Page 352 - 《软件学报》2025年第5期
P. 352

2252                                                       软件学报  2025  年第  36  卷第  5  期


                      sensing.  In:  Proc.  of  the  2021  IEEE  Conf.  on  Computer  Communications.  Vancouver:  IEEE,  2021.  1–10.  [doi:  10.1109/
                      INFOCOM42981.2021.9488866]
                 [100]  Zhou B, Lohokare J, Gao RP, Ye F. EchoPrint: Two-factor authentication using acoustics and vision on smartphones. In: Proc. of the
                      24th Annual Int’l Conf. on Mobile Computing and Networking. New Delhi: ACM, 2018. 321–336. [doi: 10.1145/3241539.3241575]
                 [101]  Chen HJ, Li F, Du W, Yang S, Conn M, Wang Y. Listen to your fingers: User authentication based on geometry biometrics of touch
                      gesture. Proc. of the ACM on Interactive, Mobile, Wearable and Ubiquitous Technologies, 2020, 4(3): 75. [doi: 10.1145/3411809]
                 [102]  Chen YL, Ni T, Xu WT, Gu T. SwipePass: Acoustic-based second-factor user authentication for smartphones. Proc. of the ACM on
                      Interactive, Mobile, Wearable and Ubiquitous Technologies, 2022, 6(3): 106. [doi: 10.1145/3550292]
                 [103]  Zhou M, Wang Q, Lin X, Zhao Y, Jiang PP, Li Q, Shen C, Wang C. PressPIN: Enabling secure PIN authentication on mobile devices
                      via structure-borne sounds. IEEE Trans. on Dependable and Secure Computing, 2023, 20(2): 1228–1242. [doi: 10.1109/TDSC.2022.
                      3151889]
                 [104]  Wu C, Chen J, He K, Zhao ZM, Du RY, Zhang C. EchoHand: High accuracy and presentation attack resistant hand authentication on
                      commodity mobile devices. In: Proc. of the 2022 ACM SIGSAC Conf. on Computer and Communications Security. Los Angeles: ACM,
                      2022. 2931–2945. [doi: 10.1145/3548606.3560553]
                 [105]  Han DQ, Chen YM, Li T, Zhang R, Zhang YC, Hedgpeth T. Proximity-proof: Secure and usable mobile two-factor authentication. In:
                      Proc. of the 24th Annual Int’l Conf. on Mobile Computing and Networking. New Delhi: ACM, 2018. 401–415. [doi: 10.1145/3241539.
                      3241574]
                 [106]  Wu LB, Yang JX, Zhou M, Chen YJ, Wang Q. LVID: A multimodal biometrics authentication system on smartphones. IEEE Trans. on
                      Information Forensics and Security, 2020, 15: 1572–1585. [doi: 10.1109/TIFS.2019.2944058]
                 [107]  Yang YL, Wang Y, Chen YY, Wang C. EchoLock: Towards low-effort mobile user identification leveraging structure-borne echos. In:
                      Proc. of the 15th ACM Asia Conf. on Computer and Communications Security. Taipei: ACM, 2020. 772–783. [doi: 10.1145/3320269.
                      3384741]
                 [108]  Zhang SH, Das A. HandLock: Enabling 2-FA for smart home voice assistants using inaudible acoustic signal. In: Proc. of the 24th Int’l
                      Symp. on Research in Attacks, Intrusions and Defenses. San Sebastian: ACM, 2021. 251–265. [doi: 10.1145/3471621.3471866]
                 [109]  Liu D, Wang Q, Zhou M, Jiang PP, Li Q, Shen C, Wang C. SoundID: Securing mobile two-factor authentication via acoustic signals.
                      IEEE Trans. on Dependable and Secure Computing, 2023, 20(2): 1687–1701. [doi: 10.1109/TDSC.2022.3162718]
                 [110]  Wang ZF, Wei G, He QH. Channel pattern noise based playback attack detection algorithm for speaker recognition. In: Proc. of the 2011
                      Int’l Conf. on Machine Learning and Cybernetics. Guilin: IEEE, 2011. 1708–1713. [doi: 10.1109/ICMLC.2011.6016982]
                 [111]  Zhang  LH,  Tan  S,  Yang  J,  Chen  YY.  Voicelive:  A  phoneme  localization  based  liveness  detection  for  voice  authentication  on
                      smartphones. In: Proc. of the 2016 ACM SIGSAC Conf. on Computer and Communications Security. Vienna: ACM, 2016. 1080–1091.
                      [doi: 10.1145/2976749.2978296]
                 [112]  Shang JC, Chen S, Wu J. Defending against voice spoofing: A robust software-based liveness detection system. In: Proc. of the 15th
                      IEEE Int’l Conf. on Mobile Ad Hoc and Sensor Systems. Chengdu: IEEE, 2018. 28–36. [doi: 10.1109/MASS.2018.00016]
                 [113]  Jiang PP, Wang Q, Lin X, Zhou M, Ding WB, Wang C, Shen C, Li Q. Securing liveness detection for voice authentication via pop
                      noises. IEEE Trans. on Dependable and Secure Computing, 2023, 20(2): 1702–1718. [doi: 10.1109/TDSC.2022.3163024]
                 [114]  Wang Y, Cai WD, Gu T, Shao W, Li YN, Yu Y. Secure your voice: An oral airflow-based continuous liveness detection for voice
                      assistants. Proc. of the ACM on Interactive, Mobile, Wearable and Ubiquitous Technologies, 2020, 3(4): 157. [doi: 10.1145/3369811]
                 [115]  Yan C, Long Y, Ji XY, Xu WY. The catcher in the field: A fieldprint based spoofing detection for text-independent speaker verification.
                      In: Proc. of the 2019 ACM SIGSAC Conf. on Computer and Communications Security. London: ACM, 2019. 1215–1229. [doi: 10.1145/
                      3319535.3354248]
                 [116]  Ahmed ME, Kwak IY, Huh JH, Kim I, Oh T, Kim H. VOID: A fast and light voice liveness detection system. In: Proc. of the 29th
                      USENIX Security Symp. USENIX Association, 2020. 2685–2702.
                 [117]  Li ZH, Shi C, Zhang TF, Xie Y, Liu J, Yuan B, Chen YY. Robust detection of machine-induced audio attacks in intelligent audio
                      systems with microphone array. In: Proc. of the 2021 ACM SIGSAC Conf. on Computer and Communications Security. ACM, 2021.
                      1884–1899. [doi: 10.1145/3460120.3484755]
                 [118]  Meng Y, Li JC, Pillari M, Deopujari A, Brennan L, Shamsie H, Zhu HJ, Tian Y. Your microphone array retains your identity: A robust
                      voice liveness detection system for smart speakers. In: Proc. of the 31st USENIX Security Symp. Boston: USENIX Association, 2022.
                      1077–1094.
                 [119]  Zhang  LH,  Tan  S,  Chen  YY,  Yang  J.  A  continuous  articulatory-gesture-based  liveness  detection  for  voice  authentication  on  smart
                      devices. IEEE Internet of Things Journal, 2022, 9(23): 23320–23331. [doi: 10.1109/JIOT.2022.3199995]
   347   348   349   350   351   352   353   354   355   356   357