{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,15]],"date-time":"2026-04-15T20:19:48Z","timestamp":1776284388612,"version":"3.50.1"},"reference-count":25,"publisher":"IEEE","license":[{"start":{"date-parts":[[2025,7,3]],"date-time":"2025-07-03T00:00:00Z","timestamp":1751500800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2025,7,3]],"date-time":"2025-07-03T00:00:00Z","timestamp":1751500800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2025,7,3]]},"DOI":"10.1109\/icecet63943.2025.11471975","type":"proceedings-article","created":{"date-parts":[[2026,4,9]],"date-time":"2026-04-09T19:42:35Z","timestamp":1775763755000},"page":"1-6","source":"Crossref","is-referenced-by-count":0,"title":["A Comprehensive Review of Touch Dynamics-Based Approaches for Continuous User Authentication Using Machine Learning"],"prefix":"10.1109","author":[{"given":"Zemichael","family":"Desta","sequence":"first","affiliation":[{"name":"Minnesota State University-Mankato,Computer Science,Mankato,MN,USA"}]},{"given":"Rushit","family":"Dave","sequence":"additional","affiliation":[{"name":"Minnesota State University - Mankato,Computer Information Science,Mankato,MN,USA"}]},{"given":"Mansi","family":"Bhavsar","sequence":"additional","affiliation":[{"name":"Minnesota State University - Mankato,Computer Information Science,Mankato,MN,USA"}]}],"member":"263","reference":[{"key":"ref1","first-page":"1","article-title":"Towards continuous and passive authentication via touch biometrics: An experimental study on smartphones","volume-title":"2020 IEEE Conference on Communications and Network Security (CNS)","author":"Feng"},{"key":"ref2","first-page":"1","article-title":"Hold on and swipe: A touch-movement based continuous authentication schema","volume-title":"2022 Asia Conference on Algorithms, Computing and Machine Learning (CACML)","author":"Hernandez"},{"key":"ref3","first-page":"1","article-title":"Your identity is your behavior: Continuous user authentication based on machine learning and touch dynamics","volume-title":"2020 IEEE 21st International Conference on Information Reuse and Integration for Data Science (IRI)","author":"Nader"},{"key":"ref4","first-page":"187","article-title":"Continuous user identification via touch and movement behavioral biometrics (SilentSense)","volume-title":"2013 IEEE International Conference on Pervasive Computing and Communications (PerCom)","author":"Shi"},{"key":"ref5","first-page":"1","article-title":"Continuous mobile authentication using a novel graphic touch gesture feature","volume-title":"2016 IEEE International Conference on Identity, Security and Behavior Analysis (ISBA)","author":"Mahbub"},{"issue":"3","key":"ref6","first-page":"273","article-title":"Touch gestures based biometric authentication scheme for touchscreen mobile phones","volume":"14","author":"Liu","year":"2015","journal-title":"International Journal of Information Security"},{"issue":"19","key":"ref7","first-page":"5464","article-title":"Privacy-preserving sensor-based continuous authentication and user profiling: A review","volume":"20","author":"Patel","year":"2020","journal-title":"Sensors"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1145\/2207676.2208544"},{"issue":"6","key":"ref9","first-page":"48","article-title":"Continuous authentication on mobile devices: Recent progress and open challenges","volume":"53","author":"Feng","year":"2015","journal-title":"IEEE Communications Magazine"},{"key":"ref10","first-page":"3233","article-title":"Touch-input based continuous authentication using gesture-level and session-level features","volume-title":"2019 IEEE International Conference on Systems, Man and Cybernetics (SMC)","author":"Hassan"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2013.05.005"},{"key":"ref12","first-page":"1","article-title":"Machine learning algorithms in user authentication schemes","volume-title":"Proceedings of the 2018 International Conference on Advances in Big Data, Computing and Data Communication Systems ( icABCD)","author":"Shelton"},{"key":"ref13","first-page":"1","article-title":"Continuous user authentication using machine learning and multi-finger mobile touch dynamics","volume-title":"2022 IEEE International Symposium on Technologies for Homeland Security (HST)","author":"DeRidder"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1016\/j.procs.2015.10.072"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.21817\/indjcse\/2022\/v13i2\/221302111"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.3390\/s21124212"},{"key":"ref17","first-page":"2937","article-title":"An omnidirectional approach to touch-based continuous authentication","volume-title":"2015 IEEE International Conference on Systems, Man, and Cybernetics (SMC)","author":"Kunze"},{"key":"ref18","first-page":"215","article-title":"A dynamic selection method for touch-based continuous authentication on mobile devices","volume-title":"2015 9th International Conference on Interdisciplinarity in Engineering (INTER-ENG)","author":"Antal"},{"key":"ref19","first-page":"1","article-title":"Continuous nonintrusive mobile device soft keyboard biometric authentication","volume-title":"2012 IEEE Fifth International Conference on Biometrics: Theory, Applications and Systems (BTAS)","author":"Banerjee"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.58496\/mjcs\/2025\/011"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.3390\/math10030362"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1145\/2554850.2554931"},{"issue":"6","key":"ref23","first-page":"2125","article-title":"Sensors-based continuous authentication and user profiling: A review","volume":"18","author":"Yang","year":"2018","journal-title":"IEEE Sensors Journal"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.3390\/info14050274"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.32604\/csse.2022.022003"}],"event":{"name":"2025 5th International Conference on Electrical, Computer and Energy Technologies (ICECET)","location":"Paris, France","start":{"date-parts":[[2025,7,3]]},"end":{"date-parts":[[2025,7,6]]}},"container-title":["2025 5th International Conference on Electrical, Computer and Energy Technologies (ICECET)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/11471878\/11471697\/11471975.pdf?arnumber=11471975","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,4,15]],"date-time":"2026-04-15T19:24:52Z","timestamp":1776281092000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/11471975\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,7,3]]},"references-count":25,"URL":"https:\/\/doi.org\/10.1109\/icecet63943.2025.11471975","relation":{},"subject":[],"published":{"date-parts":[[2025,7,3]]}}}