{"id":"https://openalex.org/W2890915954","doi":"https://doi.org/10.1145/3243734.3243777","title":"PatternListener","display_name":"PatternListener","publication_year":2018,"publication_date":"2018-10-15","ids":{"openalex":"https://openalex.org/W2890915954","doi":"https://doi.org/10.1145/3243734.3243777","mag":"2890915954"},"language":"en","primary_location":{"id":"doi:10.1145/3243734.3243777","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3243734.3243777","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security","raw_type":"proceedings-article"},"type":"article","indexed_in":["arxiv","crossref"],"open_access":{"is_oa":true,"oa_status":"green","oa_url":"https://arxiv.org/pdf/1810.02242","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5062166339","display_name":"Man Zhou","orcid":"https://orcid.org/0000-0002-1602-7369"},"institutions":[{"id":"https://openalex.org/I37461747","display_name":"Wuhan University","ror":"https://ror.org/033vjfk17","country_code":"CN","type":"education","lineage":["https://openalex.org/I37461747"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Man Zhou","raw_affiliation_strings":["Wuhan University, Wuhan, China"],"affiliations":[{"raw_affiliation_string":"Wuhan University, Wuhan, China","institution_ids":["https://openalex.org/I37461747"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100391116","display_name":"Qian Wang","orcid":"https://orcid.org/0000-0002-8967-8525"},"institutions":[{"id":"https://openalex.org/I37461747","display_name":"Wuhan University","ror":"https://ror.org/033vjfk17","country_code":"CN","type":"education","lineage":["https://openalex.org/I37461747"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Qian Wang","raw_affiliation_strings":["Wuhan University, Wuhan, China"],"affiliations":[{"raw_affiliation_string":"Wuhan University, Wuhan, China","institution_ids":["https://openalex.org/I37461747"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5058515267","display_name":"Jingxiao Yang","orcid":"https://orcid.org/0000-0002-4811-3894"},"institutions":[{"id":"https://openalex.org/I37461747","display_name":"Wuhan University","ror":"https://ror.org/033vjfk17","country_code":"CN","type":"education","lineage":["https://openalex.org/I37461747"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Jingxiao Yang","raw_affiliation_strings":["Wuhan University, Wuhan, China"],"affiliations":[{"raw_affiliation_string":"Wuhan University, Wuhan, China","institution_ids":["https://openalex.org/I37461747"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100350165","display_name":"Qi Li","orcid":"https://orcid.org/0000-0001-8776-8730"},"institutions":[{"id":"https://openalex.org/I99065089","display_name":"Tsinghua University","ror":"https://ror.org/03cve4549","country_code":"CN","type":"education","lineage":["https://openalex.org/I99065089"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Qi Li","raw_affiliation_strings":["Tsinghua University, Shenzhen, China"],"affiliations":[{"raw_affiliation_string":"Tsinghua University, Shenzhen, China","institution_ids":["https://openalex.org/I99065089"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5000194562","display_name":"Feng Xiao","orcid":"https://orcid.org/0000-0001-8199-6249"},"institutions":[{"id":"https://openalex.org/I37461747","display_name":"Wuhan University","ror":"https://ror.org/033vjfk17","country_code":"CN","type":"education","lineage":["https://openalex.org/I37461747"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Feng Xiao","raw_affiliation_strings":["Wuhan University, Wuhan, China"],"affiliations":[{"raw_affiliation_string":"Wuhan University, Wuhan, China","institution_ids":["https://openalex.org/I37461747"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100422345","display_name":"Zhibo Wang","orcid":"https://orcid.org/0000-0002-5804-3279"},"institutions":[{"id":"https://openalex.org/I37461747","display_name":"Wuhan University","ror":"https://ror.org/033vjfk17","country_code":"CN","type":"education","lineage":["https://openalex.org/I37461747"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Zhibo Wang","raw_affiliation_strings":["Wuhan University, Wuhan, China"],"affiliations":[{"raw_affiliation_string":"Wuhan University, Wuhan, China","institution_ids":["https://openalex.org/I37461747"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5039525839","display_name":"Xiaofeng Chen","orcid":"https://orcid.org/0000-0003-4062-4515"},"institutions":[{"id":"https://openalex.org/I149594827","display_name":"Xidian University","ror":"https://ror.org/05s92vm98","country_code":"CN","type":"education","lineage":["https://openalex.org/I149594827"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Xiaofeng Chen","raw_affiliation_strings":["Xidian University, Xi'an, China"],"affiliations":[{"raw_affiliation_string":"Xidian University, Xi'an, China","institution_ids":["https://openalex.org/I149594827"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":7,"corresponding_author_ids":["https://openalex.org/A5062166339"],"corresponding_institution_ids":["https://openalex.org/I37461747"],"apc_list":null,"apc_paid":null,"fwci":5.3098,"has_fulltext":false,"cited_by_count":67,"citation_normalized_percentile":{"value":0.96528095,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":97,"max":99},"biblio":{"volume":null,"issue":null,"first_page":"1775","last_page":"1787"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11800","display_name":"User Authentication and Security Systems","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11598","display_name":"Internet Traffic Analysis and Secure E-voting","score":0.9926999807357788,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.853126049041748},{"id":"https://openalex.org/keywords/mobile-device","display_name":"Mobile device","score":0.6467493772506714},{"id":"https://openalex.org/keywords/lock","display_name":"Lock (firearm)","score":0.6368528008460999},{"id":"https://openalex.org/keywords/scalability","display_name":"Scalability","score":0.6265734434127808},{"id":"https://openalex.org/keywords/line","display_name":"Line (geometry)","score":0.5554983615875244},{"id":"https://openalex.org/keywords/authentication","display_name":"Authentication (law)","score":0.516957700252533},{"id":"https://openalex.org/keywords/signal","display_name":"SIGNAL (programming language)","score":0.47302886843681335},{"id":"https://openalex.org/keywords/construct","display_name":"Construct (python library)","score":0.41608238220214844},{"id":"https://openalex.org/keywords/microphone","display_name":"Microphone","score":0.4150255024433136},{"id":"https://openalex.org/keywords/real-time-computing","display_name":"Real-time computing","score":0.340604692697525},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.21825581789016724},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.16679531335830688},{"id":"https://openalex.org/keywords/telecommunications","display_name":"Telecommunications","score":0.13081330060958862},{"id":"https://openalex.org/keywords/database","display_name":"Database","score":0.11098518967628479}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.853126049041748},{"id":"https://openalex.org/C186967261","wikidata":"https://www.wikidata.org/wiki/Q5082128","display_name":"Mobile device","level":2,"score":0.6467493772506714},{"id":"https://openalex.org/C174839445","wikidata":"https://www.wikidata.org/wiki/Q1134386","display_name":"Lock (firearm)","level":2,"score":0.6368528008460999},{"id":"https://openalex.org/C48044578","wikidata":"https://www.wikidata.org/wiki/Q727490","display_name":"Scalability","level":2,"score":0.6265734434127808},{"id":"https://openalex.org/C198352243","wikidata":"https://www.wikidata.org/wiki/Q37105","display_name":"Line (geometry)","level":2,"score":0.5554983615875244},{"id":"https://openalex.org/C148417208","wikidata":"https://www.wikidata.org/wiki/Q4825882","display_name":"Authentication (law)","level":2,"score":0.516957700252533},{"id":"https://openalex.org/C2779843651","wikidata":"https://www.wikidata.org/wiki/Q7390335","display_name":"SIGNAL (programming language)","level":2,"score":0.47302886843681335},{"id":"https://openalex.org/C2780801425","wikidata":"https://www.wikidata.org/wiki/Q5164392","display_name":"Construct (python library)","level":2,"score":0.41608238220214844},{"id":"https://openalex.org/C2778263558","wikidata":"https://www.wikidata.org/wiki/Q46384","display_name":"Microphone","level":3,"score":0.4150255024433136},{"id":"https://openalex.org/C79403827","wikidata":"https://www.wikidata.org/wiki/Q3988","display_name":"Real-time computing","level":1,"score":0.340604692697525},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.21825581789016724},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.16679531335830688},{"id":"https://openalex.org/C76155785","wikidata":"https://www.wikidata.org/wiki/Q418","display_name":"Telecommunications","level":1,"score":0.13081330060958862},{"id":"https://openalex.org/C77088390","wikidata":"https://www.wikidata.org/wiki/Q8513","display_name":"Database","level":1,"score":0.11098518967628479},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.0},{"id":"https://openalex.org/C127413603","wikidata":"https://www.wikidata.org/wiki/Q11023","display_name":"Engineering","level":0,"score":0.0},{"id":"https://openalex.org/C78519656","wikidata":"https://www.wikidata.org/wiki/Q101333","display_name":"Mechanical engineering","level":1,"score":0.0},{"id":"https://openalex.org/C68115822","wikidata":"https://www.wikidata.org/wiki/Q1068172","display_name":"Sound pressure","level":2,"score":0.0},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.0},{"id":"https://openalex.org/C2524010","wikidata":"https://www.wikidata.org/wiki/Q8087","display_name":"Geometry","level":1,"score":0.0},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.0}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1145/3243734.3243777","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3243734.3243777","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security","raw_type":"proceedings-article"},{"id":"pmh:oai:arXiv.org:1810.02242","is_oa":true,"landing_page_url":"http://arxiv.org/abs/1810.02242","pdf_url":"https://arxiv.org/pdf/1810.02242","source":{"id":"https://openalex.org/S4306400194","display_name":"arXiv (Cornell University)","issn_l":null,"issn":null,"is_oa":true,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I205783295","host_organization_name":"Cornell University","host_organization_lineage":["https://openalex.org/I205783295"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":null,"raw_type":"text"}],"best_oa_location":{"id":"pmh:oai:arXiv.org:1810.02242","is_oa":true,"landing_page_url":"http://arxiv.org/abs/1810.02242","pdf_url":"https://arxiv.org/pdf/1810.02242","source":{"id":"https://openalex.org/S4306400194","display_name":"arXiv (Cornell University)","issn_l":null,"issn":null,"is_oa":true,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I205783295","host_organization_name":"Cornell University","host_organization_lineage":["https://openalex.org/I205783295"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":null,"raw_type":"text"},"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/16","score":0.7400000095367432,"display_name":"Peace, Justice and strong institutions"}],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":32,"referenced_works":["https://openalex.org/W1626992774","https://openalex.org/W1973132608","https://openalex.org/W1973831058","https://openalex.org/W1977574166","https://openalex.org/W1997834106","https://openalex.org/W2028570584","https://openalex.org/W2044798763","https://openalex.org/W2055344768","https://openalex.org/W2074367177","https://openalex.org/W2077910711","https://openalex.org/W2080335657","https://openalex.org/W2083295738","https://openalex.org/W2099468260","https://openalex.org/W2107816859","https://openalex.org/W2112767991","https://openalex.org/W2115042198","https://openalex.org/W2121800893","https://openalex.org/W2125011234","https://openalex.org/W2128025167","https://openalex.org/W2149359921","https://openalex.org/W2254621492","https://openalex.org/W2294170611","https://openalex.org/W2394945029","https://openalex.org/W2524232494","https://openalex.org/W2525860450","https://openalex.org/W2534482106","https://openalex.org/W2613395272","https://openalex.org/W2625581252","https://openalex.org/W2684055372","https://openalex.org/W2724510687","https://openalex.org/W2725499676","https://openalex.org/W2806247261"],"related_works":["https://openalex.org/W2389214306","https://openalex.org/W2363983170","https://openalex.org/W2270181498","https://openalex.org/W4235240664","https://openalex.org/W2965083567","https://openalex.org/W2357191878","https://openalex.org/W1838576100","https://openalex.org/W2095886385","https://openalex.org/W2376330853","https://openalex.org/W1997078944"],"abstract_inverted_index":{"Pattern":[0],"lock":[1,131],"has":[2],"been":[3,22],"widely":[4],"used":[5,53],"for":[6,196],"authentication":[7],"to":[8,24,34,39,45,66,152,192,208,217],"protect":[9],"user":[10],"privacy":[11],"on":[12,104,119],"mobile":[13,77,109],"devices":[14],"(e.g.,":[15,50],"smartphones":[16,243],"and":[17,134,146,156,183,199,225,244],"tablets).":[18],"Several":[19],"attacks":[20,62,81],"have":[21],"constructed":[23],"crack":[25],"the":[26,32,40,47,55,58,61,67,70,73,76,105,141,149,158,163,178,181,186,209,228,231],"lock.":[27],"However,":[28],"these":[29,80],"approaches":[30],"require":[31],"attackers":[33],"be":[35,112],"either":[36],"physically":[37],"close":[38],"target":[41],"device":[42,110,151],"or":[43],"able":[44],"manipulate":[46],"network":[48],"facilities":[49],"wifi":[51],"hotspots)":[52],"by":[54,98,114,132,140,172,240],"victims.":[56],"Therefore,":[57],"effectiveness":[59],"of":[60,69,91,95,107,148,180,185,203,230],"is":[63],"highly":[64],"sensitive":[65],"setting":[68],"environment":[71],"where":[72],"users":[74],"use":[75],"devices.":[78],"Also,":[79],"are":[82,177],"not":[83],"scalable":[84],"since":[85],"they":[86],"cannot":[87],"easily":[88],"infer":[89,200],"patterns":[90,224,264],"a":[92,108,124,215,237],"large":[93],"number":[94],"users.":[96],"Motivated":[97],"an":[99],"observation":[100],"that":[101,128,176,257],"fingertip":[102,182],"motions":[103],"screen":[106],"can":[111,259],"captured":[113],"analyzing":[115,135,173],"surrounding":[116],"acoustic":[117,126,137,159],"signals":[118,138,160],"it,":[120],"we":[121,213],"propose":[122,189],"PatternListener,":[123],"novel":[125],"attack":[127],"cracks":[129],"pattern":[130,171],"leveraging":[133],"imperceptible":[136,154],"reflected":[139,161],"fingertip.":[142,164],"It":[143],"leverages":[144],"speakers":[145],"microphones":[147],"victim's":[150],"play":[153],"audio":[155],"record":[157],"from":[162],"In":[165],"particular,":[166],"it":[167,247],"infers":[168],"each":[169,197,204],"unlock":[170,233],"individual":[174,205],"lines":[175],"trajectories":[179],"composed":[184],"pattern.":[187,234],"We":[188,235],"several":[190],"algorithms":[191],"construct":[193],"signal":[194,210],"segments":[195],"line":[198,206,220],"possible":[201],"candidates":[202,221,229],"according":[207],"segments.":[211],"Finally,":[212],"produce":[214],"tree":[216],"map":[218],"all":[219],"into":[222],"grid":[223],"thereby":[226],"obtain":[227],"entire":[232],"implement":[236],"PatternListener":[238,258],"prototype":[239],"using":[241,248],"off-the-shelf":[242],"thoroughly":[245],"evaluate":[246],"130":[249],"unique":[250],"patterns.":[251],"The":[252],"real":[253],"experimental":[254],"results":[255],"demonstrate":[256],"successfully":[260],"exploit":[261],"over":[262],"90%":[263],"in":[265],"five":[266],"attempts.":[267]},"counts_by_year":[{"year":2026,"cited_by_count":1},{"year":2025,"cited_by_count":5},{"year":2024,"cited_by_count":12},{"year":2023,"cited_by_count":7},{"year":2022,"cited_by_count":10},{"year":2021,"cited_by_count":7},{"year":2020,"cited_by_count":14},{"year":2019,"cited_by_count":11}],"updated_date":"2026-03-20T23:20:44.827607","created_date":"2018-09-27T00:00:00"}
