{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,28]],"date-time":"2026-04-28T12:37:40Z","timestamp":1777379860111,"version":"3.51.4"},"reference-count":42,"publisher":"Elsevier BV","license":[{"start":{"date-parts":[[2026,7,1]],"date-time":"2026-07-01T00:00:00Z","timestamp":1782864000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/tdm\/userlicense\/1.0\/"},{"start":{"date-parts":[[2026,7,1]],"date-time":"2026-07-01T00:00:00Z","timestamp":1782864000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/legal\/tdmrep-license"},{"start":{"date-parts":[[2026,3,23]],"date-time":"2026-03-23T00:00:00Z","timestamp":1774224000000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"funder":[{"DOI":"10.13039\/501100004152","name":"Macao Polytechnic University","doi-asserted-by":"publisher","award":["RP\/FCA-05\/2024"],"award-info":[{"award-number":["RP\/FCA-05\/2024"]}],"id":[{"id":"10.13039\/501100004152","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["elsevier.com","sciencedirect.com"],"crossmark-restriction":true},"short-container-title":["Array"],"published-print":{"date-parts":[[2026,7]]},"DOI":"10.1016\/j.array.2026.100780","type":"journal-article","created":{"date-parts":[[2026,3,25]],"date-time":"2026-03-25T19:10:36Z","timestamp":1774465836000},"page":"100780","update-policy":"https:\/\/doi.org\/10.1016\/elsevier_cm_policy","source":"Crossref","is-referenced-by-count":0,"special_numbering":"C","title":["Advanced electroencephalogram based authentication by adapting machine learning models"],"prefix":"10.1016","volume":"30","author":[{"given":"Yi","family":"Zhao","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-4856-8247","authenticated-orcid":false,"given":"Song-Kyoo","family":"Kim","sequence":"additional","affiliation":[]}],"member":"78","reference":[{"key":"10.1016\/j.array.2026.100780_b1","doi-asserted-by":"crossref","DOI":"10.1016\/j.cose.2023.103353","article-title":"Privacy-centered authentication: A new framework and analysis","volume":"132","author":"Robles-Gonz\u00e1lez","year":"2023","journal-title":"Comput Secur"},{"key":"10.1016\/j.array.2026.100780_b2","article-title":"The state of user authentication in the wild","volume":"18","author":"Quermann","year":"2018","journal-title":"WAY"},{"issue":"1","key":"10.1016\/j.array.2026.100780_b3","first-page":"15","article-title":"Study on most popular behavioral biometrics, advantages, disadvantages and recent applications: A review","volume":"10","author":"Alsaadi","year":"2021","journal-title":"Int J Sci Technol Res"},{"issue":"6","key":"10.1016\/j.array.2026.100780_b4","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1145\/3230632","article-title":"A survey on brain biometrics","volume":"51","author":"Gui","year":"2019","journal-title":"ACM Comput Surv"},{"key":"10.1016\/j.array.2026.100780_b5","doi-asserted-by":"crossref","DOI":"10.1016\/j.cose.2023.103198","article-title":"Brainwave-based authentication using features fusion","volume":"129","author":"TajDini","year":"2023","journal-title":"Comput Secur"},{"key":"10.1016\/j.array.2026.100780_b6","doi-asserted-by":"crossref","DOI":"10.1016\/j.cose.2023.103520","article-title":"A robust brain pattern for brain-based authentication methods using deep breath","volume":"135","author":"Yousefi","year":"2023","journal-title":"Comput Secur"},{"issue":"1","key":"10.1016\/j.array.2026.100780_b7","doi-asserted-by":"crossref","DOI":"10.1155\/2021\/5229576","article-title":"Review on EEG-based authentication technology","volume":"2021","author":"Zhang","year":"2021","journal-title":"Comput Intell Neurosci"},{"key":"10.1016\/j.array.2026.100780_b8","doi-asserted-by":"crossref","first-page":"227","DOI":"10.3389\/fnins.2018.00227","article-title":"A study of the effects of electrode number and decoding algorithm on online EEG-based BCI behavioral performance","volume":"12","author":"Meng","year":"2018","journal-title":"Front Neurosci"},{"issue":"1","key":"10.1016\/j.array.2026.100780_b9","doi-asserted-by":"crossref","first-page":"77","DOI":"10.1017\/S0263574721000382","article-title":"Recent approaches on classification and feature extraction of EEG signal: A review","volume":"40","author":"Pahuja","year":"2022","journal-title":"Robotica"},{"issue":"1","key":"10.1016\/j.array.2026.100780_b10","doi-asserted-by":"crossref","first-page":"61","DOI":"10.1016\/S0165-1684(97)00038-8","article-title":"Classification of EEG signals using the wavelet transform","volume":"59","author":"Hazarika","year":"1997","journal-title":"Signal Process"},{"key":"10.1016\/j.array.2026.100780_b11","series-title":"2014 IEEE signal processing in medicine and biology symposium","first-page":"1","article-title":"Exploring EEG-based biometrics for user identification and authentication","author":"Gui","year":"2014"},{"key":"10.1016\/j.array.2026.100780_b12","series-title":"2023 international conference on speech technology and human-computer dialogue (speD)","first-page":"111","article-title":"Analysis of spectral entropy and maximum power of EEG as authentication mechanisms","author":"Vulpe","year":"2023"},{"key":"10.1016\/j.array.2026.100780_b13","doi-asserted-by":"crossref","DOI":"10.1109\/TCE.2025.3571744","article-title":"A tri-fusion approach for brainwave based biometric authentication, using consumer EEG devices","author":"Adil","year":"2025","journal-title":"IEEE Trans Consum Electron"},{"key":"10.1016\/j.array.2026.100780_b14","doi-asserted-by":"crossref","DOI":"10.1016\/j.bspc.2023.104851","article-title":"Detection of alcoholism by combining EEG local activations with brain connectivity features and graph neural network","volume":"85","author":"Pain","year":"2023","journal-title":"Biomed Signal Process Control"},{"issue":"3","key":"10.1016\/j.array.2026.100780_b15","doi-asserted-by":"crossref","first-page":"137","DOI":"10.3390\/axioms13030137","article-title":"Compact data learning for machine learning classifications","volume":"13","author":"Kim","year":"2024","journal-title":"Axioms"},{"key":"10.1016\/j.array.2026.100780_b16","doi-asserted-by":"crossref","first-page":"52138","DOI":"10.1109\/ACCESS.2018.2870052","article-title":"Peeking inside the black-box: a survey on explainable artificial intelligence (XAI)","volume":"6","author":"Adadi","year":"2018","journal-title":"IEEE Access"},{"issue":"4","key":"10.1016\/j.array.2026.100780_b17","doi-asserted-by":"crossref","first-page":"187","DOI":"10.3390\/info15040187","article-title":"Versatile machine learning-based authentications by using enhanced time-sliced electrocardiograms","volume":"15","author":"Zhao","year":"2024","journal-title":"Information"},{"key":"10.1016\/j.array.2026.100780_b18","series-title":"2025 17th international conference on computer and automation engineering","first-page":"326","article-title":"Innovative electrocardiogram authentication system by using tailor-made compact data learning","author":"Zhao","year":"2025"},{"key":"10.1016\/j.array.2026.100780_b19","series-title":"Novel gait based identification by using versatile machine learning models","first-page":"37336","author":"Zhao","year":"2026"},{"issue":"12","key":"10.1016\/j.array.2026.100780_b20","doi-asserted-by":"crossref","first-page":"1869","DOI":"10.3390\/math12121869","article-title":"Novel machine learning based credit card fraud detection systems","volume":"12","author":"Feng","year":"2024","journal-title":"Mathematics"},{"key":"10.1016\/j.array.2026.100780_b21","doi-asserted-by":"crossref","first-page":"115296","DOI":"10.1109\/ACCESS.2024.3434629","article-title":"Advanced machine learning based malware detection systems","volume":"12","author":"Kim","year":"2024","journal-title":"IEEE Access"},{"issue":"14","key":"10.1016\/j.array.2026.100780_b22","doi-asserted-by":"crossref","first-page":"6434","DOI":"10.3390\/s23146434","article-title":"Electroencephalography signal processing: A comprehensive review and analysis of methods and techniques","volume":"23","author":"Chaddad","year":"2023","journal-title":"Sensors"},{"issue":"14","key":"10.1016\/j.array.2026.100780_b23","doi-asserted-by":"crossref","first-page":"11295","DOI":"10.1007\/s00521-020-05588-x","article-title":"Global research on artificial intelligence-enhanced human electroencephalogram analysis","volume":"34","author":"Chen","year":"2022","journal-title":"Neural Comput Appl"},{"key":"10.1016\/j.array.2026.100780_b24","series-title":"Tree boosting with xgboost-why does xgboost win\u201d every\u201d machine learning competition?","author":"Nielsen","year":"2016"},{"key":"10.1016\/j.array.2026.100780_b25","doi-asserted-by":"crossref","first-page":"189","DOI":"10.1016\/j.neucom.2019.10.118","article-title":"A comprehensive survey on support vector machine classification: Applications, challenges and trends","volume":"408","author":"Cervantes","year":"2020","journal-title":"Neurocomputing"},{"issue":"7","key":"10.1016\/j.array.2026.100780_b26","doi-asserted-by":"crossref","first-page":"1235","DOI":"10.1162\/neco_a_01199","article-title":"A review of recurrent neural networks: LSTM cells and network architectures","volume":"31","author":"Yu","year":"2019","journal-title":"Neural Comput"},{"key":"10.1016\/j.array.2026.100780_b27","series-title":"An introduction to convolutional neural networks","author":"O\u2019shea","year":"2015"},{"key":"10.1016\/j.array.2026.100780_b28","doi-asserted-by":"crossref","first-page":"70","DOI":"10.1016\/j.neucom.2017.11.077","article-title":"Feature selection in machine learning: A new perspective","volume":"300","author":"Cai","year":"2018","journal-title":"Neurocomputing"},{"key":"10.1016\/j.array.2026.100780_b29","series-title":"2015 38th international convention on information and communication technology, electronics and microelectronics","first-page":"1200","article-title":"A review of feature selection methods with applications","author":"Jovi\u0107","year":"2015"},{"issue":"22","key":"10.1016\/j.array.2026.100780_b30","doi-asserted-by":"crossref","first-page":"10511","DOI":"10.3390\/app142210511","article-title":"Performance analysis and improvement of machine learning with various feature selection methods for EEG-based emotion classification","volume":"14","author":"Abdumalikov","year":"2024","journal-title":"Appl Sci"},{"issue":"10","key":"10.1016\/j.array.2026.100780_b31","doi-asserted-by":"crossref","first-page":"6969","DOI":"10.1007\/s00371-023-03240-y","article-title":"Graphical representation of data prediction potential: correlation graphs and correlation chains","volume":"40","author":"Dud\u00e1\u0161","year":"2024","journal-title":"Vis Comput"},{"issue":"1","key":"10.1016\/j.array.2026.100780_b32","doi-asserted-by":"crossref","first-page":"175","DOI":"10.1007\/s00521-013-1368-0","article-title":"A review of feature selection methods based on mutual information","volume":"24","author":"Vergara","year":"2014","journal-title":"Neural Comput Appl"},{"issue":"12","key":"10.1016\/j.array.2026.100780_b33","doi-asserted-by":"crossref","first-page":"1869","DOI":"10.3390\/math12121869","article-title":"Novel machine learning based credit card fraud detection systems","volume":"12","author":"Feng","year":"2024","journal-title":"Mathematics"},{"key":"10.1016\/j.array.2026.100780_b34","doi-asserted-by":"crossref","first-page":"115296","DOI":"10.1109\/ACCESS.2024.3434629","article-title":"Advanced machine learning based malware detection systems","volume":"12","author":"Kim","year":"2024","journal-title":"IEEE Access"},{"key":"10.1016\/j.array.2026.100780_b35","doi-asserted-by":"crossref","first-page":"01","DOI":"10.5121\/ijdkp.2015.5201","article-title":"A review on evaluation metrics for data classification evaluations","volume":"5","author":"H. M.","year":"2015","journal-title":"Int J Data Min Knowl Manag Process"},{"key":"10.1016\/j.array.2026.100780_b36","series-title":"Brain signals and the corresponding hand movement signals dataset (BS-HMS-dataset)","author":"Shukla","year":"2019"},{"key":"10.1016\/j.array.2026.100780_b37","series-title":"2019 6th international conference on computing for sustainable global development (iNDIACom)","first-page":"862","article-title":"Design and implementation of efficient digital filter for preprocessing of EEG signals","author":"Bansal","year":"2019"},{"issue":"3","key":"10.1016\/j.array.2026.100780_b38","doi-asserted-by":"crossref","first-page":"250","DOI":"10.1504\/IJBET.2016.079488","article-title":"Comparative study of FIR and IIR filters for the removal of 50 Hz noise from EEG signal","volume":"22","author":"Singh","year":"2016","journal-title":"Int J Biomed Eng Technol"},{"issue":"4","key":"10.1016\/j.array.2026.100780_b39","doi-asserted-by":"crossref","first-page":"415","DOI":"10.1007\/s42979-024-02773-w","article-title":"Emerging trends in EEG signal processing: A systematic review","volume":"5","author":"Sharma","year":"2024","journal-title":"SN Comput Sci"},{"key":"10.1016\/j.array.2026.100780_b40","series-title":"2021 IEEE international joint conference on biometrics","first-page":"1","article-title":"Concealable biometric-based continuous user authentication system an EEG induced deep learning model","author":"Gopal","year":"2021"},{"issue":"6","key":"10.1016\/j.array.2026.100780_b41","doi-asserted-by":"crossref","first-page":"442","DOI":"10.1016\/0013-4694(94)90165-1","article-title":"Fast wavelet transformation of EEG","volume":"91","author":"Schiff","year":"1994","journal-title":"Electroencephalogr Clin Neurophysiol"},{"key":"10.1016\/j.array.2026.100780_b42","doi-asserted-by":"crossref","DOI":"10.1109\/TIM.2024.3480231","article-title":"Combined bivariate performance measure","author":"Kim","year":"2024","journal-title":"IEEE Trans Instrum Meas"}],"container-title":["Array"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S2590005626001037?httpAccept=text\/xml","content-type":"text\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S2590005626001037?httpAccept=text\/plain","content-type":"text\/plain","content-version":"vor","intended-application":"text-mining"}],"deposited":{"date-parts":[[2026,4,28]],"date-time":"2026-04-28T09:15:47Z","timestamp":1777367747000},"score":1,"resource":{"primary":{"URL":"https:\/\/linkinghub.elsevier.com\/retrieve\/pii\/S2590005626001037"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2026,7]]},"references-count":42,"alternative-id":["S2590005626001037"],"URL":"https:\/\/doi.org\/10.1016\/j.array.2026.100780","relation":{},"ISSN":["2590-0056"],"issn-type":[{"value":"2590-0056","type":"print"}],"subject":[],"published":{"date-parts":[[2026,7]]},"assertion":[{"value":"Elsevier","name":"publisher","label":"This article is maintained by"},{"value":"Advanced electroencephalogram based authentication by adapting machine learning models","name":"articletitle","label":"Article Title"},{"value":"Array","name":"journaltitle","label":"Journal Title"},{"value":"https:\/\/doi.org\/10.1016\/j.array.2026.100780","name":"articlelink","label":"CrossRef DOI link to publisher maintained version"},{"value":"article","name":"content_type","label":"Content Type"},{"value":"\u00a9 2026 The Authors. Published by Elsevier Inc.","name":"copyright","label":"Copyright"}],"article-number":"100780"}}