{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,8]],"date-time":"2026-04-08T06:14:04Z","timestamp":1775628844208,"version":"3.50.1"},"reference-count":47,"publisher":"IEEE","license":[{"start":{"date-parts":[[2025,12,3]],"date-time":"2025-12-03T00:00:00Z","timestamp":1764720000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2025,12,3]],"date-time":"2025-12-03T00:00:00Z","timestamp":1764720000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2025,12,3]]},"DOI":"10.1109\/icmla66185.2025.00098","type":"proceedings-article","created":{"date-parts":[[2026,4,7]],"date-time":"2026-04-07T19:54:58Z","timestamp":1775591698000},"page":"682-689","source":"Crossref","is-referenced-by-count":0,"title":["Active Authentication via Korean Keystrokes Under Varying LLM Assistance and Cognitive Contexts"],"prefix":"10.1109","author":[{"given":"Dong Hyun","family":"Roh","sequence":"first","affiliation":[{"name":"Bucknell University,USA"}]},{"given":"Rajesh","family":"Kumar","sequence":"additional","affiliation":[{"name":"Bucknell University,USA"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/MITP.2013.73"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2016.2537748"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1145\/3733103"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1155\/2013\/408280"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/BTAS.2016.7791164"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1145\/3210240.3210317"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1145\/3372420"},{"key":"ref8","article-title":"Keystroke Dynamics - Plurilock \u2014 plurilock.com","author":"Plurilock","year":"2024"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1145\/75577.75582"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1016\/S0020-7373(88)80053-1"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1016\/S0167-739X(99)00059-X"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/TIP.2014.2348802"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2014.2374424"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/CCNC51664.2024.10454821"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/BigMM50055.2020.00021"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/INNOVATIONS.2016.7880049"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1145\/3508398.3511516"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/CCST.2017.8167838"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/ICNSS.2011.6060005"},{"key":"ref20","article-title":"Keystroke timing analysis for individual identification in japanese free text typing","volume-title":"ICCAS-SICE","author":"Samura"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1016\/j.patcog.2020.107556"},{"key":"ref22","article-title":"Shared data set for free-text keystroke dynamics authentication algorithms","author":"Iapa","year":"2021","journal-title":"Preprint"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-01821-4_8"},{"key":"ref24","article-title":"From keystrokes to cognitive processes: Analyzing morphological knowledge using keystroke logging","volume-title":"Master\u2019s thesis","author":"Sellstone","year":"2023"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.21236\/ada595913"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1016\/j.tics.2006.02.003"},{"key":"ref27","article-title":"Using keystroke analytics to understand cognitive processes during writing","volume-title":"IEDMS","author":"Zhang"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1177\/0741088312451260"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.2307\/356600"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1016\/j.asoc.2017.09.045"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1109\/IJCB65343.2025.11411145"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1109\/IJCB62174.2024.10744461"},{"key":"ref33","article-title":"Plagiarism detection using keystroke logs","author":"Crossley","journal-title":"IEEE ICEDM"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1016\/j.patrec.2011.02.014"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2015.2506542"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-05452-0_14"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1109\/btas.2016.7791182"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.2196\/41003"},{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1007\/s00521-024-10140-2"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1109\/BigData59044.2023.10386557"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1109\/IJCB57857.2023.10448997"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.5220\/0011684100003411"},{"key":"ref43","doi-asserted-by":"crossref","DOI":"10.31979\/etd.pa2z-p7v3","article-title":"Keystroke dynamics for user identification","author":"Sharma","year":"2023"},{"key":"ref44","article-title":"Machine learning and deep learning for fixed-text keystroke dynamics","author":"Chang","year":"2021"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1007\/11527923_90"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.2307\/2685478"},{"key":"ref47","article-title":"Sheep, goats, lambs and wolves: An analysis of individual differences in speaker recognition performance","volume-title":"NIST, Technical Report \/ Slides","author":"D","year":"1998"}],"event":{"name":"2025 International Conference on Machine Learning and Applications (ICMLA)","location":"Boca Raton, FL, USA","start":{"date-parts":[[2025,12,3]]},"end":{"date-parts":[[2025,12,5]]}},"container-title":["2025 International Conference on Machine Learning and Applications (ICMLA)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/11471302\/11471304\/11471388.pdf?arnumber=11471388","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,4,8]],"date-time":"2026-04-08T05:38:32Z","timestamp":1775626712000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/11471388\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,12,3]]},"references-count":47,"URL":"https:\/\/doi.org\/10.1109\/icmla66185.2025.00098","relation":{},"subject":[],"published":{"date-parts":[[2025,12,3]]}}}