{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,27]],"date-time":"2025-09-27T13:55:13Z","timestamp":1758981313571,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":76,"publisher":"ACM","license":[{"start":{"date-parts":[[2025,4,25]],"date-time":"2025-04-25T00:00:00Z","timestamp":1745539200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2025,4,26]]},"DOI":"10.1145\/3706598.3713925","type":"proceedings-article","created":{"date-parts":[[2025,4,28]],"date-time":"2025-04-28T14:48:11Z","timestamp":1745851691000},"page":"1-18","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":1,"title":["EchoSight: Streamlining Bidirectional Virtual-physical Interaction with In-situ Optical Tethering"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-0370-5183","authenticated-orcid":false,"given":"Jingyu","family":"Li","sequence":"first","affiliation":[{"name":"Computer Science, Peking University, Beijing, China"}]},{"ORCID":"https:\/\/orcid.org\/0009-0009-2809-3011","authenticated-orcid":false,"given":"Qingwen","family":"Yang","sequence":"additional","affiliation":[{"name":"Computer Science, Peking University, Beijing, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-3774-644X","authenticated-orcid":false,"given":"Kenuo","family":"Xu","sequence":"additional","affiliation":[{"name":"Computer Science, Peking University, Beijing, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-2472-6968","authenticated-orcid":false,"given":"Yang","family":"Zhang","sequence":"additional","affiliation":[{"name":"Electrical and Computer Engineering, University of California, Los Angeles, Los Angeles, California, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-9171-2596","authenticated-orcid":false,"given":"Chenren","family":"Xu","sequence":"additional","affiliation":[{"name":"Computer Science, Peking University, Beijing, China"}]}],"member":"320","published-online":{"date-parts":[[2025,4,25]]},"reference":[{"key":"e_1_3_3_2_2_2","unstructured":"Ako\u00a0Muhamad Abdullah et\u00a0al. 2017. Advanced encryption standard (AES) algorithm to encrypt and decrypt data. Cryptography and Network Security 16 1 (2017) 11."},{"key":"e_1_3_3_2_3_2","doi-asserted-by":"publisher","DOI":"10.1145\/3332165.3347884"},{"key":"e_1_3_3_2_4_2","doi-asserted-by":"publisher","unstructured":"Syed\u00a0Shah Alam Samiha Susmit Chieh-Yu Lin Mohammad Masukujjaman and Yi-Hui Ho. 2021. Factors Affecting Augmented Reality Adoption in the Retail Industry. Journal of Open Innovation: Technology Market and Complexity 7 2 (2021) 142. 10.3390\/joitmc7020142","DOI":"10.3390\/joitmc7020142"},{"key":"e_1_3_3_2_5_2","doi-asserted-by":"publisher","unstructured":"Sahar Ammar Osama Amin Mohamed-Slim Alouini and Basem Shihada. 2022. Design and Analysis of LCD-Based Modulator for Passive Sunlight Communications. IEEE Photonics Journal 14 5 (2022) 1\u201317. 10.1109\/JPHOT.2022.3200833","DOI":"10.1109\/JPHOT.2022.3200833"},{"key":"e_1_3_3_2_6_2","doi-asserted-by":"publisher","DOI":"10.1109\/ICRoM.2018.8657615"},{"key":"e_1_3_3_2_7_2","unstructured":"Debnath Bhattacharyya Rahul Ranjan Farkhod Alisherov Minkyu Choi et\u00a0al. 2009. Biometric authentication: A review. International Journal of u-and e-Service Science and Technology 2 3 (2009) 13\u201328."},{"key":"e_1_3_3_2_8_2","doi-asserted-by":"publisher","DOI":"10.1145\/1056808.1056884"},{"key":"e_1_3_3_2_9_2","first-page":"1341","volume-title":"20th USENIX Symposium on Networked Systems Design and Implementation (NSDI 23)","author":"Boroushaki Tara","year":"2023","unstructured":"Tara Boroushaki, Maisy Lam, Laura Dodds, Aline Eid, and Fadel Adib. 2023. Augmenting Augmented Reality with Non-Line-of-Sight Perception. In 20th USENIX Symposium on Networked Systems Design and Implementation (NSDI 23). USENIX Association, Boston, MA, 1341\u20131358. https:\/\/www.usenix.org\/conference\/nsdi23\/presentation\/boroushaki"},{"key":"e_1_3_3_2_10_2","doi-asserted-by":"publisher","unstructured":"Paul Brandl Tomislav Juki\u0107 Reinhard Enne Kerstin Schneider-Hornstein and Horst Zimmermann. 2016. Optical Wireless APD Receiver With High Background-Light Immunity for Increased Communication Distances. IEEE Journal of Solid-State Circuits 51 7 (2016) 1663\u20131673. 10.1109\/JSSC.2016.2557815","DOI":"10.1109\/JSSC.2016.2557815"},{"key":"e_1_3_3_2_11_2","doi-asserted-by":"publisher","unstructured":"Christopher\u00a0J. Breshike Christopher\u00a0A. Kendziora Robert Furstenberg Viet Nguyen Andrew Kusterbeck and R.\u00a0Andrew McGill. 2019. Infrared backscatter imaging spectroscopy of trace analytes at standoff. Journal of Applied Physics 125 10 (03 2019) 104901. 10.1063\/1.5079622","DOI":"10.1063\/1.5079622"},{"key":"e_1_3_3_2_12_2","doi-asserted-by":"publisher","DOI":"10.1145\/3570361.3614081"},{"key":"e_1_3_3_2_13_2","doi-asserted-by":"publisher","DOI":"10.1109\/ICRA48506.2021.9561144"},{"key":"e_1_3_3_2_14_2","doi-asserted-by":"publisher","unstructured":"Gaige Chen Pei Wang Bo Feng Yihui Li and Dekun Liu. 2020. The framework design of smart factory in discrete manufacturing industry based on cyber-physical system. International Journal of Computer Integrated Manufacturing 33 1 (2020) 79\u2013101. 10.1080\/0951192X.2019.1699254","DOI":"10.1080\/0951192X.2019.1699254"},{"key":"e_1_3_3_2_15_2","doi-asserted-by":"publisher","DOI":"10.1002\/047168659X"},{"key":"e_1_3_3_2_16_2","doi-asserted-by":"publisher","unstructured":"Denis\u00a0C. Daly and Anantha\u00a0P. Chandrakasan. 2007. An Energy-Efficient OOK Transceiver for Wireless Sensor Networks. IEEE Journal of Solid-State Circuits 42 5 (2007) 1003\u20131011. 10.1109\/JSSC.2007.894323","DOI":"10.1109\/JSSC.2007.894323"},{"key":"e_1_3_3_2_17_2","doi-asserted-by":"publisher","DOI":"10.1145\/3586183.3606758"},{"key":"e_1_3_3_2_18_2","doi-asserted-by":"publisher","DOI":"10.1145\/3654777.3676379"},{"key":"e_1_3_3_2_19_2","doi-asserted-by":"publisher","DOI":"10.1145\/3491102.3501951"},{"key":"e_1_3_3_2_20_2","doi-asserted-by":"publisher","DOI":"10.1145\/3491101.3519911"},{"key":"e_1_3_3_2_21_2","doi-asserted-by":"publisher","DOI":"10.1145\/3025453.3025599"},{"key":"e_1_3_3_2_22_2","doi-asserted-by":"publisher","DOI":"10.1145\/3290607.3312847"},{"key":"e_1_3_3_2_23_2","doi-asserted-by":"publisher","DOI":"10.1145\/3430524.3440645"},{"key":"e_1_3_3_2_24_2","doi-asserted-by":"publisher","DOI":"10.1145\/3544216.3544255"},{"key":"e_1_3_3_2_25_2","volume-title":"The elliptic curve diffie-hellman (ecdh)","author":"Haakegaard Rakel","year":"2005","unstructured":"Rakel Haakegaard and Joanna Lang. 2005. The elliptic curve diffie-hellman (ecdh). University of California, Santa Barbara. Retrieved Feburary 2, 2025 from https:\/\/koclab.cs.ucsb.edu\/teaching\/ecc\/project\/2015Projects\/Haakegaard+Lang.pdf"},{"key":"e_1_3_3_2_26_2","doi-asserted-by":"publisher","unstructured":"Charles Herder Meng-Day Yu Farinaz Koushanfar and Srinivas Devadas. 2014. Physical Unclonable Functions and Applications: A Tutorial. Proc. IEEE 102 8 (2014) 1126\u20131141. 10.1109\/JPROC.2014.2320516","DOI":"10.1109\/JPROC.2014.2320516"},{"key":"e_1_3_3_2_27_2","doi-asserted-by":"publisher","DOI":"10.1145\/3411764.3445298"},{"key":"e_1_3_3_2_28_2","doi-asserted-by":"publisher","DOI":"10.1145\/3586183.3606727"},{"key":"e_1_3_3_2_29_2","doi-asserted-by":"publisher","DOI":"10.1145\/3411763.3451844"},{"key":"e_1_3_3_2_30_2","doi-asserted-by":"publisher","DOI":"10.1145\/3526113.3545626"},{"key":"e_1_3_3_2_31_2","doi-asserted-by":"publisher","DOI":"10.1007\/978-0-387-27712-7"},{"key":"e_1_3_3_2_32_2","doi-asserted-by":"publisher","DOI":"10.1145\/3654777.3676327"},{"key":"e_1_3_3_2_33_2","doi-asserted-by":"publisher","unstructured":"Juhee Lee. 2022. Problem-based gaming via an augmented reality mobile game and a printed game in foreign language education. Education and Information Technologies 27 1 (2022) 743\u2013771. 10.1007\/s10639-020-10391-1","DOI":"10.1007\/s10639-020-10391-1"},{"key":"e_1_3_3_2_34_2","doi-asserted-by":"publisher","DOI":"10.1145\/3491102.3517451"},{"key":"e_1_3_3_2_35_2","doi-asserted-by":"publisher","unstructured":"Chengxi Li Pai Zheng Shufei Li Yatming Pang and Carman\u00a0K.M. Lee. 2022. AR-assisted digital twin-enabled robot collaborative manufacturing system with human-in-the-loop. Robotics and Computer-Integrated Manufacturing 76 (2022) 102321. 10.1016\/j.rcim.2022.102321","DOI":"10.1016\/j.rcim.2022.102321"},{"key":"e_1_3_3_2_36_2","doi-asserted-by":"publisher","DOI":"10.1145\/3613904.3642846"},{"key":"e_1_3_3_2_37_2","doi-asserted-by":"publisher","DOI":"10.1145\/3613904.3642064"},{"key":"e_1_3_3_2_38_2","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-45809-312"},{"key":"e_1_3_3_2_39_2","doi-asserted-by":"publisher","DOI":"10.1109\/ICARSC61747.2024.10535948"},{"key":"e_1_3_3_2_40_2","doi-asserted-by":"publisher","unstructured":"Thomas\u00a0D. Novlan Harpreet\u00a0S. Dhillon and Jeffrey\u00a0G. Andrews. 2013. Analytical Modeling of Uplink Cellular Networks. IEEE Transactions on Wireless Communications 12 6 (2013) 2669\u20132679. 10.1109\/TWC.2013.050613.120325","DOI":"10.1109\/TWC.2013.050613.120325"},{"key":"e_1_3_3_2_41_2","doi-asserted-by":"publisher","DOI":"10.1145\/1978942.1979384"},{"key":"e_1_3_3_2_42_2","doi-asserted-by":"publisher","unstructured":"David Pointcheval and Jacques Stern. 2000. Security Arguments for Digital Signatures and Blind Signatures. Journal of Cryptology 13 3 (2000) 361\u2013396. 10.1007\/s001450010003","DOI":"10.1007\/s001450010003"},{"key":"e_1_3_3_2_43_2","doi-asserted-by":"publisher","unstructured":"Wasiu\u00a0O. Popoola Enrique Poves and Harald Haas. 2012. Spatial Pulse Position Modulation for Optical Communications. Journal of Lightwave Technology 30 18 (2012) 2948\u20132954. 10.1109\/JLT.2012.2208940","DOI":"10.1109\/JLT.2012.2208940"},{"key":"e_1_3_3_2_44_2","doi-asserted-by":"publisher","DOI":"10.1145\/3491102.3517486"},{"key":"e_1_3_3_2_45_2","first-page":"1","volume-title":"2009 International Conference on Control, Automation, Communication and Energy Conservation","author":"Rudrappa K.M.","year":"2009","unstructured":"K.M. Rudrappa, H.\u00a0D. Maheshappa, C. Puttamadappa, K. Somashekar, and K.S. Venkatesh\u00a0Prasad. 2009. Implementing RC5 protocol for remote control applications. In 2009 International Conference on Control, Automation, Communication and Energy Conservation. IEEE, Perundurai, India, 1\u20136."},{"key":"e_1_3_3_2_46_2","doi-asserted-by":"publisher","DOI":"10.1145\/3411764.3445255"},{"key":"e_1_3_3_2_47_2","volume-title":"Role-based Access Control","author":"Sandhu Ravi\u00a0S.","year":"1997","unstructured":"Ravi\u00a0S. Sandhu. 1997. Role-based Access Control. George Mason University. Retrieved Feburary 2, 2025 from https:\/\/profsandhu.com\/articles\/advcom\/a98rbac.pdf"},{"key":"e_1_3_3_2_48_2","doi-asserted-by":"publisher","DOI":"10.1145\/3173574.3173681"},{"key":"e_1_3_3_2_49_2","doi-asserted-by":"publisher","unstructured":"Jannis Strecker Khakim Akhunov Federico Carbone Kimberly Garc\u00eda Kenan Bekta\u015f Andres Gomez Simon Mayer and Kasim\u00a0Sinan Yildirim. 2023. MR Object Identification and Interaction: Fusing Object Situation Information from Heterogeneous Sources. Proc. ACM Interact. Mob. Wearable Ubiquitous Technol. 7 3 Article 124 (Sept. 2023) 26\u00a0pages. 10.1145\/3610879","DOI":"10.1145\/3610879"},{"key":"e_1_3_3_2_50_2","doi-asserted-by":"publisher","unstructured":"Yong-Chin Tan Sandeep\u00a0R. Chandukala and Srinivas\u00a0K. Reddy. 2022. Augmented Reality in Retail and Its Impact on Sales. Journal of Marketing 86 1 (2022) 48\u201366. 10.1177\/0022242921995449","DOI":"10.1177\/0022242921995449"},{"key":"e_1_3_3_2_51_2","doi-asserted-by":"publisher","unstructured":"Bruce\u00a0H. Thomas. 2012. A survey of visual mixed and augmented reality gaming. Comput. Entertain. 10 1 Article 3 (Dec. 2012) 33\u00a0pages. 10.1145\/2381876.2381879","DOI":"10.1145\/2381876.2381879"},{"key":"e_1_3_3_2_52_2","doi-asserted-by":"publisher","DOI":"10.1145\/2973750.2973772"},{"key":"e_1_3_3_2_53_2","doi-asserted-by":"publisher","unstructured":"Nguyen Van\u00a0Huynh Dinh\u00a0Thai Hoang Xiao Lu Dusit Niyato Ping Wang and Dong\u00a0In Kim. 2018. Ambient Backscatter Communications: A Contemporary Survey. IEEE Communications Surveys & Tutorials 20 4 (2018) 2889\u20132922. 10.1109\/COMST.2018.2841964","DOI":"10.1109\/COMST.2018.2841964"},{"key":"e_1_3_3_2_54_2","doi-asserted-by":"publisher","DOI":"10.1109\/ISMAR.2008.4637338"},{"key":"e_1_3_3_2_55_2","doi-asserted-by":"publisher","unstructured":"Daniel Wagner Gerhard Reitmayr Alessandro Mulloni Tom Drummond and Dieter Schmalstieg. 2010. Real-Time Detection and Tracking for Augmented Reality on Mobile Phones. IEEE Transactions on Visualization and Computer Graphics 16 3 (2010) 355\u2013368. 10.1109\/TVCG.2009.99","DOI":"10.1109\/TVCG.2009.99"},{"key":"e_1_3_3_2_56_2","doi-asserted-by":"publisher","DOI":"10.1109\/ART.2003.1320418"},{"key":"e_1_3_3_2_57_2","first-page":"139","volume-title":"12th Computer Vision Winter Workshop 07","author":"Wagner Daniel","year":"2007","unstructured":"Daniel Wagner and Dieter Schmalstieg. 2007. ARToolKitPlus for Pose Tracking on Mobile Devices. In 12th Computer Vision Winter Workshop 07. Technische Universit\u00e4t Graz, Graz, Austria, 139\u2013146. Computer Vision Winter Workshop : CVWW 2007, CVWW 2007 ; Conference date: 06-02-2007 Through 08-02-2007."},{"key":"e_1_3_3_2_58_2","doi-asserted-by":"publisher","DOI":"10.1145\/3403676.3404349"},{"key":"e_1_3_3_2_59_2","doi-asserted-by":"publisher","DOI":"10.1145\/3372224.3380883"},{"key":"e_1_3_3_2_60_2","doi-asserted-by":"publisher","unstructured":"Xue Wang and Yang Zhang. 2024. TextureSight: Texture Detection for Routine Activity Awareness with Wearable Laser Speckle Imaging. Proc. ACM Interact. Mob. Wearable Ubiquitous Technol. 7 4 Article 184 (Jan. 2024) 27\u00a0pages. 10.1145\/3631413","DOI":"10.1145\/3631413"},{"key":"e_1_3_3_2_61_2","doi-asserted-by":"publisher","DOI":"10.1145\/3411764.3445552"},{"key":"e_1_3_3_2_62_2","doi-asserted-by":"publisher","unstructured":"W. Weber. 1978. Differential Encoding for Multiple Amplitude and Phase Shift Keying Systems. IEEE Transactions on Communications 26 3 (1978) 385\u2013391. 10.1109\/TCOM.1978.1094074","DOI":"10.1109\/TCOM.1978.1094074"},{"key":"e_1_3_3_2_63_2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-31912-920"},{"key":"e_1_3_3_2_64_2","doi-asserted-by":"publisher","DOI":"10.1145\/3387514.3406229"},{"key":"e_1_3_3_2_65_2","doi-asserted-by":"publisher","DOI":"10.1145\/3526114.3558721"},{"key":"e_1_3_3_2_66_2","doi-asserted-by":"publisher","DOI":"10.1145\/3117811.3117843"},{"key":"e_1_3_3_2_67_2","doi-asserted-by":"publisher","DOI":"10.1145\/3491102.3517666"},{"key":"e_1_3_3_2_68_2","doi-asserted-by":"publisher","DOI":"10.1145\/3544548.3581344"},{"key":"e_1_3_3_2_69_2","doi-asserted-by":"publisher","DOI":"10.1145\/3332165.3347954"},{"key":"e_1_3_3_2_70_2","doi-asserted-by":"publisher","unstructured":"Xiaoying Yang Jacob Sayono Jess Xu Jiahao\u00a0Nick Li Josiah Hester and Yang Zhang. 2022. MiniKers: Interaction-Powered Smart Environment Automation. Proc. ACM Interact. Mob. Wearable Ubiquitous Technol. 6 3 Article 149 (Sept. 2022) 22\u00a0pages. 10.1145\/3550287","DOI":"10.1145\/3550287"},{"key":"e_1_3_3_2_71_2","doi-asserted-by":"publisher","DOI":"10.1145\/3491102.3517689"},{"key":"e_1_3_3_2_72_2","doi-asserted-by":"publisher","DOI":"10.1145\/3613904.3642527"},{"key":"e_1_3_3_2_73_2","doi-asserted-by":"publisher","unstructured":"Steve Chi-Yin Yuen Gallayanee Yaoyuneyong and Erik Johnson. 2011. Augmented reality: An overview and five directions for AR in education. Journal of Educational Technology Development and Exchange (JETDE) 4 1 (2011) 11. 10.18785\/jetde.0401.10","DOI":"10.18785\/jetde.0401.10"},{"key":"e_1_3_3_2_74_2","doi-asserted-by":"publisher","unstructured":"Tengxiang Zhang Zitong Lan Chenren Xu Yanrong Li and Yiqiang Chen. 2023. BLEselect: Gestural IoT Device Selection via Bluetooth Angle of Arrival Estimation from Smart Glasses. Proc. ACM Interact. Mob. Wearable Ubiquitous Technol. 6 4 Article 198 (Jan. 2023) 28\u00a0pages. 10.1145\/3569482","DOI":"10.1145\/3569482"},{"key":"e_1_3_3_2_75_2","doi-asserted-by":"publisher","DOI":"10.1145\/3491102.3517479"},{"key":"e_1_3_3_2_76_2","doi-asserted-by":"publisher","DOI":"10.1145\/3313831.3376233"},{"key":"e_1_3_3_2_77_2","doi-asserted-by":"publisher","DOI":"10.1145\/3526113.3545668"}],"event":{"name":"CHI 2025: CHI Conference on Human Factors in Computing Systems","sponsor":["SIGCHI ACM Special Interest Group on Computer-Human Interaction"],"location":"Yokohama Japan","acronym":"CHI '25"},"container-title":["Proceedings of the 2025 CHI Conference on Human Factors in Computing Systems"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3706598.3713925","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3706598.3713925","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,7,4]],"date-time":"2025-07-04T05:20:49Z","timestamp":1751606449000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3706598.3713925"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,4,25]]},"references-count":76,"alternative-id":["10.1145\/3706598.3713925","10.1145\/3706598"],"URL":"https:\/\/doi.org\/10.1145\/3706598.3713925","relation":{},"subject":[],"published":{"date-parts":[[2025,4,25]]},"assertion":[{"value":"2025-04-25","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}