{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,11]],"date-time":"2026-03-11T09:33:24Z","timestamp":1773221604366,"version":"3.50.1"},"reference-count":37,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"2","license":[{"start":{"date-parts":[[2014,4,1]],"date-time":"2014-04-01T00:00:00Z","timestamp":1396310400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans. Human-Mach. Syst."],"published-print":{"date-parts":[[2014,4]]},"DOI":"10.1109\/thms.2014.2302371","type":"journal-article","created":{"date-parts":[[2014,3,12]],"date-time":"2014-03-12T18:12:34Z","timestamp":1394647954000},"page":"244-255","source":"Crossref","is-referenced-by-count":25,"title":["Mitigating Behavioral Variability for Mouse Dynamics: A Dimensionality-Reduction-Based Approach"],"prefix":"10.1109","volume":"44","author":[{"given":"Zhongmin","family":"Cai","sequence":"first","affiliation":[]},{"given":"Chao","family":"Shen","sequence":"additional","affiliation":[]},{"given":"Xiaohong","family":"Guan","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1109\/DSN.2012.6263955"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1145\/2046707.2046725"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1504\/IJBM.2008.018665"},{"key":"ref30","first-page":"403","article-title":"A user identification system using signature written with mouse","author":"syukri","year":"0","journal-title":"Proc 3rd Australasian Conf Inform Security Privacy"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2012.2223677"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1145\/502512.502546"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1016\/0167-2789(92)90108-Y"},{"key":"ref34","first-page":"275","article-title":"Comparison of dimension reduction methods for automated essay grading","volume":"11","author":"kakkonen","year":"2008","journal-title":"Educ Technol Soc"},{"key":"ref10","year":"0"},{"key":"ref11","author":"cox","year":"1994","journal-title":"Multidimensional Scaling"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1016\/j.istr.2012.02.001"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/TPAMI.2003.1227991"},{"key":"ref14","doi-asserted-by":"crossref","first-page":"381","DOI":"10.1117\/12.542625","article-title":"A behavioral biometric system based on human computer interaction","author":"gamboa","year":"2004","journal-title":"Proc SPIE"},{"key":"ref15","first-page":"46","article-title":"An identity authentication system based on human computer interaction behaviour","author":"gamboa","year":"2003","journal-title":"Proc 2nd Int Workshop Pattern Recog Inf Syst"},{"key":"ref16","first-page":"1","article-title":"Web biometrics: User verification via web interaction","author":"gamboa","year":"2007","journal-title":"Proc Biometrics Symp"},{"key":"ref17","first-page":"143","article-title":"On using mouse movements as a biometric","author":"hashia","year":"2005","journal-title":"Proc Int Conf Comput Sci Appl"},{"key":"ref18","year":"0"},{"key":"ref19","article-title":"Users authentication by a study of human computer interactions","author":"hocquet","year":"2004","journal-title":"Proc 8th Annu (Doctoral) Meeting Health Sci Technol"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/ICC.2009.5199032"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1162\/089976603321780317"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/ICB.2012.6199780"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/ISCIS.2009.5291887"},{"key":"ref6","volume":"16","author":"bengio","year":"2004","journal-title":"Advances in neural information processing systems"},{"key":"ref29","author":"swets","year":"1982","journal-title":"Evaluation of Diagnostic Systems Methods from Signal Detection Theory"},{"key":"ref5","first-page":"623","article-title":"Anytime classification using the nearest neighbor algorithm with applications to stream mining","author":"ueno","year":"0","journal-title":"Proc IEEE Int Conf Data Mining"},{"key":"ref8","first-page":"185","article-title":"Denoising and dimensionality reduction in feature space","author":"braun","year":"2006","journal-title":"Proc Neural Inf Process Syst"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/IIH-MSP.2009.77"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/IAW.2005.1495997"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1145\/1143844.1143865"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2007.70207"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2006.873653"},{"key":"ref22","year":"0"},{"key":"ref21","first-page":"476","article-title":"On mouse dynamics as a behavioral biometric for authentication","author":"jorgensen","year":"2011","journal-title":"Proc ACM Symp Inf Comput Commun Security"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1145\/1029208.1029210"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/TSMCA.2010.2052602"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/BCC.2006.4341626"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-69403-8_25"}],"container-title":["IEEE Transactions on Human-Machine Systems"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6221037\/6766254\/06766265.pdf?arnumber=6766265","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,1,12]],"date-time":"2022-01-12T16:29:47Z","timestamp":1642004987000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6766265\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014,4]]},"references-count":37,"journal-issue":{"issue":"2"},"URL":"https:\/\/doi.org\/10.1109\/thms.2014.2302371","relation":{},"ISSN":["2168-2291","2168-2305"],"issn-type":[{"value":"2168-2291","type":"print"},{"value":"2168-2305","type":"electronic"}],"subject":[],"published":{"date-parts":[[2014,4]]}}}