{"id":"https://openalex.org/W2911233953","doi":"https://doi.org/10.1109/tnet.2019.2891733","title":"Lip Reading-Based User Authentication Through Acoustic Sensing on Smartphones","display_name":"Lip Reading-Based User Authentication Through Acoustic Sensing on Smartphones","publication_year":2019,"publication_date":"2019-01-24","ids":{"openalex":"https://openalex.org/W2911233953","doi":"https://doi.org/10.1109/tnet.2019.2891733","mag":"2911233953"},"language":"en","primary_location":{"id":"doi:10.1109/tnet.2019.2891733","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tnet.2019.2891733","pdf_url":null,"source":{"id":"https://openalex.org/S62238642","display_name":"IEEE/ACM Transactions on Networking","issn_l":"1063-6692","issn":["1063-6692","1558-2566"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE/ACM Transactions on Networking","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5100658678","display_name":"Li L\u00fc","orcid":"https://orcid.org/0000-0001-5230-3749"},"institutions":[{"id":"https://openalex.org/I183067930","display_name":"Shanghai Jiao Tong University","ror":"https://ror.org/0220qvk04","country_code":"CN","type":"education","lineage":["https://openalex.org/I183067930"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Li Lu","raw_affiliation_strings":["Department of Computer Science and Engineering, Shanghai Jiao Tong University, Shanghai, China"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science and Engineering, Shanghai Jiao Tong University, Shanghai, China","institution_ids":["https://openalex.org/I183067930"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5012589427","display_name":"Jiadi Yu","orcid":"https://orcid.org/0000-0002-0207-9643"},"institutions":[{"id":"https://openalex.org/I183067930","display_name":"Shanghai Jiao Tong University","ror":"https://ror.org/0220qvk04","country_code":"CN","type":"education","lineage":["https://openalex.org/I183067930"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Jiadi Yu","raw_affiliation_strings":["Department of Computer Science and Engineering, Shanghai Jiao Tong University, Shanghai, China"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science and Engineering, Shanghai Jiao Tong University, Shanghai, China","institution_ids":["https://openalex.org/I183067930"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100394750","display_name":"Yingying Chen","orcid":"https://orcid.org/0000-0002-3994-766X"},"institutions":[{"id":"https://openalex.org/I102322142","display_name":"Rutgers, The State University of New Jersey","ror":"https://ror.org/05vt9qd57","country_code":"US","type":"education","lineage":["https://openalex.org/I102322142"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Yingying Chen","raw_affiliation_strings":["Department of Electrical and Computer Engineering, Rutgers University, New Brunswick, NJ, USA"],"affiliations":[{"raw_affiliation_string":"Department of Electrical and Computer Engineering, Rutgers University, New Brunswick, NJ, USA","institution_ids":["https://openalex.org/I102322142"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100334703","display_name":"Hongbo Liu","orcid":"https://orcid.org/0000-0003-1162-839X"},"institutions":[{"id":"https://openalex.org/I135191193","display_name":"University of Indianapolis","ror":"https://ror.org/052133d12","country_code":"US","type":"education","lineage":["https://openalex.org/I135191193"]},{"id":"https://openalex.org/I55769427","display_name":"Indiana University \u2013 Purdue University Indianapolis","ror":"https://ror.org/05gxnyn08","country_code":"US","type":"education","lineage":["https://openalex.org/I55769427","https://openalex.org/I592451"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Hongbo Liu","raw_affiliation_strings":["Department of Computer, Indiana University-Purdue University Indianapolis, Indianapolis, IN, USA"],"affiliations":[{"raw_affiliation_string":"Department of Computer, Indiana University-Purdue University Indianapolis, Indianapolis, IN, USA","institution_ids":["https://openalex.org/I135191193","https://openalex.org/I55769427"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5081759167","display_name":"Yanmin Zhu","orcid":"https://orcid.org/0000-0001-6406-4992"},"institutions":[{"id":"https://openalex.org/I183067930","display_name":"Shanghai Jiao Tong University","ror":"https://ror.org/0220qvk04","country_code":"CN","type":"education","lineage":["https://openalex.org/I183067930"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Yanmin Zhu","raw_affiliation_strings":["Department of Computer Science and Engineering, Shanghai Jiao Tong University, Shanghai, China"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science and Engineering, Shanghai Jiao Tong University, Shanghai, China","institution_ids":["https://openalex.org/I183067930"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5072308822","display_name":"Linghe Kong","orcid":"https://orcid.org/0000-0001-9266-3044"},"institutions":[{"id":"https://openalex.org/I183067930","display_name":"Shanghai Jiao Tong University","ror":"https://ror.org/0220qvk04","country_code":"CN","type":"education","lineage":["https://openalex.org/I183067930"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Linghe Kong","raw_affiliation_strings":["Department of Computer Science and Engineering, Shanghai Jiao Tong University, Shanghai, China"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science and Engineering, Shanghai Jiao Tong University, Shanghai, China","institution_ids":["https://openalex.org/I183067930"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5100608804","display_name":"Minglu Li","orcid":"https://orcid.org/0000-0001-6547-3472"},"institutions":[{"id":"https://openalex.org/I183067930","display_name":"Shanghai Jiao Tong University","ror":"https://ror.org/0220qvk04","country_code":"CN","type":"education","lineage":["https://openalex.org/I183067930"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Minglu Li","raw_affiliation_strings":["Department of Computer Science and Engineering, Shanghai Jiao Tong University, Shanghai, China"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science and Engineering, Shanghai Jiao Tong University, Shanghai, China","institution_ids":["https://openalex.org/I183067930"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":7,"corresponding_author_ids":["https://openalex.org/A5100658678"],"corresponding_institution_ids":["https://openalex.org/I183067930"],"apc_list":null,"apc_paid":null,"fwci":20.7601,"has_fulltext":false,"cited_by_count":107,"citation_normalized_percentile":{"value":0.99314684,"is_in_top_1_percent":true,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":99,"max":100},"biblio":{"volume":"27","issue":"1","first_page":"447","last_page":"460"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11800","display_name":"User Authentication and Security Systems","score":0.9986000061035156,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11800","display_name":"User Authentication and Security Systems","score":0.9986000061035156,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10860","display_name":"Speech and Audio Processing","score":0.9980000257492065,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T13289","display_name":"Infant Health and Development","score":0.9970999956130981,"subfield":{"id":"https://openalex.org/subfields/3611","display_name":"Pharmacy"},"field":{"id":"https://openalex.org/fields/36","display_name":"Health Professions"},"domain":{"id":"https://openalex.org/domains/4","display_name":"Health Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8301127552986145},{"id":"https://openalex.org/keywords/liveness","display_name":"Liveness","score":0.6044027805328369},{"id":"https://openalex.org/keywords/authentication","display_name":"Authentication (law)","score":0.5756797790527344},{"id":"https://openalex.org/keywords/biometrics","display_name":"Biometrics","score":0.5380558371543884},{"id":"https://openalex.org/keywords/identifier","display_name":"Identifier","score":0.5283223986625671},{"id":"https://openalex.org/keywords/replay-attack","display_name":"Replay attack","score":0.49259525537490845},{"id":"https://openalex.org/keywords/identification","display_name":"Identification (biology)","score":0.4773321747779846},{"id":"https://openalex.org/keywords/spoofing-attack","display_name":"Spoofing attack","score":0.4365992844104767},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.37942689657211304},{"id":"https://openalex.org/keywords/human\u2013computer-interaction","display_name":"Human\u2013computer interaction","score":0.3596612811088562},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.28735247254371643},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.150199294090271}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8301127552986145},{"id":"https://openalex.org/C15569618","wikidata":"https://www.wikidata.org/wiki/Q3561421","display_name":"Liveness","level":2,"score":0.6044027805328369},{"id":"https://openalex.org/C148417208","wikidata":"https://www.wikidata.org/wiki/Q4825882","display_name":"Authentication (law)","level":2,"score":0.5756797790527344},{"id":"https://openalex.org/C184297639","wikidata":"https://www.wikidata.org/wiki/Q177765","display_name":"Biometrics","level":2,"score":0.5380558371543884},{"id":"https://openalex.org/C154504017","wikidata":"https://www.wikidata.org/wiki/Q853614","display_name":"Identifier","level":2,"score":0.5283223986625671},{"id":"https://openalex.org/C11560541","wikidata":"https://www.wikidata.org/wiki/Q1756025","display_name":"Replay attack","level":3,"score":0.49259525537490845},{"id":"https://openalex.org/C116834253","wikidata":"https://www.wikidata.org/wiki/Q2039217","display_name":"Identification (biology)","level":2,"score":0.4773321747779846},{"id":"https://openalex.org/C167900197","wikidata":"https://www.wikidata.org/wiki/Q11081100","display_name":"Spoofing attack","level":2,"score":0.4365992844104767},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.37942689657211304},{"id":"https://openalex.org/C107457646","wikidata":"https://www.wikidata.org/wiki/Q207434","display_name":"Human\u2013computer interaction","level":1,"score":0.3596612811088562},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.28735247254371643},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.150199294090271},{"id":"https://openalex.org/C86803240","wikidata":"https://www.wikidata.org/wiki/Q420","display_name":"Biology","level":0,"score":0.0},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.0},{"id":"https://openalex.org/C59822182","wikidata":"https://www.wikidata.org/wiki/Q441","display_name":"Botany","level":1,"score":0.0}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1109/tnet.2019.2891733","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tnet.2019.2891733","pdf_url":null,"source":{"id":"https://openalex.org/S62238642","display_name":"IEEE/ACM Transactions on Networking","issn_l":"1063-6692","issn":["1063-6692","1558-2566"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE/ACM Transactions on Networking","raw_type":"journal-article"},{"id":"pmh:oai:alma.01RUT_INST:11685411760004646","is_oa":false,"landing_page_url":"https://scholarship.libraries.rutgers.edu/esploro/outputs/journalArticle/Lip-Reading-Based-User-Authentication-Through-Acoustic/991031758468704646","pdf_url":null,"source":{"id":"https://openalex.org/S4210197018","display_name":"View","issn_l":"2688-268X","issn":["2688-268X","2688-3988"],"is_oa":false,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310320595","host_organization_name":"Wiley","host_organization_lineage":["https://openalex.org/P4310320595"],"host_organization_lineage_names":["Wiley"],"type":"journal"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":null,"raw_type":"Article"}],"best_oa_location":null,"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/4","score":0.6600000262260437,"display_name":"Quality Education"}],"awards":[{"id":"https://openalex.org/G2333451228","display_name":null,"funder_award_id":"61772338","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G5407064335","display_name":null,"funder_award_id":"61672349","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G6571577732","display_name":null,"funder_award_id":"61772341","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G7123709921","display_name":null,"funder_award_id":"61472254","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"}],"funders":[{"id":"https://openalex.org/F4320321001","display_name":"National Natural Science Foundation of China","ror":"https://ror.org/01h0zpd94"},{"id":"https://openalex.org/F4320322725","display_name":"China Scholarship Council","ror":"https://ror.org/04atp4p48"}],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":34,"referenced_works":["https://openalex.org/W42204834","https://openalex.org/W1520969751","https://openalex.org/W1557594219","https://openalex.org/W1664547674","https://openalex.org/W2025768430","https://openalex.org/W2070115070","https://openalex.org/W2100294832","https://openalex.org/W2100783932","https://openalex.org/W2114252863","https://openalex.org/W2119821739","https://openalex.org/W2133651588","https://openalex.org/W2145094598","https://openalex.org/W2150341374","https://openalex.org/W2152135784","https://openalex.org/W2153200718","https://openalex.org/W2157519031","https://openalex.org/W2165653503","https://openalex.org/W2307299445","https://openalex.org/W2344757691","https://openalex.org/W2394945029","https://openalex.org/W2525860450","https://openalex.org/W2536166232","https://openalex.org/W2536204627","https://openalex.org/W2624849939","https://openalex.org/W2625581252","https://openalex.org/W2764166175","https://openalex.org/W2765636281","https://openalex.org/W2768149277","https://openalex.org/W2795038031","https://openalex.org/W2997574889","https://openalex.org/W4239510810","https://openalex.org/W4243070457","https://openalex.org/W6681096077","https://openalex.org/W6728050117"],"related_works":["https://openalex.org/W2533239677","https://openalex.org/W4389545061","https://openalex.org/W2140593870","https://openalex.org/W3126377002","https://openalex.org/W2903861076","https://openalex.org/W2604576816","https://openalex.org/W2729608596","https://openalex.org/W2913345013","https://openalex.org/W2900020547","https://openalex.org/W2465785224"],"abstract_inverted_index":{"To":[0,138],"prevent":[1],"users":[2,75,102],"privacy":[3,28],"from":[4,153],"leakage,":[5],"more":[6,8],"and":[7,22,60,126,156,163,174,183,205,231],"mobile":[9],"devices":[10],"employ":[11,157],"biometric-based":[12],"authentication":[13,73,93,194],"approaches,":[14],"such":[15,56],"as":[16,57],"fingerprint,":[17],"face":[18],"recognition,":[19],"voiceprint":[20],"authentications,":[21],"so":[23],"on,":[24],"to":[25,35,45,53,81,149,168,196,210],"enhance":[26],"the":[27,39,47,140],"protection.":[29],"However,":[30],"these":[31,202],"approaches":[32,50],"are":[33,51,79,130],"vulnerable":[34],"replay":[36],"attacks.":[37],"Although":[38],"state-of-art":[40],"solutions":[41],"utilize":[42],"liveness":[43,69],"verification":[44,70],"combat":[46],"attacks,":[48],"existing":[49],"sensitive":[52],"ambient":[54,58],"environments,":[55,222],"lights":[59],"surrounding":[61],"audible":[62],"noises.":[63],"Toward":[64],"this":[65,85],"end,":[66],"we":[67,87,143,188],"explore":[68],"of":[71,101,118],"user":[72,92,111,181,229],"leveraging":[74,201],"mouth":[76,132,141,178],"movements,":[77,142],"which":[78,96],"robust":[80],"noisy":[82],"environments.":[83],"In":[84],"paper,":[86],"propose":[88,144],"a":[89,145,190],"lip":[90],"reading-based":[91],"system,":[94],"LipPass,":[95],"extracts":[97],"unique":[98,131],"behavioral":[99],"characteristics":[100],"speaking":[103,124],"mouths":[104,125],"through":[105],"acoustic":[106,119],"sensing":[107],"on":[108],"smartphones":[109],"for":[110,135,177],"authentication.":[112],"We":[113],"first":[114],"investigate":[115],"Doppler":[116,154],"profiles":[117,155],"signals":[120],"caused":[121],"by":[122],"users'":[123],"find":[127],"that":[128],"there":[129],"movement":[133],"patterns":[134],"different":[136],"individuals.":[137],"characterize":[139],"deep":[146],"learning-based":[147],"method":[148],"extract":[150],"efficient":[151],"features":[152],"softmax":[158],"function,":[159],"support":[160,164],"vector":[161,165],"machine":[162],"domain":[166],"description":[167],"construct":[169],"multi-class":[170],"identifier,":[171],"binary":[172,192,203],"classifiers":[173,204],"spoofer":[175,184,206,235],"detectors":[176,207],"state":[179],"identification,":[180],"identification":[182,230],"detection,":[185],"respectively.":[186],"Afterward,":[187],"develop":[189],"balanced":[191],"tree-based":[193],"approach":[195],"accurately":[197],"identify":[198],"each":[199],"individual":[200],"with":[208],"respect":[209],"registered":[211],"users.":[212],"Through":[213],"extensive":[214],"experiments":[215],"involving":[216],"48":[217],"volunteers":[218],"in":[219,228,234],"four":[220],"real":[221],"LipPass":[223],"can":[224],"achieve":[225],"90.2%":[226],"accuracy":[227,233],"93.1%":[232],"detection.":[236]},"counts_by_year":[{"year":2025,"cited_by_count":16},{"year":2024,"cited_by_count":15},{"year":2023,"cited_by_count":17},{"year":2022,"cited_by_count":15},{"year":2021,"cited_by_count":22},{"year":2020,"cited_by_count":15},{"year":2019,"cited_by_count":7}],"updated_date":"2026-03-27T05:58:40.876381","created_date":"2025-10-10T00:00:00"}
