{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,19]],"date-time":"2025-11-19T06:55:46Z","timestamp":1763535346912,"version":"3.28.0"},"reference-count":23,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2015,5]]},"DOI":"10.1109\/icb.2015.7139046","type":"proceedings-article","created":{"date-parts":[[2015,7,6]],"date-time":"2015-07-06T17:23:31Z","timestamp":1436203411000},"page":"157-162","source":"Crossref","is-referenced-by-count":17,"title":["Touch-interaction behavior for continuous user authentication on smartphones"],"prefix":"10.1109","author":[{"given":"Chao","family":"Shen","sequence":"first","affiliation":[]},{"given":"Yong","family":"Zhang","sequence":"additional","affiliation":[]},{"given":"Zhongmin","family":"Cai","sequence":"additional","affiliation":[]},{"given":"Tianwen","family":"Yu","sequence":"additional","affiliation":[]},{"given":"Xiaohong","family":"Guan","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1145\/2420950.2420976"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/EST.2013.38"},{"journal-title":"You are how you touch User verification on smartphone via tapping bchaviors","year":"2012","author":"zheng","key":"ref12"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1145\/1961189.1961199"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/ICCEE.2008.157"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-31869-6_47"},{"article-title":"Mobilitics: Analyzing Privacy Leaks in Smartphones","year":"2014","author":"achara","key":"ref16"},{"year":"2012","key":"ref17","article-title":"Top Ten Smartphone Risks"},{"journal-title":"One-class classification Concept-learning in the absence of counter-examples","year":"2001","author":"tax","key":"ref18"},{"key":"ref19","doi-asserted-by":"crossref","first-page":"2481","DOI":"10.1016\/j.sigpro.2003.07.018","article-title":"Novelty detection: A review, Part I: Statistical approaches","volume":"83","author":"markou","year":"2003","journal-title":"Signal Process"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2012.2225048"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1145\/1753326.1753489"},{"key":"ref6","first-page":"987","article-title":"Touch me once and i know it's you!: implicit authentication based on touch screen patterns","author":"luca","year":"2012","journal-title":"Conf Proc Human Factors in Computing Systems"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/SURV.2012.013012.00028"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/UIC-ATC.2012.45"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1145\/2207676.2208543"},{"journal-title":"EN 50133&#x2013;1 Alarm systems Access control systems for use in security applications Part 1 Syst Requirements","year":"2002","key":"ref2"},{"key":"ref1","doi-asserted-by":"crossref","first-page":"187","DOI":"10.1145\/2500423.2504572","article-title":"SilenlSense: silent user identification via touch and movement behavioral biometrics","author":"bo","year":"2013","journal-title":"Proc the 19th annual international conference on Mobile computing and networking"},{"key":"ref9","doi-asserted-by":"crossref","first-page":"110","DOI":"10.1145\/2592235.2592252","article-title":"LatentGesture: Active User Authentication through Background Touch Analysis","author":"saravanan","year":"2014","journal-title":"Proc the Second International Symposium of Chinese CHI"},{"key":"ref20","doi-asserted-by":"crossref","first-page":"2499","DOI":"10.1016\/j.sigpro.2003.07.019","article-title":"Novelty detection: A review, Part II: Neural network based approaches","volume":"83","author":"markou","year":"2003","journal-title":"Signal Process"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2012.49"},{"key":"ref21","first-page":"526","article-title":"Support vector method for novelty detection","author":"sch\u00f6lkopf","year":"1999","journal-title":"Proc Advances in Neural Information Processing Systems"},{"key":"ref23","doi-asserted-by":"crossref","first-page":"386","DOI":"10.1007\/978-3-319-02961-0_48","article-title":"Mobile authentication through touch-behavior features","author":"cai","year":"2013","journal-title":"Biometric Recognition"}],"event":{"name":"2015 International Conference on Biometrics (ICB)","start":{"date-parts":[[2015,5,19]]},"location":"Phuket, Thailand","end":{"date-parts":[[2015,5,22]]}},"container-title":["2015 International Conference on Biometrics (ICB)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/7131935\/7139039\/07139046.pdf?arnumber=7139046","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,23]],"date-time":"2017-06-23T11:12:30Z","timestamp":1498216350000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/7139046\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015,5]]},"references-count":23,"URL":"https:\/\/doi.org\/10.1109\/icb.2015.7139046","relation":{},"subject":[],"published":{"date-parts":[[2015,5]]}}}