skip to main content
research-article
Public Access

ToothSonic: Earable Authentication via Acoustic Toothprint

Published: 07 July 2022 Publication History
  • Get Citation Alerts
  • Abstract

    Earables (ear wearables) are rapidly emerging as a new platform encompassing a diverse range of personal applications. The traditional authentication methods hence become less applicable and inconvenient for earables due to their limited input interface. Nevertheless, earables often feature rich around-the-head sensing capability that can be leveraged to capture new types of biometrics. In this work, we propose ToothSonic that leverages the toothprint-induced sonic effect produced by a user performing teeth gestures for earable authentication. In particular, we design representative teeth gestures that can produce effective sonic waves carrying the information of the toothprint. To reliably capture the acoustic toothprint, it leverages the occlusion effect of the ear canal and the inward-facing microphone of the earables. It then extracts multi-level acoustic features to reflect the intrinsic toothprint information for authentication. The key advantages of ToothSonic are that it is suitable for earables and is resistant to various spoofing attacks as the acoustic toothprint is captured via the user's private teeth-ear channel that modulates and encrypts the sonic waves. Our experiment studies with 25 participants show that ToothSonic achieves up to 95% accuracy with only one of the users' tooth gestures.

    References

    [1]
    Aditya Abhyankar and Stephanie Schuckers. 2009. Integrating a wavelet based perspiration liveness check with fingerprint recognition. Pattern Recognition 42, 3 (2009), 452--464.
    [2]
    Takayuki Arakawa, Takafumi Koshinaka, Shohei Yano, Hideki Irisawa, Ryoji Miyahara, and Hitoshi Imaoka. 2016. Fast and accurate personal authentication using ear acoustics. In 2016 Asia-Pacific Signal and Information Processing Association Annual Summit and Conference (APSIPA). IEEE, 1--4.
    [3]
    Jean-François Augoyard. 2006. Sonic experience: a guide to everyday sounds. McGill-Queen's Press-MQUP.
    [4]
    Hind Baqeel and Saqib Saeed. 2019. Face Detection Authentication on Smartphones: End Users Usability Assessment Experiences. In 2019 International Conference on Computer and Information Sciences (ICCIS). IEEE, 1--6.
    [5]
    Greene Vardiman Black. 1897. Descriptive anatomy of the human teeth. SS White manufacturing Company.
    [6]
    Stanley Braun, William P Hnat, Dana E Fender, and Harry L Legan. 1998. The form of the human dental arch. The Angle Orthodontist 68, 1 (1998), 29--36.
    [7]
    Nam Bui, Nhat Pham, Jessica Jacqueline Barnitz, Zhanan Zou, Phuc Nguyen, Hoang Truong, Taeho Kim, Nicholas Farrow, Anh Nguyen, Jianliang Xiao, et al. 2019. ebp: A wearable system for frequent and comfortable blood pressure monitoring from user's ear. In The 25th annual international conference on mobile computing and networking. 1--17.
    [8]
    Ricardo Carreira, Jaime M Crato, Daniel Gonçalves, and Joaquim A Jorge. 2004. Evaluating adaptive user profiles for news classification. In Proceedings of the 9th international conference on Intelligent user interfaces. 206--212.
    [9]
    Ivana Chingovska, Andre Rabello Dos Anjos, and Sebastien Marcel. 2014. Biometrics evaluation under spoofing attacks. IEEE transactions on Information Forensics and Security 9, 12 (2014), 2264--2276.
    [10]
    Romit Roy Choudhury. 2021. Earable computing: A new area to think about. In Proceedings of the 22nd International Workshop on Mobile Computing Systems and Applications. 147--153.
    [11]
    Phillip L De Leon, Michael Pucher, Junichi Yamagishi, Inma Hernaez, and Ibon Saratxaga. 2012. Evaluation of speaker verification security and detection of HMM-based synthetic speech. IEEE Transactions on Audio, Speech, and Language Processing 20, 8 (2012), 2280--2290.
    [12]
    Xiaoran Fan, Longfei Shangguan, Siddharth Rupavatharam, Yanyong Zhang, Jie Xiong, Yunfei Ma, and Richard E Howard. 2021. HeadFi: bringing intelligence to all headphones. In MobiCom. 147--159.
    [13]
    Jianjiang Feng, Anil K Jain, and Arun Ross. 2009. Fingerprint alteration. submitted to IEEE TIFS (2009).
    [14]
    Matteo Ferrara, Annalisa Franco, and Davide Maltoni. 2016. On the effects of image alterations on face recognition accuracy. In Face recognition across the imaging spectrum. Springer, 195--222.
    [15]
    Pablo Gallego Cascón, Denys JC Matthies, Sachith Muthukumarana, and Suranga Nanayakkara. 2019. ChewIt. An Intraoral Interface for Discreet Interactions. In Proceedings of the 2019 CHI Conference on Human Factors in Computing Systems. 1--13.
    [16]
    Yang Gao, Wei Wang, Vir V Phoha, Wei Sun, and Zhanpeng Jin. 2019. EarEcho: Using Ear Canal Echo for Wearable Authentication. Proceedings of the ACM on Interactive, Mobile, Wearable and Ubiquitous Technologies 3, 3 (2019), 1--24.
    [17]
    Maria del Pilar Gutiérrez-Salazar and Jorge Reyes-Gasga. 2003. Microhardness and chemical composition of human tooth. Materials Research 6 (2003), 367--373.
    [18]
    Rosa González Hautamäki, Tomi Kinnunen, Ville Hautamäki, Timo Leino, and Anne-Maria Laukkanen. 2013. I-vectors meet imitators: on vulnerability of speaker verification systems against voice mimicry. In Interspeech. 930--934.
    [19]
    Simon Hillson and Sandra Bond. 1997. Relationship of enamel hypoplasia to the pattern of tooth crown growth: a discussion. American Journal of Physical Anthropology: The Official Publication of the American Association of Physical Anthropologists 104, 1 (1997), 89--103.
    [20]
    Michael Hofer and Aparecido Nilceu Marana. 2007. Dental biometrics: human identification based on dental work information. In XX Brazilian Symposium on Computer Graphics and Image Processing (SIBGRAPI 2007). IEEE, 281--286.
    [21]
    Md Afzal Hossan, Sheeraz Memon, and Mark A Gregory. 2010. A novel approach for MFCC feature extraction. In 2010 4th International Conference on Signal Processing and Communication Systems. IEEE, 1--5.
    [22]
    Danoush Hosseinzadeh and Sridhar Krishnan. 2007. Combining vocal source and MFCC features for enhanced speaker recognition performance using GMMs. In 2007 IEEE 9th Workshop on Multimedia Signal Processing. IEEE, 365--368.
    [23]
    Idtechex. 2020. https://www.idtechex.com/en/research-article/what-does-the-future-hold-for-the-hearables-market/22130.
    [24]
    Mahdieh Izadpanahkakhk, Seyyed Mohammad Razavi, Mehran Taghipour-Gorjikolaie, Seyyed Hamid Zahiri, and Aurelio Uncini. 2018. Deep region of interest and feature extraction models for palmprint verification using convolutional neural networks transfer learning. Applied Sciences 8, 7 (2018), 1210.
    [25]
    Markus Jakobsson, Elaine Shi, Philippe Golle, Richard Chow, et al. 2009. Implicit authentication for mobile devices. In Proceedings of the 4th USENIX conference on Hot topics in security, Vol. 1. USENIX Association, 25--27.
    [26]
    Amin Jalali, Rommohan Mallipeddi, and Minho Lee. 2015. Deformation invariant and contactless palmprint recognition using convolutional neural network. In Proceedings of the 3rd International Conference on Human-Agent Interaction. 209--212.
    [27]
    Artur Janicki, Federico Alegre, and Nicholas Evans. 2016. An assessment of automatic speaker verification vulnerabilities to replay spoofing attacks. Security and Communication Networks 9, 15 (2016), 3030--3044.
    [28]
    Hongbo Jiang, Hangcheng Cao, Daibo Liu, Jie Xiong, and Zhichao Cao. 2020. SmileAuth: Using Dental Edge Biometrics for User Authentication on Smartphones. Proceedings of the ACM on Interactive, Mobile, Wearable and Ubiquitous Technologies 4, 3 (2020), 1--24.
    [29]
    Fahim Kawsar, Chulhong Min, Akhil Mathur, and Allesandro Montanari. 2018. Earables for personal-scale behavior analytics. IEEE Pervasive Computing 17, 3 (2018), 83--89.
    [30]
    Dongwoo Kim, Chulhong Min, and Seungwoo Kang. 2020. Towards recognizing perceived level of understanding for online lectures using earables. In Proceedings of the 18th Conference on Embedded Networked Sensor Systems. 739--740.
    [31]
    Hyoung-Gook Kim, Nicolas Moreau, and Thomas Sikora. 2006. MPEG-7 audio and beyond: Audio content indexing and retrieval. John Wiley & Sons.
    [32]
    Andreas Kipp, M-B Wesenick, and Florian Schiel. 1996. Automatic detection and segmentation of pronunciation variants in German speech corpora. In Proceeding of Fourth International Conference on Spoken Language Processing. ICSLP'96, Vol. 1. IEEE, 106--109.
    [33]
    Kewal Krishan, Tanuj Kanchan, and Arun K Garg. 2015. Dental evidence in forensic identification-An overview, methodology and present status. The open dentistry journal 9 (2015), 250.
    [34]
    Yan-Hao Lai, Chun-Hung KuoLin, Phen Lan, et al. 2011. Dental identification based on teeth and dental works matching for bitewing radiographs. (2011).
    [35]
    Jonathan Liebers, Mark Abdelaziz, Lukas Mecke, Alia Saad, Jonas Auda, Uwe Gruenefeld, Florian Alt, and Stefan Schneegass. 2021. Understanding User Identification in Virtual Reality Through Behavioral Biometrics and the Effect of Body Normalization. In Proceedings of the 2021 CHI Conference on Human Factors in Computing Systems. 1--11.
    [36]
    Jonathan Liebers and Stefan Schneegass. 2020. Introducing Functional Biometrics: Using Body-Reflections as a Novel Class of Biometric Authentication Systems. In Extended Abstracts of the 2020 CHI Conference on Human Factors in Computing Systems. 1--7.
    [37]
    Hongbo Liu, Yan Wang, Jian Liu, Jie Yang, and Yingying Chen. 2014. Practical user authentication leveraging channel state information (CSI). In Proceedings of the 9th ACM symposium on Information, computer and communications security. 389--400.
    [38]
    Hongbo Liu, Yan Wang, Jian Liu, Jie Yang, Yingying Chen, and H Vincent Poor. 2017. Authenticating users through fine-grained channel information. IEEE Transactions on Mobile Computing 17, 2 (2017), 251--264.
    [39]
    Jian Liu, Yingying Chen, Yan Wang, Xu Chen, Jerry Cheng, and Jie Yang. 2018. Monitoring vital signs and postures during sleep using WiFi signals. IEEE Internet of Things Journal 5, 3 (2018), 2071--2084.
    [40]
    Jian Liu, Yan Wang, Yingying Chen, Jie Yang, Xu Chen, and Jerry Cheng. 2015. Tracking vital signs during sleep leveraging off-the-shelf wifi. In Proceedings of the 16th ACM international symposium on mobile ad hoc networking and computing. 267--276.
    [41]
    Davide Maltoni, Dario Maio, Anil K Jain, and Salil Prabhakar. 2009. Handbook of fingerprint recognition. Springer Science & Business Media.
    [42]
    Emanuela Marasco and Arun Ross. 2014. A survey on antispoofing schemes for fingerprint recognition systems. ACM Computing Surveys (CSUR) 47, 2 (2014), 1--36.
    [43]
    Gian Luca Marcialis, Fabio Roli, and Alessandra Tidu. 2010. Analysis of fingerprint pores for vitality detection. In 2010 20th international conference on pattern recognition. IEEE, 1289--1292.
    [44]
    Steven D Marshall, Matthew Caspersen, Rachel R Hardinger, Robert G Franciscus, Steven A Aquilino, and Thomas E Southard. 2008. Development of the curve of Spee. American Journal of Orthodontics and Dentofacial Orthopedics 134, 3 (2008), 344--352.
    [45]
    Chulhong Min, Akhil Mathur, and Fahim Kawsar. 2018. Exploring audio and kinetic sensing on earable devices. In Proceedings of the 4th ACM Workshop on Wearable Systems and Applications. 5--10.
    [46]
    Chulhong Min, Alessandro Montanari, Akhil Mathur, Seungchul Lee, and Fahim Kawsar. 2018. Cross-modal approach for conversational well-being monitoring with multi-sensory earables. In Proceedings of the 2018 ACM International Joint Conference and 2018 International Symposium on Pervasive and Ubiquitous Computing and Wearable Computers. 706--709.
    [47]
    Amir Mohammadi, Sushil Bhattacharjee, and Sébastien Marcel. 2017. Deeply vulnerable: a study of the robustness of face recognition to presentation attacks. IET Biometrics 7, 1 (2017), 15--26.
    [48]
    Stephen Molnar and Iva M Molnar. 1990. Dental arch shape and tooth wear variability. American Journal of Physical Anthropology 82, 3 (1990), 385--395.
    [49]
    J Naziya, S Sunil, P Jayanthi, R Rathy, and RK Harish. 2019. Analysis of enamel rod end pattern for personal identification. Journal of oral and maxillofacial pathology: JOMFP 23, 1 (2019), 165.
    [50]
    Alejandra Ortiz, Shara E Bailey, Gary T Schwartz, Jean-Jacques Hublin, and Matthew M Skinner. 2018. Evo-devo models of tooth development and the origin of hominoid molar diversity. Science advances 4, 4 (2018), eaar2334.
    [51]
    Nhat Pham, Tuan Dinh, Zohreh Raghebi, Taeho Kim, Nam Bui, Phuc Nguyen, Hoang Truong, Farnoush Banaei-Kashani, Ann Halbower, Thang Dinh, et al. 2020. WAKE: a behind-the-ear wearable system for microsleep detection. In Proceedings of the 18th International Conference on Mobile Systems, Applications, and Services. 404--418.
    [52]
    Jay Prakash, Zhijian Yang, Yu-Lin Wei, and Romit Roy Choudhury. 2019. Stear: Robust step counting from earables. In Proceedings of the 1st International Workshop on Earable Computing. 36--41.
    [53]
    Jay Prakash, Zhijian Yang, Yu-Lin Wei, Haitham Hassanieh, and Romit Roy Choudhury. 2020. EarSense: earphones as a teeth activity sensor. In Proceedings of the 26th Annual International Conference on Mobile Computing and Networking. 1--13.
    [54]
    Yanzhi Ren, Yingying Chen, Mooi Choo Chuah, and Jie Yang. 2013. Smartphone based user verification leveraging gait recognition for mobile healthcare systems. In 2013 IEEE international conference on sensing, communications and networking (SECON). IEEE, 149--157.
    [55]
    Yanzhi Ren, Yingying Chen, Mooi Choo Chuah, and Jie Yang. 2014. User verification leveraging gait recognition for smartphone enabled mobile healthcare systems. IEEE Transactions on Mobile Computing 14, 9 (2014), 1961--1974.
    [56]
    Yanzhi Ren, Chen Wang, Yingying Chen, Mooi Choo Chuah, and Jie Yang. 2015. Critical segment based real-time e-signature for securing mobile transactions. In 2015 IEEE Conference on Communications and Network Security (CNS). IEEE, 7--15.
    [57]
    Yanzhi Ren, Chen Wang, Yingying Chen, Mooi Choo Chuah, and Jie Yang. 2019. Signature verification using critical segments for securing mobile transactions. IEEE Transactions on Mobile Computing 19, 3 (2019), 724--739.
    [58]
    Ulrich Scherhag, Christian Rathgeb, Johannes Merkle, Ralph Breithaupt, and Christoph Busch. 2019. Face recognition systems under morphing attacks: A survey. IEEE Access 7 (2019), 23012--23026.
    [59]
    Florian Schiel. 1999. Automatic phonetic transcription of non-prompted speech. (1999).
    [60]
    Roman Schlieper, Song Li, Stephan Preihs, and Jürgen Peissig. 2019. The relationship between the acoustic impedance of headphones and the occlusion effect. In Audio Engineering Society Conference: 2019 AES INTERNATIONAL CONFERENCE ON HEADPHONE TECHNOLOGY. Audio Engineering Society.
    [61]
    Albrecht Schmidt. 2000. Implicit human computer interaction through context. Personal technologies 4, 2 (2000), 191--199.
    [62]
    Stefan Schneegass, Youssef Oualil, and Andreas Bulling. 2016. SkullConduct: Biometric user identification on eyewear computers using bone conduction through the skull. In Proceedings of the 2016 CHI Conference on Human Factors in Computing Systems. 1379--1384.
    [63]
    Stephanie AC Schuckers. 2002. Spoofing and anti-spoofing measures. Information Security technical report 7, 4 (2002), 56--62.
    [64]
    G Richard Scott, Christy G Turner, et al. 1997. Anthropology of modern human teeth. Cambridge University Press Cambridge.
    [65]
    Mark Sorenti, María Martinón-Torres, Laura Martín-Francés, and Bernardo Perea-Pérez. 2019. Sexual dimorphism of dental tissues in modern human mandibular molars. American journal of physical anthropology 169, 2 (2019), 332--340.
    [66]
    Stefan Stenfelt. 2011. Acoustic and physiologic aspects of bone conduction hearing. Implantable bone conduction hearing aids 71 (2011), 10--21.
    [67]
    Wei Sun, Franklin Mingzhe Li, Benjamin Steeper, Songlin Xu, Feng Tian, and Cheng Zhang. 2021. TeethTap: Recognizing Discrete Teeth Gestures Using Motion and Acoustic Sensing on an Earpiece. In 26th International Conference on Intelligent User Interfaces. 161--169.
    [68]
    D Sweet and JA DiZinno. 1996. Personal identification through dental evidence-tooth fragments to DNA. Journal of the California Dental Association 24, 5 (1996), 35--42.
    [69]
    Sheng Tan and Jie Yang. 2016. WiFinger: Leveraging commodity WiFi for fine-grained finger gesture recognition. In Proceedings of the 17th ACM international symposium on mobile ad hoc networking and computing. 201--210.
    [70]
    Sheng Tan, Jie Yang, and Yingying Chen. 2020. Enabling fine-grained finger gesture recognition on commodity wifi devices. IEEE Transactions on Mobile Computing (2020).
    [71]
    Sheng Tan, Linghan Zhang, Zi Wang, and Jie Yang. 2019. MultiTrack: Multi-user tracking and activity recognition using commodity WiFi. In Proceedings of the 2019 CHI Conference on Human Factors in Computing Systems. 1--12.
    [72]
    Peter S Ungar. 2010. Mammal teeth: origin, evolution, and diversity. JHU Press.
    [73]
    Tomás Vega Gálvez, Shardul Sapkota, Alexandru Dancu, and Pattie Maes. 2019. Byte. it: discreet teeth gestures for mobile device interaction. In Extended Abstracts of the 2019 CHI Conference on Human Factors in Computing Systems. 1--6.
    [74]
    Rudolf M Verdaasdonk and Niels Liberton. 2019. The Iphone X as 3D scanner for quantitative photography of faces for diagnosis and treatment follow-up (Conference Presentation). In Optics and Biophotonics in Low-Resource Settings V, Vol. 10869. International Society for Optics and Photonics, 1086902.
    [75]
    Lixin Wang, Jiafa Mao, Yahong Hu, and Weigou Sheng. 2020. Tooth identification based on teeth structure feature. Systems Science & Control Engineering 8, 1 (2020), 521--533.
    [76]
    Yan Wang, Jian Liu, Yingying Chen, Marco Gruteser, Jie Yang, and Hongbo Liu. 2014. E-eyes: device-free location-oriented activity identification using fine-grained wifi signatures. In Proceedings of the 20th annual international conference on Mobile computing and networking. 617--628.
    [77]
    Zi Wang, Yili Ren, Yingying Chen, and Jie Yang. 2021. Earable Authentication via Acoustic Toothprint. In Proceedings of the 2021 ACM SIGSAC Conference on Computer and Communications Security. 2390--2392.
    [78]
    Zi Wang, Sheng Tan, Linghan Zhang, Yili Ren, Zhi Wang, and Jie Yang. 2021. EarDynamic: An Ear Canal Deformation Based Continuous User Authentication Using In-Ear Wearables. Proceedings of the ACM on Interactive, Mobile, Wearable and Ubiquitous Technologies 5, 1 (2021), 1--27.
    [79]
    Zi Wang, Sheng Tan, Linghan Zhang, and Jie Yang. 2018. ObstacleWatch: Acoustic-based obstacle collision detection for pedestrian using smartphone. Proceedings of the ACM on IMWUT 2, 4 (2018), 1--22.
    [80]
    Zhizheng Wu, Tomi Kinnunen, Nicholas Evans, Junichi Yamagishi, Cemal Hanilçi, Md Sahidullah, and Aleksandr Sizov. 2015. ASVspoof 2015: the first automatic speaker verification spoofing and countermeasures challenge. In Sixteenth Annual Conference of the International Speech Communication Association.
    [81]
    Xuhai Xu, Chun Yu, Anind K Dey, and Jennifer Mankoff. 2019. Clench Interface: Novel Biting Input Techniques. In Proceedings of the 2019 CHI Conference on Human Factors in Computing Systems. 1--12.
    [82]
    Zhijian Yang, Yu-Lin Wei, Sheng Shen, and Romit Roy Choudhury. 2020. Ear-ar: indoor acoustic augmented reality on earphones. In Proceedings of the 26th Annual International Conference on Mobile Computing and Networking. 1--14.
    [83]
    ZDNet. 2020. https://www.zdnet.com/article/apple-airpods-and-other-smart-hearables-are-ruling-the-wearable-tech-market.
    [84]
    Linghan Zhang, Sheng Tan, Zi Wang, Yili Ren, Zhi Wang, and Jie Yang. 2020. VibLive: A Continuous Liveness Detection for Secure Voice User Interface in IoT Environment. In Annual Computer Security Applications Conference. 884--896.
    [85]
    Linghan Zhang, Sheng Tan, and Jie Yang. 2017. Hearing your voice is not enough: An articulatory gesture based liveness detection for voice authentication. In Proceedings of the 2017 ACM SIGSAC Conference on CCS. 57--71.
    [86]
    Linghan Zhang, Sheng Tan, Jie Yang, and Yingying Chen. 2016. Voicelive: A phoneme localization based liveness detection for voice authentication on smartphones. In Proceedings of the 2016 ACM SIGSAC Conference on CCS. 1080--1091.
    [87]
    Yongpan Zou, Meng Zhao, Zimu Zhou, Jiawei Lin, Mo Li, and Kaishun Wu. 2018. BiLock: User authentication via dental occlusion biometrics. Proceedings of the ACM on Interactive, Mobile, Wearable and Ubiquitous Technologies 2, 3 (2018), 1--20.

    Cited By

    View all
    • (2024)WiFi-CSI Difference ParadigmProceedings of the ACM on Interactive, Mobile, Wearable and Ubiquitous Technologies10.1145/36596088:2(1-29)Online publication date: 15-May-2024
    • (2024)BreathPro: Monitoring Breathing Mode during Running with EarablesProceedings of the ACM on Interactive, Mobile, Wearable and Ubiquitous Technologies10.1145/36596078:2(1-25)Online publication date: 15-May-2024
    • (2024)ICY Interfaces: Exploration of Ice’s Ephemeral Features for Digital Game User ExperienceProceedings of the 2024 ACM Designing Interactive Systems Conference10.1145/3643834.3660725(2107-2124)Online publication date: 1-Jul-2024
    • Show More Cited By

    Recommendations

    Comments

    Information & Contributors

    Information

    Published In

    cover image Proceedings of the ACM on Interactive, Mobile, Wearable and Ubiquitous Technologies
    Proceedings of the ACM on Interactive, Mobile, Wearable and Ubiquitous Technologies  Volume 6, Issue 2
    July 2022
    1551 pages
    EISSN:2474-9567
    DOI:10.1145/3547347
    Issue’s Table of Contents
    Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

    Publisher

    Association for Computing Machinery

    New York, NY, United States

    Publication History

    Published: 07 July 2022
    Published in IMWUT Volume 6, Issue 2

    Permissions

    Request permissions for this article.

    Check for updates

    Author Tags

    1. Acoustic Sensing
    2. Biometrics
    3. Ear Canal
    4. Earable Authentication
    5. Tooth
    6. Wearable

    Qualifiers

    • Research-article
    • Research
    • Refereed

    Funding Sources

    Contributors

    Other Metrics

    Bibliometrics & Citations

    Bibliometrics

    Article Metrics

    • Downloads (Last 12 months)310
    • Downloads (Last 6 weeks)31

    Other Metrics

    Citations

    Cited By

    View all
    • (2024)WiFi-CSI Difference ParadigmProceedings of the ACM on Interactive, Mobile, Wearable and Ubiquitous Technologies10.1145/36596088:2(1-29)Online publication date: 15-May-2024
    • (2024)BreathPro: Monitoring Breathing Mode during Running with EarablesProceedings of the ACM on Interactive, Mobile, Wearable and Ubiquitous Technologies10.1145/36596078:2(1-25)Online publication date: 15-May-2024
    • (2024)ICY Interfaces: Exploration of Ice’s Ephemeral Features for Digital Game User ExperienceProceedings of the 2024 ACM Designing Interactive Systems Conference10.1145/3643834.3660725(2107-2124)Online publication date: 1-Jul-2024
    • (2024)RFSpy: Eavesdropping on Online Conversations with Out-of-Vocabulary Words by Sensing Metal Coil Vibration of Headsets Leveraging RFIDProceedings of the 22nd Annual International Conference on Mobile Systems, Applications and Services10.1145/3643832.3661887(169-182)Online publication date: 3-Jun-2024
    • (2024)Enabling 6D Pose Tracking on Your Acoustic DevicesProceedings of the 22nd Annual International Conference on Mobile Systems, Applications and Services10.1145/3643832.3661875(15-28)Online publication date: 3-Jun-2024
    • (2024)F2Key: Dynamically Converting Your Face into a Private Key Based on COTS Headphones for Reliable Voice InteractionProceedings of the 22nd Annual International Conference on Mobile Systems, Applications and Services10.1145/3643832.3661860(127-140)Online publication date: 3-Jun-2024
    • (2024)EarSlideProceedings of the ACM on Interactive, Mobile, Wearable and Ubiquitous Technologies10.1145/36435158:1(1-29)Online publication date: 6-Mar-2024
    • (2024)LiquImagerProceedings of the ACM on Interactive, Mobile, Wearable and Ubiquitous Technologies10.1145/36435098:1(1-29)Online publication date: 6-Mar-2024
    • (2024)Combating Islamophobia: Compromise, Community, and Harmony in Mitigating Harmful Online ContentACM Transactions on Social Computing10.1145/36415107:1(1-32)Online publication date: 27-Apr-2024
    • (2024)EarSEProceedings of the ACM on Interactive, Mobile, Wearable and Ubiquitous Technologies10.1145/36314477:4(1-33)Online publication date: 12-Jan-2024
    • Show More Cited By

    View Options

    View options

    PDF

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader

    Get Access

    Login options

    Full Access

    Media

    Figures

    Other

    Tables

    Share

    Share

    Share this Publication link

    Share on social media

    -