\/article\/transinf\/E102.D\/10\/E102.D_2019EDP7024\/_article"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,10,1]]},"references-count":36,"journal-issue":{"issue":"10","published-print":{"date-parts":[[2019]]}},"URL":"https:\/\/doi.org\/10.1587\/transinf.2019edp7024","relation":{},"ISSN":["0916-8532","1745-1361"],"issn-type":[{"value":"0916-8532","type":"print"},{"value":"1745-1361","type":"electronic"}],"subject":[],"published":{"date-parts":[[2019,10,1]]}}}