{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,28]],"date-time":"2025-10-28T15:13:01Z","timestamp":1761664381437,"version":"3.30.1"},"reference-count":28,"publisher":"IEEE","license":[{"start":{"date-parts":[[2021,10,11]],"date-time":"2021-10-11T00:00:00Z","timestamp":1633910400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2021,10,11]],"date-time":"2021-10-11T00:00:00Z","timestamp":1633910400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2021,10,11]]},"DOI":"10.1109\/iccst49569.2021.9717372","type":"proceedings-article","created":{"date-parts":[[2022,2,25]],"date-time":"2022-02-25T20:36:02Z","timestamp":1645821362000},"page":"1-6","source":"Crossref","is-referenced-by-count":7,"title":["Evaluation of Electrocardiogram Biometric Verification Models Based on Short Enrollment Time on Medical and Wearable Recorders"],"prefix":"10.1109","author":[{"given":"Hazal Su","family":"B\u0131\u00e7akc\u0131","sequence":"first","affiliation":[{"name":"School of Engineering, University of Kent"}]},{"given":"Marco","family":"Santopietro","sequence":"additional","affiliation":[{"name":"School of Engineering, University of Kent"}]},{"given":"Matthew","family":"Boakes","sequence":"additional","affiliation":[{"name":"School of Engineering, University of Kent"}]},{"given":"Richard","family":"Guest","sequence":"additional","affiliation":[{"name":"School of Engineering, University of Kent"}]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/UEMCON.2017.8249111"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/ISWC.2000.888463"},{"journal-title":"Qardio smart wearable ecg\/ekg monitor","year":"2018","key":"ref12"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/TBME.2020.2987759"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1016\/j.hrthm.2020.01.034"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/BioCAS.2015.7348372"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1155\/2008\/491382"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/MUE.2008.67"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/TIM.2007.909996"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/IEMBS.2002.1134388"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1016\/j.patrec.2018.03.028"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1145\/3410158"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1186\/s12911-019-1004-8"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.14257\/ijbsbt.2014.6.4.07"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1016\/j.patcog.2004.05.014"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/19.930458"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1016\/0002-9149(87)90191-3"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/TIM.2015.2503863"},{"key":"ref2","article-title":"Implementing biometric security","author":"chirillo","year":"2003","journal-title":"Hungry Minds Incorporated"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.4236\/wjcd.2020.107046"},{"journal-title":"Guide to Biometrics","year":"2003","author":"bolle","key":"ref1"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1111\/j.1542-474X.2005.00593.x"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/IDAACS.2017.8095063"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1145\/1647314.1647378"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2016.2548519"},{"key":"ref23","doi-asserted-by":"crossref","first-page":"1258","DOI":"10.1109\/TIFS.2017.2784362","article-title":"Learning deep off-the-person heart biometrics representations","volume":"13","author":"luz","year":"2018","journal-title":"IEEE Transactions on Information Forensics and Security"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.3758\/s13428-020-01516-y"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1145\/3242969.3242985"}],"event":{"name":"2021 International Carnahan Conference on Security Technology (ICCST)","start":{"date-parts":[[2021,10,11]]},"location":"Hatfield, United Kingdom","end":{"date-parts":[[2021,10,15]]}},"container-title":["2021 International Carnahan Conference on Security Technology (ICCST)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9717366\/9717368\/09717372.pdf?arnumber=9717372","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,12,11]],"date-time":"2024-12-11T00:37:22Z","timestamp":1733877442000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9717372\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,10,11]]},"references-count":28,"URL":"https:\/\/doi.org\/10.1109\/iccst49569.2021.9717372","relation":{},"subject":[],"published":{"date-parts":[[2021,10,11]]}}}