{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,5,5]],"date-time":"2026-05-05T15:43:50Z","timestamp":1777995830915,"version":"3.51.4"},"reference-count":46,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"5","license":[{"start":{"date-parts":[[2021,10,1]],"date-time":"2021-10-01T00:00:00Z","timestamp":1633046400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2021,10,1]],"date-time":"2021-10-01T00:00:00Z","timestamp":1633046400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2021,10,1]],"date-time":"2021-10-01T00:00:00Z","timestamp":1633046400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"name":"Center of Cyber-Physical Systems, Khalifa University"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans. Human-Mach. Syst."],"published-print":{"date-parts":[[2021,10]]},"DOI":"10.1109\/thms.2021.3102508","type":"journal-article","created":{"date-parts":[[2021,9,2]],"date-time":"2021-09-02T20:16:25Z","timestamp":1630613785000},"page":"451-462","source":"Crossref","is-referenced-by-count":19,"title":["Identifying Drone Operator by Deep Learning and Ensemble Learning of IMU and Control Data"],"prefix":"10.1109","volume":"51","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-7378-3286","authenticated-orcid":false,"given":"Ruba","family":"Alkadi","sequence":"first","affiliation":[]},{"given":"Sultan","family":"Al-Ameri","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-3968-8637","authenticated-orcid":false,"given":"Abdulhadi","family":"Shoufan","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-9557-6496","authenticated-orcid":false,"given":"Ernesto","family":"Damiani","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref39","author":"hastie","year":"2009","journal-title":"The Elements of Statistical Learning Data Mining Inference and Prediction"},{"key":"ref38","article-title":"Cross-validation confidence intervals for test error","author":"bayle","year":"2020"},{"key":"ref33","first-page":"31","article-title":"Driver status identification from driving behavior signals","author":"\u00f6zt\u00fcrk","year":"0","journal-title":"Proc Digit Signal Process In-Veh Syst Saf"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1155\/2010\/397865"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1515\/popets-2015-0029"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1007\/978-0-387-45976-9_3"},{"key":"ref37","first-page":"282","article-title":"Gait analysis for human identification in frequency domain","author":"yu","year":"0","journal-title":"Proc 3rd Int Conf Image Graph"},{"key":"ref36","first-page":"249","article-title":"Understanding the difficulty of training deep feedforward neural networks","author":"glorot","year":"0","journal-title":"Proc 13th Int Conf Artif Intell Statist"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1111\/j.1439-0310.2010.01751.x"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1109\/ITSC.2015.470"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2012.2225048"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1162\/neco.1997.9.8.1735"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2020.3004077"},{"key":"ref12","first-page":"366","article-title":"Multi-modal person recognition for vehicular applications","author":"erdo?an","year":"0","journal-title":"Proc of International Workshop on Multiple Classifier Systems"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1007\/978-0-387-45976-9_1"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/MMUL.2006.37"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1016\/j.engappai.2013.11.009"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/ITNG.2007.101"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2015.2506542"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2018.2819126"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/VLSI-SoC.2017.8203494"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/TITS.2013.2297057"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1016\/j.jisa.2017.10.006"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1016\/j.ssci.2008.01.007"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-27668-7_11"},{"key":"ref6","first-page":"13","article-title":"Biometric authentication: A review","volume":"2","author":"bhattacharyya","year":"2009","journal-title":"International Journal of U- and E- Service Science and Technology"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1109\/ITSC.2011.6083128"},{"key":"ref5","doi-asserted-by":"crossref","first-page":"269","DOI":"10.1016\/j.engappai.2014.06.028","article-title":"A new entropy function and a classifier for thermal face recognition","volume":"36","author":"hanmandlu","year":"2014","journal-title":"Eng Appl Artif Intell"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2016.2555335"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1016\/S0952-1976(98)80006-7"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1145\/3001836"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.4018\/978-1-60566-725-6.ch001"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/VLSID.2018.97"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.5220\/0009355605820589"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/MITP.2013.50"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1109\/CIS.2017.00074"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/CYBER.2017.8446096"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1145\/1161289.1161298"},{"key":"ref42","article-title":"Understanding random forests: From theory to practice","author":"louppe","year":"2014"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/THMS.2017.2736948"},{"key":"ref41","article-title":"The computational complexity of the fast Fourier transform","author":"lohne","year":"2017"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2942944"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1109\/CCST.2016.7815713"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/THMS.2020.2969380"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1109\/ISI.2009.5137288"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1007\/11504894_85"}],"container-title":["IEEE Transactions on Human-Machine Systems"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6221037\/9540728\/09527245.pdf?arnumber=9527245","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,5,10]],"date-time":"2022-05-10T14:53:40Z","timestamp":1652194420000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9527245\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,10]]},"references-count":46,"journal-issue":{"issue":"5"},"URL":"https:\/\/doi.org\/10.1109\/thms.2021.3102508","relation":{},"ISSN":["2168-2291","2168-2305"],"issn-type":[{"value":"2168-2291","type":"print"},{"value":"2168-2305","type":"electronic"}],"subject":[],"published":{"date-parts":[[2021,10]]}}}