Page 351 - 《软件学报》2025年第5期
P. 351
周满 等: 基于声感知的移动终端身份认证综述 2251
[79] Chauhan J, Rajasegaran J, Seneviratne S, Misra A, Seneviratne A, Lee Y. Performance characterization of deep learning models for
breathing-based authentication on resource-constrained devices. Proc. of the ACM on Interactive, Mobile, Wearable and Ubiquitous
Technologies, 2018, 2(4): 158. [doi: 10.1145/3287036]
[80] Zhou QQ, Yang YN, Hong F, Feng Y, Guo ZW. User identification and authentication using keystroke dynamics with acoustic signal.
In: Proc. of the 12th Int’l Conf. on Mobile Ad-hoc and Sensor Networks. Hefei: IEEE, 2016. 445–449. [doi: 10.1109/MSN.2016.082]
[81] Rathore AS, Zhu WJ, Daiyan A, Xu CH, Wang K, Lin F, Ren K, Xu WY. SonicPrint: A generally adoptable and secure fingerprint
biometrics in smart devices. In: Proc. of the 18th Int’l Conf. on Mobile Systems, Applications, and Services. Toronto: ACM, 2020.
121–134. [doi: 10.1145/3386901.3388939]
[82] Zou YP, Lei HB, Wu KS. Beyond legitimacy, also with identity: Your smart earphones know who you are quietly. IEEE Trans. on
Mobile Computing, 2023, 22(6): 3179–3192. [doi: 10.1109/TMC.2021.3134654]
[83] Gao Y, Jin YC, Chauhan J, Choi S, Li JY, Jin ZP. Voice in ear: Spoofing-resistant and passphrase-independent body sound
authentication. Proc. of the ACM on Interactive, Mobile, Wearable and Ubiquitous Technologies, 2021, 5(1): 12. [doi: 10.1145/
3448113]
[84] Zhou Z, Diao WR, Liu XY, Zhang KH. Acoustic fingerprinting revisited: Generate stable device ID stealthily with inaudible sound. In:
Proc. of the 2014 ACM SIGSAC Conf. on Computer and Communications Security. Scottsdale: ACM, 2014. 429–440. [doi: 10.1145/
2660267.2660300]
[85] Das A, Borisov N, Caesar M. Do you hear what I hear? Fingerprinting smart devices through embedded acoustic components. In: Proc.
of the 2014 ACM SIGSAC Conf. on Computer and Communications Security. Scottsdale: ACM, 2014. 441–452. [doi: 10.1145/2660267.
2660325]
[86] Luo D, Korus P, Huang JW. Band energy difference for source attribution in audio forensics. IEEE Trans. on Information Forensics and
Security, 2018, 13(9): 2179–2189. [doi: 10.1109/TIFS.2018.2812185]
[87] Tan JY, Wang XL, Nguyen CT, Shi Y. SilentKey: A new authentication framework through ultrasonic-based lip reading. Proc. of the
ACM on Interactive, Mobile, Wearable and Ubiquitous Technologies, 2018, 2(1): 36. [doi: 10.1145/3191768]
[88] Lu L, Yu JD, Chen YY, Liu HB, Zhu YM, Liu YF, Li ML. LipPass: Lip reading-based user authentication on smartphones leveraging
acoustic signals. In: Proc. of the 2018 IEEE Conf. on Computer Communications. Honolulu: IEEE, 2018. 1466–1474. [doi: 10.1109/
INFOCOM.2018.8486283]
[89] Lu L, Yu JD, Chen YY, Liu HB, Zhu YM, Kong LH, Li ML. Lip reading-based user authentication through acoustic sensing on
smartphones. IEEE/ACM Trans. on Networking, 2019, 27(1): 447–460. [doi: 10.1109/TNET.2019.2891733]
[90] Wang YX, Chen YN, Bhuiyan ZA, Han Y, Zhao SH, Li JX. Gait-based human identification using acoustic sensor and deep neural
network. Future Generation Computer Systems, 2018, 86: 1228–1237. [doi: 10.1016/j.future.2017.07.012]
[91] Ding F, Wang D, Zhang Q, Zhao R. ASSV: Handwritten signature verification using acoustic signals. Proc. of the ACM on Interactive,
Mobile, Wearable and Ubiquitous Technologies, 2019, 3(3): 80. [doi: 10.1145/3351238]
[92] Zhao R, Wang D, Zhang Q, Jin XY, Liu K. Smartphone-based handwritten signature verification using acoustic signals. Proc. of the
ACM on Human-computer Interaction, 2021, 5(ISS): 499. [doi: 10.1145/3488544]
[93] Gao Y, Wang W, Phoha VV, Sun W, Jin ZP. EarEcho: Using ear canal echo for wearable authentication. Proc. of the ACM on
Interactive, Mobile, Wearable and Ubiquitous Technologies, 2019, 3(3): 81. [doi: 10.1145/3351239]
[94] Lu L, Yu JD, Chen YY, Wang Y. VocalLock: Sensing vocal tract for passphrase-independent user authentication leveraging acoustic
signals on smartphones. Proc. of the ACM on Interactive, Mobile, Wearable and Ubiquitous Technologies, 2020, 4(2): 51. [doi: 10.1145/
3397320]
[95] Huang L, Wang C. Notification privacy protection via unobtrusive gripping hand verification using media sounds. In: Proc. of the 27th
Annual Int’l Conf. on Mobile Computing and Networking. New Orleans: ACM, 2021. 491–504. [doi: 10.1145/3447993.3483277]
[96] Shrestha B, Shirvanian M, Shrestha P, Saxena N. The sounds of the phones: Dangers of zero-effort second factor login based on ambient
audio. In: Proc. of the 2016 ACM SIGSAC Conf. on Computer and Communications Security. Vienna: ACM, 2016. 908–919. [doi: 10.
1145/2976749.2978328]
[97] Shrestha P, Shrestha B, Saxena N. Home alone: The insider threat of unattended wearables and a defense using audio proximity. In:
Proc. of the 2018 IEEE Conf. on Communications and Network Security. Beijing: IEEE, 2018. 1–9. [doi: 10.1109/CNS.2018.8433216]
[98] Shrestha P, Saxena N. Listening watch: Wearable two-factor authentication using speech signals resilient to near-far attacks. In: Proc. of
the 11th ACM Conf. on Security & Privacy in Wireless and Mobile Networks. Stockholm: ACM, 2018. 99–110. [doi: 10.1145/3212480.
3212501]
[99] Ren YZ, Wen P, Liu HB, Zheng ZR, Chen YY, Huang PC, Li HW. Proximity-echo: Secure two factor authentication using active sound