{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,17]],"date-time":"2026-04-17T15:51:59Z","timestamp":1776441119171,"version":"3.51.2"},"reference-count":26,"publisher":"IEEE","license":[{"start":{"date-parts":[[2023,9,25]],"date-time":"2023-09-25T00:00:00Z","timestamp":1695600000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2023,9,25]],"date-time":"2023-09-25T00:00:00Z","timestamp":1695600000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2023,9,25]]},"DOI":"10.1109\/ijcb57857.2023.10448997","type":"proceedings-article","created":{"date-parts":[[2024,3,1]],"date-time":"2024-03-01T13:31:14Z","timestamp":1709299874000},"page":"1-9","source":"Crossref","is-referenced-by-count":17,"title":["BehaveFormer: A Framework with Spatio-Temporal Dual Attention Transformers for IMU-enhanced Keystroke Dynamics"],"prefix":"10.1109","author":[{"given":"Dilshan","family":"Senarath","sequence":"first","affiliation":[{"name":"University of Moratuwa"}]},{"given":"Sanuja","family":"Tharinda","sequence":"additional","affiliation":[{"name":"University of Moratuwa"}]},{"given":"Maduka","family":"Vishvajith","sequence":"additional","affiliation":[{"name":"University of Moratuwa"}]},{"given":"Sanka","family":"Rasnayaka","sequence":"additional","affiliation":[{"name":"National University of Singapore"}]},{"given":"Sandareka","family":"Wickramanayake","sequence":"additional","affiliation":[{"name":"University of Moratuwa"}]},{"given":"Dulani","family":"Meedeniya","sequence":"additional","affiliation":[{"name":"University of Moratuwa"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1016\/j.engappai.2020.104058"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/TBIOM.2021.3112540"},{"key":"ref3","volume-title":"Layer normalization","author":"Ba","year":"2016"},{"key":"ref4","first-page":"2579","article-title":"Visualizing data using t-sne laurens van der maaten","volume":"9","author":"Com","year":"2008","journal-title":"Journal of Machine Learning Research"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/ICB45273.2019.8987433"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2016.90"},{"key":"ref7","article-title":"Improving neural networks by preventing co-adaptation of feature detectors","volume":"abs\/1207.0580","author":"Hinton","year":"2012","journal-title":"CoRR"},{"key":"ref8","first-page":"448","article-title":"Batch normalization: Accelerating deep network training by reducing internal covariate shift","volume-title":"In Proceedings of the 32nd International Conference on International Conference on Machine Learning","volume":"37","author":"Ioffe"},{"key":"ref9","first-page":"12","article-title":"Adam: A method for stochastic optimization","volume-title":"International Conference on Learning Representations","author":"Kingma"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1145\/3230820.3230829"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1609\/aaai.v35i1.16103"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/TC.2016.2622262"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1145\/3338286.3340120"},{"key":"ref14","article-title":"Pytorch: An imperative style, high-performance deep learning library","volume-title":"Curran Associates, Inc","volume":"32","author":"Paszke"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/BTAS.2018.8698599"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/ICARC57651.2023.10145743"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/TPAMI.2007.1010"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2015.2506542"},{"key":"ref19","article-title":"Typeformer: Transformers for mobile keystroke biometrics","author":"Stragapede","year":"2022","journal-title":"arXiv preprint arXiv:2212.13075"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/FG57933.2023.10042710"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1016\/j.patcog.2022.109089"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1016\/j.patrec.2022.03.014"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/IWBF55382.2022.9794524"},{"key":"ref24","first-page":"1","article-title":"The knowledge based authentication attacks","volume-title":"In Proceedings of the International Conference on Security and Management (SAM)","author":"Towhidi"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.48550\/ARXIV.1706.03762"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/IAW.2005.1495927"}],"event":{"name":"2023 IEEE International Joint Conference on Biometrics (IJCB)","location":"Ljubljana, Slovenia","start":{"date-parts":[[2023,9,25]]},"end":{"date-parts":[[2023,9,28]]}},"container-title":["2023 IEEE International Joint Conference on Biometrics (IJCB)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/10447019\/10448524\/10448997.pdf?arnumber=10448997","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,3,7]],"date-time":"2024-03-07T20:23:32Z","timestamp":1709843012000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10448997\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,9,25]]},"references-count":26,"URL":"https:\/\/doi.org\/10.1109\/ijcb57857.2023.10448997","relation":{},"subject":[],"published":{"date-parts":[[2023,9,25]]}}}