{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,5,12]],"date-time":"2026-05-12T17:10:06Z","timestamp":1778605806768,"version":"3.51.4"},"reference-count":37,"publisher":"Elsevier BV","license":[{"start":{"date-parts":[[2026,7,1]],"date-time":"2026-07-01T00:00:00Z","timestamp":1782864000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/tdm\/userlicense\/1.0\/"},{"start":{"date-parts":[[2026,7,1]],"date-time":"2026-07-01T00:00:00Z","timestamp":1782864000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/legal\/tdmrep-license"},{"start":{"date-parts":[[2026,7,1]],"date-time":"2026-07-01T00:00:00Z","timestamp":1782864000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-017"},{"start":{"date-parts":[[2026,7,1]],"date-time":"2026-07-01T00:00:00Z","timestamp":1782864000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"},{"start":{"date-parts":[[2026,7,1]],"date-time":"2026-07-01T00:00:00Z","timestamp":1782864000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-012"},{"start":{"date-parts":[[2026,7,1]],"date-time":"2026-07-01T00:00:00Z","timestamp":1782864000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2026,7,1]],"date-time":"2026-07-01T00:00:00Z","timestamp":1782864000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-004"}],"content-domain":{"domain":["elsevier.com","sciencedirect.com"],"crossmark-restriction":true},"short-container-title":["Computers and Electrical Engineering"],"published-print":{"date-parts":[[2026,7]]},"DOI":"10.1016\/j.compeleceng.2026.111133","type":"journal-article","created":{"date-parts":[[2026,4,4]],"date-time":"2026-04-04T11:54:39Z","timestamp":1775303679000},"page":"111133","update-policy":"https:\/\/doi.org\/10.1016\/elsevier_cm_policy","source":"Crossref","is-referenced-by-count":0,"special_numbering":"C","title":["Neuroauthnet: A brainwave-based authentication framework using BCI and deep learning for privacy-preserving identity verification"],"prefix":"10.1016","volume":"135","author":[{"given":"S.","family":"Nooriya begam","sequence":"first","affiliation":[]},{"given":"R.M.","family":"Vidhyavathi","sequence":"additional","affiliation":[]},{"given":"B.","family":"Vignesh","sequence":"additional","affiliation":[]},{"given":"A.","family":"Sumaiya","sequence":"additional","affiliation":[]}],"member":"78","reference":[{"issue":"8","key":"10.1016\/j.compeleceng.2026.111133_bib0001","doi-asserted-by":"crossref","first-page":"1546","DOI":"10.1109\/TNSRE.2019.2926965","article-title":"Protecting privacy of users in brain-computer interface applications","volume":"27","author":"Agarwal","year":"2019","journal-title":"IEEE Trans Neural Syst Rehabil Eng"},{"issue":"17","key":"10.1016\/j.compeleceng.2026.111133_bib0002","doi-asserted-by":"crossref","first-page":"1178","DOI":"10.1049\/el.2017.1637","article-title":"Brain-controlled wheelchair controlled by sustained and brief motor imagery BCIs","volume":"53","author":"Wang","year":"2017","journal-title":"Electron Lett"},{"key":"10.1016\/j.compeleceng.2026.111133_bib0003","series-title":"2020 international conference on computer, electrical & communication engineering (ICCECE)","first-page":"1","article-title":"Brain-computer interfacebased user authentication system for personal device security","author":"Hossain","year":"2020"},{"issue":"6","key":"10.1016\/j.compeleceng.2026.111133_bib0004","doi-asserted-by":"crossref","first-page":"1301","DOI":"10.1109\/TNSRE.2018.2837003","article-title":"Neuromagnetic decoding of simultaneous bilateral hand movements for multidimensional brain\u2013machine interfaces","volume":"26","author":"Belkacem","year":"2018","journal-title":"IEEE Trans Neural Syst Rehabil Eng"},{"issue":"1","key":"10.1016\/j.compeleceng.2026.111133_bib0005","doi-asserted-by":"crossref","first-page":"35","DOI":"10.1007\/s12559-017-9517-x","article-title":"Attentional bias pattern recognition in spiking neural networks from spatio-temporal EEG data","volume":"10","author":"Gholami Doborjeh","year":"2018","journal-title":"Cogn Comput"},{"issue":"17","key":"10.1016\/j.compeleceng.2026.111133_bib0006","doi-asserted-by":"crossref","first-page":"5746","DOI":"10.3390\/s21175746","article-title":"Brain-computer interface: advancement and challenges","volume":"21","author":"Mridha","year":"2021","journal-title":"Sensors"},{"issue":"15","key":"10.1016\/j.compeleceng.2026.111133_bib0007","doi-asserted-by":"crossref","first-page":"12527","DOI":"10.1007\/s00521-022-07292-4","article-title":"Human emotion recognition from EEG-based brain\u2013computer interface using machine learning: a comprehensive review","volume":"34","author":"Houssein","year":"2022","journal-title":"Neural Comput Appl"},{"issue":"9","key":"10.1016\/j.compeleceng.2026.111133_bib0008","doi-asserted-by":"crossref","first-page":"4283","DOI":"10.1007\/s00521-020-05247-1","article-title":"SaS-BCI: a new strategy to predict image memorability and use mental imagery as a brain-based biometric authentication","volume":"33","author":"Yousefi","year":"2021","journal-title":"Neural Comput Appl"},{"key":"10.1016\/j.compeleceng.2026.111133_bib0009","series-title":"Proceedings of the 15th ACM conference on security and privacy in wireless and mobile networks","first-page":"175","article-title":"SoK: your mind tells a lot about you: on the privacy leakage via brainwave devices","author":"Mandal","year":"2022"},{"key":"10.1016\/j.compeleceng.2026.111133_bib0010","doi-asserted-by":"crossref","first-page":"100294","DOI":"10.1109\/ACCESS.2021.3093391","article-title":"Adaptive thresholds of EEG brain signals for IoT devices authentication","volume":"9","author":"Elshenaway","year":"2021","journal-title":"IEEE Access"},{"issue":"3","key":"10.1016\/j.compeleceng.2026.111133_bib0011","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1145\/3579356","article-title":"Performance and usability evaluation of brainwave authentication techniques with consumer devices","volume":"26","author":"Arias-Cabarcos","year":"2023","journal-title":"ACM Trans Priv Secur"},{"key":"10.1016\/j.compeleceng.2026.111133_bib0012","series-title":"30th USENIX security symposium (USENIX security 21)","first-page":"55","article-title":"Inexpensive brainwave authentication: new techniques and insights on user acceptance","author":"Arias-Cabarcos","year":"2021"},{"key":"10.1016\/j.compeleceng.2026.111133_bib0013","doi-asserted-by":"crossref","DOI":"10.1016\/j.cose.2023.103520","article-title":"A robust brain pattern for brain-based authentication methods using deep breath","volume":"135","author":"Yousefi","year":"2023","journal-title":"Comput Secur"},{"issue":"9","key":"10.1016\/j.compeleceng.2026.111133_bib0014","doi-asserted-by":"crossref","first-page":"205","DOI":"10.3390\/ai6090205","article-title":"Brainwave biometrics: a secure and scalable brain\u2013computer interface-based authentication system","volume":"6","author":"Mashael","year":"2025","journal-title":"AI"},{"key":"10.1016\/j.compeleceng.2026.111133_bib0015","doi-asserted-by":"crossref","first-page":"153","DOI":"10.1002\/9781394386574.ch10","article-title":"Brainwave authentication: threats and vulnerabilities","author":"Rawat","year":"2025","journal-title":"Cogn Cyber Crimes Era Artif Intell"},{"key":"10.1016\/j.compeleceng.2026.111133_bib0016","series-title":"2025 10th international conference on communication and electronics systems (ICCES)","first-page":"01","article-title":"A study on EEG sensors for secure authentication using machine learning","author":"Mary","year":"2025"},{"issue":"14","key":"10.1016\/j.compeleceng.2026.111133_bib0017","doi-asserted-by":"crossref","first-page":"1252","DOI":"10.1007\/s11760-025-04852-8","article-title":"EEG-based biometric authentication: advancing security through motor imagery and deep learning","volume":"19","author":"Mostafavi","year":"2025","journal-title":"Signal Image Video Process"},{"key":"10.1016\/j.compeleceng.2026.111133_bib0018","doi-asserted-by":"crossref","DOI":"10.1016\/j.patcog.2025.112009","article-title":"A brainwave verification system integrating passwords with EEG templates for online identification and authentication","volume":"169","author":"Zhao","year":"2026","journal-title":"Pattern Recognit"},{"key":"10.1016\/j.compeleceng.2026.111133_bib0019","article-title":"BrainAuth: a neuro-biometric approach for personal authentication","author":"Adil","year":"2025","journal-title":"IEEE J Biomed Health Inf"},{"issue":"9","key":"10.1016\/j.compeleceng.2026.111133_bib0020","doi-asserted-by":"crossref","first-page":"398","DOI":"10.1007\/s40747-025-02012-6","article-title":"Advancing EEG-based biometric identification through multi-modal data fusion and deep learning techniques","volume":"11","author":"Rehman","year":"2025","journal-title":"Complex Intell Syst"},{"issue":"8","key":"10.1016\/j.compeleceng.2026.111133_bib0021","doi-asserted-by":"crossref","DOI":"10.31449\/inf.v49i8.9228","article-title":"Comparative performance analysis of machine and Deep learning models for EEG-based biometric authentication","volume":"49","author":"Tarawneh","year":"2025","journal-title":"Informatica"},{"key":"10.1016\/j.compeleceng.2026.111133_bib0022","doi-asserted-by":"crossref","DOI":"10.1109\/TCE.2025.3571744","article-title":"A tri-fusion approach for brainwave-based biometric authentication, using consumer EEG devices","author":"Adil","year":"2025","journal-title":"IEEE Trans Consum Electron"},{"issue":"7","key":"10.1016\/j.compeleceng.2026.111133_bib0023","first-page":"2424","article-title":"Frequency-reconfigurable input-reflectionless bandpass filter and filtering power divider with constant absolute bandwidth","volume":"68","author":"Fan","year":"2021","journal-title":"IEEE Trans Circuits Syst II: Express Br"},{"issue":"8","key":"10.1016\/j.compeleceng.2026.111133_bib0024","doi-asserted-by":"crossref","first-page":"3051","DOI":"10.3390\/s22083051","article-title":"Improved cognitive vigilance assessment after artifact reduction with wavelet independent component analysis","volume":"22","author":"Abu Farha","year":"2022","journal-title":"Sensors"},{"key":"10.1016\/j.compeleceng.2026.111133_bib0025","doi-asserted-by":"crossref","DOI":"10.1016\/j.jneumeth.2021.109089","article-title":"Use of common average reference and large-laplacian spatial-filters enhances EEG signal-to-noise ratios in intrinsic sensorimotor activity","volume":"353","author":"Tsuchimoto","year":"2021","journal-title":"J Neurosci Methods"},{"key":"10.1016\/j.compeleceng.2026.111133_bib0026","doi-asserted-by":"crossref","DOI":"10.1016\/j.optcom.2020.126567","article-title":"Low-complexity point cloud denoising for LiDAR by PCA-based dimension reduction","volume":"482","author":"Duan","year":"2021","journal-title":"Opt Commun"},{"issue":"1","key":"10.1016\/j.compeleceng.2026.111133_bib0027","doi-asserted-by":"crossref","DOI":"10.1155\/2022\/1502934","article-title":"An efficient signal processing algorithm for detecting abnormalities in EEG signal using CNN","volume":"2022","author":"Syamsundararao","year":"2022","journal-title":"Contrast Media Mol Imaging"},{"key":"10.1016\/j.compeleceng.2026.111133_bib0028","doi-asserted-by":"crossref","first-page":"58081","DOI":"10.1109\/ACCESS.2022.3178710","article-title":"New hybrid deep learning approach using BiGRU-BiLSTM and multilayered dilated CNN to detect arrhythmia","volume":"10","author":"Islam","year":"2022","journal-title":"IEEE Access"},{"issue":"11","key":"10.1016\/j.compeleceng.2026.111133_bib0029","doi-asserted-by":"crossref","first-page":"10395","DOI":"10.1007\/s12652-020-02837-8","article-title":"EEG signal processing for epilepsy seizure detection using 5-level Db4 discrete wavelet transform, GA-based feature selection and ANN\/SVM classifiers","volume":"12","author":"Omidvar","year":"2021","journal-title":"J Ambient Intell Humaniz Comput"},{"issue":"12","key":"10.1016\/j.compeleceng.2026.111133_bib0030","doi-asserted-by":"crossref","first-page":"1946","DOI":"10.3390\/life12121946","article-title":"RNN and BiLSTM fusion for accurate automatic epileptic seizure diagnosis using EEG signals","volume":"12","author":"Samee","year":"2022","journal-title":"Life"},{"key":"10.1016\/j.compeleceng.2026.111133_bib0031","article-title":"StressNet: hybrid model of LSTM and CNN for stress detection from electroencephalogram signal (EEG)","volume":"11","author":"Mane","year":"2023","journal-title":"Results Control Optim"},{"key":"10.1016\/j.compeleceng.2026.111133_bib0032","article-title":"A multi-dimensional hybrid CNN-BiLSTM framework for epileptic seizure detection using electroencephalogram signal scrutiny","volume":"5","author":"KR","year":"2023","journal-title":"Syst Soft Comput"},{"key":"10.1016\/j.compeleceng.2026.111133_bib0033","series-title":"2021 international conference on advance computing and innovative technologies in engineering (ICACITE)","first-page":"880","article-title":"Classifying the autism and epilepsy disorder based on EEG signal using deep convolutional neural network (DCNN)","author":"Ranjani","year":"2021"},{"key":"10.1016\/j.compeleceng.2026.111133_bib0034","doi-asserted-by":"crossref","DOI":"10.1016\/j.bspc.2023.105475","article-title":"Toward reliable signals decoding for electroencephalogram: a benchmark study to EEGNeX","volume":"87","author":"Chen","year":"2024","journal-title":"Biomed Signal Process Control"},{"issue":"3","key":"10.1016\/j.compeleceng.2026.111133_bib0035","doi-asserted-by":"crossref","first-page":"193","DOI":"10.1007\/s42979-025-03743-6","article-title":"Classification of EEG signal using deep learning architecturesbased motor-imagery for an upper-limb rehabilitation exoskeleton","volume":"6","author":"Titkanlou","year":"2025","journal-title":"SN Comput Sci"},{"key":"10.1016\/j.compeleceng.2026.111133_bib0036","doi-asserted-by":"crossref","first-page":"36672","DOI":"10.1109\/ACCESS.2022.3161489","article-title":"EEG-ITNet: an explainable inception temporal convolutional network for motor imagery classification","volume":"10","author":"Salami","year":"2022","journal-title":"Ieee Access"},{"key":"10.1016\/j.compeleceng.2026.111133_bib0037","doi-asserted-by":"crossref","DOI":"10.3389\/fnbot.2022.901765","article-title":"EEG identity authentication in multi-domain features: a multi-scale 3D-CNN approach","volume":"16","author":"Zhang","year":"2022","journal-title":"Front Neurorobot"}],"container-title":["Computers and Electrical Engineering"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S0045790626002053?httpAccept=text\/xml","content-type":"text\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S0045790626002053?httpAccept=text\/plain","content-type":"text\/plain","content-version":"vor","intended-application":"text-mining"}],"deposited":{"date-parts":[[2026,5,12]],"date-time":"2026-05-12T16:26:31Z","timestamp":1778603191000},"score":1,"resource":{"primary":{"URL":"https:\/\/linkinghub.elsevier.com\/retrieve\/pii\/S0045790626002053"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2026,7]]},"references-count":37,"alternative-id":["S0045790626002053"],"URL":"https:\/\/doi.org\/10.1016\/j.compeleceng.2026.111133","relation":{},"ISSN":["0045-7906"],"issn-type":[{"value":"0045-7906","type":"print"}],"subject":[],"published":{"date-parts":[[2026,7]]},"assertion":[{"value":"Elsevier","name":"publisher","label":"This article is maintained by"},{"value":"Neuroauthnet: A brainwave-based authentication framework using BCI and deep learning for privacy-preserving identity verification","name":"articletitle","label":"Article Title"},{"value":"Computers and Electrical Engineering","name":"journaltitle","label":"Journal Title"},{"value":"https:\/\/doi.org\/10.1016\/j.compeleceng.2026.111133","name":"articlelink","label":"CrossRef DOI link to publisher maintained version"},{"value":"article","name":"content_type","label":"Content Type"},{"value":"\u00a9 2026 Elsevier Ltd. All rights are reserved, including those for text and data mining, AI training, and similar technologies.","name":"copyright","label":"Copyright"}],"article-number":"111133"}}