{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,11]],"date-time":"2026-04-11T13:35:26Z","timestamp":1775914526157,"version":"3.50.1"},"reference-count":22,"publisher":"Springer Science and Business Media LLC","issue":"4","license":[{"start":{"date-parts":[[2022,10,11]],"date-time":"2022-10-11T00:00:00Z","timestamp":1665446400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2022,10,11]],"date-time":"2022-10-11T00:00:00Z","timestamp":1665446400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61872027"],"award-info":[{"award-number":["61872027"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Open Research Fund of the State Key Laboratory of Integrated Services Networks","award":["ISN21-16"],"award-info":[{"award-number":["ISN21-16"]}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["CCF Trans. Pervasive Comp. Interact."],"published-print":{"date-parts":[[2022,12]]},"DOI":"10.1007\/s42486-022-00117-2","type":"journal-article","created":{"date-parts":[[2022,10,11]],"date-time":"2022-10-11T11:03:38Z","timestamp":1665486218000},"page":"370-380","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":4,"title":["Implicit authentication with sensor normalization and multi-modal domain adaption based on mobile crowd sensing"],"prefix":"10.1007","volume":"4","author":[{"given":"Zuodong","family":"Jin","sequence":"first","affiliation":[]},{"given":"Muyan","family":"Yao","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-7368-2132","authenticated-orcid":false,"given":"Dan","family":"Tao","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2022,10,11]]},"reference":[{"key":"117_CR1","doi-asserted-by":"publisher","first-page":"53","DOI":"10.1108\/ICS-01-2015-0001","volume":"24","author":"P Andriotis","year":"2016","unstructured":"Andriotis, P., Oikonomou, G., Mylonas, A., et al.: A study on usability and security features of the Android pattern lock screen. Inf. Comput. Secur. 24, 53\u201372 (2016)","journal-title":"Inf. Comput. Secur."},{"issue":"1","key":"117_CR2","doi-asserted-by":"publisher","first-page":"53","DOI":"10.1108\/ICS-01-2015-0001","volume":"24","author":"P Andriotis","year":"2016","unstructured":"Andriotis, P., Oikonomou, G., Mylonas, A., et al.: A study on usability and security features of the Android pattern lock screen. Inf. Comput. Secur. 24(1), 53\u201372 (2016)","journal-title":"Inf. Comput. Secur."},{"key":"117_CR3","first-page":"1","volume":"101","author":"F Binbeshr","year":"2020","unstructured":"Binbeshr, F., Kiah, M., Por, Y.L., Zaidan, A.A.: A systematic review of pin-entry methods resistant to shoulder-surfing attacks. Comput. Secur. 101, 1\u201314 (2020)","journal-title":"Comput. Secur."},{"key":"117_CR4","doi-asserted-by":"crossref","unstructured":"Feng, T., Yang, J., Yan, Z., et al.: TIPS: context-aware implicit user identification using touch screen in uncontrolled environments. In: Workshop on Mobile Computing Systems & Applications, pp. 1\u20136. ACM (2014)","DOI":"10.1145\/2565585.2565592"},{"issue":"7","key":"117_CR5","first-page":"1401","volume":"43","author":"YANG Gui-song","year":"2022","unstructured":"Gui-song, Y.A.N.G., Han-qing, L.I., Xing-yu, H.E.: Incentive mechanism based on user collaboration pair for mobile crowd sensing. J. Chin. Comput. Syst. 43(7), 1401\u20131405 (2022)","journal-title":"J. Chin. Comput. Syst."},{"key":"117_CR6","doi-asserted-by":"crossref","unstructured":"Gurary, J., Ye, Z., Alnahash, N., et al.: Implicit authentication for mobile devices using typing behavior. International Conference on Human Aspects of Information Security, pp.25\u201336. Springer (2016)","DOI":"10.1007\/978-3-319-39381-0_3"},{"key":"117_CR7","doi-asserted-by":"publisher","first-page":"33","DOI":"10.1108\/IJPCC-D-18-00006","volume":"14","author":"M Inoue","year":"2018","unstructured":"Inoue, M., Ogawa, T.: TapOnce: a novel authentication method on smartphones. Int. J. Pervasive Comput. Commun. 14, 33\u201348 (2018)","journal-title":"Int. J. Pervasive Comput. Commun."},{"key":"117_CR8","doi-asserted-by":"crossref","unstructured":"Khan, H., Hengartner, U.: Towards application-centric implicit authentication on smartphones[C]. In: Proceedings of the 15th Workshop on Mobile Computing Systems and Applications, pp. 1\u20136. ACM (2014)","DOI":"10.1145\/2565585.2565590"},{"key":"117_CR9","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1016\/j.cviu.2020.103103","volume":"202","author":"FV Massoli","year":"2021","unstructured":"Massoli, F.V., Carrara, F., Amato, G., Falchi, F.: Detection of face recognition adversarial attacks. Comput Vis Image Underst 202, 1\u201311 (2021)","journal-title":"Comput Vis Image Underst"},{"key":"117_CR10","doi-asserted-by":"crossref","unstructured":"Sch\u00f6lkopf, B., Platt, J., Hofmann, T.: Correcting sample selection bias by unlabeled data. In: Advances in Neural Information Processing Systems 19: Proceedings of the 2006 Conference, pp. 601\u2013608. MIT Press (2007)","DOI":"10.7551\/mitpress\/7503.003.0080"},{"key":"117_CR11","doi-asserted-by":"crossref","unstructured":"Shi, D., Tao, D.: Sensor fusion based implicit authentication for smartphones. In: 14th China Conference on Internet of Things (Wireless Sensor Network), pp. 157\u2013168 (2020)","DOI":"10.1007\/978-981-33-4214-9_12"},{"key":"117_CR12","first-page":"1","volume":"33","author":"D Shi","year":"2021","unstructured":"Shi, D., Tao, D., Wang, J.T., et al.: Fine-grained and context-aware behavioral biometrics for pattern lock on smartphones. Proc ACM Interact Mobile Wearable Ubiquitous Technol 33, 1\u201330 (2021)","journal-title":"Proc ACM Interact Mobile Wearable Ubiquitous Technol"},{"key":"117_CR13","first-page":"1","volume":"21","author":"H Shin","year":"2021","unstructured":"Shin, H., Sim, S., Kwon, H., et al.: A new smart smudge attack using CNN. Int. J. Inf. Secur. 21, 1\u201312 (2021)","journal-title":"Int. J. Inf. Secur."},{"key":"117_CR14","doi-asserted-by":"publisher","first-page":"3116","DOI":"10.1109\/TIFS.2019.2911170","volume":"14","author":"S Vhaduri","year":"2019","unstructured":"Vhaduri, S., Poellabauer, C.: Summary: multi-modal biometric-based implicit authentication of wearable device users. IEEE Trans. Inf. Forens. Secur. 14, 3116\u20133125 (2019)","journal-title":"IEEE Trans. Inf. Forens. Secur."},{"key":"117_CR15","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1016\/j.cose.2020.102046","volume":"99","author":"M Xue","year":"2020","unstructured":"Xue, M., He, C., Wang, J., et al.: LOPA: a linear offset based poisoning attack method against adaptive fingerprint authentication system. Comput. Secur. 99, 1\u201313 (2020)","journal-title":"Comput. Secur."},{"key":"117_CR16","unstructured":"Yao, M.Y., Tao, D.: Implicit authentication mechanism of pattern unlock based on over-sampling and one-class classification for smartphones. Comput. Sci., pp. 19\u201324 (2020)"},{"issue":"4","key":"117_CR17","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/3230740","volume":"21","author":"G Ye","year":"2018","unstructured":"Ye, G., Tang, Z., Fang, D., Chen, X., Wolff, W., Aviv, A.J., Wang, Z.: A video-based attack for android pattern lock. ACM Trans. Priv. Secur. (TOPS) 21(4), 1\u201331 (2018)","journal-title":"ACM Trans. Priv. Secur. (TOPS)"},{"key":"117_CR18","doi-asserted-by":"crossref","unstructured":"Zafar, M. R., Shah, M.A.: Fingerprint authentication and security risks in smart devices. In: International Conference on Automation Computing, pp. 1-6. IEEE (2016)","DOI":"10.1109\/IConAC.2016.7604977"},{"issue":"4","key":"117_CR19","first-page":"1","volume":"1","author":"Y Zhang","year":"2018","unstructured":"Zhang, Y., Hu, W., Xu, W., et al.: Continuous authentication using eye movement response of implicit visual stimuli. Proc. ACM Interact. Mob. Wearable Ubiquitous Technol. 1(4), 1\u201322 (2018)","journal-title":"Proc. ACM Interact. Mob. Wearable Ubiquitous Technol."},{"key":"117_CR20","doi-asserted-by":"crossref","unstructured":"Zheng, N., Bai, K., Huang, H., Wang, H.: You are how you touch: user verification on smartphones via tapping behaviors. In: 2014 IEEE 22nd International Conference on Network Protocols, pp. 221\u2013232 (2014)","DOI":"10.1109\/ICNP.2014.43"},{"key":"117_CR21","doi-asserted-by":"crossref","unstructured":"Zhou, M., Wang, Q., Yang, J., et al.: PatternListener: cracking android pattern lock using acoustic signals. p 1775\u20131787 (2018)","DOI":"10.1145\/3243734.3243777"},{"issue":"2","key":"117_CR22","doi-asserted-by":"publisher","first-page":"88","DOI":"10.1504\/IJSNET.2021.113628","volume":"35","author":"J Zhou","year":"2021","unstructured":"Zhou, J., Fan, J., Wang, J.: Task scheduling for mobile edge computing enabled crowd sensing applications. Int. J. Sens. Netw. 35(2), 88\u201398 (2021)","journal-title":"Int. J. Sens. Netw."}],"container-title":["CCF Transactions on Pervasive Computing and Interaction"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s42486-022-00117-2.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s42486-022-00117-2\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s42486-022-00117-2.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,11,28]],"date-time":"2023-11-28T18:59:52Z","timestamp":1701197992000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s42486-022-00117-2"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,10,11]]},"references-count":22,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2022,12]]}},"alternative-id":["117"],"URL":"https:\/\/doi.org\/10.1007\/s42486-022-00117-2","relation":{},"ISSN":["2524-521X","2524-5228"],"issn-type":[{"value":"2524-521X","type":"print"},{"value":"2524-5228","type":"electronic"}],"subject":[],"published":{"date-parts":[[2022,10,11]]},"assertion":[{"value":"14 December 2021","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"21 September 2022","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"11 October 2022","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors have no relevant financial or non-financial interests to disclose. We ensure that there has been no significant financial support for this work that could have influenced its outcome.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}}]}}