{"id":"https://openalex.org/W4403123473","doi":"https://doi.org/10.1109/tmc.2024.3474673","title":"Biometric Encoding for Replay-Resistant Smartphone User Authentication Using Handgrips","display_name":"Biometric Encoding for Replay-Resistant Smartphone User Authentication Using Handgrips","publication_year":2024,"publication_date":"2024-10-04","ids":{"openalex":"https://openalex.org/W4403123473","doi":"https://doi.org/10.1109/tmc.2024.3474673"},"language":"en","primary_location":{"id":"doi:10.1109/tmc.2024.3474673","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tmc.2024.3474673","pdf_url":null,"source":{"id":"https://openalex.org/S69141925","display_name":"IEEE Transactions on Mobile Computing","issn_l":"1536-1233","issn":["1536-1233","1558-0660","2161-9875"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310320439","host_organization_name":"IEEE Computer Society","host_organization_lineage":["https://openalex.org/P4310320439","https://openalex.org/P4310319808"],"host_organization_lineage_names":["IEEE Computer Society","Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Mobile Computing","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5070503574","display_name":"Long Huang","orcid":"https://orcid.org/0000-0001-7192-1024"},"institutions":[{"id":"https://openalex.org/I121820613","display_name":"Louisiana State University","ror":"https://ror.org/05ect4e57","country_code":"US","type":"education","lineage":["https://openalex.org/I121820613"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Long Huang","raw_affiliation_strings":["Department of Computer Science, Louisiana State University, Baton Rouge, LA, USA"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science, Louisiana State University, Baton Rouge, LA, USA","institution_ids":["https://openalex.org/I121820613"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5092519535","display_name":"Chen Wang","orcid":"https://orcid.org/0000-0003-1747-335X"},"institutions":[{"id":"https://openalex.org/I178169726","display_name":"Southern Methodist University","ror":"https://ror.org/042tdr378","country_code":"US","type":"education","lineage":["https://openalex.org/I178169726"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Chen Wang","raw_affiliation_strings":["Department of Computer Science, Southern Methodist University, Dallas, TX, USA"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science, Southern Methodist University, Dallas, TX, USA","institution_ids":["https://openalex.org/I178169726"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5070503574"],"corresponding_institution_ids":["https://openalex.org/I121820613"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.26714738,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":"24","issue":"2","first_page":"1230","last_page":"1248"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11800","display_name":"User Authentication and Security Systems","score":0.9980999827384949,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11800","display_name":"User Authentication and Security Systems","score":0.9980999827384949,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10828","display_name":"Biometric Identification and Security","score":0.9707000255584717,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11045","display_name":"Privacy, Security, and Data Protection","score":0.909600019454956,"subfield":{"id":"https://openalex.org/subfields/3312","display_name":"Sociology and Political Science"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8398197889328003},{"id":"https://openalex.org/keywords/replay-attack","display_name":"Replay attack","score":0.6895720958709717},{"id":"https://openalex.org/keywords/biometrics","display_name":"Biometrics","score":0.6229325532913208},{"id":"https://openalex.org/keywords/authentication","display_name":"Authentication (law)","score":0.5718954801559448},{"id":"https://openalex.org/keywords/encoding","display_name":"Encoding (memory)","score":0.5324941873550415},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.5024387836456299},{"id":"https://openalex.org/keywords/multi-factor-authentication","display_name":"Multi-factor authentication","score":0.4325946867465973},{"id":"https://openalex.org/keywords/message-authentication-code","display_name":"Message authentication code","score":0.4117586612701416},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.3987770080566406},{"id":"https://openalex.org/keywords/authentication-protocol","display_name":"Authentication protocol","score":0.37744075059890747},{"id":"https://openalex.org/keywords/multimedia","display_name":"Multimedia","score":0.3466978967189789},{"id":"https://openalex.org/keywords/internet-privacy","display_name":"Internet privacy","score":0.3336363434791565},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.3127056360244751},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.1414870023727417}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8398197889328003},{"id":"https://openalex.org/C11560541","wikidata":"https://www.wikidata.org/wiki/Q1756025","display_name":"Replay attack","level":3,"score":0.6895720958709717},{"id":"https://openalex.org/C184297639","wikidata":"https://www.wikidata.org/wiki/Q177765","display_name":"Biometrics","level":2,"score":0.6229325532913208},{"id":"https://openalex.org/C148417208","wikidata":"https://www.wikidata.org/wiki/Q4825882","display_name":"Authentication (law)","level":2,"score":0.5718954801559448},{"id":"https://openalex.org/C125411270","wikidata":"https://www.wikidata.org/wiki/Q18653","display_name":"Encoding (memory)","level":2,"score":0.5324941873550415},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.5024387836456299},{"id":"https://openalex.org/C194699767","wikidata":"https://www.wikidata.org/wiki/Q7878662","display_name":"Multi-factor authentication","level":4,"score":0.4325946867465973},{"id":"https://openalex.org/C141492731","wikidata":"https://www.wikidata.org/wiki/Q1052621","display_name":"Message authentication code","level":3,"score":0.4117586612701416},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.3987770080566406},{"id":"https://openalex.org/C21564112","wikidata":"https://www.wikidata.org/wiki/Q4825885","display_name":"Authentication protocol","level":3,"score":0.37744075059890747},{"id":"https://openalex.org/C49774154","wikidata":"https://www.wikidata.org/wiki/Q131765","display_name":"Multimedia","level":1,"score":0.3466978967189789},{"id":"https://openalex.org/C108827166","wikidata":"https://www.wikidata.org/wiki/Q175975","display_name":"Internet privacy","level":1,"score":0.3336363434791565},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.3127056360244751},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.1414870023727417}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/tmc.2024.3474673","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tmc.2024.3474673","pdf_url":null,"source":{"id":"https://openalex.org/S69141925","display_name":"IEEE Transactions on Mobile Computing","issn_l":"1536-1233","issn":["1536-1233","1558-0660","2161-9875"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310320439","host_organization_name":"IEEE Computer Society","host_organization_lineage":["https://openalex.org/P4310320439","https://openalex.org/P4310319808"],"host_organization_lineage_names":["IEEE Computer Society","Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Mobile Computing","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":50,"referenced_works":["https://openalex.org/W87400274","https://openalex.org/W108218230","https://openalex.org/W1568066294","https://openalex.org/W1681309784","https://openalex.org/W1856525733","https://openalex.org/W1964160137","https://openalex.org/W1976081290","https://openalex.org/W1977554898","https://openalex.org/W1977848804","https://openalex.org/W1980581462","https://openalex.org/W2017658349","https://openalex.org/W2040320186","https://openalex.org/W2050132334","https://openalex.org/W2066236160","https://openalex.org/W2069446061","https://openalex.org/W2087115651","https://openalex.org/W2092966366","https://openalex.org/W2107595704","https://openalex.org/W2108700572","https://openalex.org/W2122702209","https://openalex.org/W2136975665","https://openalex.org/W2151270693","https://openalex.org/W2163582782","https://openalex.org/W2165880886","https://openalex.org/W2187662548","https://openalex.org/W2334400488","https://openalex.org/W2461999971","https://openalex.org/W2470889211","https://openalex.org/W2535970271","https://openalex.org/W2537377273","https://openalex.org/W2730482441","https://openalex.org/W2745744274","https://openalex.org/W2766717877","https://openalex.org/W2777595189","https://openalex.org/W2784017372","https://openalex.org/W2896384017","https://openalex.org/W2897106987","https://openalex.org/W2903650079","https://openalex.org/W2983060509","https://openalex.org/W2991076039","https://openalex.org/W2991582191","https://openalex.org/W3177318507","https://openalex.org/W3188872815","https://openalex.org/W4288057741","https://openalex.org/W4321020646","https://openalex.org/W4372266552","https://openalex.org/W4382934573","https://openalex.org/W6739901393","https://openalex.org/W6784333009","https://openalex.org/W6849109464"],"related_works":["https://openalex.org/W2093798919","https://openalex.org/W2355452447","https://openalex.org/W3101929529","https://openalex.org/W2393298610","https://openalex.org/W2907262898","https://openalex.org/W2050433615","https://openalex.org/W3022695109","https://openalex.org/W1536503377","https://openalex.org/W2466913372","https://openalex.org/W2406792259"],"abstract_inverted_index":{"Biometrics":[0],"have":[1],"been":[2],"widely":[3],"applied":[4],"for":[5,148],"user":[6,56,149],"authentication.":[7,150],"However,":[8],"existing":[9],"biometric":[10,15,30,45,61,84,97,108,132,146],"authentications":[11],"are":[12,76],"vulnerable":[13],"to":[14,41,78,91,99,111,123,143,164,176],"spoofing,":[16],"because":[17],"they":[18,26],"can":[19,47],"be":[20,48],"observed":[21],"and":[22,72,89,128,157,173,191],"forged.":[23],"In":[24,103],"addition,":[25],"rely":[27],"on":[28],"verifying":[29],"features":[31,98],"that":[32,46],"rarely":[33],"change.":[34],"To":[35],"address":[36],"this":[37],"issue,":[38],"we":[39,81,105,152],"propose":[40,82],"verify":[42],"the":[43,55,58,66,114,119,135,145,166,171],"handgrip":[44],"unobtrusively":[49],"extracted":[50],"by":[51],"acoustic":[52,167],"signals":[53],"when":[54],"holds":[57],"phone.":[59],"This":[60],"is":[62],"uniquely":[63],"associated":[64],"with":[65,113,196],"user\u2019s":[67],"hand":[68],"geometry,":[69],"body-fat":[70],"ratio,":[71],"gripping":[73],"strength,":[74],"which":[75],"hard":[77],"reproduce.":[79],"Furthermore,":[80],"two":[83,140],"encoding":[85],"techniques":[86],"(i.e.,":[87],"temporal-frequential":[88],"spatial)":[90],"convert":[92],"static":[93],"biometrics":[94],"into":[95],"dynamic":[96],"prevent":[100],"data":[101,175],"reuse.":[102],"particular,":[104],"develop":[106,139],"a":[107,124,130,160],"authentication":[109],"system":[110,178,184],"work":[112],"challenge-response":[115],"protocol.":[116],"We":[117,137],"encode":[118],"ultrasonic":[120],"signal":[121],"according":[122],"random":[125],"challenge":[126,202],"sequence":[127],"extract":[129],"distinct":[131],"code":[133,147],"as":[134],"response.":[136],"further":[138],"decoding":[141],"algorithms":[142],"decode":[144],"Additionally,":[151],"investigate":[153],"multiple":[154],"new":[155],"attacks":[156,195],"explore":[158],"using":[159],"latent":[161],"diffusion":[162],"model":[163],"solve":[165],"noise":[168],"discrepancies":[169],"between":[170],"training":[172],"testing":[174],"improve":[177],"performance.":[179],"Extensive":[180],"experiments":[181],"show":[182],"our":[183],"achieves":[185],"97%":[186],"accuracy":[187],"in":[188],"distinguishing":[189],"users":[190],"rejects":[192],"100%":[193],"replay":[194],"<inline-formula><tex-math":[197],"notation=\"LaTeX\">$":[198],"0.6":[199],"\\,":[200],"s$</tex-math></inline-formula>":[201],"sequence.":[203]},"counts_by_year":[],"updated_date":"2025-12-27T23:08:20.325037","created_date":"2025-10-10T00:00:00"}
