{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,9]],"date-time":"2026-01-09T14:30:33Z","timestamp":1767969033482,"version":"3.49.0"},"reference-count":18,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2016,12]]},"DOI":"10.1109\/pst.2016.7906958","type":"proceedings-article","created":{"date-parts":[[2017,4,24]],"date-time":"2017-04-24T21:12:50Z","timestamp":1493068370000},"page":"368-375","source":"Crossref","is-referenced-by-count":19,"title":["Continuous authentication using EEG and face images for trusted autonomous systems"],"prefix":"10.1109","author":[{"given":"Min","family":"Wang","sequence":"first","affiliation":[]},{"given":"Hussein A.","family":"Abbass","sequence":"additional","affiliation":[]},{"given":"Jiankun","family":"Hu","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","first-page":"135","article-title":"Contin-uous authentication of mobile user: Fusion of face image and inertial measurement unit data","author":"crouse","year":"0","journal-title":"Proc 2015 Int Conf on Biometrics (ICB)"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/TPAMI.2007.1010"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1145\/1146269.1146282"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-41320-9_1"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2016.2543524"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-49685-6_9"},{"key":"ref16","first-page":"1988","article-title":"Deep learning face representation by joint identification-verification","author":"sun","year":"2014","journal-title":"Advances in neural information processing systems"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1023\/B:VISI.0000013087.49260.fb"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1504\/IJCB.2012.046513"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1002\/sec.240"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.5898\/JHRI.5.1.Brown"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/34.667881"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1016\/j.patcog.2014.01.016"},{"key":"ref8","author":"niedermeyer","year":"2005","journal-title":"Electroencephalography Basic Principles Clinical Applications and Related Fields"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/34.982906"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1037\/14528-021"},{"key":"ref1","first-page":"1","article-title":"Trusted autonomy and cognitive cyber symbiosis: Open challenges","author":"abbass","year":"2015","journal-title":"Cognitive Computation"},{"key":"ref9","article-title":"Temporal integration for continuous multimodal biometrics","author":"altinok","year":"0","journal-title":"Proc ACM Workshop on Multimodal User Authentication"}],"event":{"name":"2016 14th Annual Conference on Privacy, Security and Trust (PST)","location":"Auckland, New Zealand","start":{"date-parts":[[2016,12,12]]},"end":{"date-parts":[[2016,12,14]]}},"container-title":["2016 14th Annual Conference on Privacy, Security and Trust (PST)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/7899233\/7906913\/07906958.pdf?arnumber=7906958","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,5,15]],"date-time":"2017-05-15T20:08:53Z","timestamp":1494878933000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/7906958\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,12]]},"references-count":18,"URL":"https:\/\/doi.org\/10.1109\/pst.2016.7906958","relation":{},"subject":[],"published":{"date-parts":[[2016,12]]}}}