{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,28]],"date-time":"2026-03-28T06:27:20Z","timestamp":1774679240462,"version":"3.50.1"},"reference-count":38,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2026,1,12]],"date-time":"2026-01-12T00:00:00Z","timestamp":1768176000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2026,1,12]],"date-time":"2026-01-12T00:00:00Z","timestamp":1768176000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Int. J. Inf. Secur."],"published-print":{"date-parts":[[2026,2]]},"DOI":"10.1007\/s10207-025-01194-x","type":"journal-article","created":{"date-parts":[[2026,1,12]],"date-time":"2026-01-12T18:57:35Z","timestamp":1768244255000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["Improved CoAtNet for robust acoustic side-channel attack classification on keyboards"],"prefix":"10.1007","volume":"25","author":[{"given":"Karwan Mahdi","family":"Hama Rawf","sequence":"first","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2026,1,12]]},"reference":[{"key":"1194_CR1","doi-asserted-by":"crossref","unstructured":"Harrison, J., Toreini, E., Mehrnezhad, M.: A practical deep learning-based acoustic side channel attack on keyboards. in 2023 IEEE European Symposium on Security and Privacy Workshops (EuroS&PW). 2023. IEEE","DOI":"10.1109\/EuroSPW59978.2023.00034"},{"key":"1194_CR2","doi-asserted-by":"crossref","unstructured":"Loboda, V., Kolaczek, G.: Sound and keystroke dynamics analysis for user authenticity verification. in 2019 IEEE 14th International Conference on Intelligent Systems and Knowledge Engineering (ISKE). 2019. IEEE","DOI":"10.1109\/ISKE47853.2019.9170404"},{"key":"1194_CR3","doi-asserted-by":"crossref","unstructured":"Zhou Q. et al. User identification and authentication using keystroke dynamics with acoustic signal. in 2016 12th International Conference on Mobile Ad-Hoc and Sensor Networks (MSN). 2016. IEEE","DOI":"10.1109\/MSN.2016.082"},{"issue":"1","key":"1194_CR4","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/1609956.1609959","volume":"13","author":"L Zhuang","year":"2009","unstructured":"Zhuang, L., et al.: Keyboard acoustic emanations revisited. ACM Trans. Inf. Syst. Secur. 13(1), 1\u201326 (2009)","journal-title":"ACM Trans. Inf. Syst. Secur."},{"key":"1194_CR5","unstructured":"Asonov, D., Agrawal, R.: Keyboard acoustic emanations. in IEEE Symposium on Security and Privacy, 2004. Proceedings. 2004. 2004. IEEE"},{"key":"1194_CR6","unstructured":"Fiona, A.H.Y.: Keyboard acoustic triangulation attack. The Chinese University Of Hong Kong: bachelors thesis, 2006"},{"key":"1194_CR7","doi-asserted-by":"crossref","unstructured":"Parascandolo, G., Huttunen, H., Virtanen, T.: Recurrent neural networks for polyphonic sound event detection in real life recordings. in 2016 IEEE international conference on acoustics, speech and signal processing (ICASSP). 2016. IEEE","DOI":"10.1109\/ICASSP.2016.7472917"},{"key":"1194_CR8","doi-asserted-by":"crossref","unstructured":"Compagno, A., et al. Don't skype & type! acoustic eavesdropping in voice-over-ip. in Proceedings of the 2017 ACM on Asia Conference on Computer and Communications Security. 2017","DOI":"10.1145\/3052973.3053005"},{"key":"1194_CR9","doi-asserted-by":"crossref","unstructured":"Maiti, A., et al. Smartwatch-based keystroke inference attacks and context-aware protection mechanisms. in Proceedings of the 11th ACM on Asia Conference on Computer and Communications Security. 2016","DOI":"10.1145\/2897845.2897905"},{"key":"1194_CR10","doi-asserted-by":"crossref","unstructured":"Haubrick, P., Ye, J.: Robust audio sensing with multi-sound classification. in 2019 IEEE International Conference on Pervasive Computing and Communications (PerCom. 2019. IEEE","DOI":"10.1109\/PERCOM.2019.8767402"},{"key":"1194_CR11","unstructured":"Dai, Z., et al. Coatnet: marrying convolution and attention for all data sizes. 2021. 34: p. 3965\u20133977"},{"key":"1194_CR12","unstructured":"Paszke, A., et al. Pytorch: an imperative style, high-performance deep learning library. Advances in Neural Information Processing Systems, 2019. 32"},{"key":"1194_CR13","doi-asserted-by":"crossref","unstructured":"Bai, J.X., Liu, B., Song, L.: I know your keyboard input: a robust keystroke eavesdropper based-on acoustic signals. in Proceedings of the 29th ACM International Conference on Multimedia. 2021","DOI":"10.1145\/3474085.3475539"},{"key":"1194_CR14","unstructured":"Cooper, M.J., Schaffer, K.B.: Security requirements for cryptographic modules. 2019"},{"key":"1194_CR15","unstructured":"Abdulgadir, A., et al. Side-channel resistant implementations of three finalists of the nist lightweight cryptography standardization process: Elephant, tinyjambu, and xoodyak. in Fifth NIST Lightweight Cryptography Workshop. 2022"},{"key":"1194_CR16","unstructured":"Genkin, D., Shamir, A., Tromer, E.: RSA key extraction via low-bandwidth acoustic cryptanalysis. in Advances in Cryptology\u2013CRYPTO 2014: 34th Annual Cryptology Conference, Santa Barbara, CA, USA, August 17\u201321, 2014, Proceedings, Part I 34. 2014. Springer"},{"key":"1194_CR17","doi-asserted-by":"publisher","DOI":"10.1016\/j.dib.2024.110949","volume":"57","author":"KMH Rawf","year":"2024","unstructured":"Rawf, K.M.H., et al.: Multi-datasets for different keyboard key sound recognition. Data Brief 57, 110949 (2024)","journal-title":"Data Brief"},{"key":"1194_CR18","doi-asserted-by":"crossref","unstructured":"Senarath, D., et al. BehaveFormer: a framework with spatio-temporal dual attention transformers for IMU-enhanced keystroke dynamics. in 2023 IEEE International Joint Conference on Biometrics (IJCB). 2023. IEEE","DOI":"10.1109\/IJCB57857.2023.10448997"},{"key":"1194_CR19","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2023.103363","volume":"132","author":"I Stylios","year":"2023","unstructured":"Stylios, I., et al.: Continuous authentication with feature-level fusion of touch gestures and keystroke dynamics to solve security and usability issues. Comput. Secur. 132, 103363 (2023)","journal-title":"Comput. Secur."},{"issue":"6","key":"1194_CR20","doi-asserted-by":"publisher","first-page":"542","DOI":"10.1002\/sec.1061","volume":"9","author":"G Kambourakis","year":"2016","unstructured":"Kambourakis, G., et al.: Introducing touchstroke: keystroke-based authentication system for smartphones. Secur. Commun. Networks 9(6), 542\u2013554 (2016)","journal-title":"Secur. Commun. Networks"},{"key":"1194_CR21","unstructured":"Xu, H., Zhou, Y., Lyu, M.R.: Towards continuous and passive authentication via touch biometrics: an experimental study on smartphones. in 10th Symposium On Usable Privacy and Security (SOUPS 2014). 2014"},{"key":"1194_CR22","unstructured":"Wright, P., Greengrass, P.: The candid autobiography of a senior intelligence officer. 1988: A Dell Book"},{"key":"1194_CR23","doi-asserted-by":"crossref","unstructured":"Lee, Y., et al. Sociophone: everyday face-to-face interaction monitoring platform using multi-phone sensor fusion. in Proceeding of the 11th annual international conference on Mobile systems, applications, and services. 2013","DOI":"10.1145\/2462456.2465702"},{"key":"1194_CR24","doi-asserted-by":"crossref","unstructured":"Rachuri, K.K., et al. EmotionSense: a mobile phones based adaptive platform for experimental social psychology research. in Proceedings of the 12th ACM international conference on Ubiquitous computing. 2010","DOI":"10.1145\/1864349.1864393"},{"key":"1194_CR25","doi-asserted-by":"crossref","unstructured":"Zhu, T., et al. Context-free attacks using keyboard acoustic emanations. in Proceedings of the 2014 ACM SIGSAC conference on computer and communications security. 2014","DOI":"10.1145\/2660267.2660296"},{"key":"1194_CR26","doi-asserted-by":"crossref","unstructured":"Anand, S.A., Saxena, N.: Keyboard emanations in remote voice calls: Password leakage and noise (less) masking defenses. in Proceedings of the Eighth ACM Conference on Data and Application Security and Privacy. 2018","DOI":"10.1145\/3176258.3176341"},{"key":"1194_CR27","doi-asserted-by":"crossref","unstructured":"Halevi, T., Saxena, N.: A closer look at keyboard acoustic emanations: random passwords, typing styles and decoding techniques. in Proceedings of the 7th ACM Symposium on Information, Computer and Communications Security. 2012","DOI":"10.1145\/2414456.2414509"},{"key":"1194_CR28","doi-asserted-by":"crossref","unstructured":"Tsimperidis, I., Arampatzis, A.: User profiling using keystroke dynamics and rotation forest, in applications of machine learning and deep learning for privacy and cybersecurity. 2022, IGI Global. p. 1\u201324","DOI":"10.4018\/978-1-7998-9430-8.ch001"},{"key":"1194_CR29","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/s10916-020-1530-z","volume":"44","author":"EA Sa\u011fba\u015f","year":"2020","unstructured":"Sa\u011fba\u015f, E.A., Korukoglu, S., Balli, S.: Stress detection via keyboard typing behaviors by using smartphone sensors and machine learning techniques. J. Med. Syst. 44, 1\u201312 (2020)","journal-title":"J. Med. Syst."},{"issue":"2","key":"1194_CR30","doi-asserted-by":"publisher","first-page":"333","DOI":"10.1109\/TIFS.2014.2374424","volume":"10","author":"J Roth","year":"2014","unstructured":"Roth, J., et al.: Investigating the discriminative power of keystroke sound. IEEE Trans. Inf. Forensics Secur. 10(2), 333\u2013345 (2014)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"1194_CR31","doi-asserted-by":"publisher","first-page":"564","DOI":"10.1016\/j.procs.2018.08.209","volume":"135","author":"Y Muliono","year":"2018","unstructured":"Muliono, Y., Ham, H., Darmawan, D.: Keystroke dynamic classification using machine learning for password authorization. Procedia Comput. Sci. 135, 564\u2013569 (2018)","journal-title":"Procedia Comput. Sci."},{"key":"1194_CR32","volume":"19","author":"M Mimura","year":"2025","unstructured":"Mimura, M.: Practical classification accuracy of sequential data using neural networks. Mach. Learn. Appl. 19, 100611 (2025)","journal-title":"Mach. Learn. Appl."},{"issue":"5","key":"1194_CR33","doi-asserted-by":"publisher","first-page":"1400","DOI":"10.3390\/s25051400","volume":"25","author":"RdT Guerra","year":"2025","unstructured":"Guerra, Rd.T., et al.: Deep learning approach for automatic heartbeat classification. Sensors 25(5), 1400 (2025)","journal-title":"Sensors"},{"key":"1194_CR34","doi-asserted-by":"crossref","unstructured":"Martinasek, Z., Clupek, V., Trasy, K.: Acoustic attack on keyboard using spectrogram and neural network. in 2015 38th International Conference on Telecommunications and Signal Processing (TSP). 2015. IEEE","DOI":"10.1109\/TSP.2015.7296341"},{"key":"1194_CR35","doi-asserted-by":"crossref","unstructured":"Tsimperidis, I., et al. Keystroke dynamics as a language profiling tool: Identifying mother tongue of unknown internet users. in Telecom. 2023. MDPI","DOI":"10.3390\/telecom4030021"},{"key":"1194_CR36","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2023.119522","volume":"217","author":"S Roy","year":"2023","unstructured":"Roy, S., et al.: Imbalanced ensemble learning in determining Parkinson\u2019s disease using keystroke dynamics. Expert Syst. Appl. 217, 119522 (2023)","journal-title":"Expert Syst. Appl."},{"issue":"2","key":"1194_CR37","doi-asserted-by":"publisher","DOI":"10.2196\/41003","volume":"7","author":"A Acien","year":"2022","unstructured":"Acien, A., et al.: Detection of mental fatigue in the general population: feasibility study of keystroke dynamics as a real-world biomarker. JMIR Biomed. Eng. 7(2), e41003 (2022)","journal-title":"JMIR Biomed. Eng."},{"issue":"17","key":"1194_CR38","doi-asserted-by":"publisher","first-page":"6627","DOI":"10.3390\/s22176627","volume":"22","author":"X Wang","year":"2022","unstructured":"Wang, X., et al.: User authentication method based on keystroke dynamics and mouse dynamics with scene-irrelated features in hybrid scenes. Sensors 22(17), 6627 (2022)","journal-title":"Sensors"}],"container-title":["International Journal of Information Security"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10207-025-01194-x.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s10207-025-01194-x","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10207-025-01194-x.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,1,31]],"date-time":"2026-01-31T16:08:22Z","timestamp":1769875702000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s10207-025-01194-x"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2026,1,12]]},"references-count":38,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2026,2]]}},"alternative-id":["1194"],"URL":"https:\/\/doi.org\/10.1007\/s10207-025-01194-x","relation":{},"ISSN":["1615-5262","1615-5270"],"issn-type":[{"value":"1615-5262","type":"print"},{"value":"1615-5270","type":"electronic"}],"subject":[],"published":{"date-parts":[[2026,1,12]]},"assertion":[{"value":"9 July 2025","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"10 December 2025","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"12 January 2026","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The author declares no competing interests that could have influenced the research design, data collection, analysis, interpretation, or presentation of the findings. No funding sources or financial relationships influenced the work presented in this paper. The author confirms that this research was conducted objectively and unbiasedly.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}},{"value":"These are not applicable for this study.","order":3,"name":"Ethics","group":{"name":"EthicsHeading","label":"Ethical approval"}},{"value":"These are not applicable for this study.","order":4,"name":"Ethics","group":{"name":"EthicsHeading","label":"Consent for publication"}},{"value":"These are not applicable for this study.","order":5,"name":"Ethics","group":{"name":"EthicsHeading","label":"Consent to participate"}}],"article-number":"29"}}