{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,26]],"date-time":"2025-03-26T09:25:13Z","timestamp":1742981113936,"version":"3.40.3"},"publisher-location":"Cham","reference-count":18,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030953904"},{"type":"electronic","value":"9783030953911"}],"license":[{"start":{"date-parts":[[2022,1,1]],"date-time":"2022-01-01T00:00:00Z","timestamp":1640995200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2022,1,1]],"date-time":"2022-01-01T00:00:00Z","timestamp":1640995200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2022]]},"DOI":"10.1007\/978-3-030-95391-1_21","type":"book-chapter","created":{"date-parts":[[2022,2,22]],"date-time":"2022-02-22T09:04:54Z","timestamp":1645520694000},"page":"331-345","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Sensor Data Normalization Among Heterogeneous Smartphones for\u00a0Implicit Authentication"],"prefix":"10.1007","author":[{"given":"Zuodong","family":"Jin","sequence":"first","affiliation":[]},{"given":"Muyan","family":"Yao","sequence":"additional","affiliation":[]},{"given":"Dan","family":"Tao","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2022,2,23]]},"reference":[{"issue":"4","key":"21_CR1","doi-asserted-by":"publisher","first-page":"49","DOI":"10.1109\/MSP.2016.2555335","volume":"33","author":"VM Patel","year":"2016","unstructured":"Patel, V.M., et al.: Continuous user authentication on mobile devices: recent progress and remaining challenges. IEEE Signal Process. Mag. 33(4), 49\u201361 (2016)","journal-title":"IEEE Signal Process. Mag."},{"key":"21_CR2","doi-asserted-by":"publisher","unstructured":"Ye, G., Tang, Z., et al.: A video-based attack for android pattern lock. ACM Trans. Priv. Secur. (TOPS) 2018 21, 1\u201331. https:\/\/doi.org\/10.1145\/3230740","DOI":"10.1145\/3230740"},{"key":"21_CR3","doi-asserted-by":"publisher","unstructured":"Shi, D., Tao, D., et al.: Fine-grained and context-aware behavioral biometrics for pattern lock on smartphones. In: Proceedings of the ACM on Interactive, Mobile, Wearable and Ubiquitous Technologies (IMWUT) 2021, vol. 5, pp. 1\u201330 (2021). https:\/\/doi.org\/10.1145\/3448080","DOI":"10.1145\/3448080"},{"key":"21_CR4","doi-asserted-by":"publisher","unstructured":"Khan, H., Hengartner, U.: Towards application-centric implicit authentication on smartphones. In: Proceedings of the 15th Workshop on Mobile Computing Systems and Applications 2014, Article 10, 6 p. (2014) https:\/\/doi.org\/10.1145\/2565585.2565590","DOI":"10.1145\/2565585.2565590"},{"key":"21_CR5","doi-asserted-by":"publisher","unstructured":"Sitov\u00e1, Z., \u0160ed\u011bnka, J., et al.: New behavioral biometric features for continuous authentication of smartphone users. IEEE Trans. Inf. Forensics Secur. 11, 877\u2013892 (2016). https:\/\/doi.org\/10.1109\/TIFS.2015.2506542","DOI":"10.1109\/TIFS.2015.2506542"},{"issue":"6","key":"21_CR6","first-page":"19","volume":"54","author":"GY Xu","year":"2018","unstructured":"Xu, G.Y., et al.: Overview of implicit identity authentication mechanisms for mobile terminals. Comput. Eng. Appl. 54(6), 19\u201325 (2018)","journal-title":"Comput. Eng. Appl."},{"key":"21_CR7","doi-asserted-by":"publisher","unstructured":"Zhang, Y.T., Hu, W., et al.: Continuous authentication using eye movement response of implicit visual stimuli. ACM Interact. Mob. Wearable Ubiquit. Technol. 1, 22 (2018). https:\/\/doi.org\/10.1145\/3161410","DOI":"10.1145\/3161410"},{"key":"21_CR8","doi-asserted-by":"publisher","unstructured":"Vhaduri, S., Poellabauer, C.: Multi-modal biometric-based implicit authentication of wearable device users. In: IEEE Trans. Inf. Forensics Secur., 10 (2018). https:\/\/doi.org\/10.1109\/TIFS.2019.2911170","DOI":"10.1109\/TIFS.2019.2911170"},{"key":"21_CR9","doi-asserted-by":"publisher","unstructured":"Shi, D., Tao, D.: Sensor fusion based implicit authentication for smartphones. In: 14th China Conference on Internet of Things (Wireless Sensor Network), pp. 157\u2013168 (2020). https:\/\/doi.org\/10.1007\/978-981-33-4214-9_12","DOI":"10.1007\/978-981-33-4214-9_12"},{"key":"21_CR10","doi-asserted-by":"publisher","first-page":"128","DOI":"10.1016\/j.jnca.2015.03.006","volume":"53","author":"CL Liu","year":"2015","unstructured":"Liu, C.L., et al.: Implementing multiple biometric features for a recall-based graphical keystroke dynamics authentication system on a smart phone. J. Netw. Comput. Appl. 53, 128\u2013139 (2015)","journal-title":"J. Netw. Comput. Appl."},{"issue":"7","key":"21_CR11","doi-asserted-by":"publisher","first-page":"1443","DOI":"10.1162\/089976601750264965","volume":"13","author":"B Scholkopf","year":"2001","unstructured":"Scholkopf, B., et al.: Estimating the support of a high-dimensional distribution. Neural Comput. 13(7), 1443\u20131471 (2001)","journal-title":"Neural Comput."},{"key":"21_CR12","doi-asserted-by":"publisher","unstructured":"Ott, F., Wehbi, M., et al.: The OnHW dataset: online handwriting recognition from IMU-enhanced ballpoint pens with machine learning. In: Proceedings of the ACM on Interactive, Mobile, Wearable and Ubiquitous Technologies, vol. 4, pp. 1\u201320 (2020). https:\/\/doi.org\/10.1145\/3411842","DOI":"10.1145\/3411842"},{"key":"21_CR13","doi-asserted-by":"publisher","unstructured":"Shi, Y.L., et al.: Ready, steady, touch! Sensing physical contact with a finger-mounted IMU. In: Proceedings of the ACM on Interactive Mobile Wearable and Ubiquitous Technologies, vol. 4, pp. 1\u201325 (2020). https:\/\/doi.org\/10.1145\/3397309","DOI":"10.1145\/3397309"},{"key":"21_CR14","unstructured":"Zhang, Y.B.: Research on user behavior recognition model based on sensor data. Master dissertation, University of Electronic Science and Technology of China (UESTC), Chengdu (2020)"},{"issue":"24","key":"21_CR15","first-page":"81","volume":"43","author":"H Wei","year":"2020","unstructured":"Wei, H., et al.: Implementation of improved adaptive complementary filtering MEMS-IMU attitude calculation. Electron. Meas. Technol. 43(24), 81\u201386 (2020)","journal-title":"Electron. Meas. Technol."},{"issue":"11","key":"21_CR16","first-page":"19","volume":"46","author":"MY Yao","year":"2020","unstructured":"Yao, M.Y., et al.: Implicit identity authentication mechanism of smartphone pattern password based on up-sampling single classification. Comput. Sci. 46(11), 19\u201324 (2020)","journal-title":"Comput. Sci."},{"key":"21_CR17","unstructured":"Liu, B.Y.: Smart phone identity authentication based on gesture recognition. Master dissertation, Beijing Jiaotong University, Beijing (2018)"},{"key":"21_CR18","doi-asserted-by":"publisher","unstructured":"Zheng, Z., et al.: A fused method of machine learning and dynamic time warping for road anomalies detection. IEEE Trans. Intell. Transp. Syst., 1\u201313 (2020). https:\/\/doi.org\/10.1109\/TITS.2020.3016288","DOI":"10.1109\/TITS.2020.3016288"}],"container-title":["Lecture Notes in Computer Science","Algorithms and Architectures for Parallel Processing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-95391-1_21","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,2,22]],"date-time":"2022-02-22T09:08:46Z","timestamp":1645520926000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-030-95391-1_21"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022]]},"ISBN":["9783030953904","9783030953911"],"references-count":18,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-95391-1_21","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2022]]},"assertion":[{"value":"23 February 2022","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ICA3PP","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Algorithms and Architectures for Parallel Processing","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2021","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"3 December 2021","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"5 December 2021","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"21","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"ica3pp2021","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/nsclab.org\/ica3pp2021\/index.html","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Single-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"EasyChair","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"403","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"145","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"0","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"36% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3.12","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"2.27","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Yes","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}