“…(3) The paper had to propose an authentication scheme. Specifically, the paper had to use machine learning to label [12], [33], [41], [42] IMWUT/UbiComp [11], [20], [25], [35], [48] INFOCOM [8], [36], [45], [51], [53] MobiCom [15], [32] MobiSys [7], [31] NDSS [5], [17], [49], [50] Pattern Recognition [2], [9], [18], [24], [38], [40], [54]…”