{"id":"https://openalex.org/W4308410093","doi":"https://doi.org/10.1145/3548606.3563524","title":"Poster","display_name":"Poster","publication_year":2022,"publication_date":"2022-11-07","ids":{"openalex":"https://openalex.org/W4308410093","doi":"https://doi.org/10.1145/3548606.3563524"},"language":"en","primary_location":{"id":"doi:10.1145/3548606.3563524","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3548606.3563524","pdf_url":null,"source":{"id":"https://openalex.org/S4363608815","display_name":"Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"conference"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5100338326","display_name":"Zi Wang","orcid":"https://orcid.org/0000-0001-9081-7185"},"institutions":[{"id":"https://openalex.org/I103163165","display_name":"Florida State University","ror":"https://ror.org/05g3dte14","country_code":"US","type":"education","lineage":["https://openalex.org/I103163165"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Zi Wang","raw_affiliation_strings":["Florida State University, Tallahassee, FL, USA"],"affiliations":[{"raw_affiliation_string":"Florida State University, Tallahassee, FL, USA","institution_ids":["https://openalex.org/I103163165"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100449845","display_name":"Yilin Wang","orcid":"https://orcid.org/0000-0002-0776-6215"},"institutions":[{"id":"https://openalex.org/I103163165","display_name":"Florida State University","ror":"https://ror.org/05g3dte14","country_code":"US","type":"education","lineage":["https://openalex.org/I103163165"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Yilin Wang","raw_affiliation_strings":["Florida State University, Tallahassee, FL, USA"],"affiliations":[{"raw_affiliation_string":"Florida State University, Tallahassee, FL, USA","institution_ids":["https://openalex.org/I103163165"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100394750","display_name":"Yingying Chen","orcid":"https://orcid.org/0000-0002-3994-766X"},"institutions":[{"id":"https://openalex.org/I102322142","display_name":"Rutgers, The State University of New Jersey","ror":"https://ror.org/05vt9qd57","country_code":"US","type":"education","lineage":["https://openalex.org/I102322142"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Yingying Chen","raw_affiliation_strings":["Rutgers University, Piscataway, NJ, USA"],"affiliations":[{"raw_affiliation_string":"Rutgers University, Piscataway, NJ, USA","institution_ids":["https://openalex.org/I102322142"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5068383847","display_name":"Jie Yang","orcid":"https://orcid.org/0000-0002-8244-2181"},"institutions":[{"id":"https://openalex.org/I103163165","display_name":"Florida State University","ror":"https://ror.org/05g3dte14","country_code":"US","type":"education","lineage":["https://openalex.org/I103163165"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Jie Yang","raw_affiliation_strings":["Florida State University, Tallahassee, FL, USA"],"affiliations":[{"raw_affiliation_string":"Florida State University, Tallahassee, FL, USA","institution_ids":["https://openalex.org/I103163165"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5100338326"],"corresponding_institution_ids":["https://openalex.org/I103163165"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.09605055,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":null,"issue":null,"first_page":"3487","last_page":"3489"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10860","display_name":"Speech and Audio Processing","score":0.9988999962806702,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10860","display_name":"Speech and Audio Processing","score":0.9988999962806702,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T13289","display_name":"Infant Health and Development","score":0.9975000023841858,"subfield":{"id":"https://openalex.org/subfields/3611","display_name":"Pharmacy"},"field":{"id":"https://openalex.org/fields/36","display_name":"Health Professions"},"domain":{"id":"https://openalex.org/domains/4","display_name":"Health Sciences"}},{"id":"https://openalex.org/T10828","display_name":"Biometric Identification and Security","score":0.9803000092506409,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7602484822273254},{"id":"https://openalex.org/keywords/spoofing-attack","display_name":"Spoofing attack","score":0.6399554014205933},{"id":"https://openalex.org/keywords/gesture","display_name":"Gesture","score":0.6086195111274719},{"id":"https://openalex.org/keywords/face","display_name":"Face (sociological concept)","score":0.593096137046814},{"id":"https://openalex.org/keywords/fingerprint","display_name":"Fingerprint (computing)","score":0.5852168798446655},{"id":"https://openalex.org/keywords/microphone","display_name":"Microphone","score":0.5751650929450989},{"id":"https://openalex.org/keywords/wearable-computer","display_name":"Wearable computer","score":0.5408945083618164},{"id":"https://openalex.org/keywords/feature","display_name":"Feature (linguistics)","score":0.4670625627040863},{"id":"https://openalex.org/keywords/computer-vision","display_name":"Computer vision","score":0.4584195017814636},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.44826045632362366},{"id":"https://openalex.org/keywords/interface","display_name":"Interface (matter)","score":0.43514660000801086},{"id":"https://openalex.org/keywords/facial-recognition-system","display_name":"Facial recognition system","score":0.42941418290138245},{"id":"https://openalex.org/keywords/authentication","display_name":"Authentication (law)","score":0.42674824595451355},{"id":"https://openalex.org/keywords/feature-extraction","display_name":"Feature extraction","score":0.3446129560470581},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.15357232093811035},{"id":"https://openalex.org/keywords/embedded-system","display_name":"Embedded system","score":0.13589277863502502},{"id":"https://openalex.org/keywords/telecommunications","display_name":"Telecommunications","score":0.11150488257408142}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7602484822273254},{"id":"https://openalex.org/C167900197","wikidata":"https://www.wikidata.org/wiki/Q11081100","display_name":"Spoofing attack","level":2,"score":0.6399554014205933},{"id":"https://openalex.org/C207347870","wikidata":"https://www.wikidata.org/wiki/Q371174","display_name":"Gesture","level":2,"score":0.6086195111274719},{"id":"https://openalex.org/C2779304628","wikidata":"https://www.wikidata.org/wiki/Q3503480","display_name":"Face (sociological concept)","level":2,"score":0.593096137046814},{"id":"https://openalex.org/C2777826928","wikidata":"https://www.wikidata.org/wiki/Q3745713","display_name":"Fingerprint (computing)","level":2,"score":0.5852168798446655},{"id":"https://openalex.org/C2778263558","wikidata":"https://www.wikidata.org/wiki/Q46384","display_name":"Microphone","level":3,"score":0.5751650929450989},{"id":"https://openalex.org/C150594956","wikidata":"https://www.wikidata.org/wiki/Q1334829","display_name":"Wearable computer","level":2,"score":0.5408945083618164},{"id":"https://openalex.org/C2776401178","wikidata":"https://www.wikidata.org/wiki/Q12050496","display_name":"Feature (linguistics)","level":2,"score":0.4670625627040863},{"id":"https://openalex.org/C31972630","wikidata":"https://www.wikidata.org/wiki/Q844240","display_name":"Computer vision","level":1,"score":0.4584195017814636},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.44826045632362366},{"id":"https://openalex.org/C113843644","wikidata":"https://www.wikidata.org/wiki/Q901882","display_name":"Interface (matter)","level":4,"score":0.43514660000801086},{"id":"https://openalex.org/C31510193","wikidata":"https://www.wikidata.org/wiki/Q1192553","display_name":"Facial recognition system","level":3,"score":0.42941418290138245},{"id":"https://openalex.org/C148417208","wikidata":"https://www.wikidata.org/wiki/Q4825882","display_name":"Authentication (law)","level":2,"score":0.42674824595451355},{"id":"https://openalex.org/C52622490","wikidata":"https://www.wikidata.org/wiki/Q1026626","display_name":"Feature extraction","level":2,"score":0.3446129560470581},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.15357232093811035},{"id":"https://openalex.org/C149635348","wikidata":"https://www.wikidata.org/wiki/Q193040","display_name":"Embedded system","level":1,"score":0.13589277863502502},{"id":"https://openalex.org/C76155785","wikidata":"https://www.wikidata.org/wiki/Q418","display_name":"Telecommunications","level":1,"score":0.11150488257408142},{"id":"https://openalex.org/C157915830","wikidata":"https://www.wikidata.org/wiki/Q2928001","display_name":"Bubble","level":2,"score":0.0},{"id":"https://openalex.org/C144024400","wikidata":"https://www.wikidata.org/wiki/Q21201","display_name":"Sociology","level":0,"score":0.0},{"id":"https://openalex.org/C129307140","wikidata":"https://www.wikidata.org/wiki/Q6795880","display_name":"Maximum bubble pressure method","level":3,"score":0.0},{"id":"https://openalex.org/C41895202","wikidata":"https://www.wikidata.org/wiki/Q8162","display_name":"Linguistics","level":1,"score":0.0},{"id":"https://openalex.org/C68115822","wikidata":"https://www.wikidata.org/wiki/Q1068172","display_name":"Sound pressure","level":2,"score":0.0},{"id":"https://openalex.org/C173608175","wikidata":"https://www.wikidata.org/wiki/Q232661","display_name":"Parallel computing","level":1,"score":0.0},{"id":"https://openalex.org/C138885662","wikidata":"https://www.wikidata.org/wiki/Q5891","display_name":"Philosophy","level":0,"score":0.0},{"id":"https://openalex.org/C36289849","wikidata":"https://www.wikidata.org/wiki/Q34749","display_name":"Social science","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1145/3548606.3563524","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3548606.3563524","pdf_url":null,"source":{"id":"https://openalex.org/S4363608815","display_name":"Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"conference"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":5,"referenced_works":["https://openalex.org/W1603495404","https://openalex.org/W2008648979","https://openalex.org/W2975173899","https://openalex.org/W3129328687","https://openalex.org/W3151244818"],"related_works":["https://openalex.org/W2188559950","https://openalex.org/W2989910292","https://openalex.org/W2998478967","https://openalex.org/W3128793638","https://openalex.org/W2123299109","https://openalex.org/W2021230337","https://openalex.org/W4401097268","https://openalex.org/W2607818178","https://openalex.org/W2020816142","https://openalex.org/W3012240659"],"abstract_inverted_index":{"Ear":[0],"wearables":[1],"(earables)":[2],"have":[3],"become":[4,25],"an":[5,166],"emerging":[6],"and":[7,35,111,115,132,141],"wide":[8],"acceptable":[9],"platform":[10],"for":[11,108,124],"various":[12,152],"applications.":[13],"Because":[14],"of":[15,20,33,82,90,96,169],"the":[16,29,36,62,72,79,83,88,102,117,128,135,144],"limited":[17],"input":[18],"interface":[19],"earables,":[21],"traditional":[22],"authentication":[23,58],"methods":[24],"less":[26],"desired.":[27],"However,":[28],"feature-rich":[30],"sensing":[31,44],"abilities":[32],"earables":[34,57,84,112],"unique":[37,140],"human":[38,145],"face-ear":[39],"channel":[40,137],"bring":[41],"us":[42],"new":[43],"opportunities":[45],"to":[46,85,100,113,127,151],"reutilize":[47],"fingerprints.":[48],"In":[49,74],"this":[50],"work,":[51],"we":[52],"proposed":[53],"SlidePass,":[54],"a":[55,105],"secure":[56],"system":[59,77,98],"that":[60,138,163],"leverages":[61,78],"finger-face":[63,91,109,129],"acoustic":[64,89],"friction":[65,110,130],"produced":[66],"by":[67,134],"sliding":[68],"finger":[69],"gestures":[70],"on":[71],"face.":[73],"particular,":[75],"our":[76,97],"inward-facing":[80],"microphone":[81],"reliably":[86],"capture":[87,114],"frictions.":[92],"The":[93],"core":[94],"insight":[95],"is":[99,121,139,148],"utilize":[101],"face":[103,136],"as":[104],"natural":[106],"scanner":[107],"reconstruct":[116],"fingerprint":[118],"features.":[119],"SlidePass":[120,147,164],"specially":[122],"designed":[123],"earables.":[125],"Due":[126],"captured":[131],"encrypted":[133],"hidden":[142],"in":[143],"skull,":[146],"more":[149],"resistant":[150],"spoofing":[153],"attacks.":[154],"Our":[155],"preliminary":[156],"evaluation":[157],"included":[158],"ten":[159],"different":[160],"fingerprints":[161],"showing":[162],"achieves":[165],"average":[167],"accuracy":[168],"94%.":[170]},"counts_by_year":[],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2022-11-11T00:00:00"}
