{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,1,18]],"date-time":"2025-01-18T05:07:40Z","timestamp":1737176860747,"version":"3.33.0"},"reference-count":46,"publisher":"IEEE","license":[{"start":{"date-parts":[[2024,12,15]],"date-time":"2024-12-15T00:00:00Z","timestamp":1734220800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2024,12,15]],"date-time":"2024-12-15T00:00:00Z","timestamp":1734220800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2024,12,15]]},"DOI":"10.1109\/bigdata62323.2024.10826073","type":"proceedings-article","created":{"date-parts":[[2025,1,16]],"date-time":"2025-01-16T18:31:23Z","timestamp":1737052283000},"page":"5592-5601","source":"Crossref","is-referenced-by-count":0,"title":["Investigating Data Protection Mechanisms for EEG Biometric Authentication"],"prefix":"10.1109","author":[{"given":"Cristopher","family":"Hernandez","sequence":"first","affiliation":[{"name":"California State Polytechnic University, Pomona,Computer Science Department,Pomona,United States"}]},{"given":"Mohammad","family":"Husain","sequence":"additional","affiliation":[{"name":"California State Polytechnic University, Pomona,Computer Science Department,Pomona,United States"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/CCECE.2001.933649"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1155\/2021\/5229576"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1016\/j.bj.2019.03.005"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2020.3044726"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2016.06.001"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/MSECP.2003.1193209"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1007\/s10462-019-09767-8"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/TBIOM.2021.3115465"},{"key":"ref9","first-page":"3","article-title":"The ten-twenty electrode system of the International Federation. The International Federation of Clinical Neurophysiology","volume":"52","author":"Klem","year":"1999","journal-title":"Electroencephalography and Clinical Neurophysiology. Supplement"},{"key":"ref10","first-page":"3","article-title":"Ellen R. Grass Lecture: Extraordinary EEG: Neurodiagnostic Journal","volume-title":"Neurodiagnostic Journal","volume":"54","author":"Tatum","year":"2014"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.3390\/math11061424"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1016\/j.compbiomed.2021.104696"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2020.101788"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2022.3204222"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-41320-9_1"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.3389\/fnins.2019.00354"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1145\/3206004.3206006"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/BigData50022.2020.9377861"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/BigDataService.2019.00059"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/BigData59044.2023.10386718"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1007\/s11042-020-09197-7"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/TPAMI.2018.2827389"},{"year":"2022","key":"ref23","article-title":"Concrete ML: a Privacy-Preserving Machine Learning Library using Fully Homomorphic Encryption for Data Scientists"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1007\/s11227-023-05233-z"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/TPAMI.2006.250"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1117\/12.839976"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1016\/j.patcog.2007.12.002"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1117\/12.839165"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1155\/2017\/7129505"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2017.02.013"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1038\/s41598-022-06527-7"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1109\/ICASSP.2009.4959866"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1016\/j.procs.2017.08.126"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1109\/MENACOMM46666.2019.8988578"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.23919\/EUSIPCO.2017.8081349"},{"key":"ref36","doi-asserted-by":"crossref","DOI":"10.1155\/2018\/1867548","article-title":"Combining Cryptography with EEG Biometrics","volume":"2018","author":"Damasevicius","year":"2018","journal-title":"Computational Intelligence and Neuroscience"},{"article-title":"Auditory evoked potential EEG-Biometric dataset","year":"2021","author":"Alzahab","key":"ref37"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1161\/01.CIR.101.23.e21"},{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2019.2904844"},{"key":"ref40","article-title":"Scale range of array elements - MATLAB rescale"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1016\/j.patcog.2006.05.030"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1016\/j.patrec.2004.11.021"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1016\/j.diin.2006.06.015"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1145\/362686.362692"},{"key":"ref45","first-page":"118","article-title":"The FNV Non-Cryptographic Hash Algorithm","author":"Fowler","year":"2024","journal-title":"Internet Draft draft-eastlake-fnv-23, Internet Engineering Task Force"},{"article-title":"hajimes\/mmh3","year":"2024","author":"Senuma","key":"ref46"}],"event":{"name":"2024 IEEE International Conference on Big Data (BigData)","start":{"date-parts":[[2024,12,15]]},"location":"Washington, DC, USA","end":{"date-parts":[[2024,12,18]]}},"container-title":["2024 IEEE International Conference on Big Data (BigData)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/10824975\/10824942\/10826073.pdf?arnumber=10826073","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,1,17]],"date-time":"2025-01-17T07:49:06Z","timestamp":1737100146000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10826073\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,12,15]]},"references-count":46,"URL":"https:\/\/doi.org\/10.1109\/bigdata62323.2024.10826073","relation":{},"subject":[],"published":{"date-parts":[[2024,12,15]]}}}