{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,7]],"date-time":"2025-11-07T09:40:45Z","timestamp":1762508445518,"version":"3.37.3"},"reference-count":69,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","license":[{"start":{"date-parts":[[2021,1,1]],"date-time":"2021-01-01T00:00:00Z","timestamp":1609459200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/legalcode"}],"funder":[{"DOI":"10.13039\/501100003725","name":"National Research Foundation of Korea (NRF) through the Program of Basic Research Laboratory","doi-asserted-by":"publisher","award":["NRF-2019R1A4A1025958"],"award-info":[{"award-number":["NRF-2019R1A4A1025958"]}],"id":[{"id":"10.13039\/501100003725","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Access"],"published-print":{"date-parts":[[2021]]},"DOI":"10.1109\/access.2021.3071228","type":"journal-article","created":{"date-parts":[[2021,4,5]],"date-time":"2021-04-05T20:50:43Z","timestamp":1617655843000},"page":"53548-53565","source":"Crossref","is-referenced-by-count":11,"title":["Wi-Fi Based User Identification Using In-Air Handwritten Signature"],"prefix":"10.1109","volume":"9","author":[{"given":"Junsik","family":"Jung","sequence":"first","affiliation":[{"name":"School of Computing, Korea Advanced Institute of Science and Technology, Daejeon, Republic of Korea"}]},{"given":"Han-Cheol","family":"Moon","sequence":"additional","affiliation":[{"name":"School of Computer Science and Engineering, Nanyang Technological University, Singapore"}]},{"given":"Jooyoung","family":"Kim","sequence":"additional","affiliation":[{"name":"School of Electrical and Electronic Engineering, Yonsei University, Seoul, Republic of Korea"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-1960-0527","authenticated-orcid":false,"given":"Donghyun","family":"Kim","sequence":"additional","affiliation":[{"name":"School of Electrical and Electronic Engineering, Yonsei University, Seoul, Republic of Korea"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-3736-003X","authenticated-orcid":false,"given":"Kar-Ann","family":"Toh","sequence":"additional","affiliation":[{"name":"School of Electrical and Electronic Engineering, Yonsei University, Seoul, Republic of Korea"}]}],"member":"263","reference":[{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-92537-0_12"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2016.153"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1109\/PERCOMW.2018.8480253"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1145\/328236.328110"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1016\/j.compeleceng.2016.11.010"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-11680-8_28"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2009.5206848"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1109\/TMI.2016.2528162"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2014.222"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1186\/s40537-016-0043-6"},{"key":"ref60","doi-asserted-by":"publisher","DOI":"10.1109\/IJCB.2011.6117588"},{"key":"ref62","article-title":"Wi-Fi gesture recognition on existing devices","author":"nandakumar","year":"2014","journal-title":"arXiv 1411 5394"},{"journal-title":"Pattern Recognition and Machine Learning","year":"2006","author":"bishop","key":"ref61"},{"key":"ref63","doi-asserted-by":"publisher","DOI":"10.1109\/SAHCN.2019.8824896"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/ICIP.2019.8803371"},{"key":"ref64","doi-asserted-by":"publisher","DOI":"10.1016\/j.patrec.2015.09.016"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/WIFS.2015.7368566"},{"journal-title":"PyTorch","year":"2019","key":"ref65"},{"key":"ref66","doi-asserted-by":"publisher","DOI":"10.1145\/1102351.1102422"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-14292-5_50"},{"key":"ref67","article-title":"Adam: A method for stochastic optimization","author":"kingma","year":"2014","journal-title":"arXiv 1412 6980"},{"key":"ref68","doi-asserted-by":"publisher","DOI":"10.1016\/j.neucom.2005.12.126"},{"key":"ref69","doi-asserted-by":"publisher","DOI":"10.1162\/jocn.1991.3.1.71"},{"journal-title":"Biometrics Personal Identification in Networked Society","year":"2006","author":"jain","key":"ref2"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1007\/978-0-387-77326-1"},{"journal-title":"Pattern Classification","year":"2012","author":"duda","key":"ref20"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/ICIS.2018.8527565"},{"key":"ref21","article-title":"An overview of gradient descent optimization algorithms","author":"ruder","year":"2016","journal-title":"arXiv 1609 04747"},{"key":"ref24","article-title":"Analytic network learning","author":"toh","year":"2018","journal-title":"arXiv 1811 08227"},{"key":"ref23","article-title":"Gradient-free learning based on the kernel and the range space","author":"toh","year":"2018","journal-title":"arXiv 1810 11581"},{"key":"ref26","first-page":"1","article-title":"Personal authentication by free space signing with video capture","volume":"6","author":"katagiri","year":"2002","journal-title":"Proc 5th Asian Conf Comput Vis (ACCV)"},{"key":"ref25","doi-asserted-by":"crossref","first-page":"20","DOI":"10.2991\/ijndc.2018.7.1.3","article-title":"Kernel and range approach to analytic network learning","volume":"7","author":"toh","year":"2018","journal-title":"Int J Netw Distrib Comput"},{"key":"ref50","doi-asserted-by":"publisher","DOI":"10.1016\/S0167-8655(03)00079-5"},{"journal-title":"Handbook of Biometrics","year":"2007","author":"jain","key":"ref51"},{"key":"ref59","doi-asserted-by":"publisher","DOI":"10.1109\/BTAS.2010.5634516"},{"key":"ref58","doi-asserted-by":"publisher","DOI":"10.1016\/j.patcog.2012.02.027"},{"key":"ref57","doi-asserted-by":"crossref","first-page":"658","DOI":"10.1109\/TPAMI.2007.70730","article-title":"Between classification-error approximation and weighted least-squares learning","volume":"30","author":"toh","year":"2008","journal-title":"IEEE Trans Pattern Anal Mach Intell"},{"key":"ref56","doi-asserted-by":"publisher","DOI":"10.1007\/BF00994018"},{"key":"ref55","doi-asserted-by":"publisher","DOI":"10.1016\/j.inffus.2016.02.003"},{"key":"ref54","doi-asserted-by":"publisher","DOI":"10.1016\/j.patcog.2009.11.018"},{"key":"ref53","doi-asserted-by":"publisher","DOI":"10.1016\/j.patcog.2005.06.011"},{"key":"ref52","doi-asserted-by":"publisher","DOI":"10.1016\/j.patcog.2005.01.012"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1016\/j.patcog.2011.04.010"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1145\/3168776.3168799"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1145\/1925861.1925870"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/ICPR.2018.8546265"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.3390\/s18113872"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/TMC.2016.2557795"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/TMC.2016.2557792"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2017.2680998"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/TMC.2015.2504935"},{"key":"ref18","article-title":"A survey on deep transfer learning","author":"tan","year":"2018","journal-title":"arXiv 1808 01974"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/5.726791"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1007\/s11042-018-6458-7"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1016\/j.patrec.2015.12.013"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1504\/IJBM.2008.018665"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/IIH-MSP.2009.51"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2932400"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1145\/3274658"},{"journal-title":"Regression and the Moore-Penrose Pseudoinverse","year":"1972","author":"albert","key":"ref49"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/ICARCV.2012.6485153"},{"journal-title":"SciPy Open source scientific tools for Python","year":"2019","author":"eric","key":"ref46"},{"key":"ref45","first-page":"536","article-title":"On the theory of filter amplifiers","volume":"7","author":"butterworth","year":"1930","journal-title":"The Wireless Engineer and Experimental Wireless"},{"key":"ref48","article-title":"Batch normalization: Accelerating deep network training by reducing internal covariate shift","author":"ioffe","year":"2015","journal-title":"arXiv 1502 03167"},{"key":"ref47","doi-asserted-by":"publisher","DOI":"10.1007\/s12559-018-9593-6"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1109\/JSEN.2019.2938245"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1145\/2971648.2971738"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1109\/5.993400"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2019.2936580"}],"container-title":["IEEE Access"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6287639\/9312710\/09395433.pdf?arnumber=9395433","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,12,11]],"date-time":"2024-12-11T02:07:10Z","timestamp":1733882830000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9395433\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021]]},"references-count":69,"URL":"https:\/\/doi.org\/10.1109\/access.2021.3071228","relation":{},"ISSN":["2169-3536"],"issn-type":[{"type":"electronic","value":"2169-3536"}],"subject":[],"published":{"date-parts":[[2021]]}}}