Page 351 - 《软件学报》2025年第5期
P. 351

周满 等: 基于声感知的移动终端身份认证综述                                                          2251


                 [79]  Chauhan J, Rajasegaran J, Seneviratne S, Misra A, Seneviratne A, Lee Y. Performance characterization of deep learning models for
                      breathing-based authentication on resource-constrained devices. Proc. of the ACM on Interactive, Mobile, Wearable and Ubiquitous
                      Technologies, 2018, 2(4): 158. [doi: 10.1145/3287036]
                 [80]  Zhou QQ, Yang YN, Hong F, Feng Y, Guo ZW. User identification and authentication using keystroke dynamics with acoustic signal.
                      In: Proc. of the 12th Int’l Conf. on Mobile Ad-hoc and Sensor Networks. Hefei: IEEE, 2016. 445–449. [doi: 10.1109/MSN.2016.082]
                 [81]  Rathore AS, Zhu WJ, Daiyan A, Xu CH, Wang K, Lin F, Ren K, Xu WY. SonicPrint: A generally adoptable and secure fingerprint
                      biometrics in smart devices. In: Proc. of the 18th Int’l Conf. on Mobile Systems, Applications, and Services. Toronto: ACM, 2020.
                      121–134. [doi: 10.1145/3386901.3388939]
                 [82]  Zou YP, Lei HB, Wu KS. Beyond legitimacy, also with identity: Your smart earphones know who you are quietly. IEEE Trans. on
                      Mobile Computing, 2023, 22(6): 3179–3192. [doi: 10.1109/TMC.2021.3134654]
                 [83]  Gao  Y,  Jin  YC,  Chauhan  J,  Choi  S,  Li  JY,  Jin  ZP.  Voice  in  ear:  Spoofing-resistant  and  passphrase-independent  body  sound
                      authentication.  Proc.  of  the  ACM  on  Interactive,  Mobile,  Wearable  and  Ubiquitous  Technologies,  2021,  5(1):  12.  [doi:  10.1145/
                      3448113]
                 [84]  Zhou Z, Diao WR, Liu XY, Zhang KH. Acoustic fingerprinting revisited: Generate stable device ID stealthily with inaudible sound. In:
                      Proc. of the 2014 ACM SIGSAC Conf. on Computer and Communications Security. Scottsdale: ACM, 2014. 429–440. [doi: 10.1145/
                      2660267.2660300]
                 [85]  Das A, Borisov N, Caesar M. Do you hear what I hear? Fingerprinting smart devices through embedded acoustic components. In: Proc.
                      of the 2014 ACM SIGSAC Conf. on Computer and Communications Security. Scottsdale: ACM, 2014. 441–452. [doi: 10.1145/2660267.
                      2660325]
                 [86]  Luo D, Korus P, Huang JW. Band energy difference for source attribution in audio forensics. IEEE Trans. on Information Forensics and
                      Security, 2018, 13(9): 2179–2189. [doi: 10.1109/TIFS.2018.2812185]
                 [87]  Tan JY, Wang XL, Nguyen CT, Shi Y. SilentKey: A new authentication framework through ultrasonic-based lip reading. Proc. of the
                      ACM on Interactive, Mobile, Wearable and Ubiquitous Technologies, 2018, 2(1): 36. [doi: 10.1145/3191768]
                 [88]  Lu L, Yu JD, Chen YY, Liu HB, Zhu YM, Liu YF, Li ML. LipPass: Lip reading-based user authentication on smartphones leveraging
                      acoustic signals. In: Proc. of the 2018 IEEE Conf. on Computer Communications. Honolulu: IEEE, 2018. 1466–1474. [doi: 10.1109/
                      INFOCOM.2018.8486283]
                 [89]  Lu  L,  Yu  JD,  Chen  YY,  Liu  HB,  Zhu  YM,  Kong  LH,  Li  ML.  Lip  reading-based  user  authentication  through  acoustic  sensing  on
                      smartphones. IEEE/ACM Trans. on Networking, 2019, 27(1): 447–460. [doi: 10.1109/TNET.2019.2891733]
                 [90]  Wang YX, Chen YN, Bhuiyan ZA, Han Y, Zhao SH, Li JX. Gait-based human identification using acoustic sensor and deep neural
                      network. Future Generation Computer Systems, 2018, 86: 1228–1237. [doi: 10.1016/j.future.2017.07.012]
                 [91]  Ding F, Wang D, Zhang Q, Zhao R. ASSV: Handwritten signature verification using acoustic signals. Proc. of the ACM on Interactive,
                      Mobile, Wearable and Ubiquitous Technologies, 2019, 3(3): 80. [doi: 10.1145/3351238]
                 [92]  Zhao R, Wang D, Zhang Q, Jin XY, Liu K. Smartphone-based handwritten signature verification using acoustic signals. Proc. of the
                      ACM on Human-computer Interaction, 2021, 5(ISS): 499. [doi: 10.1145/3488544]
                 [93]  Gao  Y,  Wang  W,  Phoha  VV,  Sun  W,  Jin  ZP.  EarEcho:  Using  ear  canal  echo  for  wearable  authentication.  Proc.  of  the  ACM  on
                      Interactive, Mobile, Wearable and Ubiquitous Technologies, 2019, 3(3): 81. [doi: 10.1145/3351239]
                 [94]  Lu L, Yu JD, Chen YY, Wang Y. VocalLock: Sensing vocal tract for passphrase-independent user authentication leveraging acoustic
                      signals on smartphones. Proc. of the ACM on Interactive, Mobile, Wearable and Ubiquitous Technologies, 2020, 4(2): 51. [doi: 10.1145/
                      3397320]
                 [95]  Huang L, Wang C. Notification privacy protection via unobtrusive gripping hand verification using media sounds. In: Proc. of the 27th
                      Annual Int’l Conf. on Mobile Computing and Networking. New Orleans: ACM, 2021. 491–504. [doi: 10.1145/3447993.3483277]
                 [96]  Shrestha B, Shirvanian M, Shrestha P, Saxena N. The sounds of the phones: Dangers of zero-effort second factor login based on ambient
                      audio. In: Proc. of the 2016 ACM SIGSAC Conf. on Computer and Communications Security. Vienna: ACM, 2016. 908–919. [doi: 10.
                      1145/2976749.2978328]
                 [97]  Shrestha P, Shrestha B, Saxena N. Home alone: The insider threat of unattended wearables and a defense using audio proximity. In:
                      Proc. of the 2018 IEEE Conf. on Communications and Network Security. Beijing: IEEE, 2018. 1–9. [doi: 10.1109/CNS.2018.8433216]
                 [98]  Shrestha P, Saxena N. Listening watch: Wearable two-factor authentication using speech signals resilient to near-far attacks. In: Proc. of
                      the 11th ACM Conf. on Security & Privacy in Wireless and Mobile Networks. Stockholm: ACM, 2018. 99–110. [doi: 10.1145/3212480.
                      3212501]
                 [99]  Ren YZ, Wen P, Liu HB, Zheng ZR, Chen YY, Huang PC, Li HW. Proximity-echo: Secure two factor authentication using active sound
   346   347   348   349   350   351   352   353   354   355   356