{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,1]],"date-time":"2026-04-01T18:24:23Z","timestamp":1775067863538,"version":"3.50.1"},"reference-count":57,"publisher":"Springer Science and Business Media LLC","issue":"10","license":[{"start":{"date-parts":[[2024,1,7]],"date-time":"2024-01-07T00:00:00Z","timestamp":1704585600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"},{"start":{"date-parts":[[2024,1,7]],"date-time":"2024-01-07T00:00:00Z","timestamp":1704585600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"}],"funder":[{"name":"Mehmet Akif Ersoy University"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Neural Comput &amp; Applic"],"published-print":{"date-parts":[[2024,4]]},"abstract":"<jats:title>Abstract<\/jats:title><jats:p>Smartphones utilize various authentication methods, including passwords, fingerprints, and face recognition. While this information is quite practical and easy to remember, it introduces several security issues. The primary concerns involve theft, password forgetfulness, or unauthorized password copying. Implementing behavioral biometrics for user authentication adds an extra layer of security. The main contribution of this study is the utilization of soft keyboard typing behavior, a behavioral biometric, for continuous user recognition. To achieve this, the phone's grip style and typing characteristics of users are scrutinized using data collected from motion sensors and the touchscreen panel. Another challenge in mobile device authentication pertains to recognition accuracy and processing time. To expedite and optimize data classification, a hybrid classification structure is suggested. This structure incorporates correlation-based feature selection and a straightforward logistic regression method, offering rapid and highly accurate classification outcomes\u2014a further contribution of this study. Experimental results demonstrate that user identification can be accomplished in as little as 0.03\u00a0ms, with a classification accuracy of up to 93%. Continuous authentication systems offer greater security compared to one-time authentication systems. Nevertheless, these systems might not always yield the most precise results. Overcoming this challenge necessitates the development of an efficient software architecture. In line with this, an additional contribution of this study is an explanation of how to construct a continuous authentication system using the developed architecture.<\/jats:p>","DOI":"10.1007\/s00521-023-09360-9","type":"journal-article","created":{"date-parts":[[2024,1,7]],"date-time":"2024-01-07T15:02:06Z","timestamp":1704639726000},"page":"5433-5445","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":17,"title":["Machine learning-based novel continuous authentication system using soft keyboard typing behavior and motion sensor data"],"prefix":"10.1007","volume":"36","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-7463-1150","authenticated-orcid":false,"given":"Ensar Arif","family":"Sa\u011fba\u015f","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-4825-139X","authenticated-orcid":false,"given":"Serkan","family":"Ball\u0131","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"297","published-online":{"date-parts":[[2024,1,7]]},"reference":[{"issue":"6","key":"9360_CR1","doi-asserted-by":"crossref","first-page":"5008","DOI":"10.1109\/JIOT.2020.2975779","volume":"7","author":"M Abuhamad","year":"2020","unstructured":"Abuhamad M, Abuhmed T, Mohaisen D, Nyang D (2020) AUToSen: Deep-learning-based implicit continuous authentication using smartphone sensors. IEEE Internet Things J 7(6):5008\u20135020","journal-title":"IEEE Internet Things J"},{"key":"9360_CR2","doi-asserted-by":"crossref","unstructured":"Acien A, Morales A, Vera-Rodriguez R, Fierrez J, Tolosana R (2019) Multilock: mobile active authentication based on multiple biometric and behavioral patterns. In: 1st \u0131nternational workshop on multimodal understanding and learning for embodied applications, pp 53\u201359","DOI":"10.1145\/3347450.3357663"},{"key":"9360_CR3","doi-asserted-by":"crossref","unstructured":"Acien A, Morales A, Vera-Rodriguez R, Fierrez J (2020) Smartphone sensors for modeling human-computer interaction: general outlook and research datasets for user authentication. In: 2020 IEEE 44th annual computers, software, and applications conference (COMPSAC), pp 1273\u20131278 IEEE","DOI":"10.1109\/COMPSAC48688.2020.00-81"},{"issue":"1","key":"9360_CR4","doi-asserted-by":"crossref","first-page":"39","DOI":"10.2478\/ausi-2020-0003","volume":"12","author":"M Antal","year":"2020","unstructured":"Antal M, Fej\u00e9r N (2020) Mouse dynamics based user recognition using deep learning. Acta Univ Sapientiae Inform 12(1):39\u201350","journal-title":"Acta Univ Sapientiae Inform"},{"issue":"4","key":"9360_CR5","doi-asserted-by":"crossref","first-page":"295","DOI":"10.1049\/iet-sen.2018.5046","volume":"13","author":"S Ball\u0131","year":"2019","unstructured":"Ball\u0131 S, Karasoy O (2019) Development of content-based SMS classification application by using Word2Vec-based feature extraction. IET Softw 13(4):295\u2013304","journal-title":"IET Softw"},{"key":"9360_CR6","doi-asserted-by":"crossref","first-page":"111119","DOI":"10.1016\/j.chaos.2021.111119","volume":"150","author":"S Ball\u0131","year":"2021","unstructured":"Ball\u0131 S, \u00d6zdemir E (2021) A novel method for prediction of EuroLeague game results using hybrid feature extraction and machine learning techniques. Chaos Solitons Fractals 150:111119","journal-title":"Chaos Solitons Fractals"},{"issue":"1\u20132","key":"9360_CR7","doi-asserted-by":"crossref","first-page":"37","DOI":"10.1177\/0020294018813692","volume":"52","author":"S Balli","year":"2019","unstructured":"Balli S, Sa\u011fba\u015f EA, Peker M (2019) Human activity recognition from smart watch sensor data using a hybrid of principal component analysis and random forest algorithm. Meas Control 52(1\u20132):37\u201345","journal-title":"Meas Control"},{"key":"9360_CR8","first-page":"21","volume":"22","author":"H Budak","year":"2018","unstructured":"Budak H (2018) Feature selection methods and a new approach. S\u00fcleyman Demirel Univ J Nat Appl Sci 22:21\u201331","journal-title":"S\u00fcleyman Demirel Univ J Nat Appl Sci"},{"key":"9360_CR9","first-page":"89","volume":"44","author":"A Buriro","year":"2019","unstructured":"Buriro A, Crispo B, Conti M (2019) AnswerAuth: a bimodal behavioral biometric-based user authentication scheme for smartphones. J inf security appl 44:89\u2013103","journal-title":"J inf security appl"},{"key":"9360_CR10","doi-asserted-by":"crossref","unstructured":"da Silva Cruz MA, Goldschmidt RR (2019) Deep neural networks applied to user recognition based on keystroke dynamics: learning from raw data. In: Proceedings of the XV Brazilian symposium on \u0131nformation systems, pp 1\u20138","DOI":"10.1145\/3330204.3330245"},{"key":"9360_CR11","doi-asserted-by":"publisher","DOI":"10.32604\/cmc.2022.020847","author":"RM Devi","year":"2022","unstructured":"Devi RM, Premkumar M, Jangir P, Elkotb MA, Elavarasan RM, Nisar KS (2022) IRKO: an \u0131mproved Runge-Kutta optimization algorithm for global optimization problems. Comput Mater Contin. https:\/\/doi.org\/10.32604\/cmc.2022.020847","journal-title":"Comput Mater Contin"},{"key":"9360_CR12","first-page":"96","volume":"8","author":"F Evliyao\u011flu","year":"2015","unstructured":"Evliyao\u011flu F (2015) The success of biometric identification techniques for preventing healthcare abuse. Sos G\u00fcvence 8:96\u2013118","journal-title":"Sos G\u00fcvence"},{"key":"9360_CR13","doi-asserted-by":"crossref","unstructured":"Feng T, Liu Z, Kwon KA, Shi W, Carbunar B, Jiang Y, Nguyen N (2012) Continuous mobile authentication using touchscreen gestures. In: 2012 IEEE conference on technologies for homeland security (HST), pp 451\u2013456 IEEE","DOI":"10.1109\/THS.2012.6459891"},{"issue":"2","key":"9360_CR14","doi-asserted-by":"crossref","first-page":"337","DOI":"10.1214\/aos\/1016218223","volume":"28","author":"J Friedman","year":"2000","unstructured":"Friedman J, Hastie T, Tibshirani R (2000) Additive logistic regression: a statistical view of boosting (with discussion and a rejoinder by the authors). Ann Stat 28(2):337\u2013407","journal-title":"Ann Stat"},{"issue":"1","key":"9360_CR15","first-page":"1483","volume":"16","author":"M Ghasemi","year":"2022","unstructured":"Ghasemi M, Akbari MA, Jun C, Bateni SM, Zare M, Zahedi A, Chau KW (2022) Circulatory system based optimization (CSBO): an expert multilevel biologically inspired meta-heuristic algorithm. Eng Appl Comput Fluid Mech 16(1):1483\u20131525","journal-title":"Eng Appl Comput Fluid Mech"},{"key":"9360_CR16","doi-asserted-by":"crossref","first-page":"113176","DOI":"10.1016\/j.eswa.2020.113176","volume":"146","author":"O Gokalp","year":"2020","unstructured":"Gokalp O, Tasci E, Ugur A (2020) A novel wrapper feature selection algorithm based on iterated greedy metaheuristic for sentiment classification. Expert Syst Appl 146:113176","journal-title":"Expert Syst Appl"},{"issue":"3","key":"9360_CR17","doi-asserted-by":"crossref","first-page":"121","DOI":"10.1007\/s12046-021-01641-0","volume":"46","author":"D Gupta","year":"2021","unstructured":"Gupta D, Dhar AR, Roy SS (2021) A partition cum unification based genetic-firefly algorithm for single objective optimization. S\u0101dhan\u0101 46(3):121","journal-title":"S\u0101dhan\u0101"},{"key":"9360_CR18","unstructured":"Hall M (1999) Correlation-based feature selection for machine learning, the university of Waikato, PhD Thesis, Hamilton"},{"key":"9360_CR19","doi-asserted-by":"crossref","first-page":"38943","DOI":"10.1109\/ACCESS.2021.3063424","volume":"9","author":"\u00d6D Incel","year":"2021","unstructured":"Incel \u00d6D, G\u00fcnay S, Akan Y, Barlas Y, Basar OE, Alptekin GI, Isbilen M (2021) DAKOTA: sensor and touch screen-based continuous authentication on a mobile banking application. IEEE Access 9:38943\u201338960","journal-title":"IEEE Access"},{"key":"9360_CR20","unstructured":"Kose M, Incel OD, Ersoy C (2012) Online human activity recognition on smart phones. In: workshop on mobile sensing: from smartphones and wearables to big data, vol 16(2012), pp 11\u201315"},{"issue":"1\u20132","key":"9360_CR21","doi-asserted-by":"crossref","first-page":"161","DOI":"10.1007\/s10994-005-0466-3","volume":"59","author":"N Landwehr","year":"2005","unstructured":"Landwehr N, Hall M, Frank E (2005) Logistic model trees. Mach learn 59(1\u20132):161\u2013205","journal-title":"Mach learn"},{"issue":"3","key":"9360_CR22","doi-asserted-by":"crossref","first-page":"243","DOI":"10.1007\/s00521-004-0460-x","volume":"14","author":"IC Lin","year":"2005","unstructured":"Lin IC, Ou HH, Hwang MS (2005) A user authentication system using back-propagation network. Neural Comput Appl 14(3):243\u2013249","journal-title":"Neural Comput Appl"},{"issue":"3","key":"9360_CR23","doi-asserted-by":"crossref","first-page":"53","DOI":"10.1109\/TCSS.2016.2517648","volume":"2","author":"L Lu","year":"2015","unstructured":"Lu L, Liu Y (2015) Safeguard: User reauthentication on smartphones via behavioral biometrics. IEEE Trans on Comput Soc Syst 2(3):53\u201364","journal-title":"IEEE Trans on Comput Soc Syst"},{"issue":"1","key":"9360_CR24","doi-asserted-by":"crossref","first-page":"447","DOI":"10.1109\/TNET.2019.2891733","volume":"27","author":"L Lu","year":"2019","unstructured":"Lu L, Yu J, Chen Y, Liu H, Zhu Y, Kong L, Li M (2019) Lip reading-based user authentication through acoustic sensing on smartphones. IEEE\/ACM Trans Netw 27(1):447\u2013460","journal-title":"IEEE\/ACM Trans Netw"},{"key":"9360_CR25","doi-asserted-by":"crossref","first-page":"101861","DOI":"10.1016\/j.cose.2020.101861","volume":"96","author":"X Lu","year":"2020","unstructured":"Lu X, Zhang S, Hui P, Lio P (2020) Continuous authentication by free-text keystroke based on CNN and RNN. Comput Secur 96:101861","journal-title":"Comput Secur"},{"issue":"22","key":"9360_CR26","doi-asserted-by":"crossref","first-page":"16819","DOI":"10.1007\/s00521-018-3929-8","volume":"32","author":"Z Ma","year":"2020","unstructured":"Ma Z, Liu Y, Wang Z, Ge H, Zhao M (2020) A machine learning-based scheme for the security analysis of authentication and key agreement protocols. Neural Comput Appl 32(22):16819\u201316831","journal-title":"Neural Comput Appl"},{"key":"9360_CR27","doi-asserted-by":"crossref","first-page":"174","DOI":"10.1016\/j.cose.2018.07.001","volume":"78","author":"T Nguyen","year":"2018","unstructured":"Nguyen T, Memon N (2018) Tap-based user authentication for smartwatches. Comput Secur 78:174\u2013186","journal-title":"Comput Secur"},{"key":"9360_CR28","first-page":"59","volume-title":"The analysis of feature selection methods in text classification","author":"A Onan","year":"2016","unstructured":"Onan A, Koruko\u011flu S (2016) The analysis of feature selection methods in text classification. Academic Computing, Ayd\u0131n, pp 59\u201366"},{"issue":"3","key":"9360_CR29","doi-asserted-by":"crossref","first-page":"549","DOI":"10.1109\/TFUZZ.2019.2956896","volume":"29","author":"Z Qin","year":"2019","unstructured":"Qin Z, Huang G, Xiong H, Qin Z, Choo KKR (2019) A fuzzy authentication system based on neural network learning and extreme value statistics. IEEE Trans Fuzzy Syst 29(3):549\u2013559","journal-title":"IEEE Trans Fuzzy Syst"},{"key":"9360_CR30","doi-asserted-by":"crossref","unstructured":"Ramadan A, Hemeda H, Sarhan A (2017) Touch-input based continuous authentication using gesture-level and session-level features. In: 2017 8th IEEE annual \u0131nformation technology, electronics and mobile communication conference (IEMCON), pp 222\u2013229 IEEE","DOI":"10.1109\/IEMCON.2017.8117198"},{"issue":"4","key":"9360_CR31","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1007\/s10916-020-1530-z","volume":"44","author":"EA Sa\u011fba\u015f","year":"2020","unstructured":"Sa\u011fba\u015f EA, Korukoglu S, Balli S (2020) Stress detection via keyboard typing behaviors by using smartphone sensors and machine learning techniques. J Med Syst 44(4):1\u201312","journal-title":"J Med Syst"},{"issue":"2","key":"9360_CR32","doi-asserted-by":"crossref","first-page":"333","DOI":"10.5505\/pajes.2021.88724","volume":"28","author":"EA Sa\u011fba\u015f","year":"2022","unstructured":"Sa\u011fba\u015f EA, Korukoglu S, Balli S (2022) Stress detection on smartphone data with a machine learning approach based on Mahalanobis distance-based outlier finding and ReliefF feature selection. Pamukkale Univ J Eng Sci 28(2):333\u2013345","journal-title":"Pamukkale Univ J Eng Sci"},{"issue":"1","key":"9360_CR33","first-page":"239","volume":"35","author":"EA Sa\u011fba\u015f","year":"2023","unstructured":"Sa\u011fba\u015f EA (2023) A comparative study on text sentiment classification by using filter-based feature selection methods. F\u0131rat Univ J Eng Sci 35(1):239\u2013250","journal-title":"F\u0131rat Univ J Eng Sci"},{"key":"9360_CR34","doi-asserted-by":"publisher","DOI":"10.1007\/s11042-023-15706-1","author":"EA Sa\u011fba\u015f","year":"2023","unstructured":"Sa\u011fba\u015f EA, Korukoglu S, Ball\u0131 S (2023) Real-time stress detection from smartphone sensor data using genetic algorithm-based feature subset optimization and k-nearest neighbor algorithm. Multimed Tools and Appl. https:\/\/doi.org\/10.1007\/s11042-023-15706-1","journal-title":"Multimed Tools and Appl"},{"issue":"15","key":"9360_CR35","doi-asserted-by":"crossref","first-page":"5160","DOI":"10.3390\/app10155160","volume":"10","author":"SS Sammen","year":"2020","unstructured":"Sammen SS, Ghorbani MA, Malik A, Tikhamarine Y, AmirRahmani M, Al-Ansari N, Chau KW (2020) Enhanced artificial neural network with Harris hawks optimization for predicting scour depth downstream of ski-jump spillway. Appl Sci 10(15):5160","journal-title":"Appl Sci"},{"issue":"3","key":"9360_CR36","doi-asserted-by":"crossref","first-page":"345","DOI":"10.3390\/s16030345","volume":"16","author":"C Shen","year":"2016","unstructured":"Shen C, Yu T, Yuan S, Li Y, Guan X (2016) Performance analysis of motion-sensor behavior for user authentication on smartphones. Sensors 16(3):345","journal-title":"Sensors"},{"key":"9360_CR37","doi-asserted-by":"crossref","first-page":"210","DOI":"10.1016\/j.compstruct.2017.03.070","volume":"172","author":"JP Shen","year":"2017","unstructured":"Shen JP, Li C (2017) A semi-continuum-based bending analysis for extreme-thin micro\/nano-beams and new proposal for nonlocal differential constitution. Compos Struct 172:210\u2013220","journal-title":"Compos Struct"},{"issue":"6","key":"9360_CR38","doi-asserted-by":"crossref","first-page":"10146","DOI":"10.3390\/s140610146","volume":"14","author":"M Shoaib","year":"2014","unstructured":"Shoaib M, Bosch S, Incel OD, Scholten H, Havinga PJ (2014) Fusion of smartphone motion sensors for physical activity recognition. Sensors 14(6):10146\u201310176","journal-title":"Sensors"},{"issue":"4","key":"9360_CR39","doi-asserted-by":"crossref","first-page":"426","DOI":"10.3390\/s16040426","volume":"16","author":"M Shoaib","year":"2016","unstructured":"Shoaib M, Bosch S, Incel OD, Scholten H, Havinga PJ (2016) Complex human activity recognition using smartphone and wrist-worn motion sensors. Sensors 16(4):426","journal-title":"Sensors"},{"key":"9360_CR40","doi-asserted-by":"crossref","first-page":"140","DOI":"10.1016\/j.cose.2019.02.001","volume":"83","author":"M Smith-Creasey","year":"2019","unstructured":"Smith-Creasey M, Rajarajan M (2019) A novel word-independent gesture-typing continuous authentication scheme for mobile devices. Comput Secur 83:140\u2013150","journal-title":"Comput Secur"},{"issue":"4","key":"9360_CR41","first-page":"152","volume":"12","author":"NC Srikar","year":"2020","unstructured":"Srikar NC, Sasidhar B, Chanukya OV, Suggala RP (2020) User recognition using voice and appliance automation. J Interdiscip Cycle Res 12(4):152\u2013158","journal-title":"J Interdiscip Cycle Res"},{"key":"9360_CR42","first-page":"683","volume":"9","author":"R \u015eaml\u0131","year":"2009","unstructured":"\u015eaml\u0131 R, Y\u00fcksel ME (2009) Biyometrik G\u00fcvenlik Sistemleri. Akad Bili\u015fim 9:683\u2013689","journal-title":"Akad Bili\u015fim"},{"issue":"3","key":"9360_CR43","first-page":"1","volume":"38","author":"B \u015een","year":"2014","unstructured":"\u015een B, Peker M, \u00c7avu\u015fo\u011flu A, \u00c7elebi FV (2014) A comparative study on classification of sleep stage based on EEG signals using feature selection and classification algorithms. J Med Syst 38(3):1\u201321","journal-title":"J Med Syst"},{"key":"9360_CR44","doi-asserted-by":"crossref","first-page":"210","DOI":"10.1016\/j.cose.2016.03.003","volume":"59","author":"PS Teh","year":"2016","unstructured":"Teh PS, Zhang N, Teoh ABJ, Chen K (2016) A survey on touch dynamics authentication in mobile devices. Comput Secur 59:210\u2013235","journal-title":"Comput Secur"},{"key":"9360_CR45","doi-asserted-by":"crossref","unstructured":"Tse KW, Hung K (2019) Behavioral biometrics scheme with keystroke and swipe dynamics for user authentication on mobile platform. In: 2019 IEEE 9th symposium on computer applications & \u0131ndustrial electronics (ISCAIE), pp 125\u2013130 IEEE","DOI":"10.1109\/ISCAIE.2019.8743995"},{"issue":"20","key":"9360_CR46","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1007\/s00521-022-07402-2","volume":"34","author":"B Uzun","year":"2022","unstructured":"Uzun B, Ball\u0131 S (2022) A novel method for intrusion detection in computer networks by identifying multivariate outliers and Relief feature selection. Neural Comput Appl 34(20):1\u20136","journal-title":"Neural Comput Appl"},{"key":"9360_CR47","doi-asserted-by":"crossref","first-page":"14186","DOI":"10.1109\/ACCESS.2019.2894535","volume":"7","author":"X Wang","year":"2019","unstructured":"Wang X, Xue H, Liu X, Pei Q (2019) A privacy-preserving edge computation-based face verification system for user authentication. IEEE Access 7:14186\u201314197","journal-title":"IEEE Access"},{"key":"9360_CR48","unstructured":"Web-1: https:\/\/www.perkotek.com\/biyometrik-tanima-sistemleri-nedir\/. Accessed 15 mar 2021"},{"key":"9360_CR49","unstructured":"Web-2: https:\/\/lost-contact.mit.edu\/afs\/\/cs.wisc.edu\/unsup\/weka-3.6.4\/doc\/weka\/classifiers\/functions\/SimpleLogistic.html. Accessed 23 mar 2021"},{"key":"9360_CR50","doi-asserted-by":"publisher","DOI":"10.1155\/2018\/2520706","author":"A Wosiak","year":"2018","unstructured":"Wosiak A, Zakrzewska D (2018) Integrating correlation-based feature selection and clustering for improved cardiovascular disease diagnosis. Complexity. https:\/\/doi.org\/10.1155\/2018\/2520706","journal-title":"Complexity"},{"key":"9360_CR51","unstructured":"Xu H, Zhou Y, Lyu MR (2014) Towards continuous and passive authentication via touch biometrics: an experimental study on smartphones. In: 10th symposium on usable privacy and security (SOUPS), pp 187\u2013198"},{"key":"9360_CR52","doi-asserted-by":"crossref","first-page":"9","DOI":"10.1016\/j.adhoc.2018.09.015","volume":"84","author":"Y Yang","year":"2019","unstructured":"Yang Y, Guo B, Wang Z, Li M, Yu Z, Zhou X (2019) Behavesense: continuous authentication for security-sensitive mobile apps using behavioral biometrics. Ad Hoc Netw 84:9\u201318","journal-title":"Ad Hoc Netw"},{"issue":"4","key":"9360_CR53","doi-asserted-by":"crossref","first-page":"3929","DOI":"10.1007\/s13369-018-03703-8","volume":"44","author":"AS Yuksel","year":"2019","unstructured":"Yuksel AS, Senel FA, Cankaya IA (2019) Classification of soft keyboard typing behaviors using mobile device sensors with machine learning. Arab J Sci Eng 44(4):3929\u20133942","journal-title":"Arab J Sci Eng"},{"issue":"1","key":"9360_CR54","first-page":"1811","volume":"15","author":"N Zhao","year":"2021","unstructured":"Zhao N, Ghaemi A, Wu C, Band SS, Chau KW, Zaguia A, Mosavi AH (2021) A decomposition and multi-objective evolutionary optimization model for suspended sediment load prediction in rivers. Eng Appl Comput Fluid Mech 15(1):1811\u20131829","journal-title":"Eng Appl Comput Fluid Mech"},{"key":"9360_CR55","doi-asserted-by":"crossref","unstructured":"Zhao X, Feng T, Shi W (2013) Continuous mobile authentication using a novel graphic touch gesture feature. In: 2013 IEEE sixth international conference on biometrics: theory, applications and systems (BTAS), pp 1\u20136 IEEE","DOI":"10.1109\/BTAS.2013.6712747"},{"key":"9360_CR56","doi-asserted-by":"crossref","unstructured":"Zheng N, Bai K, Huang H, Wang H (2014) You are how you touch: user verification on smartphones via tapping behaviors. In: 2014 IEEE 22nd \u0131nternational conference on network protocols, pp 221\u2013232 IEEE","DOI":"10.1109\/ICNP.2014.43"},{"issue":"14","key":"9360_CR57","doi-asserted-by":"crossref","first-page":"3876","DOI":"10.3390\/s20143876","volume":"20","author":"T Zhu","year":"2020","unstructured":"Zhu T, Weng Z, Chen G, Fu L (2020) A hybrid deep learning system for real-world mobile user authentication using motion sensors. Sensors 20(14):3876","journal-title":"Sensors"}],"container-title":["Neural Computing and Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s00521-023-09360-9.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s00521-023-09360-9\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s00521-023-09360-9.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,3,8]],"date-time":"2024-03-08T21:59:12Z","timestamp":1709935152000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s00521-023-09360-9"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,1,7]]},"references-count":57,"journal-issue":{"issue":"10","published-print":{"date-parts":[[2024,4]]}},"alternative-id":["9360"],"URL":"https:\/\/doi.org\/10.1007\/s00521-023-09360-9","relation":{},"ISSN":["0941-0643","1433-3058"],"issn-type":[{"value":"0941-0643","type":"print"},{"value":"1433-3058","type":"electronic"}],"subject":[],"published":{"date-parts":[[2024,1,7]]},"assertion":[{"value":"15 December 2022","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"7 December 2023","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"7 January 2024","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare that they have no known competing financial interests or personal relationships that could have appeared to influence the work reported in this paper.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Competing interest"}},{"value":"All procedures performed in studies involving human participants were in accordance with the ethical standards of the institutional and\/or national research committee and with the 1964 Helsinki declaration and its later amendments or comparable ethical standards. The study was reviewed and approved by the Scientific Research and Publication Ethics Boards, Ege University (Ethics approval protocol number: 11\/01-362, date: 26.11.2019).","order":3,"name":"Ethics","group":{"name":"EthicsHeading","label":"Ethics approval"}},{"value":"Informed consent was obtained from all individual participants included in the study.","order":4,"name":"Ethics","group":{"name":"EthicsHeading","label":"Informed consent"}}]}}