{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,20]],"date-time":"2025-10-20T10:23:41Z","timestamp":1760955821055,"version":"3.40.3"},"publisher-location":"Cham","reference-count":23,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319998275"},{"type":"electronic","value":"9783319998282"}],"license":[{"start":{"date-parts":[[2018,1,1]],"date-time":"2018-01-01T00:00:00Z","timestamp":1514764800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2018,1,1]],"date-time":"2018-01-01T00:00:00Z","timestamp":1514764800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018]]},"DOI":"10.1007\/978-3-319-99828-2_5","type":"book-chapter","created":{"date-parts":[[2018,8,25]],"date-time":"2018-08-25T11:35:10Z","timestamp":1535196910000},"page":"62-76","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":11,"title":["Walking Through the Deep: Gait Analysis for User Authentication Through Deep Learning"],"prefix":"10.1007","author":[{"given":"Giacomo","family":"Giorgi","sequence":"first","affiliation":[]},{"given":"Fabio","family":"Martinelli","sequence":"additional","affiliation":[]},{"given":"Andrea","family":"Saracino","sequence":"additional","affiliation":[]},{"given":"Mina","family":"Sheikhalishahi","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2018,8,26]]},"reference":[{"key":"5_CR1","unstructured":"Chung, J., Gulcehre, C., Cho, K., Bengio, Y.: Empirical evaluation of gated recurrent neural networks on sequence modeling (2014). arXiv preprint arXiv:1412.355"},{"key":"5_CR2","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"384","DOI":"10.1007\/978-3-319-66284-8_32","volume-title":"Computer Safety, Reliability, and Security","author":"G Giorgi","year":"2017","unstructured":"Giorgi, G., Martinelli, F., Saracino, A., Sheikhalishahi, M.: Try walking in my shoes, if you can: accurate gait recognition through deep learning. In: Tonetta, S., Schoitsch, E., Bitsch, F. (eds.) SAFECOMP 2017. LNCS, vol. 10489, pp. 384\u2013395. Springer, Cham (2017). https:\/\/doi.org\/10.1007\/978-3-319-66284-8_32"},{"issue":"7553","key":"5_CR3","doi-asserted-by":"publisher","first-page":"436","DOI":"10.1038\/nature14539","volume":"521","author":"Y LeCun","year":"2015","unstructured":"LeCun, Y., Bengio, Y., Hinton, G.: Deep learning. Nature 521(7553), 436 (2015)","journal-title":"Nature"},{"issue":"4","key":"5_CR4","doi-asserted-by":"publisher","first-page":"965","DOI":"10.1109\/78.80924","volume":"39","author":"CK Coursey","year":"1991","unstructured":"Coursey, C.K., Stuller, J.A.: Linear interpolation lattice. IEEE Trans. Sig. Process. 39(4), 965\u2013967 (1991)","journal-title":"IEEE Trans. Sig. Process."},{"issue":"4","key":"5_CR5","doi-asserted-by":"publisher","first-page":"624","DOI":"10.1109\/TCT.1965.1082501","volume":"12","author":"E Van Vollenhoven","year":"1965","unstructured":"Van Vollenhoven, E., Reuver, H., Somer, J.: Transient response of butterworth filters. IEEE Trans. Circ. Theor. 12(4), 624\u2013626 (1965)","journal-title":"IEEE Trans. Circ. Theor."},{"key":"5_CR6","doi-asserted-by":"crossref","unstructured":"Buriro, A., et al.: Hold and sign: a novel behavioral biometrics for smartphone user authentication. In: Security and Privacy Workshops (SPW), 2016 IEEE, IEEE (2016)","DOI":"10.1109\/SPW.2016.20"},{"issue":"4","key":"5_CR7","doi-asserted-by":"publisher","first-page":"457","DOI":"10.1007\/s11760-011-0249-1","volume":"5","author":"D Gafurov","year":"2011","unstructured":"Gafurov, D., Bours, P., Snekkenes, E.: User authentication based on foot motion. Sig. Image Video Process. 5(4), 457 (2011)","journal-title":"Sig. Image Video Process."},{"issue":"9","key":"5_CR8","doi-asserted-by":"publisher","first-page":"1864","DOI":"10.1109\/TCYB.2014.2361287","volume":"45","author":"Y Zhang","year":"2015","unstructured":"Zhang, Y.: Accelerometer-based gait recognition by sparse representation of signature points with clusters. IEEE Trans. Cybern. 45(9), 1864\u20131875 (2015)","journal-title":"IEEE Trans. Cybern."},{"issue":"9","key":"5_CR9","doi-asserted-by":"publisher","first-page":"22089","DOI":"10.3390\/s150922089","volume":"15","author":"S Sprager","year":"2015","unstructured":"Sprager, S., Juric, M.B.: Inertial sensor-based gait recognition: a review. Sensors 15(9), 22089\u201322127 (2015)","journal-title":"Sensors"},{"key":"5_CR10","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/978-3-540-24646-6_1","volume-title":"Pervasive Computing","author":"L Bao","year":"2004","unstructured":"Bao, L., Intille, S.S.: Activity recognition from user-annotated acceleration data. In: Ferscha, A., Mattern, F. (eds.) Pervasive 2004. LNCS, vol. 3001, pp. 1\u201317. Springer, Heidelberg (2004). https:\/\/doi.org\/10.1007\/978-3-540-24646-6_1"},{"issue":"9","key":"5_CR11","doi-asserted-by":"publisher","first-page":"1961","DOI":"10.1109\/TMC.2014.2365185","volume":"14","author":"Y Ren","year":"2015","unstructured":"Ren, Y.: User verification leveraging gait recognition for smartphone enabled mobile healthcare systems. IEEE Trans. Mob. Comput. 14(9), 1961\u20131974 (2015)","journal-title":"IEEE Trans. Mob. Comput."},{"key":"5_CR12","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-36382-5","volume-title":"Smartshadow: Models and Methods for Pervasive Computing","author":"Z Wu","year":"2013","unstructured":"Wu, Z., Pan, G.: Smartshadow: Models and Methods for Pervasive Computing. Springer, Heidelberg (2013). https:\/\/doi.org\/10.1007\/978-3-642-36382-5"},{"issue":"7","key":"5_CR13","doi-asserted-by":"publisher","first-page":"1602","DOI":"10.1109\/TCYB.2015.2452577","volume":"46","author":"D Muramatsu","year":"2016","unstructured":"Muramatsu, D., Makihara, Y., Yagi, Y.: View transformation model incorporating quality measures for cross-view gait recognition. IEEE Trans. Cybern. 46(7), 1602\u20131615 (2016)","journal-title":"IEEE Trans. Cybern."},{"key":"5_CR14","doi-asserted-by":"publisher","first-page":"103","DOI":"10.1016\/j.cviu.2017.10.004","volume":"164","author":"M Alotaibi","year":"2017","unstructured":"Alotaibi, M., Mahmood, A.: Improved gait recognition based on specialized deep convolutional neural network. Comput. Vis. Image Underst. 164, 103\u2013110 (2017)","journal-title":"Comput. Vis. Image Underst."},{"issue":"3","key":"5_CR15","doi-asserted-by":"publisher","first-page":"798","DOI":"10.1016\/j.patcog.2014.09.022","volume":"48","author":"SD Choudhury","year":"2015","unstructured":"Choudhury, S.D., Tjahjadi, T.: Robust view-invariant multiscale gait recognition. Pattern Recogn. 48(3), 798\u2013811 (2015)","journal-title":"Pattern Recogn."},{"issue":"4","key":"5_CR16","doi-asserted-by":"publisher","first-page":"1136","DOI":"10.1109\/TCYB.2017.2682280","volume":"48","author":"Q Zou","year":"2018","unstructured":"Zou, Q.: Robust gait recognition by integrating inertial and RGBD sensors. IEEE Trans. Cybern. 48(4), 1136\u20131150 (2018)","journal-title":"IEEE Trans. Cybern."},{"key":"5_CR17","doi-asserted-by":"crossref","unstructured":"Martinelli, F., Saracino, A., Sheikhalishahi, M.: Modeling privacy aware information sharing systems: a formal and general approach. In: Trustcom\/BigDataSE\/I SPA, 2016 IEEE, IEEE (2016)","DOI":"10.1109\/TrustCom.2016.0137"},{"key":"5_CR18","doi-asserted-by":"crossref","unstructured":"Parkhi, O.M., Vedaldi, A., Zisserman, A.: Deep face recognition. In: BMVC, vol. 1, no. 3 (2015)","DOI":"10.5244\/C.29.41"},{"key":"5_CR19","unstructured":"Krizhevsky, A., Sutskever, I., Hinton, G.E.: Imagenet classification with deep convolutional neural networks. In: Advances in neural information processing systems (2012)"},{"key":"5_CR20","doi-asserted-by":"crossref","unstructured":"Graves, A., Mohamed, A.R., Hinton, G.: Speech recognition with deep recurrent neural networks. In: Acoustics, Speech and Signal Processing (ICASSP), IEEE International Conference on 2013, IEEE (2013)","DOI":"10.1109\/ICASSP.2013.6638947"},{"key":"5_CR21","doi-asserted-by":"crossref","unstructured":"Cho, K., et al.: Learning phrase representations using RNN encoder-decoder for statistical machine translation (2014). arXiv preprint arXiv:1406.1078","DOI":"10.3115\/v1\/D14-1179"},{"key":"5_CR22","unstructured":"Kingma, D.P., Ba, J.: Adam: a method for stochastic optimization (2014). arXiv preprint arXiv:1412.6980"},{"issue":"2","key":"5_CR23","doi-asserted-by":"publisher","first-page":"715","DOI":"10.1016\/j.cmpb.2012.04.004","volume":"108","author":"M Yang","year":"2012","unstructured":"Yang, M.: IGAIT: an interactive accelerometer based gait analysis system. Comput. Meth. programs Biomed. 108(2), 715\u2013723 (2012)","journal-title":"Comput. Meth. programs Biomed."}],"container-title":["IFIP Advances in Information and Communication Technology","ICT Systems Security and Privacy Protection"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-99828-2_5","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,8,26]],"date-time":"2022-08-26T00:03:18Z","timestamp":1661472198000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-319-99828-2_5"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018]]},"ISBN":["9783319998275","9783319998282"],"references-count":23,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-99828-2_5","relation":{},"ISSN":["1868-4238","1868-422X"],"issn-type":[{"type":"print","value":"1868-4238"},{"type":"electronic","value":"1868-422X"}],"subject":[],"published":{"date-parts":[[2018]]},"assertion":[{"value":"26 August 2018","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"SEC","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"IFIP International Conference on ICT Systems Security and Privacy Protection","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Poznan","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Poland","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2018","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"18 September 2018","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"20 September 2018","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"33","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"sec2018","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/ifipsec2018.pwr.edu.pl\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Double-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"EasyChair","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"27","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"89","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"0","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"330% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"4","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"1","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Yes","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"This content has been made available to all.","name":"free","label":"Free to read"}]}}