{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,5]],"date-time":"2026-02-05T22:57:46Z","timestamp":1770332266697,"version":"3.49.0"},"reference-count":49,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"12","license":[{"start":{"date-parts":[[2022,6,15]],"date-time":"2022-06-15T00:00:00Z","timestamp":1655251200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2022,6,15]],"date-time":"2022-06-15T00:00:00Z","timestamp":1655251200000},"content-version":"am","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2022,6,15]],"date-time":"2022-06-15T00:00:00Z","timestamp":1655251200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2022,6,15]],"date-time":"2022-06-15T00:00:00Z","timestamp":1655251200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/100000001","name":"National Science Foundation","doi-asserted-by":"publisher","award":["CNS1566455"],"award-info":[{"award-number":["CNS1566455"]}],"id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100000001","name":"National Science Foundation","doi-asserted-by":"publisher","award":["CNS1826647"],"award-info":[{"award-number":["CNS1826647"]}],"id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100000001","name":"National Science Foundation","doi-asserted-by":"publisher","award":["CNS1954959"],"award-info":[{"award-number":["CNS1954959"]}],"id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100000001","name":"National Science Foundation","doi-asserted-by":"publisher","award":["CNS1820624"],"award-info":[{"award-number":["CNS1820624"]}],"id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100000001","name":"National Science Foundation","doi-asserted-by":"publisher","award":["CCF2000480"],"award-info":[{"award-number":["CCF2000480"]}],"id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100000001","name":"National Science Foundation","doi-asserted-by":"publisher","award":["CCF2028873"],"award-info":[{"award-number":["CCF2028873"]}],"id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100000001","name":"National Science Foundation","doi-asserted-by":"publisher","award":["CCF1909963"],"award-info":[{"award-number":["CCF1909963"]}],"id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100000001","name":"National Science Foundation","doi-asserted-by":"publisher","award":["CCF2028876"],"award-info":[{"award-number":["CCF2028876"]}],"id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100000001","name":"National Science Foundation","doi-asserted-by":"publisher","award":["CCF2028858"],"award-info":[{"award-number":["CCF2028858"]}],"id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100000001","name":"National Science Foundation","doi-asserted-by":"publisher","award":["ECCS2033433"],"award-info":[{"award-number":["ECCS2033433"]}],"id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100000183","name":"Army Research Office","doi-asserted-by":"publisher","award":["W911NF-18-1-0221"],"award-info":[{"award-number":["W911NF-18-1-0221"]}],"id":[{"id":"10.13039\/100000183","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Internet Things J."],"published-print":{"date-parts":[[2022,6,15]]},"DOI":"10.1109\/jiot.2021.3128290","type":"journal-article","created":{"date-parts":[[2021,11,16]],"date-time":"2021-11-16T20:36:03Z","timestamp":1637094963000},"page":"9542-9556","source":"Crossref","is-referenced-by-count":34,"title":["Robust Continuous Authentication Using Cardiac Biometrics From Wrist-Worn Wearables"],"prefix":"10.1109","volume":"9","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-1177-6897","authenticated-orcid":false,"given":"Tianming","family":"Zhao","sequence":"first","affiliation":[{"name":"Department of Computer and Information Sciences, Temple University, Philadelphia, PA, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-3984-6973","authenticated-orcid":false,"given":"Yan","family":"Wang","sequence":"additional","affiliation":[{"name":"Department of Computer and Information Sciences, Temple University, Philadelphia, PA, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-8331-0834","authenticated-orcid":false,"given":"Jian","family":"Liu","sequence":"additional","affiliation":[{"name":"The University of Tennessee, Knoxville, TN, USA"}]},{"given":"Jerry","family":"Cheng","sequence":"additional","affiliation":[{"name":"Department of Computer Science, New York Institute of Technology, New York, NY, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-3994-766X","authenticated-orcid":false,"given":"Yingying","family":"Chen","sequence":"additional","affiliation":[{"name":"Department of Electrical and Computer Engineering, Rutgers University, New Brunswick, NJ, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-0207-9643","authenticated-orcid":false,"given":"Jiadi","family":"Yu","sequence":"additional","affiliation":[{"name":"Department of Computer Science and Engineering, Shanghai Jiao Tong University, Shanghai, China"}]}],"member":"263","reference":[{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1109\/72.761722"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1016\/j.bspc.2014.06.009"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1038\/s41598-020-72193-2"},{"key":"ref32","doi-asserted-by":"crossref","first-page":"18","DOI":"10.4103\/2228-7477.128434","article-title":"Ultrasound elastography using empirical mode decomposition analysis","volume":"4","author":"sadeghi","year":"2014","journal-title":"J Med Signals Sens"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1016\/0021-9290(85)90043-0"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM41043.2020.9155526"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1155\/2020\/8304903"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1088\/1742-6596\/1577\/1\/012040"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1109\/ICPR.2018.8545685"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1109\/ICASSP.2018.8461520"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1016\/j.patcog.2011.01.017"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-40811-3_66"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1007\/s13534-017-0037-0"},{"key":"ref2","first-page":"1","article-title":"Smudge attacks on smartphone touch screens","volume":"10","author":"aviv","year":"2010","journal-title":"Proc WOOT"},{"key":"ref1","article-title":"Shoulder surfing attack in graphical password authentication","author":"lashkari","year":"2009","journal-title":"arXiv 0912 0951"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/TIC-STH.2009.5444466"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/BTAS.2017.8272752"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1016\/j.asoc.2017.07.032"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1016\/j.compbiomed.2014.03.005"},{"key":"ref23","author":"shepherd","year":"1979","journal-title":"Human Cardiovascular System Facts and Concepts"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1007\/978-0-387-84858-7"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.2174\/157340312801215782"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/LSP.2016.2531996"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.3390\/s17102228"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-74048-3_4"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1145\/3117811.3117839"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/BIOMS.2013.6656145"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/BTAS.2016.7791193"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/BHI.2017.7897297"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/ICASSP.2017.7953035"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1145\/3055031.3055063"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1007\/s00779-011-0415-z"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/JETCAS.2018.2818181"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.3390\/cryptography2010001"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.3233\/JCS-2007-15503"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/ICDH.2012.59"},{"key":"ref5","first-page":"1","article-title":"A survey of continuous and transparent multibiometric authentication systems","author":"al abdulwahid","year":"2015","journal-title":"Proc Eur Conf Cyber Warfare Security"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/TMC.2014.2365185"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2014.51"},{"key":"ref49","doi-asserted-by":"publisher","DOI":"10.1145\/3081333.3081351"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/TMC.2019.2947468"},{"key":"ref46","first-page":"2825","article-title":"Scikit-learn: Machine learning in Python","volume":"12","author":"pedregosa","year":"2011","journal-title":"J Mach Learn Res"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1145\/1961189.1961199"},{"key":"ref48","doi-asserted-by":"publisher","DOI":"10.3390\/app9163355"},{"key":"ref47","year":"2017","journal-title":"Why is 128 hz used as a sampling frequency for the ppg signals"},{"key":"ref42","first-page":"65","article-title":"An improved empirical mode decomposition for long signals","author":"sanchez","year":"2016","journal-title":"Signal Process"},{"key":"ref41","author":"martinez","year":"2016","journal-title":"Multilead Beat Detector Based on Independent Component Analysis (ICA)"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1109\/TBME.2013.2246160"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1186\/1476-7120-6-15"}],"container-title":["IEEE Internet of Things Journal"],"original-title":[],"link":[{"URL":"https:\/\/ieeexplore.ieee.org\/ielam\/6488907\/9789736\/9615379-aam.pdf","content-type":"application\/pdf","content-version":"am","intended-application":"syndication"},{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6488907\/9789736\/09615379.pdf?arnumber=9615379","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,12,11]],"date-time":"2024-12-11T02:31:21Z","timestamp":1733884281000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9615379\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,6,15]]},"references-count":49,"journal-issue":{"issue":"12"},"URL":"https:\/\/doi.org\/10.1109\/jiot.2021.3128290","relation":{},"ISSN":["2327-4662","2372-2541"],"issn-type":[{"value":"2327-4662","type":"electronic"},{"value":"2372-2541","type":"electronic"}],"subject":[],"published":{"date-parts":[[2022,6,15]]}}}