{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,4,8]],"date-time":"2025-04-08T05:44:46Z","timestamp":1744091086976,"version":"3.28.0"},"reference-count":16,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2015,9]]},"DOI":"10.1109\/btas.2015.7358781","type":"proceedings-article","created":{"date-parts":[[2015,12,17]],"date-time":"2015-12-17T22:00:53Z","timestamp":1450389653000},"page":"1-7","source":"Crossref","is-referenced-by-count":3,"title":["On humanoid robots imitating human touch gestures on the smart phone"],"prefix":"10.1109","author":[{"given":"Sujit","family":"Poudel","sequence":"first","affiliation":[]},{"given":"Abdul","family":"Serwadda","sequence":"additional","affiliation":[]},{"given":"Vir V.","family":"Phoha","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","article-title":"I can be you: Questioning the use of keystroke dynamics as a biometric","author":"meng","year":"2013","journal-title":"NDSS 2013"},{"key":"ref11","first-page":"727","article-title":"X-means: Extending k-means with efficient estimation of the number of clusters","author":"pelleg","year":"2000","journal-title":"ICML Machine Learning Proceedings of the Seventh International Conference"},{"journal-title":"R A language and environment for statistical computing R foundation for statistical computing","year":"2008","key":"ref12"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1145\/2207676.2208543"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/BTAS.2013.6712758"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1145\/2508859.2516659"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/MITP.2013.51"},{"journal-title":"Nao Software 1 14 5 Documentation","year":"0","key":"ref4"},{"year":"0","key":"ref3"},{"journal-title":"Security Affairs","year":"0","key":"ref6"},{"journal-title":"Robots lab","year":"0","key":"ref5"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/BTAS.2013.6712742"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1016\/j.istr.2012.02.001"},{"journal-title":"Dhs sand t cyber security division 5-year broad agency announcement","year":"0","key":"ref2"},{"journal-title":"Darpa-baa-13-16 Active Authentication (AA) Phase 2","year":"0","key":"ref1"},{"key":"ref9","doi-asserted-by":"crossref","first-page":"136","DOI":"10.1109\/TIFS.2012.2225048","article-title":"Touch-alytics: On the applicability of touchscreen input as a behavioral biometric for continuous authentication","volume":"8","author":"mario","year":"2013","journal-title":"IEEE Transactions on Information Forensics and Security"}],"event":{"name":"2015 IEEE 7th International Conference on Biometrics Theory, Applications and Systems (BTAS)","start":{"date-parts":[[2015,9,8]]},"location":"Arlington, VA, USA","end":{"date-parts":[[2015,9,11]]}},"container-title":["2015 IEEE 7th International Conference on Biometrics Theory, Applications and Systems (BTAS)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/7348870\/7358743\/07358781.pdf?arnumber=7358781","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,24]],"date-time":"2017-06-24T01:57:03Z","timestamp":1498269423000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/7358781\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015,9]]},"references-count":16,"URL":"https:\/\/doi.org\/10.1109\/btas.2015.7358781","relation":{},"subject":[],"published":{"date-parts":[[2015,9]]}}}