Lam, L. and Suen, S. (1997). Application of majority vot-
ing to pattern recognition: an analysis of its behav-
ior and performance. IEEE Transactions on Systems,
Man, and Cybernetics-Part A: Systems and Humans,
27(5):553–568.
Lee, W.-H. and Lee, R. B. (2017). Implicit smartphone
user authentication with sensors and contextual ma-
chine learning. In Dependable Systems and Networks
(DSN), 2017 47th Annual IEEE/IFIP International
Conference on, pages 297–308. IEEE.
Lee, W.-H., Liu, X., Shen, Y., Jin, H., and Lee, R. B. (2017).
Secure pick up: Implicit authentication when you start
using the smartphone. In ACM Symposium on Access
Control Models and Technologies (SACMAT).
Lei, X., Senior, A. W., Gruenstein, A., and Sorensen,
J. (2013). Accurate and compact large vocabulary
speech recognition on mobile devices. In Interspeech,
volume 1.
Li, Q. and Cao, G. (2013). Efficient privacy-preserving
stream aggregation in mobile sensing with low ag-
gregation error. In International Symposium on Pri-
vacy Enhancing Technologies Symposium, pages 60–
81. Springer.
Liu, B., Jiang, Y., Sha, F., and Govindan, R. (2012). Cloud-
enabled privacy-preserving collaborative learning for
mobile sensing. In Proceedings of the 10th ACM Con-
ference on Embedded Network Sensor Systems, pages
57–70. ACM.
Liu, X., Zhou, Z., Diao, W., Li, Z., and Zhang, K. (2015).
When good becomes evil: Keystroke inference with
smartwatch. In Proceedings of the 22nd ACM SIGSAC
Conference on Computer and Communications Secu-
rity, pages 1273–1285. ACM.
Lu, H., Frauendorfer, D., Rabbi, M., Mast, M. S., Chit-
taranjan, G. T., Campbell, A. T., Gatica-Perez, D., and
Choudhury, T. (2012). Stresssense: Detecting stress
in unconstrained acoustic environments using smart-
phones. In Proceedings of the 2012 ACM Conference
on Ubiquitous Computing, pages 351–360. ACM.
Luxton, D. D., McCann, R. A., Bush, N. E., Mishkind,
M. C., and Reger, G. M. (2011). mhealth for mental
health: Integrating smartphone technology in behav-
ioral healthcare. Professional Psychology: Research
and Practice, 42(6):505.
Mare, S., Markham, A. M., Cornelius, C., Peterson, R., and
Kotz, D. (2014). Zebra: Zero-effort bilateral recurring
authentication. In Security and Privacy (SP), 2014
IEEE Symposium on, pages 705–720. IEEE.
Marquardt, P., Verma, A., Carter, H., and Traynor, P. (2011).
(sp) iphone: Decoding vibrations from nearby key-
boards using mobile phone accelerometers. In Pro-
ceedings of the 18th ACM conference on Computer
and communications security, pages 551–562. ACM.
Michalevsky, Y., Boneh, D., and Nakibly, G. (2014). Gyro-
phone: Recognizing speech from gyroscope signals.
In USENIX Security Symposium, pages 1053–1067.
Miluzzo, E., Varshavsky, A., Balakrishnan, S., and Choud-
hury, R. R. (2012). Tapprints: your finger taps have
fingerprints. In Proceedings of the 10th international
conference on Mobile systems, applications, and ser-
vices, pages 323–336. ACm.
Mohan, P., Padmanabhan, V. N., and Ramjee, R. (2008).
Nericell: rich monitoring of road and traffic condi-
tions using mobile smartphones. In Proceedings of
the 6th ACM conference on Embedded network sen-
sor systems, pages 323–336. ACM.
Nirjon, S., Dickerson, R. F., Asare, P., Li, Q., Hong, D.,
Stankovic, J. A., Hu, P., Shen, G., and Jiang, X.
(2013). Auditeur: A mobile-cloud service platform
for acoustic event detection on smartphones. In Pro-
ceeding of the 11th annual international conference
on Mobile systems, applications, and services, pages
403–416. ACM.
Owusu, E., Han, J., Das, S., Perrig, A., and Zhang, J.
(2012). Accessory: password inference using ac-
celerometers on smartphones. In Proceedings of the
Twelfth Workshop on Mobile Computing Systems &
Applications, page 9. ACM.
Rachuri, K. K., Musolesi, M., Mascolo, C., Rentfrow, P. J.,
Longworth, C., and Aucinas, A. (2010). Emotion-
sense: a mobile phones based adaptive platform for
experimental social psychology research. In Proceed-
ings of the 12th ACM international conference on
Ubiquitous computing, pages 281–290. ACM.
Reddy, S., Mun, M., Burke, J., Estrin, D., Hansen, M., and
Srivastava, M. (2010). Using mobile phones to de-
termine transportation modes. ACM Transactions on
Sensor Networks (TOSN), 6(2):13.
Riva, O., Qin, C., Strauss, K., and Lymberopoulos, D.
(2012). Progressive authentication: Deciding when to
authenticate on mobile phones. In USENIX Security
Symposium, pages 301–316.
Shebaro, B., Oluwatimi, O., Midi, D., and Bertino, E.
(2014). Identidroid: Android can finally wear its
anonymous suit. Transactions on Data Privacy,
7(1):27–50.
Templeman, R., Zahid Rahman, D. C., and Kapadia, A.
(2013). Placeraider: Virtual theft in physical spaces
with smartphones. In in Network and Distributed Sys-
tem Security Symposium. Citeseer.
Tung, Y.-C. and Shin, K. G. (2015). Echotag: accurate
infrastructure-free indoor location tagging with smart-
phones. In Proceedings of the 21st Annual Inter-
national Conference on Mobile Computing and Net-
working, pages 525–536. ACM.
Xu, Z., Bai, K., and Zhu, S. (2012). Taplogger: Infer-
ring user inputs on smartphone touchscreens using on-
board motion sensors. In Proceedings of the fifth ACM
conference on Security and Privacy in Wireless and
Mobile Networks, pages 113–124. ACM.
Zhu, J., Wu, P., Wang, X., and Zhang, J. (2013). Sensec:
Mobile security through passive sensing. In Com-
puting, Networking and Communications (ICNC),
2013 International Conference on, pages 1128–1133.
IEEE.
ICISSP 2018 - 4th International Conference on Information Systems Security and Privacy
148