{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,6]],"date-time":"2024-09-06T21:03:34Z","timestamp":1725656614288},"reference-count":20,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018,8]]},"DOI":"10.1109\/icpr.2018.8545451","type":"proceedings-article","created":{"date-parts":[[2018,11,30]],"date-time":"2018-11-30T00:17:38Z","timestamp":1543537058000},"page":"3359-3364","source":"Crossref","is-referenced-by-count":3,"title":["One-class Random Maxout Probabilistic Network for Mobile Touchstroke Authentication"],"prefix":"10.1109","author":[{"given":"Seokmin","family":"Choi","sequence":"first","affiliation":[]},{"given":"Inho","family":"Chang","sequence":"additional","affiliation":[]},{"given":"Andrew Beng Jin","family":"Teoh","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"doi-asserted-by":"publisher","key":"ref10","DOI":"10.1109\/BTAS.2013.6712758"},{"doi-asserted-by":"publisher","key":"ref11","DOI":"10.1016\/j.neucom.2005.12.126"},{"doi-asserted-by":"publisher","key":"ref12","DOI":"10.1007\/s11063-016-9541-y"},{"doi-asserted-by":"publisher","key":"ref13","DOI":"10.1155\/2015\/412957"},{"doi-asserted-by":"publisher","key":"ref14","DOI":"10.1016\/j.patrec.2013.12.016"},{"doi-asserted-by":"publisher","key":"ref15","DOI":"10.1587\/transinf.E93.D.2690"},{"year":"2015","author":"mroueh","journal-title":"Random maxout features","key":"ref16"},{"key":"ref17","article-title":"Maxout networks","author":"goodfellow","year":"2013","journal-title":"ICML"},{"year":"2012","author":"heinonen","journal-title":"Lectures on analysis on metric spaces [Place of publication not identified]","key":"ref18"},{"doi-asserted-by":"publisher","key":"ref19","DOI":"10.1109\/ALLERTON.2008.4797607"},{"doi-asserted-by":"publisher","key":"ref4","DOI":"10.1109\/TIFS.2012.2225048"},{"doi-asserted-by":"publisher","key":"ref3","DOI":"10.1109\/ISBA.2018.8311467"},{"doi-asserted-by":"publisher","key":"ref6","DOI":"10.1109\/ICASSP.2014.6854310"},{"key":"ref5","doi-asserted-by":"crossref","DOI":"10.1145\/2500423.2504572","article-title":"Silentsense: silent user identification via touch and movement behavioral biometrics","author":"bo","year":"2013","journal-title":"Proceedings of the 19th Annual International Conference on Mobile Computing & Networking"},{"doi-asserted-by":"publisher","key":"ref8","DOI":"10.1016\/j.sigpro.2013.12.026"},{"key":"ref7","article-title":"Continuousauthentication of smartphone users by fusing typing, swiping, and phone movement patterns","author":"kumar","year":"0","journal-title":"2016 IEEE (BTAS-2016)"},{"doi-asserted-by":"publisher","key":"ref2","DOI":"10.1109\/MSP.2015.67"},{"doi-asserted-by":"publisher","key":"ref1","DOI":"10.1016\/j.cose.2012.11.004"},{"doi-asserted-by":"publisher","key":"ref9","DOI":"10.1016\/j.patcog.2017.09.037"},{"doi-asserted-by":"publisher","key":"ref20","DOI":"10.1109\/TIFS.2015.2506542"}],"event":{"name":"2018 24th International Conference on Pattern Recognition (ICPR)","start":{"date-parts":[[2018,8,20]]},"location":"Beijing","end":{"date-parts":[[2018,8,24]]}},"container-title":["2018 24th International Conference on Pattern Recognition (ICPR)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8527858\/8545020\/08545451.pdf?arnumber=8545451","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,1,27]],"date-time":"2022-01-27T13:54:56Z","timestamp":1643291696000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/8545451\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,8]]},"references-count":20,"URL":"https:\/\/doi.org\/10.1109\/icpr.2018.8545451","relation":{},"subject":[],"published":{"date-parts":[[2018,8]]}}}