{"id":5074,"date":"2025-04-02T21:59:56","date_gmt":"2025-04-02T12:59:56","guid":{"rendered":"https:\/\/c-mng.cwh.hokudai.ac.jp\/iis-lab.ist\/Root\/?post_type=publication&p=5074"},"modified":"2025-04-03T15:05:44","modified_gmt":"2025-04-03T06:05:44","slug":"amesaka-y-watanabe-h-sugiura-y-sugimoto-m-shizuki-b-earlock-user-authentication-system-for-hearables-using-sound-leakage-signals-ieee-transactions-on-mobile-computing-doi10-1109-tmc","status":"publish","type":"publication","link":"https:\/\/c-mng.cwh.hokudai.ac.jp\/iis-lab.ist\/Root\/publication\/amesaka-y-watanabe-h-sugiura-y-sugimoto-m-shizuki-b-earlock-user-authentication-system-for-hearables-using-sound-leakage-signals-ieee-transactions-on-mobile-computing-doi10-1109-tmc","title":{"rendered":"Amesaka, Y., Watanabe, H., Sugiura, Y., Sugimoto, M., Shizuki, B.: EarLock: User Authentication System for Hearables Using Sound Leakage Signals, IEEE Transactions on Mobile Computing (doi:10.1109\/TMC.2025.3540584, to appear in 2025)."},"content":{"rendered":"","protected":false},"excerpt":{"rendered":"","protected":false},"featured_media":0,"parent":0,"template":"","meta":{"_locale":"ja","_original_post":"https:\/\/c-mng.cwh.hokudai.ac.jp\/iis-lab.ist\/Root\/?post_type=publication&p=5074","vkexunit_cta_each_option":""},"paper_genre":[39,75],"acf":[],"_links":{"self":[{"href":"https:\/\/c-mng.cwh.hokudai.ac.jp\/iis-lab.ist\/Root\/wp-json\/wp\/v2\/publication\/5074"}],"collection":[{"href":"https:\/\/c-mng.cwh.hokudai.ac.jp\/iis-lab.ist\/Root\/wp-json\/wp\/v2\/publication"}],"about":[{"href":"https:\/\/c-mng.cwh.hokudai.ac.jp\/iis-lab.ist\/Root\/wp-json\/wp\/v2\/types\/publication"}],"wp:attachment":[{"href":"https:\/\/c-mng.cwh.hokudai.ac.jp\/iis-lab.ist\/Root\/wp-json\/wp\/v2\/media?parent=5074"}],"wp:term":[{"taxonomy":"paper_genre","embeddable":true,"href":"https:\/\/c-mng.cwh.hokudai.ac.jp\/iis-lab.ist\/Root\/wp-json\/wp\/v2\/paper_genre?post=5074"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}