{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,27]],"date-time":"2026-01-27T22:35:07Z","timestamp":1769553307899,"version":"3.49.0"},"reference-count":25,"publisher":"IEEE","license":[{"start":{"date-parts":[[2019,7,1]],"date-time":"2019-07-01T00:00:00Z","timestamp":1561939200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2019,7,1]],"date-time":"2019-07-01T00:00:00Z","timestamp":1561939200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2019,7,1]],"date-time":"2019-07-01T00:00:00Z","timestamp":1561939200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2019,7]]},"DOI":"10.1109\/ijcnn.2019.8852068","type":"proceedings-article","created":{"date-parts":[[2019,10,1]],"date-time":"2019-10-01T03:44:32Z","timestamp":1569901472000},"page":"1-8","source":"Crossref","is-referenced-by-count":27,"title":["Keystroke Analysis for User Identification using Deep Neural Networks"],"prefix":"10.1109","author":[{"given":"Mario Luca","family":"Bernardi","sequence":"first","affiliation":[]},{"given":"Marta","family":"Cimitile","sequence":"additional","affiliation":[]},{"given":"Fabio","family":"Martinelli","sequence":"additional","affiliation":[]},{"given":"Francesco","family":"Mercaldo","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","article-title":"Feature learning with deep neural networks for keystroke biometrics: A study of supervised pre-training and autoencoders","author":"hellstrm","year":"2018","journal-title":"Dissertation"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1145\/3042064"},{"key":"ref12","first-page":"448","article-title":"Batch normalization: Accelerating deep network training by reducing internal covariate shift","author":"ioffe","year":"0"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-74549-5_125"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/DSN.2009.5270346"},{"key":"ref15","doi-asserted-by":"crossref","first-page":"61","DOI":"10.1109\/IIH-MSP.2007.218","article-title":"Keystroke patterns classification using the artmap-fd neural network","author":"loy","year":"2007","journal-title":"Third International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2007)"},{"key":"ref16","doi-asserted-by":"crossref","first-page":"561","DOI":"10.1145\/1102351.1102422","article-title":"The cross entropy method for classification","author":"mannor","year":"2005","journal-title":"Proceedings of the 22nd International Conference on Machine Learning"},{"key":"ref17","doi-asserted-by":"crossref","first-page":"201","DOI":"10.1109\/DSN.2010.5544311","article-title":"Keystroke biometrics with number-pad input","author":"maxion","year":"2010","journal-title":"2010 IEEE\/IFIP International Conference on Dependable Systems and Networks (DSN)"},{"key":"ref18","doi-asserted-by":"crossref","first-page":"351","DOI":"10.1016\/S0167-739X(99)00059-X","article-title":"Keystroke dynamics as a biometric for authentication","volume":"16","author":"monrose","year":"2000","journal-title":"Future Gener Comput Syst"},{"key":"ref19","article-title":"A survey of keystroke dynamics biometrics","author":"jin teoh pin shen teh","year":"2013","journal-title":"The Scientific World Journal"},{"key":"ref4","doi-asserted-by":"crossref","first-page":"197","DOI":"10.1561\/2000000039","article-title":"Deep learning: methods and applications","volume":"7","author":"deng","year":"2014","journal-title":"Foundations and Trends\ufffd in Signal Processing"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1016\/j.is.2016.06.002"},{"key":"ref6","first-page":"215","author":"dowland","year":"2002","journal-title":"Keystroke Analysis as a Method of Advanced User Authentication and Response"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1155\/2013\/565183"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1016\/S1352-2310(97)00447-0"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1145\/2858036.2858233"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1145\/581271.581272"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/ICSMC.2000.886039"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.3115\/v1\/D14-1155"},{"key":"ref20","doi-asserted-by":"crossref","first-page":"55","DOI":"10.1504\/IJESDF.2007.013592","article-title":"A machine learning approach to keystroke dynamics based user authentication","volume":"1","author":"revett","year":"2007","journal-title":"Int J Electron Secur Digit Forensic"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1111\/j.2517-6161.1974.tb00994.x"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-15766-0_121"},{"key":"ref24","year":"2011","journal-title":"Technical Report Version 6 0 0"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1145\/3190618"},{"key":"ref25","first-page":"1","article-title":"Sensitivity analysis in keystroke dynamics using convolutional neural networks","author":"eker","year":"2017","journal-title":"Information Forensics and Security (WIFS) 2017 IEEE International Workshop"}],"event":{"name":"2019 International Joint Conference on Neural Networks (IJCNN)","location":"Budapest, Hungary","start":{"date-parts":[[2019,7,14]]},"end":{"date-parts":[[2019,7,19]]}},"container-title":["2019 International Joint Conference on Neural Networks (IJCNN)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8840768\/8851681\/08852068.pdf?arnumber=8852068","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,7,17]],"date-time":"2022-07-17T21:48:46Z","timestamp":1658094526000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/8852068\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,7]]},"references-count":25,"URL":"https:\/\/doi.org\/10.1109\/ijcnn.2019.8852068","relation":{},"subject":[],"published":{"date-parts":[[2019,7]]}}}