{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,22]],"date-time":"2024-10-22T18:26:14Z","timestamp":1729621574918,"version":"3.28.0"},"reference-count":11,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2015,2]]},"DOI":"10.1109\/35021bigcomp.2015.7072841","type":"proceedings-article","created":{"date-parts":[[2015,4,3]],"date-time":"2015-04-03T18:19:44Z","timestamp":1428085184000},"page":"15-18","source":"Crossref","is-referenced-by-count":8,"title":["Mobile user verification\/identification using statistical mobility profile"],"prefix":"10.1109","author":[{"given":"Miao","family":"Lin","sequence":"first","affiliation":[]},{"given":"Hong","family":"Cao","sequence":"additional","affiliation":[]},{"given":"Vincent","family":"Zheng","sequence":"additional","affiliation":[]},{"given":"Kevin C.","family":"Chang","sequence":"additional","affiliation":[]},{"given":"Shonali","family":"Krishnaswamy","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1145\/1456403.1456409"},{"key":"ref3","article-title":"Device analyzer: Understanding smartphone usage","author":"wagner","year":"2013","journal-title":"10th International Conference on Mobile and Ubiquitous Systems Computing Networking and Services"},{"key":"ref10","doi-asserted-by":"crossref","first-page":"1","DOI":"10.18637\/jss.v031.i07","article-title":"Computing and visualizing dynamic time warping alignments in r: The dtw package","volume":"31","author":"giorgino","year":"2009","journal-title":"Journal of Statistical Software"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/ICDE.1995.380415"},{"key":"ref11","article-title":"Principal Component Analysis","author":"jolliffe","year":"2002","journal-title":"Springer"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/WOWMOM.2009.5282489"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1145\/2389148.2389151"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1038\/srep01376"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/MPRV.2003.1186725"},{"key":"ref9","article-title":"De-anonymization attack on geolocated datasets","author":"gambs","year":"2013","journal-title":"12th IEEE Inter Conf on Trust Security and Privacy in Compt and Communications"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1016\/j.pmcj.2013.06.005"}],"event":{"name":"2015 International Conference on Big Data and Smart Computing (BigComp)","start":{"date-parts":[[2015,2,9]]},"location":"Jeju, South Korea","end":{"date-parts":[[2015,2,11]]}},"container-title":["2015 International Conference on Big Data and Smart Computing (BIGCOMP)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/7062153\/7072806\/07072841.pdf?arnumber=7072841","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,23]],"date-time":"2017-06-23T08:33:42Z","timestamp":1498206822000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/7072841\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015,2]]},"references-count":11,"URL":"https:\/\/doi.org\/10.1109\/35021bigcomp.2015.7072841","relation":{},"subject":[],"published":{"date-parts":[[2015,2]]}}}