{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,21]],"date-time":"2025-06-21T10:40:04Z","timestamp":1750502404554,"version":"3.41.0"},"reference-count":48,"publisher":"Springer Science and Business Media LLC","issue":"3","license":[{"start":{"date-parts":[[2025,6,1]],"date-time":"2025-06-01T00:00:00Z","timestamp":1748736000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2025,6,1]],"date-time":"2025-06-01T00:00:00Z","timestamp":1748736000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Int. J. Inf. Secur."],"published-print":{"date-parts":[[2025,6]]},"DOI":"10.1007\/s10207-025-01068-2","type":"journal-article","created":{"date-parts":[[2025,6,7]],"date-time":"2025-06-07T09:32:54Z","timestamp":1749288774000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["DOT-C: A smartphone unlock scheme based on dot-dot connection in IoT-enabled smart cities"],"prefix":"10.1007","volume":"24","author":[{"given":"Wenjuan","family":"Li","sequence":"first","affiliation":[]},{"given":"Stefan","family":"Tan","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,6,7]]},"reference":[{"key":"1068_CR1","unstructured":"Smart cities - European Commission. (accessed on 10 March 2025). https:\/\/commission.europa.eu\/eu-regional-and-urban-development\/topics\/cities-and-urban-development\/city-initiatives\/smart-cities_en"},{"key":"1068_CR2","unstructured":"Smart Cities Market Size, Share & Trends Analysis Report. (accessed on 2 March 2025). https:\/\/www.grandviewresearch.com\/industry-analysis\/smart-cities-market"},{"key":"1068_CR3","unstructured":"Internet of Things (IoT) Market Size, Share & Industry Analysis. (accessed on 1 March 2025). https:\/\/www.fortunebusinessinsights.com\/industry-reports\/internet-of-things-iot-market-100307"},{"key":"1068_CR4","unstructured":"Weka: Machine Learning Software in Java. (accessed on 1 December 2024). https:\/\/www.cs.waikato.ac.nz\/ml\/weka\/"},{"issue":"5","key":"1068_CR5","doi-asserted-by":"publisher","first-page":"6062","DOI":"10.1109\/JIOT.2025.3525494","volume":"12","author":"UC Akuthota","year":"2025","unstructured":"Akuthota, U.C., Bhargava, L.: Transformer-Based Intrusion Detection for IoT Networks. IEEE Internet Things J. 12(5), 6062\u20136067 (2025)","journal-title":"IEEE Internet Things J."},{"issue":"6","key":"1068_CR6","doi-asserted-by":"publisher","first-page":"1833","DOI":"10.1007\/s10207-023-00721-y","volume":"22","author":"AF Baig","year":"2023","unstructured":"Baig, A.F., Eskeland, S., Yang, B.: Privacy-preserving continuous authentication using behavioral biometrics. Int. J. Inf. Sec. 22(6), 1833\u20131847 (2023)","journal-title":"Int. J. Inf. Sec."},{"issue":"109091","key":"1068_CR7","first-page":"1","volume":"178","author":"SC Cha","year":"2023","unstructured":"Cha, S.C., Meng, W., Li, W.W., Yeh, K.H.: A Blockchain-enabled IoT Auditing Management System Complying with ISO\/IEC 15408\u20132. Computers & Industrial Engineering 178(109091), 1\u201311 (2023)","journal-title":"Computers & Industrial Engineering"},{"key":"1068_CR8","doi-asserted-by":"crossref","unstructured":"Chen, T., Meng, W., Li, W.: User Authentication Based on the Integration of Musical Signals and Ear Canal Acoustics. The 23rd IEEE International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom), pp. 717-728, IEEE, (2024)","DOI":"10.1109\/TrustCom63139.2024.00111"},{"issue":"103020","key":"1068_CR9","first-page":"1","volume":"63","author":"WY Chiu","year":"2021","unstructured":"Chiu, W.Y., Meng, W., Jensen, C.D.: My Data, My Control: A Secure Data Sharing and Access Scheme over Blockchain. Journal of Information Security and Applications, vo. 63(103020), 1\u201311 (2021). (Elsevier)","journal-title":"Journal of Information Security and Applications, vo."},{"issue":"7","key":"1068_CR10","doi-asserted-by":"publisher","first-page":"7957","DOI":"10.1109\/TII.2022.3215606","volume":"19","author":"WY Chiu","year":"2023","unstructured":"Chiu, W.Y., Meng, W., Ge, C.: NoSneaky A Blockchain-based Execution Integrity Protection Scheme in Industry 4.0. IEEE Trans. Industr. Inf. 19(7), 7957\u20137965 (2023). (IEEE)","journal-title":"IEEE Trans. Industr. Inf."},{"key":"1068_CR11","doi-asserted-by":"crossref","unstructured":"De Luca, A., Hang, A., Brudy, F., Lindner, C., Hussmann, H.: Touch me once and i know it\u2019s you!: implicit authentication based on touch screen patterns. CHI 987-996 (2012)","DOI":"10.1145\/2207676.2208544"},{"key":"1068_CR12","doi-asserted-by":"crossref","unstructured":"Findling, R.D., Mayrhofer, R.: Towards face unlock: on the difficulty of reliably detecting faces on mobile phones. MoMM 275-280 (2012)","DOI":"10.1145\/2428955.2429008"},{"key":"1068_CR13","doi-asserted-by":"crossref","unstructured":"Forman, T.J., Aviv, A.J.: Double Patterns: A Usable Solution to Increase the Security of Android Unlock Patterns. ACSAC 219-233 (2020)","DOI":"10.1145\/3427228.3427252"},{"key":"1068_CR14","doi-asserted-by":"crossref","unstructured":"Han, Y., Han, J., Meng, W., Lai, J., Wu, G.: Blockchain-based Privacy-preserving Public Key Searchable Encryption with Strong Traceability. Journal of Systems Architecture, vol. 155, 103264, pp. 1-14, Elsevier, (2024)","DOI":"10.1016\/j.sysarc.2024.103264"},{"issue":"3","key":"1068_CR15","doi-asserted-by":"publisher","first-page":"279","DOI":"10.1007\/s10207-019-00462-x","volume":"19","author":"W Meng","year":"2020","unstructured":"Meng, W., Li, W., Yang, L.T., Li, P.: Enhancing Challenge-based Collaborative Intrusion Detection Networks Against Insider Attacks using Blockchain. Int. J. Inf. Secur. 19(3), 279\u2013290 (2020)","journal-title":"Int. J. Inf. Secur."},{"key":"1068_CR16","doi-asserted-by":"publisher","first-page":"213","DOI":"10.1016\/j.cose.2016.11.010","volume":"65","author":"W Meng","year":"2017","unstructured":"Meng, W., Li, W., Kwok, L.F., Choo, K.K.R.: Towards Enhancing Click-Draw Based Graphical Passwords Using Multi-Touch Behaviours on Smartphones. Computers & Security 65, 213\u2013229 (2017)","journal-title":"Computers & Security"},{"key":"1068_CR17","doi-asserted-by":"crossref","unstructured":"Meng, W., Li, W., Wong, D.S., Zhou, J.: TMGuard: A Touch Movement-Based Security Mechanism for Screen Unlock Patterns on Smartphones. ACNS 629-647 (2016)","DOI":"10.1007\/978-3-319-39555-5_34"},{"key":"1068_CR18","doi-asserted-by":"crossref","unstructured":"Meng, W., Lee, W.H., Liu, Z., Su, C., Li, Y.: Evaluating the Impact of Juice Filming Charging Attack in Practical Environments. In: Proceedings of ICISC, pp. 327-338, (2017)","DOI":"10.1007\/978-3-319-78556-1_18"},{"key":"1068_CR19","doi-asserted-by":"crossref","unstructured":"Meng, W., Lee, W.H., Au, M.H., Liu, Z.: Exploring Effect of Location Number on Map-Based Graphical Password Authentication. In: Proceedings of the 22nd Australasian Conference on Information Security and Privacy (ACISP), 301-313, (2017)","DOI":"10.1007\/978-3-319-59870-3_17"},{"key":"1068_CR20","doi-asserted-by":"crossref","unstructured":"Meng, W., Fei, F., Li, W., Au, M.H.: Harvesting Smartphone Privacy Through Enhanced Juice Filming Charging Attacks. In: Proceedings of ISC, pp. 291-308, (2017)","DOI":"10.1007\/978-3-319-69659-1_16"},{"issue":"2","key":"1068_CR21","doi-asserted-by":"publisher","first-page":"1856","DOI":"10.1109\/JIOT.2024.3465891","volume":"12","author":"W Meng","year":"2025","unstructured":"Meng, W., Li, W., Calugar, A.N.: BANN-TMGuard: Toward Touch-Movement-Based Screen Unlock Patterns via Blockchain-Enabled Artificial Neural Networks on IoT Devices. IEEE Internet Things J. 12(2), 1856\u20131866 (2025)","journal-title":"IEEE Internet Things J."},{"issue":"16","key":"1068_CR22","doi-asserted-by":"publisher","first-page":"26955","DOI":"10.1109\/JIOT.2024.3397364","volume":"11","author":"Z Jiang","year":"2024","unstructured":"Jiang, Z., Li, J., Hu, Q., Meng, W., Pedrycz, W., Su, Z.: Scalable Graph-Aware Edge Representation Learning for Wireless IoT Intrusion Detection. IEEE Internet Things J. 11(16), 26955\u201326969 (2024). (IEEE)","journal-title":"IEEE Internet Things J."},{"key":"1068_CR23","doi-asserted-by":"crossref","unstructured":"Kidmose, B., Meng, W.: can-fp: An attack-aware analysis of false alarms in automotive intrusion detection models. The 21st Annual International Conference on Privacy, Security, and Trust (PST), pp. 1-12, IEEE, (2024)","DOI":"10.1109\/PST62714.2024.10788039"},{"key":"1068_CR24","doi-asserted-by":"crossref","unstructured":"Li, W., Tan, J., Meng, W., Wang, Y., Li, J.: SwipeVLock: A Supervised Unlocking Mechanism Based on Swipe Behavior on Smartphones. The 2nd International Conference on Machine Learning for Cyber Security (ML4CS), pp, 140-153, (2019)","DOI":"10.1007\/978-3-030-30619-9_11"},{"key":"1068_CR25","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2020.102687","volume":"165","author":"W Li","year":"2020","unstructured":"Li, W., Tan, J., Meng, W., Wang, Y.: A swipe-based unlocking mechanism with supervised learning on smartphones: Design and evaluation. J. Netw. Comput. Appl. 165, 102687 (2020)","journal-title":"J. Netw. Comput. Appl."},{"key":"1068_CR26","doi-asserted-by":"publisher","DOI":"10.1016\/j.jisa.2020.102591","volume":"55","author":"W Li","year":"2020","unstructured":"Li, W., Wang, Y., Li, J., Xiang, Y.: Towards Supervised Shape-based Behavioral Authentication on Smartphones. Journal of Information Security and Applications 55, 102591 (2020)","journal-title":"Journal of Information Security and Applications"},{"issue":"1","key":"1068_CR27","doi-asserted-by":"publisher","first-page":"382","DOI":"10.1007\/s11036-021-01842-1","volume":"27","author":"W Li","year":"2022","unstructured":"Li, W., Wang, Y., Tan, J., Zhu, N.: DCUS: Evaluating Double-Click-Based Unlocking Scheme on Smartphones. Mob. Networks Appl. 27(1), 382\u2013391 (2022)","journal-title":"Mob. Networks Appl."},{"key":"1068_CR28","doi-asserted-by":"crossref","unstructured":"Li, W., Tan, J., Zhu, N.: Double-X: Towards Double-Cross-Based Unlock Mechanism on Smartphones. SEC: 412-428 (2022)","DOI":"10.1007\/978-3-031-06975-8_24"},{"issue":"4","key":"1068_CR29","doi-asserted-by":"publisher","first-page":"120","DOI":"10.1109\/MNET.013.2100768","volume":"36","author":"W Li","year":"2022","unstructured":"Li, W., Meng, W.: BCTrustFrame: Enhancing Trust Management via Blockchain and IPFS in 6G Era. IEEE Network 36(4), 120\u2013125 (2022). (IEEE)","journal-title":"IEEE Network"},{"key":"1068_CR30","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2023.103204","volume":"129","author":"W Li","year":"2023","unstructured":"Li, W., Tan, J., Zhu, N.: Design of Double-Cross-based Smartphone Unlock Mechanism. Computers & Security 129, 103204 (2023). (Elsevier)","journal-title":"Computers & Security"},{"issue":"1","key":"1068_CR31","doi-asserted-by":"publisher","first-page":"3985","DOI":"10.1109\/TCE.2023.3280064","volume":"70","author":"W Li","year":"2024","unstructured":"Li, W., Gleerup, T., Tan, J., Wang, Y.: A Security Enhanced Android Unlock Scheme Based on Pinch-to-Zoom for Smart Devices. IEEE Trans. Consumer Electron. 70(1), 3985\u20133993 (2024)","journal-title":"IEEE Trans. Consumer Electron."},{"key":"1068_CR32","doi-asserted-by":"publisher","first-page":"10000","DOI":"10.1109\/TIFS.2024.3480363","volume":"19","author":"J Li","year":"2024","unstructured":"Li, J., Yi, Q., Lim, M.K., Yi, S., Zhu, P., Huang, X.: MBBFAuth: Multimodal Behavioral Biometrics Fusion for Continuous Authentication on Non-Portable Devices. IEEE Trans. Inf. Forensics Secur. 19, 10000\u201310015 (2024)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"issue":"101898","key":"1068_CR33","first-page":"1","volume":"96","author":"Z Ma","year":"2020","unstructured":"Ma, Z., Liu, L., Meng, W.: Towards Multiple-Mix-Attack Detection via Consensus-based Trust Management in IoT Networks. Computers & Security 96(101898), 1\u201321 (2020). (Elsevier)","journal-title":"Computers & Security"},{"key":"1068_CR34","unstructured":"Godeke, A., Meng, W., Wang, Y.: Towards Alarm Reduction in Intrusion Detection: A Recurrent Neural Network Approach. The 26th IEEE International Conference on High Performance Computing and Communications (HPCC), In Press, IEEE, (2024)"},{"key":"1068_CR35","doi-asserted-by":"crossref","unstructured":"Guo, Y., Yang, L., Ding, X., Han, J., Liu, Y.: OpenSesame: Unlocking smart phone through handshaking biometrics. INFOCOM: 365-369 (2013)","DOI":"10.1109\/INFCOM.2013.6566796"},{"key":"1068_CR36","doi-asserted-by":"crossref","unstructured":"Izuta, R., Murao, K., Terada, T., Iso, T., Inamura, H., Tsukamoto, M.: Screen Unlocking Method using Behavioral Characteristics when Taking Mobile Phone from Pocket. MoMM 110-114 (2016)","DOI":"10.1145\/3007120.3007162"},{"key":"1068_CR37","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1016\/j.comcom.2024.107983","volume":"228","author":"Z Rao","year":"2024","unstructured":"Rao, Z., Xu, Y., Yao, Y., Meng, W.: DAR-DRL: A Dynamic Adaptive Routing Method based on Deep Reinforcement Learning. Comput. Commun. 228, 1\u201315 (2024). (Elsevier)","journal-title":"Comput. Commun."},{"issue":"1","key":"1068_CR38","doi-asserted-by":"publisher","first-page":"1589","DOI":"10.1109\/JIOT.2023.3289935","volume":"11","author":"Z Shen","year":"2024","unstructured":"Shen, Z., Li, S., Zhao, X., Zou, J.: IncreAuth: Incremental-Learning-Based Behavioral Biometric Authentication on Smartphones. IEEE Internet Things J. 11(1), 1589\u20131603 (2024)","journal-title":"IEEE Internet Things J."},{"key":"1068_CR39","doi-asserted-by":"crossref","unstructured":"Sun, Y., Meng, W., Li, W.: Designing In-Air Hand Gesture-based User Authentication System via Convex Hull. PST 1-5 (2022)","DOI":"10.1109\/PST55820.2022.9851982"},{"issue":"10","key":"1068_CR40","doi-asserted-by":"publisher","first-page":"2726","DOI":"10.1109\/TMC.2016.2635643","volume":"16","author":"M Shahzad","year":"2017","unstructured":"Shahzad, M., Liu, A.X., Samuel, A.: Behavior Based Human Authentication on Touch Screen Devices Using Gestures and Signatures. IEEE Trans. Mob. Comput. 16(10), 2726\u20132741 (2017)","journal-title":"IEEE Trans. Mob. Comput."},{"key":"1068_CR41","doi-asserted-by":"crossref","unstructured":"Sharma, V., Enbody, R.J.: User authentication and identification from user interface interactions on touch-enabled devices. WISEC 1-11 (2017)","DOI":"10.1145\/3098243.3098262"},{"key":"1068_CR42","doi-asserted-by":"crossref","unstructured":"Tusko, G., Meng, W., Lampe, B.: Look Closer to Touch Behavior-enabled Android Pattern Locks: A Study in the Wild. TrustCom 1196-1205 (2023)","DOI":"10.1109\/TrustCom60117.2023.00163"},{"issue":"3","key":"1068_CR43","first-page":"1","volume":"2","author":"L Wang","year":"2018","unstructured":"Wang, L., Huang, K., Sun, K., Wang, W., Tian, C., Xie, L., Gu, Q.: Unlock with Your Heart Heartbeat-based Authentication on Commercial Mobile Phones. Proc. ACM Interact. Mob. Wearable Ubiquitous Technol. 2(3), 1\u201322 (2018)","journal-title":"Proc. ACM Interact. Mob. Wearable Ubiquitous Technol."},{"key":"1068_CR44","doi-asserted-by":"crossref","unstructured":"Wu, B., Meng, W., Chiu, W.Y.: Towards Enhanced EEG-based Authentication with Motor Imagery Brain-Computer Interface. ACSAC 799-812 (2022)","DOI":"10.1145\/3564625.3564656"},{"key":"1068_CR45","doi-asserted-by":"crossref","unstructured":"Wu, J., Chiu, W.Y., Meng, W.: KEP: Keystroke Evoked Potential for EEG-Based User Authentication. AIS &P (1) 513-530 (2023)","DOI":"10.1007\/978-981-99-9785-5_36"},{"key":"1068_CR46","doi-asserted-by":"crossref","unstructured":"Yi, S., Qin, Z., Carter, N.J., Li, Q.: WearLock: Unlocking Your Phone via Acoustics Using Smartwatch. ICDCS 469-479 (2017)","DOI":"10.1109\/ICDCS.2017.183"},{"issue":"19","key":"1068_CR47","doi-asserted-by":"publisher","first-page":"31128","DOI":"10.1109\/JIOT.2024.3417622","volume":"11","author":"Y Zou","year":"2024","unstructured":"Zou, Y., Weng, J., Lei, H., Wang, D., Leung, V.C.M., Wu, K.: EarPrint: Earphone-Based Implicit User Authentication With Behavioral and Physiological Acoustics. IEEE Internet Things J. 11(19), 31128\u201331143 (2024)","journal-title":"IEEE Internet Things J."},{"key":"1068_CR48","doi-asserted-by":"crossref","unstructured":"Zheng, N., Bai, K., Huang, H., Wang, H.: You Are How You Touch: User Verification on Smartphones via Tapping Behaviors. ICNP 221-232 (2014)","DOI":"10.1109\/ICNP.2014.43"}],"container-title":["International Journal of Information Security"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10207-025-01068-2.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s10207-025-01068-2\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10207-025-01068-2.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,21]],"date-time":"2025-06-21T10:11:51Z","timestamp":1750500711000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s10207-025-01068-2"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,6]]},"references-count":48,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2025,6]]}},"alternative-id":["1068"],"URL":"https:\/\/doi.org\/10.1007\/s10207-025-01068-2","relation":{},"ISSN":["1615-5262","1615-5270"],"issn-type":[{"type":"print","value":"1615-5262"},{"type":"electronic","value":"1615-5270"}],"subject":[],"published":{"date-parts":[[2025,6]]},"assertion":[{"value":"7 June 2025","order":1,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"All authors declare that they have no conflict of interest.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflicts of Interest"}},{"value":"An IRB-approval was obtained from Copenhagen Business School for the user study.","order":3,"name":"Ethics","group":{"name":"EthicsHeading","label":"Ethical Approval"}}],"article-number":"153"}}