{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,16]],"date-time":"2026-03-16T19:47:43Z","timestamp":1773690463995,"version":"3.50.1"},"publisher-location":"Singapore","reference-count":49,"publisher":"Springer Nature Singapore","isbn-type":[{"value":"9789819531844","type":"print"},{"value":"9789819531851","type":"electronic"}],"license":[{"start":{"date-parts":[[2025,10,13]],"date-time":"2025-10-13T00:00:00Z","timestamp":1760313600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2025,10,13]],"date-time":"2025-10-13T00:00:00Z","timestamp":1760313600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2026]]},"DOI":"10.1007\/978-981-95-3185-1_3","type":"book-chapter","created":{"date-parts":[[2025,10,14]],"date-time":"2025-10-14T06:06:01Z","timestamp":1760421961000},"page":"33-50","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["Evaluating Deep Learning in\u00a0Gait Recognition"],"prefix":"10.1007","author":[{"given":"Haotian","family":"Liu","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Zheng","family":"Zhu","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Weizhi","family":"Meng","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Xiaojiang","family":"Du","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"297","published-online":{"date-parts":[[2025,10,13]]},"reference":[{"key":"3_CR1","unstructured":"CASIA Gait Database. Accessed on 1 July 2024. http:\/\/english.ia.cas.cn\/db\/201610\/t20161026_169403.html"},{"key":"3_CR2","doi-asserted-by":"crossref","unstructured":"A. Arnab, M. Dehghani, G. Heigold, C. Sun, M. Lucic, and C. Schmid, ViViT: A Video Vision Transformer. In: 2021 IEEE\/CVF International Conference on Computer Vision (ICCV), pp. 6836\u20136846 (2021)","DOI":"10.1109\/ICCV48922.2021.00676"},{"key":"3_CR3","doi-asserted-by":"publisher","first-page":"132","DOI":"10.1016\/j.patrec.2018.05.004","volume":"126","author":"F Battistone","year":"2019","unstructured":"Battistone, F., Alfredo, P.: Tglstm: a time based graph deep learning approach to gait recognition. Pattern Recognit. Lett. 126, 132\u2013138 (2019)","journal-title":"Pattern Recognit. Lett."},{"key":"3_CR4","doi-asserted-by":"publisher","DOI":"10.1016\/j.jisa.2023.103466","volume":"74","author":"Y Chang","year":"2023","unstructured":"Chang, Y., Li, J., Li, W.: 2d2ps: a demand-driven privacy-preserving scheme for anonymous data sharing in smart grids. J. Information Security and Applications 74, 103466 (2023)","journal-title":"J. Information Security and Applications"},{"key":"3_CR5","doi-asserted-by":"crossref","unstructured":"Deng, L., Zhong, Q., Song, J., Lei, H., Li, W.: LLM-based unknown function automated modeling in sensor-driven system for multi-language software security verification. Sensors 25(9), 2683 MDPI (2025)","DOI":"10.3390\/s25092683"},{"key":"3_CR6","doi-asserted-by":"publisher","first-page":"117","DOI":"10.1109\/TMM.2023.3262131","volume":"26","author":"M Deng","year":"2024","unstructured":"Deng, M., Fan, Z., Lin, P., Feng, X.: Human gait recognition based on frontal-view sequences using gait dynamics and deep learning. IEEE Trans. Multimedia 26, 117\u2013126 (2024)","journal-title":"IEEE Trans. Multimedia"},{"key":"3_CR7","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2024.110962","volume":"257","author":"A Coscia","year":"2025","unstructured":"Coscia, A., Maci, A., Tamma, N.: Frog: a firewall rule order generator for faster packet filtering. Comput. Netw. 257, 110962 (2025)","journal-title":"Comput. Netw."},{"key":"3_CR8","unstructured":"Chiu, W.Y., Meng, W.: BlockFW - towards blockchain-based rule-sharing firewall. In: The 16th International Conference on Emerging Security Information, Systems and Technologies (SECURWARE 2022), pp. 70\u201375 (2022)"},{"issue":"103020","key":"3_CR9","first-page":"1","volume":"63","author":"WY Chiu","year":"2021","unstructured":"Chiu, W.Y., Meng, W., Jensen, C.D.: My data, my control: a secure data sharing and access scheme over blockchain. J. Inf. Secur. Appl. 63(103020), 1\u201311 (2021)","journal-title":"J. Inf. Secur. Appl."},{"key":"3_CR10","doi-asserted-by":"publisher","unstructured":"Liu, W., Zhang, C., Ma, H., Li, S.: Learning efficient spatial-temporal gait features with deep learning for human identification. Neuroinformatics, 457\u2013471 (2018). https:\/\/doi.org\/10.1007\/s12021-018-9362-4","DOI":"10.1007\/s12021-018-9362-4"},{"key":"3_CR11","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2021.115057","volume":"179","author":"S Gul","year":"2021","unstructured":"Gul, S., Malik, M.I., Khan, G.M., Shafait, F.: Multi-view gait recognition system using spatio-temporal features and deep learning. Expert Syst. Appl. 179, 115057 (2021)","journal-title":"Expert Syst. Appl."},{"key":"3_CR12","doi-asserted-by":"crossref","unstructured":"Filipi Gon\u00e7alves dos Santos, C., et al.: Gait recognition based on deep learning. ACM Comput. Surv. (CSUR) 55, 1\u201334 (2022)","DOI":"10.1145\/3490235"},{"key":"3_CR13","doi-asserted-by":"publisher","first-page":"1258","DOI":"10.1016\/j.future.2018.06.007","volume":"108","author":"W Meng","year":"2020","unstructured":"Meng, W., Li, W., Wang, Y., Au, M.H.: Detecting insider attacks in medical cyber-physical networks based on behavioral profiling. Futur. Gener. Comput. Syst. 108, 1258\u20131266 (2020)","journal-title":"Futur. Gener. Comput. Syst."},{"key":"3_CR14","doi-asserted-by":"crossref","unstructured":"Girshick, R.: Fast R-CNN. In: 2015 IEEE International Conference on Computer Vision (ICCV), pp. 1440\u20131448 (2015)","DOI":"10.1109\/ICCV.2015.169"},{"issue":"8","key":"3_CR15","doi-asserted-by":"publisher","first-page":"1735","DOI":"10.1162\/neco.1997.9.8.1735","volume":"9","author":"S Hochreiter","year":"1997","unstructured":"Hochreiter, S., Schmidhuber, J.: Long short-term memory. Neural Comput. 9(8), 1735\u20131780 (1997)","journal-title":"Neural Comput."},{"key":"3_CR16","doi-asserted-by":"crossref","unstructured":"Li, Y., et al.: A closer look tells more: a facial distortion based liveness detection for face authentication. In: AsiaCCS 2019, pp. 241\u2013246 (2019)","DOI":"10.1145\/3321705.3329850"},{"key":"3_CR17","doi-asserted-by":"crossref","unstructured":"Li, W., Meng, W., Au, M.H.: Enhancing collaborative intrusion detection via disagreement-based semi-supervised learning in IoT environments. J. Netw. Comput. Appl. 161(102631), 1\u20139 (2020)","DOI":"10.1016\/j.jnca.2020.102631"},{"issue":"16","key":"3_CR18","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1002\/cpe.5957","volume":"34","author":"W Li","year":"2022","unstructured":"Li, W., Tian, F., Li, J., Xiang, Y.: Evaluating intrusion sensitivity allocation with supervised learning in collaborative intrusion detection. Concurr. Comput. Pract. Exp. 34(16), 1\u201315 (2022)","journal-title":"Concurr. Comput. Pract. Exp."},{"key":"3_CR19","doi-asserted-by":"publisher","first-page":"9575","DOI":"10.1109\/JSEN.2019.2928777","volume":"19","author":"AS Alharthi","year":"2019","unstructured":"Alharthi, A.S., Yunas, S.U., Ozanyan, K.B.: Deep learning for monitoring of human gait: a review. IEEE Sens. J. 19, 9575\u20139591 (2019)","journal-title":"IEEE Sens. J."},{"key":"3_CR20","doi-asserted-by":"publisher","first-page":"135","DOI":"10.1016\/j.jnca.2016.09.014","volume":"77","author":"W Li","year":"2017","unstructured":"Li, W., Meng, W., Kwok, L.F., Ip, H.H.S.: Enhancing collaborative intrusion detection networks against insider attacks using supervised intrusion sensitivity-based trust management model. J. Netw. Comput. Appl. 77, 135\u2013145 (2017)","journal-title":"J. Netw. Comput. Appl."},{"key":"3_CR21","doi-asserted-by":"crossref","unstructured":"Li, W., Meng. W.: BCTrustFrame: enhancing trust management via blockchain and IPFS in 6G era. IEEE Netw. 36(4), 120\u2013125 (2022)","DOI":"10.1109\/MNET.013.2100768"},{"key":"3_CR22","doi-asserted-by":"publisher","first-page":"29","DOI":"10.1016\/j.patrec.2022.03.002","volume":"156","author":"E Maiorana","year":"2022","unstructured":"Maiorana, E.: A survey on biometric recognition using wearable devices. Pattern Recognit. Lett. 156, 29\u201337 (2022)","journal-title":"Pattern Recognit. Lett."},{"key":"3_CR23","doi-asserted-by":"crossref","unstructured":"Marsico, M.D., Mecca, A.: A survey on gait recognition via wearable sensors. ACM Comput. Surv. 52(4), 86:1\u201386:39 (2019)","DOI":"10.1145\/3340293"},{"key":"3_CR24","doi-asserted-by":"crossref","unstructured":"Li, W., Wang, Y., Li, J.: A blockchain-enabled collaborative intrusion detection framework for SDN-assisted cyber-physical systems. Int. J. Inf. Secur. 22, 1219\u20131230 (2023)","DOI":"10.1007\/s10207-023-00687-x"},{"key":"3_CR25","doi-asserted-by":"crossref","unstructured":"Li, W., Stidsen, C., Adam, T.: A blockchain-assisted security management framework for collaborative intrusion detection in smart cities. Comput. Electr. Eng. 111, Part A, 108884, 1\u201313 (2023)","DOI":"10.1016\/j.compeleceng.2023.108884"},{"issue":"1","key":"3_CR26","doi-asserted-by":"publisher","first-page":"3985","DOI":"10.1109\/TCE.2023.3280064","volume":"70","author":"W Li","year":"2024","unstructured":"Li, W., Gleerup, T., Tan, J., Wang, Y.: A security enhanced android unlock scheme based on pinch-to-zoom for smart devices. IEEE Trans. Consum. Electron. 70(1), 3985\u20133993 (2024)","journal-title":"IEEE Trans. Consum. Electron."},{"key":"3_CR27","doi-asserted-by":"crossref","unstructured":"Ma, Z., Liu, L., Meng, W., Luo, X., Wang, L., Li, W.: ADCL: towards an adaptive network intrusion detection system using collaborative learning in IoT networks. IEEE Internet Things J. 10(14), 12521\u201312536 (2023)","DOI":"10.1109\/JIOT.2023.3248259"},{"key":"3_CR28","doi-asserted-by":"crossref","unstructured":"Meng, Y., Li, W., Kwok, L.F., Xiang, Y.: Towards designing privacy preserving signature-based IDS As a service: a study and practice. In: The 5th IEEE International Conference on Intelligent Networking and Collaborative Systems (INCoS), IEEE, pp. 181\u2013188 (2013)","DOI":"10.1109\/INCoS.2013.35"},{"issue":"4","key":"3_CR29","doi-asserted-by":"publisher","first-page":"1377","DOI":"10.1109\/TEM.2019.2921736","volume":"67","author":"W Meng","year":"2020","unstructured":"Meng, W., Li, W., Zhu, L.: Enhancing medical smartphone networks via blockchain-based trust management against insider attacks. IEEE Trans. Eng. Manage. 67(4), 1377\u20131386 (2020)","journal-title":"IEEE Trans. Eng. Manage."},{"key":"3_CR30","doi-asserted-by":"crossref","unstructured":"Fang, L., et al.: HandiText: handwriting recognition based on dynamic characteristics with incremental LSTM. ACM Trans. Data Sci. 4(1), 25:1\u201325:18 (2020)","DOI":"10.1145\/3385189"},{"key":"3_CR31","doi-asserted-by":"crossref","unstructured":"Li, Y., Zhang, J., Zhu, J., Li, W.: BlockFD: blockchain-based federated distillation against poisoning attacks. Neural Comput. Appl. 36, 12901\u201312916 (2024)","DOI":"10.1007\/s00521-024-09715-w"},{"issue":"3","key":"3_CR32","doi-asserted-by":"publisher","first-page":"1818","DOI":"10.1109\/TPAMI.2024.3507101","volume":"47","author":"X Long","year":"2025","unstructured":"Long, X., Zhang, J., Shan, S.: Generalized face liveness detection via de-fake face generator. IEEE Trans. Pattern Anal. Mach. Intell. 47(3), 1818\u20131831 (2025)","journal-title":"IEEE Trans. Pattern Anal. Mach. Intell."},{"key":"3_CR33","doi-asserted-by":"crossref","unstructured":"Marasco, E., Ross, A.: A survey on antispoofing schemes for fingerprint recognition systems. ACM Comput. Surv. 47(2), 28:1\u201328:36 (2014)","DOI":"10.1145\/2617756"},{"issue":"3","key":"3_CR34","doi-asserted-by":"publisher","first-page":"1268","DOI":"10.1109\/COMST.2014.2386915","volume":"17","author":"W Meng","year":"2015","unstructured":"Meng, W., Wong, D.S., Furnell, S., Zhou, J.: Surveying the development of biometric user authentication on mobile phones. IEEE Commun. Surv. Tutorials 17(3), 1268\u20131293 (2015)","journal-title":"IEEE Commun. Surv. Tutorials"},{"issue":"2","key":"3_CR35","first-page":"105","volume":"13","author":"KS Al-Zahrani","year":"2008","unstructured":"Al-Zahrani, K.S., Bakheit, M.O.: A historical review of gait analysis. Neurosci. J. 13(2), 105\u2013108 (2008)","journal-title":"Neurosci. J."},{"key":"3_CR36","doi-asserted-by":"crossref","unstructured":"Pyke, M.S.C., Meng, W., Lampe, B.: Security on top of security: detecting malicious firewall policy changes via K-means clustering. In: The 5th International Conference on Machine Learning for Cyber Security (ML4CS 2023), pp. 145\u2013162 (2023)","DOI":"10.1007\/978-981-97-2458-1_10"},{"key":"3_CR37","doi-asserted-by":"crossref","unstructured":"Meng, W., Li, W., Calugar, A.N.: BANN-TMGUARD: towards touch movement-based screen unlock patterns via blockchain-enabled artificial neural networks on IoT devices. IEEE Internet Things J. 12(2), 1856\u20131866 (2025)","DOI":"10.1109\/JIOT.2024.3465891"},{"key":"3_CR38","doi-asserted-by":"crossref","unstructured":"Sampath Dakshina Murthy, A., Karthikeyan, T., Vinoth Kanna, R.: Gait-based person fall prediction using deep learning approach. Soft Comput. 26, 12933\u201312941 (2022)","DOI":"10.1007\/s00500-021-06125-1"},{"issue":"1","key":"3_CR39","doi-asserted-by":"publisher","first-page":"264","DOI":"10.1109\/TPAMI.2022.3151865","volume":"45","author":"A Sepas-Moghaddam","year":"2022","unstructured":"Sepas-Moghaddam, A., Etemad, A.: Deep gait recognition: a survey. IEEE Trans. Pattern Anal. Mach. Intell. 45(1), 264\u2013284 (2022)","journal-title":"IEEE Trans. Pattern Anal. Mach. Intell."},{"key":"3_CR40","doi-asserted-by":"crossref","unstructured":"Sundararajan, A., Sarwat, A.I., Perez-Pons, A.: a survey on modality characteristics, performance evaluation metrics, and security for traditional and wearable biometric systems. ACM Comput. Surv. 52(2), 39:1\u201339:36 (2019)","DOI":"10.1145\/3309550"},{"issue":"1","key":"3_CR41","doi-asserted-by":"publisher","first-page":"75556","DOI":"10.1109\/ACCESS.2019.2921029","volume":"7","author":"L Tang","year":"2019","unstructured":"Tang, L., Ma, W., Grobler, M., Meng, W., Wang, Y., Wen, S.: Faces are protected as privacy: an automatic tagging framework against unpermitted photo sharing in social media. IEEE Access, IEEE 7(1), 75556\u201375567 (2019)","journal-title":"IEEE Access, IEEE"},{"key":"3_CR42","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2021.114600","volume":"172","author":"I Toprak","year":"2021","unstructured":"Toprak, I., Toygar, O.: Detection of spoofing attacks for ear biometrics through image quality assessment and deep learning. Expert Syst. Appl. 172, 114600 (2021)","journal-title":"Expert Syst. Appl."},{"key":"3_CR43","doi-asserted-by":"crossref","unstructured":"Thanh, K.N., Proenca, H., Alonso-Fernandez, F.: Deep learning for iris recognition: a survey. ACM Comput. Surv. 56(9), 223:1\u2013223:35 (2024)","DOI":"10.1145\/3651306"},{"key":"3_CR44","doi-asserted-by":"crossref","unstructured":"Wan, C., Wang, L., Phoha, V.V.: A survey on gait recognition. ACM Comput. Surv. 51(5), 89:1\u201389:35 (2019)","DOI":"10.1145\/3230633"},{"key":"3_CR45","doi-asserted-by":"publisher","first-page":"26","DOI":"10.1016\/j.jpdc.2018.07.013","volume":"122","author":"Y Wang","year":"2018","unstructured":"Wang, Y., Meng, W., Li, W., Li, J., Liu, W.X., Xiang, Y.: A privacy-preserving approach for signature-based intrusion detection using fog computing in distributed networks. J. Parall. Distrib. Comput. 122, 26\u201335 (2018)","journal-title":"J. Parall. Distrib. Comput."},{"issue":"7","key":"3_CR46","doi-asserted-by":"publisher","first-page":"3087","DOI":"10.1002\/int.22397","volume":"36","author":"C Wu","year":"2021","unstructured":"Wu, C., Li, W.: Enhancing intrusion detection with feature selection and neural network. Int. J. Intell. Syst. 36(7), 3087\u20133105 (2021)","journal-title":"Int. J. Intell. Syst."},{"key":"3_CR47","doi-asserted-by":"crossref","unstructured":"Wu, J., Chiu, W.Y., Meng, W.: KEP: keystroke evoked potential for EEG-based user authentication. In: The International Conference on Artificial Intelligence Security and Privacy (AIS &P 2023), pp. 513\u2013530 (2023)","DOI":"10.1007\/978-981-99-9785-5_36"},{"key":"3_CR48","unstructured":"Vaswani, A. et al.: Attention is all you need. In: the 31st International Conference on Neural Information Processing Systems (NIPS), pp. 6000\u20136010 (2017)"},{"key":"3_CR49","doi-asserted-by":"crossref","unstructured":"Zhang, T., Xu, W., Luo, B., Wang, G.: Depth-wise convolutions in vision transformers for efficient training on small datasets. Neurocomputing 617, 128998 (2025)","DOI":"10.1016\/j.neucom.2024.128998"}],"container-title":["Lecture Notes in Computer Science","Data Security and Privacy Protection"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-981-95-3185-1_3","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,10,14]],"date-time":"2025-10-14T06:06:16Z","timestamp":1760421976000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-981-95-3185-1_3"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,10,13]]},"ISBN":["9789819531844","9789819531851"],"references-count":49,"URL":"https:\/\/doi.org\/10.1007\/978-981-95-3185-1_3","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025,10,13]]},"assertion":[{"value":"13 October 2025","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"DSPP","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Data Security and Privacy Protection","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Xi'an","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"China","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2025","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"16 October 2025","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"18 October 2025","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"3","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"dspp2025","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/dspp2025.xidian.edu.cn\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}