{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,7,22]],"date-time":"2025-07-22T11:15:10Z","timestamp":1753182910994,"version":"3.28.0"},"reference-count":43,"publisher":"IEEE","license":[{"start":{"date-parts":[[2022,1,8]],"date-time":"2022-01-08T00:00:00Z","timestamp":1641600000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2022,1,8]],"date-time":"2022-01-08T00:00:00Z","timestamp":1641600000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2022,1,8]]},"DOI":"10.1109\/ccnc49033.2022.9700626","type":"proceedings-article","created":{"date-parts":[[2022,2,10]],"date-time":"2022-02-10T15:29:11Z","timestamp":1644506951000},"page":"569-577","source":"Crossref","is-referenced-by-count":3,"title":["Multi-factor Behavioral Authentication Using Correlations Enhanced by Neural Network-based Score Fusion"],"prefix":"10.1109","author":[{"given":"Akira","family":"Miyazawa","sequence":"first","affiliation":[{"name":"The University of Tokyo,Japan"}]},{"given":"Tran Phuong","family":"Thao","sequence":"additional","affiliation":[{"name":"The University of Tokyo,Japan"}]},{"given":"Rie","family":"Shigetomi Yamaguchi","sequence":"additional","affiliation":[{"name":"The University of Tokyo,Japan"}]}],"member":"263","reference":[{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1145\/3374664.3379527"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1186\/s12938-018-0532-2"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1109\/CEEC.2018.8674191"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1016\/j.imavis.2017.01.012"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1007\/11527923_50"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1016\/j.patrec.2007.05.017"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1017\/S0007114510005441"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1177\/0361198196153800104"},{"article-title":"Earth fact sheet","year":"0","author":"williams","key":"ref35"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1145\/3374664.3379527"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/JSYST.2015.2472579"},{"article-title":"Adam: A method for stochastic optimization","year":"2017","author":"kingma","key":"ref40"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-49669-2_19"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/PIMRC.2017.8292272"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/BTAS.2018.8698577"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.3390\/cryptography2010001"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.23919\/ICACT.2019.8701960"},{"key":"ref16","first-page":"1128","article-title":"Sensec: Mobile security through passive sensing","author":"zhu","year":"2013","journal-title":"2013 International Conference on Computing Networking and Communications (ICNC)"},{"key":"ref17","first-page":"1","article-title":"Implicit sensor-based authentication of smart-phone users with smartwatch","author":"lee","year":"2016","journal-title":"Proceedings of the Hardware and Architectural Support for Security and Privacy 2016 on - HASP 2016"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2017.2737969"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/TMC.2017.2686855"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2014.02.051"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/MITP.2013.50"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2018.2886573"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/JPROC.2003.819611"},{"key":"ref6","first-page":"412","article-title":"Redefine and organize, 4th authentication factor, behavior","author":"yamaguchi","year":"2019","journal-title":"International Symposium on Computing and Networking Workshops (CANDARW) IEEE"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-29938-9_4"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2015.2506542"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/CANDAR.2015.45"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2020.3020076"},{"key":"ref2","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1016\/j.cose.2019.101647","article-title":"A survey on smart-phone user&#x2019;s security choices, awareness and education","volume":"88","author":"breitinger","year":"2020","journal-title":"Computers & Security"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1016\/S0167-739X(99)00059-X"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/MCE.2016.2614524"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1016\/j.patcog.2017.09.005"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/ICTC.2016.7763394"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.2982852"},{"article-title":"Cross-validation: evaluating estimator performance","year":"0","author":"developers","key":"ref42"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/TIP.2011.2165218"},{"journal-title":"Pattern Recognition and Machine Learning","year":"2006","author":"bishop","key":"ref41"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/TMC.2019.2892440"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1016\/j.patrec.2015.11.020"},{"key":"ref43","first-page":"1","article-title":"Lifestyle authentication social experiment -mithra project-","author":"susuki","year":"2017","journal-title":"2017 Symposium on Cryptography and Information Security no 4D2-1"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1016\/j.patcog.2005.08.014"}],"event":{"name":"2022 IEEE 19th Annual Consumer Communications & Networking Conference (CCNC)","start":{"date-parts":[[2022,1,8]]},"location":"Las Vegas, NV, USA","end":{"date-parts":[[2022,1,11]]}},"container-title":["2022 IEEE 19th Annual Consumer Communications &amp; Networking Conference (CCNC)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9700484\/9700495\/09700626.pdf?arnumber=9700626","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,6,13]],"date-time":"2022-06-13T17:14:52Z","timestamp":1655140492000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9700626\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,1,8]]},"references-count":43,"URL":"https:\/\/doi.org\/10.1109\/ccnc49033.2022.9700626","relation":{},"subject":[],"published":{"date-parts":[[2022,1,8]]}}}