{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,4,16]],"date-time":"2025-04-16T05:40:05Z","timestamp":1744782005633,"version":"3.40.3"},"publisher-location":"Cham","reference-count":37,"publisher":"Springer Nature Switzerland","isbn-type":[{"type":"print","value":"9783031646072"},{"type":"electronic","value":"9783031646089"}],"license":[{"start":{"date-parts":[[2024,1,1]],"date-time":"2024-01-01T00:00:00Z","timestamp":1704067200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2024,1,1]],"date-time":"2024-01-01T00:00:00Z","timestamp":1704067200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2024]]},"DOI":"10.1007\/978-3-031-64608-9_12","type":"book-chapter","created":{"date-parts":[[2024,7,1]],"date-time":"2024-07-01T05:01:59Z","timestamp":1719810119000},"page":"186-197","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["Elevating Wearable Sensor Authentication with\u00a0Hybrid Deep Learning and\u00a0Squeeze-and-Excitation"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-3735-4262","authenticated-orcid":false,"given":"Sakorn","family":"Mekruksavanich","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-5249-2786","authenticated-orcid":false,"given":"Anuchit","family":"Jitpattanakul","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2024,7,2]]},"reference":[{"issue":"1","key":"12_CR1","doi-asserted-by":"publisher","first-page":"273","DOI":"10.1016\/j.aej.2020.08.006","volume":"60","author":"MW Abo El-Soud","year":"2021","unstructured":"Abo El-Soud, M.W., Gaber, T., AlFayez, F., Eltoukhy, M.M.: Implicit authentication method for smartphone users based on rank aggregation and random forest. Alex. Eng. J. 60(1), 273\u2013283 (2021). https:\/\/doi.org\/10.1016\/j.aej.2020.08.006","journal-title":"Alex. Eng. J."},{"key":"12_CR2","doi-asserted-by":"publisher","unstructured":"Baig, A.F., Eskeland, S., Yang, B.: Novel and efficient privacy-preserving continuous authentication. Cryptography 8(1) (2024). https:\/\/doi.org\/10.3390\/cryptography8010003","DOI":"10.3390\/cryptography8010003"},{"key":"12_CR3","doi-asserted-by":"publisher","unstructured":"Bimbot, F., et al.: A tutorial on text-independent speaker verification. EURASIP J. Adv. Signal Process. 2004, 430-451 (2004). https:\/\/doi.org\/10.1155\/S1110865704310024","DOI":"10.1155\/S1110865704310024"},{"key":"12_CR4","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"97","DOI":"10.1007\/978-3-642-21726-5_7","volume-title":"Pervasive Computing","author":"S Buthpitiya","year":"2011","unstructured":"Buthpitiya, S., Zhang, Y., Dey, A.K., Griss, M.: n-gram geo-trace modeling. In: Lyons, K., Hightower, J., Huang, E.M. (eds.) Pervasive 2011. LNCS, vol. 6696, pp. 97\u2013114. Springer, Heidelberg (2011). https:\/\/doi.org\/10.1007\/978-3-642-21726-5_7"},{"key":"12_CR5","doi-asserted-by":"publisher","unstructured":"Chen, L., Zhang, H., Xiao, J., Nie, L., Shao, J., Liu, W., Chua, T.: Sca-cnn: spatial and channel-wise attention in convolutional networks for image captioning. In: 2017 IEEE Conference on Computer Vision and Pattern Recognition (CVPR), pp. 6298\u20136306. IEEE Computer Society, Los Alamitos, CA, USA (2017). https:\/\/doi.org\/10.1109\/CVPR.2017.667","DOI":"10.1109\/CVPR.2017.667"},{"key":"12_CR6","doi-asserted-by":"publisher","unstructured":"Choi, J., Choi, S., Kang, T.: Smartphone authentication system using personal gaits and a deep learning model. Sensors 23(14) (2023). https:\/\/doi.org\/10.3390\/s23146395","DOI":"10.3390\/s23146395"},{"key":"12_CR7","doi-asserted-by":"publisher","unstructured":"Dama\u0161evi\u010dius, R., Vasiljevas, M., Salkevicius, J., Wo\u017aniak, M.: Human activity recognition in aal environments using random projections. Comput. Math. Methods Med. 2016, 1\u201317 (2016). https:\/\/doi.org\/10.1155\/2016\/4073584","DOI":"10.1155\/2016\/4073584"},{"key":"12_CR8","doi-asserted-by":"publisher","unstructured":"Fathy, M.E., Patel, V.M., Chellappa, R.: Face-based active authentication on mobile devices. In: 2015 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1687\u20131691 (2015). https:\/\/doi.org\/10.1109\/ICASSP.2015.7178258","DOI":"10.1109\/ICASSP.2015.7178258"},{"key":"12_CR9","doi-asserted-by":"publisher","first-page":"25","DOI":"10.1016\/j.patcog.2017.09.005","volume":"74","author":"M Gadaleta","year":"2018","unstructured":"Gadaleta, M., Rossi, M.: Idnet: smartphone-based gait recognition with convolutional neural networks. Pattern Recogn. 74, 25\u201337 (2018). https:\/\/doi.org\/10.1016\/j.patcog.2017.09.005","journal-title":"Pattern Recogn."},{"key":"12_CR10","doi-asserted-by":"publisher","first-page":"157","DOI":"10.1016\/j.patrec.2021.03.010","volume":"147","author":"G Giorgi","year":"2021","unstructured":"Giorgi, G., Saracino, A., Martinelli, F.: Using recurrent neural networks for continuous authentication through gait analysis. Pattern Recogn. Lett. 147, 157\u2013163 (2021). https:\/\/doi.org\/10.1016\/j.patrec.2021.03.010","journal-title":"Pattern Recogn. Lett."},{"key":"12_CR11","doi-asserted-by":"publisher","unstructured":"Hinton, G.E., Osindero, S., Teh, Y.W.: A fast learning algorithm for deep belief nets. Neural Comput. 18(7), 1527-1554 (2006). https:\/\/doi.org\/10.1162\/neco.2006.18.7.1527","DOI":"10.1162\/neco.2006.18.7.1527"},{"key":"12_CR12","doi-asserted-by":"publisher","unstructured":"Hu, J., Shen, L., Sun, G.: Squeeze-and-excitation networks. In: 2018 IEEE\/CVF Conference on Computer Vision and Pattern Recognition, pp. 7132\u20137141 (2018). https:\/\/doi.org\/10.1109\/CVPR.2018.00745","DOI":"10.1109\/CVPR.2018.00745"},{"issue":"1","key":"12_CR13","doi-asserted-by":"publisher","first-page":"221","DOI":"10.1109\/TPAMI.2012.59","volume":"35","author":"S Ji","year":"2013","unstructured":"Ji, S., Xu, W., Yang, M., Yu, K.: 3d convolutional neural networks for human action recognition. IEEE Trans. Pattern Anal. Mach. Intell. 35(1), 221\u2013231 (2013). https:\/\/doi.org\/10.1109\/TPAMI.2012.59","journal-title":"IEEE Trans. Pattern Anal. Mach. Intell."},{"key":"12_CR14","doi-asserted-by":"publisher","unstructured":"Karpathy, A., Toderici, G., Shetty, S., Leung, T., Sukthankar, R., Fei-Fei, L.: Large-scale video classification with convolutional neural networks. In: 2014 IEEE Conference on Computer Vision and Pattern Recognition, pp. 1725\u20131732 (2014). https:\/\/doi.org\/10.1109\/CVPR.2014.223","DOI":"10.1109\/CVPR.2014.223"},{"key":"12_CR15","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"307","DOI":"10.1007\/978-3-030-58802-1_23","volume-title":"Computational Science and Its Applications \u2013 ICCSA 2020","author":"K Ka\u0161ys","year":"2020","unstructured":"Ka\u0161ys, K., Dundulis, A., Vasiljevas, M., Maskeli\u016bnas, R., Dama\u0161evi\u010dius, R.: BodyLock: human identity recogniser app from walking activity data. In: Gervasi, O., et al. (eds.) ICCSA 2020. LNCS, vol. 12250, pp. 307\u2013319. Springer, Cham (2020). https:\/\/doi.org\/10.1007\/978-3-030-58802-1_23"},{"key":"12_CR16","doi-asserted-by":"publisher","first-page":"32554","DOI":"10.1109\/ACCESS.2018.2841347","volume":"6","author":"Y Li","year":"2018","unstructured":"Li, Y., Hu, H., Zhou, G., Deng, S.: Sensor-based continuous authentication using cost-effective kernel ridge regression. IEEE Access 6, 32554\u201332565 (2018). https:\/\/doi.org\/10.1109\/ACCESS.2018.2841347","journal-title":"IEEE Access"},{"key":"12_CR17","doi-asserted-by":"publisher","unstructured":"Mantyjarvi, J., Lindholm, M., Vildjiounaite, E., Makela, S.M., Ailisto, H.: Identifying users of portable devices from gait pattern with accelerometers. In: Proceedings. (ICASSP2005). IEEE International Conference on Acoustics, Speech, and Signal Processing, 2005, vol.\u00a02, pp. ii\/973\u2013ii\/976 (2005). https:\/\/doi.org\/10.1109\/ICASSP.2005.1415569","DOI":"10.1109\/ICASSP.2005.1415569"},{"key":"12_CR18","doi-asserted-by":"publisher","unstructured":"Martinovic, I., Rasmussen, K., Roeschlin, M., Tsudik, G.: Authentication using pulse-response biometrics. Commun. ACM 60(2), 108-115 (2017). https:\/\/doi.org\/10.1145\/3023359","DOI":"10.1145\/3023359"},{"key":"12_CR19","doi-asserted-by":"publisher","unstructured":"Mekruksavanich, S., Jitpattanakul, A.: Deep residual network for smartwatch-based user identification through complex hand movements. Sensors 22(8) (2022). https:\/\/doi.org\/10.3390\/s22083094","DOI":"10.3390\/s22083094"},{"key":"12_CR20","doi-asserted-by":"publisher","unstructured":"Mekruksavanich, S., Jitpattanakul, A.: Fallnext: a deep residual model based on multi-branch aggregation for sensor-based fall detection. ECTI Trans. Comput. Inform. Technol. (ECTI-CIT) 16(4), 352-364 (2022). https:\/\/doi.org\/10.37936\/ecti-cit.2022164.248156","DOI":"10.37936\/ecti-cit.2022164.248156"},{"key":"12_CR21","doi-asserted-by":"publisher","unstructured":"Muaaz, M., Mayrhofer, R.: An analysis of different approaches to gait recognition using cell phone based accelerometers. In: Proceedings of International Conference on Advances in Mobile Computing & Multimedia,MoMM 2013. pp. 293-300. Association for Computing Machinery, New York (2013). https:\/\/doi.org\/10.1145\/2536853.2536895","DOI":"10.1145\/2536853.2536895"},{"issue":"11","key":"12_CR22","doi-asserted-by":"publisher","first-page":"3209","DOI":"10.1109\/TMC.2017.2686855","volume":"16","author":"M Muaaz","year":"2017","unstructured":"Muaaz, M., Mayrhofer, R.: Smartphone-based gait recognition: from authentication to imitation. IEEE Trans. Mob. Comput. 16(11), 3209\u20133221 (2017). https:\/\/doi.org\/10.1109\/TMC.2017.2686855","journal-title":"IEEE Trans. Mob. Comput."},{"key":"12_CR23","doi-asserted-by":"publisher","unstructured":"Nickel, C., Busch, C., Rangarajan, S., M\u00f6bius, M.: Using hidden markov models for accelerometer-based biometric gait recognition. In: 2011 IEEE 7th International Colloquium on Signal Processing and its Applications, pp. 58\u201363 (2011). https:\/\/doi.org\/10.1109\/CSPA.2011.5759842","DOI":"10.1109\/CSPA.2011.5759842"},{"key":"12_CR24","doi-asserted-by":"publisher","unstructured":"Nickel, C., Wirtl, T., Busch, C.: Authentication of smartphone users based on the way they walk using k-nn algorithm. In: 2012 Eighth International Conference on Intelligent Information Hiding and Multimedia Signal Processing, pp. 16\u201320 (2012). https:\/\/doi.org\/10.1109\/IIH-MSP.2012.11","DOI":"10.1109\/IIH-MSP.2012.11"},{"key":"12_CR25","doi-asserted-by":"publisher","DOI":"10.1016\/j.smhl.2020.100162","volume":"19","author":"I Papavasileiou","year":"2021","unstructured":"Papavasileiou, I., Qiao, Z., Zhang, C., Zhang, W., Bi, J., Han, S.: Gaitcode: gait-based continuous authentication using multimodal learning and wearable sensors. Smart Health 19, 100162 (2021). https:\/\/doi.org\/10.1016\/j.smhl.2020.100162","journal-title":"Smart Health"},{"key":"12_CR26","doi-asserted-by":"publisher","unstructured":"Peinado-Contreras, A., Munoz-Organero, M.: Gait-based identification using deep recurrent neural networks and acceleration patterns. Sensors 20(23) (2020). https:\/\/doi.org\/10.3390\/s20236900","DOI":"10.3390\/s20236900"},{"key":"12_CR27","doi-asserted-by":"publisher","unstructured":"Qi, M., Lu, Y., Li, J., Li, X., Kong, J.: User-specific iris authentication based on feature selection. In: 2008 International Conference on Computer Science and Software Engineering, vol.\u00a01, pp. 1040\u20131043 (2008). https:\/\/doi.org\/10.1109\/CSSE.2008.1060","DOI":"10.1109\/CSSE.2008.1060"},{"key":"12_CR28","doi-asserted-by":"publisher","unstructured":"Shabrina, N., Isshiki, T., Kunieda, H.: Fingerprint authentication on touch sensor using phase-only correlation method. In: 2016 7th International Conference of Information and Communication Technology for Embedded Systems (IC-ICTES), pp. 85\u201389 (2016). https:\/\/doi.org\/10.1109\/ICTEmSys.2016.7467127","DOI":"10.1109\/ICTEmSys.2016.7467127"},{"key":"12_CR29","doi-asserted-by":"publisher","unstructured":"Shiraga, K., Makihara, Y., Muramatsu, D., Echigo, T., Yagi, Y.: Geinet: view-invariant gait recognition using a convolutional neural network. In: 2016 International Conference on Biometrics (ICB), pp.\u00a01\u20138 (2016). https:\/\/doi.org\/10.1109\/ICB.2016.7550060","DOI":"10.1109\/ICB.2016.7550060"},{"issue":"5","key":"12_CR30","doi-asserted-by":"publisher","first-page":"877","DOI":"10.1109\/TIFS.2015.2506542","volume":"11","author":"Z Sitov\u00e1","year":"2016","unstructured":"Sitov\u00e1, Z., et al.: Hmog: new behavioral biometric features for continuous authentication of smartphone users. IEEE Trans. Inf. Forensics Secur. 11(5), 877\u2013892 (2016). https:\/\/doi.org\/10.1109\/TIFS.2015.2506542","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"12_CR31","doi-asserted-by":"publisher","unstructured":"Taigman, Y., Yang, M., Ranzato, M., Wolf, L.: Deepface: closing the gap to human-level performance in face verification. In: 2014 IEEE Conference on Computer Vision and Pattern Recognition, pp. 1701\u20131708 (2014). https:\/\/doi.org\/10.1109\/CVPR.2014.220","DOI":"10.1109\/CVPR.2014.220"},{"key":"12_CR32","doi-asserted-by":"publisher","unstructured":"Thang, H.M., Viet, V.Q., Dinh\u00a0Thuc, N., Choi, D.: Gait identification using accelerometer on mobile phone. In: 2012 International Conference on Control, Automation and Information Sciences (ICCAIS), pp. 344\u2013348 (2012). https:\/\/doi.org\/10.1109\/ICCAIS.2012.6466615","DOI":"10.1109\/ICCAIS.2012.6466615"},{"key":"12_CR33","doi-asserted-by":"publisher","first-page":"742","DOI":"10.1007\/s11263-019-01198-w","volume":"128","author":"Y Wu","year":"2018","unstructured":"Wu, Y., He, K.: Group normalization. Int. J. Comput. Vision 128, 742\u2013755 (2018)","journal-title":"Int. J. Comput. Vision"},{"key":"12_CR34","doi-asserted-by":"publisher","DOI":"10.1016\/j.adhoc.2020.102218","volume":"107","author":"W Xu","year":"2020","unstructured":"Xu, W., Shen, Y., Luo, C., Li, J., Li, W., Zomaya, A.Y.: Gait-watch: a gait-based context-aware authentication system for smart watch via sparse coding. Ad Hoc Netw. 107, 102218 (2020). https:\/\/doi.org\/10.1016\/j.adhoc.2020.102218","journal-title":"Ad Hoc Netw."},{"key":"12_CR35","unstructured":"Yang, J., Ren, Z., Gan, C., Zhu, H., Parikh, D.: Cross-channel communication networks. In: Wallach, H., Larochelle, H., Beygelzimer, A., d\u2019Alch\u00e9-Buc, F., Fox, E., Garnett, R. (eds.) Advances in Neural Information Processing Systems, vol.\u00a032, pp. 1\u201310. Curran Associates, Inc. (2019)"},{"key":"12_CR36","doi-asserted-by":"publisher","unstructured":"Zhong, Y., Deng, Y., Meltzner, G.: Pace independent mobile gait biometrics. In: 2015 IEEE 7th International Conference on Biometrics Theory, Applications and Systems (BTAS), pp.\u00a01\u20138 (2015). https:\/\/doi.org\/10.1109\/BTAS.2015.7358784","DOI":"10.1109\/BTAS.2015.7358784"},{"key":"12_CR37","doi-asserted-by":"publisher","unstructured":"Zou, B., Li, Y.: Touch-based smartphone authentication using import vector domain description. In: 2018 IEEE 29th International Conference on Application-specific Systems, Architectures and Processors (ASAP), pp.\u00a01\u20134 (2018). https:\/\/doi.org\/10.1109\/ASAP.2018.8445125","DOI":"10.1109\/ASAP.2018.8445125"}],"container-title":["Lecture Notes in Computer Science","Computational Science and Its Applications \u2013 ICCSA 2024"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-64608-9_12","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,7,1]],"date-time":"2024-07-01T05:07:56Z","timestamp":1719810476000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-64608-9_12"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024]]},"ISBN":["9783031646072","9783031646089"],"references-count":37,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-64608-9_12","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2024]]},"assertion":[{"value":"2 July 2024","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"The authors have no competing interests to declare that are relevant to the content of this article.","order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Disclosure of Interests"}},{"value":"ICCSA","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Computational Science and Its Applications","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Hanoi","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Vietnam","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2024","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"1 July 2024","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"4 July 2024","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"24","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"iccsa2024","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}