{"id":"https://openalex.org/W3000988236","doi":"https://doi.org/10.1145/3366423.3380108","title":"Nowhere to Hide: Cross-modal Identity Leakage between Biometrics and Devices","display_name":"Nowhere to Hide: Cross-modal Identity Leakage between Biometrics and Devices","publication_year":2020,"publication_date":"2020-04-20","ids":{"openalex":"https://openalex.org/W3000988236","doi":"https://doi.org/10.1145/3366423.3380108","mag":"3000988236"},"language":"en","primary_location":{"id":"doi:10.1145/3366423.3380108","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3366423.3380108","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of The Web Conference 2020","raw_type":"proceedings-article"},"type":"article","indexed_in":["arxiv","crossref"],"open_access":{"is_oa":true,"oa_status":"green","oa_url":"https://arxiv.org/pdf/2001.08211","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":null,"display_name":"Chris Xiaoxuan Lu","orcid":null},"institutions":[{"id":"https://openalex.org/I146655781","display_name":"University of Liverpool","ror":"https://ror.org/04xs57h96","country_code":"GB","type":"education","lineage":["https://openalex.org/I146655781"]}],"countries":["GB"],"is_corresponding":true,"raw_author_name":"Chris Xiaoxuan Lu","raw_affiliation_strings":["University of Liverpool"],"affiliations":[{"raw_affiliation_string":"University of Liverpool","institution_ids":["https://openalex.org/I146655781"]}]},{"author_position":"middle","author":{"id":null,"display_name":"Yang Li","orcid":null},"institutions":[{"id":"https://openalex.org/I57206974","display_name":"New York University","ror":"https://ror.org/0190ak572","country_code":"US","type":"education","lineage":["https://openalex.org/I57206974"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Yang Li","raw_affiliation_strings":["New York University"],"affiliations":[{"raw_affiliation_string":"New York University","institution_ids":["https://openalex.org/I57206974"]}]},{"author_position":"middle","author":{"id":null,"display_name":"Yuanbo Xiangli","orcid":null},"institutions":[{"id":"https://openalex.org/I177725633","display_name":"Chinese University of Hong Kong","ror":"https://ror.org/00t33hh48","country_code":"CN","type":"education","lineage":["https://openalex.org/I177725633"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Yuanbo Xiangli","raw_affiliation_strings":["The Chinese University of Hong Kong"],"affiliations":[{"raw_affiliation_string":"The Chinese University of Hong Kong","institution_ids":["https://openalex.org/I177725633"]}]},{"author_position":"last","author":{"id":null,"display_name":"Zhengxiong Li","orcid":null},"institutions":[{"id":"https://openalex.org/I63190737","display_name":"University at Buffalo, State University of New York","ror":"https://ror.org/01y64my43","country_code":"US","type":"education","lineage":["https://openalex.org/I63190737"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Zhengxiong Li","raw_affiliation_strings":["University at Buffalo SUNY"],"affiliations":[{"raw_affiliation_string":"University at Buffalo SUNY","institution_ids":["https://openalex.org/I63190737"]}]}],"institutions":[],"countries_distinct_count":3,"institutions_distinct_count":4,"corresponding_author_ids":[],"corresponding_institution_ids":["https://openalex.org/I146655781"],"apc_list":null,"apc_paid":null,"fwci":0.5563,"has_fulltext":false,"cited_by_count":2,"citation_normalized_percentile":{"value":0.73657519,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":94,"max":96},"biblio":{"volume":"1","issue":null,"first_page":"212","last_page":"223"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11800","display_name":"User Authentication and Security Systems","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11800","display_name":"User Authentication and Security Systems","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10828","display_name":"Biometric Identification and Security","score":0.9975000023841858,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12357","display_name":"Digital Media Forensic Detection","score":0.996999979019165,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/biometrics","display_name":"Biometrics","score":0.8536999821662903},{"id":"https://openalex.org/keywords/identity","display_name":"Identity (music)","score":0.5814999938011169},{"id":"https://openalex.org/keywords/information-leakage","display_name":"Information leakage","score":0.5508000254631042},{"id":"https://openalex.org/keywords/adversary","display_name":"Adversary","score":0.5382999777793884},{"id":"https://openalex.org/keywords/leakage","display_name":"Leakage (economics)","score":0.515500009059906},{"id":"https://openalex.org/keywords/permission","display_name":"Permission","score":0.49470001459121704},{"id":"https://openalex.org/keywords/identity-theft","display_name":"Identity theft","score":0.43050000071525574},{"id":"https://openalex.org/keywords/the-internet","display_name":"The Internet","score":0.4300000071525574}],"concepts":[{"id":"https://openalex.org/C184297639","wikidata":"https://www.wikidata.org/wiki/Q177765","display_name":"Biometrics","level":2,"score":0.8536999821662903},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.7498999834060669},{"id":"https://openalex.org/C2778355321","wikidata":"https://www.wikidata.org/wiki/Q17079427","display_name":"Identity (music)","level":2,"score":0.5814999938011169},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.5777999758720398},{"id":"https://openalex.org/C2779201187","wikidata":"https://www.wikidata.org/wiki/Q2775060","display_name":"Information leakage","level":2,"score":0.5508000254631042},{"id":"https://openalex.org/C41065033","wikidata":"https://www.wikidata.org/wiki/Q2825412","display_name":"Adversary","level":2,"score":0.5382999777793884},{"id":"https://openalex.org/C2777042071","wikidata":"https://www.wikidata.org/wiki/Q6509304","display_name":"Leakage (economics)","level":2,"score":0.515500009059906},{"id":"https://openalex.org/C108827166","wikidata":"https://www.wikidata.org/wiki/Q175975","display_name":"Internet privacy","level":1,"score":0.5099999904632568},{"id":"https://openalex.org/C2779089604","wikidata":"https://www.wikidata.org/wiki/Q7169333","display_name":"Permission","level":2,"score":0.49470001459121704},{"id":"https://openalex.org/C522325796","wikidata":"https://www.wikidata.org/wiki/Q471880","display_name":"Identity theft","level":2,"score":0.43050000071525574},{"id":"https://openalex.org/C110875604","wikidata":"https://www.wikidata.org/wiki/Q75","display_name":"The Internet","level":2,"score":0.4300000071525574},{"id":"https://openalex.org/C40305131","wikidata":"https://www.wikidata.org/wiki/Q2616305","display_name":"Obfuscation","level":2,"score":0.36730000376701355},{"id":"https://openalex.org/C137822555","wikidata":"https://www.wikidata.org/wiki/Q2587068","display_name":"Information sensitivity","level":2,"score":0.34130001068115234},{"id":"https://openalex.org/C99498987","wikidata":"https://www.wikidata.org/wiki/Q2210247","display_name":"Noise (video)","level":3,"score":0.3206999897956848},{"id":"https://openalex.org/C148417208","wikidata":"https://www.wikidata.org/wiki/Q4825882","display_name":"Authentication (law)","level":2,"score":0.31859999895095825},{"id":"https://openalex.org/C527821871","wikidata":"https://www.wikidata.org/wiki/Q228502","display_name":"Access control","level":2,"score":0.3003000020980835},{"id":"https://openalex.org/C81860439","wikidata":"https://www.wikidata.org/wiki/Q251212","display_name":"Internet of Things","level":2,"score":0.2897000014781952},{"id":"https://openalex.org/C168406668","wikidata":"https://www.wikidata.org/wiki/Q178022","display_name":"Fingerprint recognition","level":3,"score":0.2870999872684479},{"id":"https://openalex.org/C109297577","wikidata":"https://www.wikidata.org/wiki/Q161157","display_name":"Password","level":2,"score":0.2694000005722046},{"id":"https://openalex.org/C107457646","wikidata":"https://www.wikidata.org/wiki/Q207434","display_name":"Human\u2013computer interaction","level":1,"score":0.2671999931335449},{"id":"https://openalex.org/C169093310","wikidata":"https://www.wikidata.org/wiki/Q3702971","display_name":"Personally identifiable information","level":2,"score":0.2639000117778778},{"id":"https://openalex.org/C63479239","wikidata":"https://www.wikidata.org/wiki/Q7353546","display_name":"Robustness (evolution)","level":3,"score":0.2551000118255615}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1145/3366423.3380108","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3366423.3380108","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of The Web Conference 2020","raw_type":"proceedings-article"},{"id":"pmh:oai:arXiv.org:2001.08211","is_oa":true,"landing_page_url":"http://arxiv.org/abs/2001.08211","pdf_url":"https://arxiv.org/pdf/2001.08211","source":{"id":"https://openalex.org/S4306400194","display_name":"arXiv (Cornell University)","issn_l":null,"issn":null,"is_oa":true,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I205783295","host_organization_name":"Cornell University","host_organization_lineage":["https://openalex.org/I205783295"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":null,"raw_type":"text"}],"best_oa_location":{"id":"pmh:oai:arXiv.org:2001.08211","is_oa":true,"landing_page_url":"http://arxiv.org/abs/2001.08211","pdf_url":"https://arxiv.org/pdf/2001.08211","source":{"id":"https://openalex.org/S4306400194","display_name":"arXiv (Cornell University)","issn_l":null,"issn":null,"is_oa":true,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I205783295","host_organization_name":"Cornell University","host_organization_lineage":["https://openalex.org/I205783295"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":null,"raw_type":"text"},"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":41,"referenced_works":["https://openalex.org/W1824983686","https://openalex.org/W1847657293","https://openalex.org/W1972302881","https://openalex.org/W1975937116","https://openalex.org/W1978350727","https://openalex.org/W1981276164","https://openalex.org/W1981794546","https://openalex.org/W2010865277","https://openalex.org/W2011876093","https://openalex.org/W2026254891","https://openalex.org/W2069778223","https://openalex.org/W2076680677","https://openalex.org/W2096733369","https://openalex.org/W2103133870","https://openalex.org/W2118572719","https://openalex.org/W2118688880","https://openalex.org/W2126074213","https://openalex.org/W2135930857","https://openalex.org/W2136486572","https://openalex.org/W2146722394","https://openalex.org/W2159024459","https://openalex.org/W2168790756","https://openalex.org/W2205690070","https://openalex.org/W2394784643","https://openalex.org/W2471492149","https://openalex.org/W2527142536","https://openalex.org/W2606684806","https://openalex.org/W2611887307","https://openalex.org/W2740924709","https://openalex.org/W2761561878","https://openalex.org/W2790176444","https://openalex.org/W2808631503","https://openalex.org/W2890964092","https://openalex.org/W2898264154","https://openalex.org/W2911571942","https://openalex.org/W2922083518","https://openalex.org/W2955701401","https://openalex.org/W2963562852","https://openalex.org/W2972558603","https://openalex.org/W3147561890","https://openalex.org/W4299734264"],"related_works":[],"abstract_inverted_index":{"Along":[0],"with":[1,148,180],"the":[2,16,35,41,44,57,72,91,94,137,164,183],"benefits":[3],"of":[4,6,15,59,63,75,93,172],"Internet":[5],"Things":[7],"(IoT)":[8],"come":[9],"potential":[10],"privacy":[11],"risks,":[12],"since":[13],"billions":[14],"connected":[17],"devices":[18],"are":[19,118],"granted":[20],"permission":[21],"to":[22,31,40,121,132],"track":[23],"information":[24],"about":[25],"their":[26],"users":[27],"and":[28,101,112,139,159,175],"communicate":[29],"it":[30],"other":[32],"parties":[33],"over":[34],"Internet.":[36],"Of":[37],"particular":[38],"interest":[39],"adversary":[42],"is":[43,69,125,130],"user":[45],"identity":[46,68,96],"which":[47],"constantly":[48],"plays":[49],"an":[50,140],"important":[51],"role":[52],"in":[53,82,136,146],"launching":[54],"attacks.":[55],"While":[56],"exposure":[58],"a":[60],"certain":[61],"type":[62],"physical":[64,113],"biometrics":[65,114,158],"or":[66],"device":[67,106,160,173],"extensively":[70],"studied,":[71],"compound":[73,95],"effect":[74],"leakage":[76,97],"from":[77],"both":[78],"sides":[79],"remains":[80],"unknown":[81],"multi-modal":[83],"sensing":[84],"environments.":[85],"In":[86],"this":[87],"work,":[88],"we":[89],"explore":[90],"feasibility":[92],"across":[98],"cyber-physical":[99],"spaces":[100],"unveil":[102],"that":[103,127,163],"co-located":[104],"smart":[105],"IDs":[107,161,174],"(e.g.,":[108,115],"smartphone":[109],"MAC":[110],"addresses)":[111],"facial/vocal":[116],"samples)":[117],"side":[119],"channels":[120],"each":[122],"other.":[123],"It":[124],"demonstrated":[126],"our":[128],"method":[129],"robust":[131],"various":[133],"observation":[134],"noise":[135],"wild":[138],"attacker":[141],"can":[142,167],"comprehensively":[143],"profile":[144],"victims":[145],"multi-dimension":[147],"nearly":[149],"zero":[150],"analysis":[151],"effort.":[152],"Two":[153],"real-world":[154],"experiments":[155],"on":[156],"different":[157],"show":[162],"presented":[165],"approach":[166],"compromise":[168],"more":[169],"than":[170],"70%":[171],"harvests":[176],"multiple":[177],"biometric":[178],"clusters":[179],"purity":[181],"at":[182],"same":[184],"time.":[185]},"counts_by_year":[{"year":2022,"cited_by_count":2}],"updated_date":"2026-03-20T23:20:44.827607","created_date":"2020-01-30T00:00:00"}
