{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,6]],"date-time":"2026-03-06T15:26:12Z","timestamp":1772810772079,"version":"3.50.1"},"reference-count":15,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2010,9]]},"DOI":"10.1109\/btas.2010.5634532","type":"proceedings-article","created":{"date-parts":[[2010,11,19]],"date-time":"2010-11-19T16:30:10Z","timestamp":1290184210000},"page":"1-7","source":"Crossref","is-referenced-by-count":204,"title":["Cell phone-based biometric identification"],"prefix":"10.1109","author":[{"given":"Jennifer R.","family":"Kwapisz","sequence":"first","affiliation":[]},{"given":"Gary M.","family":"Weiss","sequence":"additional","affiliation":[]},{"given":"Samuel A.","family":"Moore","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"15","doi-asserted-by":"crossref","first-page":"315","DOI":"10.1613\/jair.1199","article-title":"Learning when training data are costly: The effect of class distribution on tree induction","volume":"19","author":"weiss","year":"2003","journal-title":"Journal of Artificial Intelligence Research"},{"key":"13","article-title":"Robustness of biometric gait authentication against impersonation attack","author":"gafurov","year":"2006","journal-title":"International Workshop on Information Security On The Move Federated Conferences"},{"key":"14","doi-asserted-by":"publisher","DOI":"10.1145\/1964897.1964918"},{"key":"11","first-page":"359","article-title":"Learning to predict rare events in event sequences","author":"weiss","year":"1998","journal-title":"Proceedings of the Fourth International Conference on Knowledge Discovery and Data Mining"},{"key":"12","author":"witten","year":"2005","journal-title":"Data Mining Practical Machine Learning Tools and Techniques"},{"key":"3","doi-asserted-by":"publisher","DOI":"10.1007\/978-0-387-29488-9"},{"key":"2","year":"2009","journal-title":"Apple IPhone & Apple IPod Touch"},{"key":"1","year":"0","journal-title":"WISDM Project"},{"key":"10","article-title":"Gait recognition using wearable motion recording sensors","author":"gafurov","year":"2008","journal-title":"EURASIP Journal on Advances in Signal Processing"},{"key":"7","doi-asserted-by":"publisher","DOI":"10.1145\/1515747.1515762"},{"key":"6","doi-asserted-by":"publisher","DOI":"10.1109\/ICASSP.2005.1415569"},{"key":"5","article-title":"A survey of biometric gait recognition: Approaches, security, & challenges","author":"gafurov","year":"2007","journal-title":"Annual Norwegian Computer Science Conference"},{"key":"4","doi-asserted-by":"publisher","DOI":"10.1016\/j.patcog.2003.09.012"},{"key":"9","doi-asserted-by":"publisher","DOI":"10.1109\/ARES.2006.68"},{"key":"8","doi-asserted-by":"publisher","DOI":"10.4304\/jcp.1.7.51-59"}],"event":{"name":"2010 IEEE Fourth International Conference On Biometrics: Theory, Applications And Systems (BTAS)","location":"Washington, DC, USA","start":{"date-parts":[[2010,9,27]]},"end":{"date-parts":[[2010,9,29]]}},"container-title":["2010 Fourth IEEE International Conference on Biometrics: Theory, Applications and Systems (BTAS)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/5618724\/5634461\/05634532.pdf?arnumber=5634532","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,6,6]],"date-time":"2019-06-06T07:33:38Z","timestamp":1559806418000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/5634532\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2010,9]]},"references-count":15,"URL":"https:\/\/doi.org\/10.1109\/btas.2010.5634532","relation":{},"subject":[],"published":{"date-parts":[[2010,9]]}}}