{"id":"https://openalex.org/W4224083286","doi":"https://doi.org/10.1145/3508398.3511498","title":"Leveraging Disentangled Representations to Improve Vision-Based Keystroke Inference Attacks Under Low Data Constraints","display_name":"Leveraging Disentangled Representations to Improve Vision-Based Keystroke Inference Attacks Under Low Data Constraints","publication_year":2022,"publication_date":"2022-04-14","ids":{"openalex":"https://openalex.org/W4224083286","doi":"https://doi.org/10.1145/3508398.3511498"},"language":"en","primary_location":{"id":"doi:10.1145/3508398.3511498","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3508398.3511498","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the Twelfth ACM Conference on Data and Application Security and Privacy","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5112409213","display_name":"John Lim","orcid":null},"institutions":[{"id":"https://openalex.org/I114027177","display_name":"University of North Carolina at Chapel Hill","ror":"https://ror.org/0130frc33","country_code":"US","type":"education","lineage":["https://openalex.org/I114027177"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"John Lim","raw_affiliation_strings":["University of North Carolina at Chapel Hill, Chapel Hill, NC, USA"],"affiliations":[{"raw_affiliation_string":"University of North Carolina at Chapel Hill, Chapel Hill, NC, USA","institution_ids":["https://openalex.org/I114027177"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5018151384","display_name":"Jan\u2010Michael Frahm","orcid":null},"institutions":[{"id":"https://openalex.org/I114027177","display_name":"University of North Carolina at Chapel Hill","ror":"https://ror.org/0130frc33","country_code":"US","type":"education","lineage":["https://openalex.org/I114027177"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Jan-Michael Frahm","raw_affiliation_strings":["University of North Carolina at Chapel Hill, Chapel Hill, NC, USA"],"affiliations":[{"raw_affiliation_string":"University of North Carolina at Chapel Hill, Chapel Hill, NC, USA","institution_ids":["https://openalex.org/I114027177"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5069862528","display_name":"Fabian Monrose","orcid":"https://orcid.org/0000-0002-9805-2217"},"institutions":[{"id":"https://openalex.org/I114027177","display_name":"University of North Carolina at Chapel Hill","ror":"https://ror.org/0130frc33","country_code":"US","type":"education","lineage":["https://openalex.org/I114027177"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Fabian Monrose","raw_affiliation_strings":["University of North Carolina at Chapel Hill, Chapel Hill, NC, USA"],"affiliations":[{"raw_affiliation_string":"University of North Carolina at Chapel Hill, Chapel Hill, NC, USA","institution_ids":["https://openalex.org/I114027177"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5112409213"],"corresponding_institution_ids":["https://openalex.org/I114027177"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.03845618,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":null,"issue":null,"first_page":"242","last_page":"251"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11800","display_name":"User Authentication and Security Systems","score":0.9994999766349792,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11800","display_name":"User Authentication and Security Systems","score":0.9994999766349792,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11398","display_name":"Hand Gesture Recognition Systems","score":0.9912999868392944,"subfield":{"id":"https://openalex.org/subfields/1709","display_name":"Human-Computer Interaction"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10812","display_name":"Human Pose and Action Recognition","score":0.9824000000953674,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8196804523468018},{"id":"https://openalex.org/keywords/leverage","display_name":"Leverage (statistics)","score":0.6831212639808655},{"id":"https://openalex.org/keywords/overfitting","display_name":"Overfitting","score":0.6820414066314697},{"id":"https://openalex.org/keywords/machine-learning","display_name":"Machine learning","score":0.6326929330825806},{"id":"https://openalex.org/keywords/inference","display_name":"Inference","score":0.6213766932487488},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.5569196939468384},{"id":"https://openalex.org/keywords/keystroke-logging","display_name":"Keystroke logging","score":0.5017490386962891},{"id":"https://openalex.org/keywords/set","display_name":"Set (abstract data type)","score":0.41402700543403625},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.15157249569892883},{"id":"https://openalex.org/keywords/artificial-neural-network","display_name":"Artificial neural network","score":0.13689839839935303}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8196804523468018},{"id":"https://openalex.org/C153083717","wikidata":"https://www.wikidata.org/wiki/Q6535263","display_name":"Leverage (statistics)","level":2,"score":0.6831212639808655},{"id":"https://openalex.org/C22019652","wikidata":"https://www.wikidata.org/wiki/Q331309","display_name":"Overfitting","level":3,"score":0.6820414066314697},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.6326929330825806},{"id":"https://openalex.org/C2776214188","wikidata":"https://www.wikidata.org/wiki/Q408386","display_name":"Inference","level":2,"score":0.6213766932487488},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.5569196939468384},{"id":"https://openalex.org/C161615301","wikidata":"https://www.wikidata.org/wiki/Q309396","display_name":"Keystroke logging","level":2,"score":0.5017490386962891},{"id":"https://openalex.org/C177264268","wikidata":"https://www.wikidata.org/wiki/Q1514741","display_name":"Set (abstract data type)","level":2,"score":0.41402700543403625},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.15157249569892883},{"id":"https://openalex.org/C50644808","wikidata":"https://www.wikidata.org/wiki/Q192776","display_name":"Artificial neural network","level":2,"score":0.13689839839935303},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1145/3508398.3511498","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3508398.3511498","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the Twelfth ACM Conference on Data and Application Security and Privacy","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":22,"referenced_works":["https://openalex.org/W1533974647","https://openalex.org/W2066792529","https://openalex.org/W2101105183","https://openalex.org/W2124885613","https://openalex.org/W2135032965","https://openalex.org/W2136853139","https://openalex.org/W2149889219","https://openalex.org/W2158705880","https://openalex.org/W2170653751","https://openalex.org/W2187089797","https://openalex.org/W2291367281","https://openalex.org/W2593768305","https://openalex.org/W2767699072","https://openalex.org/W2794478211","https://openalex.org/W2962793481","https://openalex.org/W3092022161","https://openalex.org/W3126863176","https://openalex.org/W3201519611","https://openalex.org/W4242289848","https://openalex.org/W4385245566","https://openalex.org/W6739901393","https://openalex.org/W6745620410"],"related_works":["https://openalex.org/W1574414179","https://openalex.org/W4362597605","https://openalex.org/W3009056573","https://openalex.org/W2922073769","https://openalex.org/W4297676672","https://openalex.org/W4281702477","https://openalex.org/W2989932438","https://openalex.org/W4387297750","https://openalex.org/W2186333919","https://openalex.org/W4379251913"],"abstract_inverted_index":{"Keystroke":[0],"inference":[1,229],"attacks":[2,8,40,230],"are":[3],"a":[4,18,31,87,105,153,166,183,210],"form":[5,222],"of":[6,49,58,78,82,116,146,165,172,185,191,223],"side-channel":[7],"in":[9,67,169],"which":[10],"an":[11,193,220],"attacker":[12,194],"leverages":[13],"various":[14],"techniques":[15],"to":[16,64,74,95,159,187,197,209],"recover":[17],"user's":[19],"keystrokes":[20],"as":[21],"she":[22],"inputs":[23],"information":[24,192],"into":[25,113,140],"some":[26],"display":[27],"(e.g.,":[28],"while":[29],"sending":[30],"text":[32],"message":[33],"or":[34],"entering":[35],"her":[36],"pin).":[37],"Typically,":[38],"these":[39,156],"leverage":[41,96],"machine":[42,59],"learning":[43,60],"approaches,":[44],"but":[45],"assessing":[46],"the":[47,50,56,65,76,110,161,170,189],"realism":[48],"threat":[51],"space":[52],"has":[53],"lagged":[54],"behind":[55],"pace":[57],"advancements,":[61],"due":[62],"in-part,":[63],"challenges":[66],"curating":[68],"large":[69],"real-life":[70,127,131,180,212],"datasets.":[71],"We":[72,175,199],"aim":[73],"overcome":[75],"challenge":[77],"having":[79],"limited":[80],"number":[81],"real":[83],"data":[84,98,112,181,224],"by":[85],"introducing":[86],"video":[88],"domain":[89],"adaptation":[90],"technique":[91],"that":[92,201,216],"is":[93,195,219],"able":[94,196],"synthetic":[97,129,134],"through":[99],"supervised":[100],"disentangled":[101],"learning.":[102],"Specifically,":[103],"for":[104],"given":[106,167],"domain,":[107],"we":[108,137],"decompose":[109],"observed":[111],"two":[114],"factors":[115],"variation:":[117],"Style":[118],"and":[119,133,151],"Content.":[120],"Doing":[121],"so":[122],"provides":[123],"four":[124],"learned":[125],"representations:":[126],"style,":[128,130],"content":[132,162],"content.":[135],"Then,":[136],"combine":[138],"them":[139],"feature":[141],"representations":[142,158],"from":[143,207],"all":[144],"combinations":[145],"style-content":[147],"pairings":[148],"across":[149],"domains,":[150],"train":[152],"model":[154,206],"on":[155,179],"combined":[157],"classify":[160],"(i.e.,":[163],"labels)":[164],"datapoint":[168],"style":[171],"another":[173],"domain.":[174],"evaluate":[176],"our":[177,202,205,217],"method":[178,203,218],"using":[182],"variety":[184],"metrics":[186],"quantify":[188],"amount":[190],"recover.":[198],"show":[200],"prevents":[204],"overfitting":[208],"small":[211],"training":[213],"set,":[214],"indicating":[215],"effective":[221],"augmentation,":[225],"thereby":[226],"making":[227],"keystroke":[228],"more":[231],"practical.":[232]},"counts_by_year":[],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
