{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,4,8]],"date-time":"2025-04-08T04:51:27Z","timestamp":1744087887046,"version":"3.28.0"},"reference-count":35,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2016,12]]},"DOI":"10.1109\/icdmw.2016.0052","type":"proceedings-article","created":{"date-parts":[[2017,2,7]],"date-time":"2017-02-07T20:40:13Z","timestamp":1486500013000},"page":"319-326","source":"Crossref","is-referenced-by-count":14,"title":["Smart Phone User Behaviour Characterization Based on Autoencoders and Self Organizing Maps"],"prefix":"10.1109","author":[{"given":"Deepthi","family":"Rajashekar","sequence":"first","affiliation":[]},{"given":"A. Nur","family":"Zincir-Heywood","sequence":"additional","affiliation":[]},{"given":"Malcolm I.","family":"Heywood","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref33","first-page":"3563","article-title":"What regularized auto-encoders learn from the data-generating distribution","volume":"15","author":"alain","year":"2014","journal-title":"Journal of Machine Learning Research"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1145\/2187836.2187842"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1016\/j.neunet.2012.09.018"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1007\/BF03040854"},{"key":"ref35","article-title":"Matlab implementations and applications of the self-organizing map","author":"kohonen","year":"2014","journal-title":"Unigrafia Oy Helsinki"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2015.10.013"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1007\/s00779-005-0046-3"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1007\/s00265-009-0739-0"},{"key":"ref12","first-page":"99","article-title":"Implicit authentication through learning user behavior","author":"shi","year":"2010","journal-title":"International Conference on Information Security Springer"},{"key":"ref13","first-page":"1","article-title":"Data driven authentication: On the effectiveness of user behaviour modelling with mobile device sensors","author":"kayacik","year":"2014","journal-title":"in Proceedings of the Third Workshop on Mobile Security Technologies (MoST) in conjunction with the IEEE Symposium on Security and Privacy"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/NOMS.2016.7502994"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1006\/jpdc.2002.1857"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/IIH-MSP.2012.11"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1016\/j.patrec.2015.07.004"},{"key":"ref18","article-title":"Unobservable re-authentication for smartphones","author":"li","year":"2013","journal-title":"NDSS"},{"key":"ref19","first-page":"1","article-title":"Multi-sensor authentication to improve smartphone security","author":"lee","year":"2015","journal-title":"International Conference on Information Systems Security and Privacy"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/CIG.2009.5286500"},{"key":"ref4","first-page":"518","article-title":"A novelty detection approach to classification","author":"japkowicz","year":"1995","journal-title":"Proceedings of the Fourth International Conference on Artificial Intelligence"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1016\/j.engappai.2006.09.005"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/INM.2015.7140304"},{"key":"ref6","doi-asserted-by":"crossref","first-page":"2481","DOI":"10.1016\/j.sigpro.2003.07.018","article-title":"Novelty detection: a review - part 1: statistical approaches","volume":"83","author":"markou","year":"2003","journal-title":"Signal Processing"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1016\/S0893-6080(05)80056-5"},{"key":"ref5","first-page":"139","article-title":"One-class svms for document classification","volume":"2","author":"manevitz","year":"2001","journal-title":"Journal of Machine Learning Research"},{"key":"ref8","doi-asserted-by":"crossref","first-page":"15","DOI":"10.1145\/1925019.1925023","article-title":"Livelab: measuring wireless networks and smartphone users in the field","volume":"38","author":"shepard","year":"2011","journal-title":"ACM Sigmetrics Performance Evaluation Review"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1016\/j.sigpro.2003.07.019"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1117\/12.2015649"},{"key":"ref9","first-page":"29","article-title":"One-class classifiers: a review and analysis of suitability in the context of mobile-masquerader detection","volume":"6","author":"mazhelis","year":"2007","journal-title":"ARIMA Journal"},{"key":"ref1","first-page":"235","article-title":"Rays scheme: graphical password based hybrid authentication system for smart hand held devices","volume":"3","author":"ray","year":"2012","journal-title":"International Journal of Computer Trends and Technology"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1145\/1899475.1899502"},{"key":"ref22","doi-asserted-by":"crossref","first-page":"2769","DOI":"10.1145\/2207676.2208676","article-title":"Char-acterizing web use on smartphones","author":"tossell","year":"2012","journal-title":"Proceedings of the SIGCHI conference on Human Factors in computing systems ACM"},{"key":"ref21","first-page":"1","article-title":"Can your smartphone infer your mood","author":"likamwa","year":"2011","journal-title":"PhoneSense Workshop"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1145\/1866307.1866317"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-25159-2_63"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/TPWRS.2006.881133"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1016\/j.asoc.2012.08.028"}],"event":{"name":"2016 IEEE 16th International Conference on Data Mining Workshops (ICDMW)","start":{"date-parts":[[2016,12,12]]},"location":"Barcelona, Spain","end":{"date-parts":[[2016,12,15]]}},"container-title":["2016 IEEE 16th International Conference on Data Mining Workshops (ICDMW)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/7836069\/7836631\/07836683.pdf?arnumber=7836683","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,7,23]],"date-time":"2022-07-23T18:49:11Z","timestamp":1658602151000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/7836683\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,12]]},"references-count":35,"URL":"https:\/\/doi.org\/10.1109\/icdmw.2016.0052","relation":{},"subject":[],"published":{"date-parts":[[2016,12]]}}}