{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,19]],"date-time":"2026-03-19T09:01:43Z","timestamp":1773910903318,"version":"3.50.1"},"publisher-location":"Cham","reference-count":20,"publisher":"Springer International Publishing","isbn-type":[{"value":"9783319712727","type":"print"},{"value":"9783319712734","type":"electronic"}],"license":[{"start":{"date-parts":[[2017,1,1]],"date-time":"2017-01-01T00:00:00Z","timestamp":1483228800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2017,1,1]],"date-time":"2017-01-01T00:00:00Z","timestamp":1483228800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017]]},"DOI":"10.1007\/978-3-319-71273-4_19","type":"book-chapter","created":{"date-parts":[[2017,12,29]],"date-time":"2017-12-29T09:12:26Z","timestamp":1514538746000},"page":"228-240","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":34,"title":["Sequential Keystroke Behavioral Biometrics for Mobile User Identification via Multi-view Deep Learning"],"prefix":"10.1007","author":[{"given":"Lichao","family":"Sun","sequence":"first","affiliation":[]},{"given":"Yuqi","family":"Wang","sequence":"additional","affiliation":[]},{"given":"Bokai","family":"Cao","sequence":"additional","affiliation":[]},{"given":"Philip S.","family":"Yu","sequence":"additional","affiliation":[]},{"given":"Witawas","family":"Srisa-an","sequence":"additional","affiliation":[]},{"given":"Alex D.","family":"Leow","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2017,12,30]]},"reference":[{"key":"19_CR1","unstructured":"Abramson, M., Gore, S.: Associative patterns of web browsing behavior. In: 2013 AAAI Fall Symposium Series (2013)"},{"key":"19_CR2","doi-asserted-by":"crossref","unstructured":"Alghamdi, S.J., Elrefaei, L.A.: Dynamic user verification using touch keystroke based on medians vector proximity. In: 2015 7th International Conference on Computational Intelligence, Communication Systems and Networks (CICSyN), pp. 121\u2013126. IEEE (2015)","DOI":"10.1109\/CICSyN.2015.31"},{"key":"19_CR3","doi-asserted-by":"crossref","unstructured":"Bo, C., Jian, X., Li, X.-Y., Mao, X., Wang, Y., Li, F.: You\u2019re driving and texting: detecting drivers using personal smart phones by leveraging inertial sensors. In: Proceedings of the 19th Annual International Conference on Mobile Computing & Networking, pp. 199\u2013202. ACM (2013)","DOI":"10.1145\/2500423.2504575"},{"key":"19_CR4","doi-asserted-by":"crossref","unstructured":"Bo, C., Zhang, L., Jung, T., Han, J., Li, X.-Y., Wang, Y.: Continuous user identification via touch and movement behavioral biometrics. In: 2014 IEEE 33rd International Performance Computing and Communications Conference (IPCCC), pp. 1\u20138. IEEE (2014)","DOI":"10.1109\/PCCC.2014.7017067"},{"key":"19_CR5","doi-asserted-by":"crossref","unstructured":"Cao, B., He, L., Wei, X., Xing, M., Yu, P.S., Klumpp, H., Leow, A.D.: t-BNE: tensor-based brain network embedding. SIAM (2017)","DOI":"10.1137\/1.9781611974973.22"},{"key":"19_CR6","unstructured":"Chung, J., Gulcehre, C., Cho, K., Bengio, Y.: Empirical evaluation of gated recurrent neural networks on sequence modeling. arXiv preprint arXiv:1412.3555 (2014)"},{"key":"19_CR7","doi-asserted-by":"crossref","unstructured":"de Martin-Roche, D., Sanchez-Avila, C., Sanchez-Reillo, R.: Iris recognition for biometric identification using dyadic wavelet transform zero-crossing. In: 2001 IEEE 35th International Carnahan Conference on Security Technology, pp. 272\u2013277. IEEE (2001)","DOI":"10.1109\/CCST.2001.962844"},{"key":"19_CR8","doi-asserted-by":"crossref","unstructured":"Feng, T., Liu, Z., Kwon, K.-A., Shi, W., Carbunar, B., Jiang, Y., Nguyen, N.: Continuous mobile authentication using touchscreen gestures. In: 2012 IEEE Conference on Technologies for Homeland Security (HST), pp. 451\u2013456. IEEE (2012)","DOI":"10.1109\/THS.2012.6459891"},{"key":"19_CR9","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/978-3-540-45184-6_1","volume-title":"Communications and Multimedia Security. Advanced Techniques for Network and Data Protection","author":"A Goh","year":"2003","unstructured":"Goh, A., Ngo, D.C.L.: Computation of cryptographic keys from face biometrics. In: Lioy, A., Mazzocchi, D. (eds.) CMS 2003. LNCS, vol. 2828, pp. 1\u201313. Springer, Heidelberg (2003). https:\/\/doi.org\/10.1007\/978-3-540-45184-6_1"},{"key":"19_CR10","doi-asserted-by":"crossref","unstructured":"He, L., Kong, X., Yu, P.S., Yang, X., Ragin, A.B., Hao, Z.: Dusk: a dual structure-preserving kernel for supervised tensor learning with applications to neuroimages. In: Proceedings of the 2014 SIAM International Conference on Data Mining, pp. 127\u2013135. SIAM (2014)","DOI":"10.1137\/1.9781611973440.15"},{"key":"19_CR11","doi-asserted-by":"crossref","unstructured":"He, L., Lu, C.-T., Ding, H., Wang, S., Shen, L., Yu, P.S., Ragin, A.B.: Multi-way multi-level kernel modeling for neuroimaging classification. In: Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition (2017)","DOI":"10.1109\/CVPR.2017.724"},{"key":"19_CR12","unstructured":"He, L., Lu, C.-T., Ma, G., Wang, S., Shen, L., Yu, P.S., Ragin, A.B.: Kernelized support tensor machines. In: Proceedings of the 34th International Conference on Machine Learning (2017)"},{"issue":"8","key":"19_CR13","doi-asserted-by":"publisher","first-page":"1735","DOI":"10.1162\/neco.1997.9.8.1735","volume":"9","author":"S Hochreiter","year":"1997","unstructured":"Hochreiter, S., Schmidhuber, J.: Long short-term memory. Neural Comput. 9(8), 1735\u20131780 (1997)","journal-title":"Neural Comput."},{"key":"19_CR14","doi-asserted-by":"crossref","unstructured":"Miluzzo, E., Varshavsky, A., Balakrishnan, S., Choudhury, R.R.: TapPrints: your finger taps have fingerprints. In: Proceedings of the 10th International Conference on Mobile Systems, Applications, and Services, pp. 323\u2013336. ACM (2012)","DOI":"10.1145\/2307636.2307666"},{"key":"19_CR15","first-page":"2825","volume":"12","author":"F Pedregosa","year":"2011","unstructured":"Pedregosa, F., Varoquaux, G., Gramfort, A., Michel, V., Thirion, B., Grisel, O., Blondel, M., Prettenhofer, P., Weiss, R., Dubourg, V., Vanderplas, J., Passos, A., Cournapeau, D., Brucher, M., Perrot, M., Duchesnay, E.: Scikit-learn: machine learning in Python. J. Mach. Learn. Res. 12, 2825\u20132830 (2011)","journal-title":"J. Mach. Learn. Res."},{"key":"19_CR16","unstructured":"Ruder, S.: An overview of gradient descent optimization algorithms. arXiv preprint arXiv:1609.04747 (2016)"},{"key":"19_CR17","series-title":"Lecture Notes in Computer Science (Lecture Notes in Artificial Intelligence)","doi-asserted-by":"publisher","first-page":"485","DOI":"10.1007\/978-3-319-18032-8_38","volume-title":"Advances in Knowledge Discovery and Data Mining","author":"W Shao","year":"2015","unstructured":"Shao, W., He, L., Yu, P.S.: Clustering on multi-source incomplete data via tensor modeling and factorization. In: Cao, T., Lim, E.-P., Zhou, Z.-H., Ho, T.-B., Cheung, D., Motoda, H. (eds.) PAKDD 2015. LNCS (LNAI), vol. 9078, pp. 485\u2013497. Springer, Cham (2015). https:\/\/doi.org\/10.1007\/978-3-319-18032-8_38"},{"key":"19_CR18","doi-asserted-by":"crossref","unstructured":"Sun, L., Li, Z., Yan, Q., Srisa-an, W.: SigPID: significant permission identification for android malware detection (2016)","DOI":"10.1109\/MALWARE.2016.7888730"},{"key":"19_CR19","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"195","DOI":"10.1007\/978-3-319-05579-4_24","volume-title":"Social Computing, Behavioral-Cultural Modeling and Prediction","author":"H Zhang","year":"2014","unstructured":"Zhang, H., Yan, Z., Yang, J., Tapia, E.M., Crandall, D.J.: mFingerprint: privacy-preserving user modeling with multimodal mobile device footprints. In: Kennedy, W.G., Agarwal, N., Yang, S.J. (eds.) SBP 2014. LNCS, vol. 8393, pp. 195\u2013203. Springer, Cham (2014). https:\/\/doi.org\/10.1007\/978-3-319-05579-4_24"},{"key":"19_CR20","doi-asserted-by":"crossref","unstructured":"Zhao, X., Feng, T., Shi, W.: Continuous mobile authentication using a novel graphic touch gesture feature. In: 2013 IEEE Sixth International Conference on Biometrics: Theory, Applications and Systems (BTAS), pp. 1\u20136. IEEE (2013)","DOI":"10.1109\/BTAS.2013.6712747"}],"container-title":["Lecture Notes in Computer Science","Machine Learning and Knowledge Discovery in Databases"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-71273-4_19","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,29]],"date-time":"2025-06-29T09:09:35Z","timestamp":1751188175000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-319-71273-4_19"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017]]},"ISBN":["9783319712727","9783319712734"],"references-count":20,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-71273-4_19","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2017]]},"assertion":[{"value":"30 December 2017","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ECML PKDD","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Joint European Conference on Machine Learning and Knowledge Discovery in Databases","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Skopje","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Macedonia","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2017","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"18 September 2017","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"22 September 2017","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"17","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"ecml2017","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/ecmlpkdd2017.ijs.si\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"This content has been made available to all.","name":"free","label":"Free to read"}]}}