{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,28]],"date-time":"2025-10-28T00:31:35Z","timestamp":1761611495467,"version":"3.37.3"},"reference-count":18,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","license":[{"start":{"date-parts":[[2019,1,1]],"date-time":"2019-01-01T00:00:00Z","timestamp":1546300800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/legalcode"}],"funder":[{"DOI":"10.13039\/501100003725","name":"National Research Foundation of Korea","doi-asserted-by":"publisher","id":[{"id":"10.13039\/501100003725","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Korean Government","award":["2018R1A4A1025632"],"award-info":[{"award-number":["2018R1A4A1025632"]}]},{"name":"Basic Science Research Program through the National Research Foundation of Korea"},{"DOI":"10.13039\/501100002701","name":"Ministry of Education","doi-asserted-by":"publisher","award":["NRF-2018R1D1A1B07047656"],"award-info":[{"award-number":["NRF-2018R1D1A1B07047656"]}],"id":[{"id":"10.13039\/501100002701","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100002560","name":"Soonchunhyang University","doi-asserted-by":"publisher","id":[{"id":"10.13039\/501100002560","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Access"],"published-print":{"date-parts":[[2019]]},"DOI":"10.1109\/access.2019.2956819","type":"journal-article","created":{"date-parts":[[2019,11,29]],"date-time":"2019-11-29T15:57:18Z","timestamp":1575043038000},"page":"177241-177253","source":"Crossref","is-referenced-by-count":7,"title":["Vulnerability Analysis Challenges of the Mouse Data Based on Machine Learning for Image-Based User Authentication"],"prefix":"10.1109","volume":"7","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-1477-7569","authenticated-orcid":false,"given":"Kyungroul","family":"Lee","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-0085-0748","authenticated-orcid":false,"given":"Christian","family":"Esposito","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-4686-9436","authenticated-orcid":false,"given":"Sun-Young","family":"Lee","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2018.03.024"},{"key":"ref11","first-page":"236","article-title":"A protection technique for screen image-based authentication protocols utilizing the SetCursorPos function","author":"oh","year":"2017","journal-title":"Proc WISA"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1016\/j.patcog.2006.12.019"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1007\/s10994-009-5127-5"},{"journal-title":"Learning with kernels","year":"2002","author":"sch\u00f6lkopf","key":"ref14"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/CSAC.1999.816048"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/TPAMI.2007.250609"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2017.2705644"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2017.2762418"},{"key":"ref4","first-page":"212","article-title":"Vulnerability analysis on the image-based authentication through the PS\/2 interface","author":"oh","year":"2018","journal-title":"Proc of IMIS"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/IMIS.2011.148"},{"key":"ref6","first-page":"534","article-title":"Secure authentication using anti-screenshot virtual keyboard","volume":"8","author":"parekh","year":"2011","journal-title":"Int J Comput Sci Issues"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-45233-1_26"},{"key":"ref8","first-page":"387","article-title":"Security assessment on the mouse data using mouse loggers","author":"lee","year":"2016","journal-title":"Proc BWCCA"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/CCST.2005.1594881"},{"key":"ref2","first-page":"9","article-title":"Password sniff by forcing the keyboard to replay scan codes","author":"lee","year":"2010","journal-title":"Proceedings of JWIS09"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/HICSS.2004.1265412"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2018.12.002"}],"container-title":["IEEE Access"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6287639\/8600701\/08918103.pdf?arnumber=8918103","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,1,12]],"date-time":"2022-01-12T11:31:42Z","timestamp":1641987102000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/8918103\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019]]},"references-count":18,"URL":"https:\/\/doi.org\/10.1109\/access.2019.2956819","relation":{},"ISSN":["2169-3536"],"issn-type":[{"type":"electronic","value":"2169-3536"}],"subject":[],"published":{"date-parts":[[2019]]}}}