{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,21]],"date-time":"2025-02-21T13:26:12Z","timestamp":1740144372634,"version":"3.37.3"},"reference-count":38,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","license":[{"start":{"date-parts":[[2022,1,1]],"date-time":"2022-01-01T00:00:00Z","timestamp":1640995200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2022,1,1]],"date-time":"2022-01-01T00:00:00Z","timestamp":1640995200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2022,1,1]],"date-time":"2022-01-01T00:00:00Z","timestamp":1640995200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["62072319"],"award-info":[{"award-number":["62072319"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"Sichuan Science and Technology Program","doi-asserted-by":"publisher","award":["2022YFG0041"],"award-info":[{"award-number":["2022YFG0041"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Sichuan University-Luzhou Scientific and Technological Innovation Research and Development","award":["2021CDLZ-11"],"award-info":[{"award-number":["2021CDLZ-11"]}]},{"name":"Science and Technology on Communication Security Laboratory","award":["6142103190415"],"award-info":[{"award-number":["6142103190415"]}]},{"name":"Chengdu Technology Innovation Research and Development Program","award":["2021-YF05-02000-SN"],"award-info":[{"award-number":["2021-YF05-02000-SN"]}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans.Inform.Forensic Secur."],"published-print":{"date-parts":[[2022]]},"DOI":"10.1109\/tifs.2022.3196270","type":"journal-article","created":{"date-parts":[[2022,8,3]],"date-time":"2022-08-03T19:29:28Z","timestamp":1659554968000},"page":"3077-3090","source":"Crossref","is-referenced-by-count":4,"title":["A Low-Calculation Contactless Continuous Authentication Based on Postural Transition"],"prefix":"10.1109","volume":"17","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-6634-4808","authenticated-orcid":false,"given":"Shijia","family":"Liu","sequence":"first","affiliation":[{"name":"College of Computer Science, Sichuan University, Chengdu, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-9677-7142","authenticated-orcid":false,"given":"Yanru","family":"Chen","sequence":"additional","affiliation":[{"name":"College of Computer Science, Sichuan University, Chengdu, China"}]},{"given":"Hao","family":"Wang","sequence":"additional","affiliation":[{"name":"College of Computer Science, Sichuan University, Chengdu, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-6258-0595","authenticated-orcid":false,"given":"Hongbin","family":"Liang","sequence":"additional","affiliation":[{"name":"National United Engineering Laboratory of Integrated and Intelligent Transportation, School of Transportation and Logistics, and the National Engineering Laboratory of Integrated Transportation Big Data Application Technology, Southwest Jiaotong University, Chengdu, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-6166-890X","authenticated-orcid":false,"given":"Liangyin","family":"Chen","sequence":"additional","affiliation":[{"name":"College of Computer Science, Institute for Industrial Internet Research, Sichuan University, Chengdu, China"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2016.2594132"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1049\/cp:19950480"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1145\/2984393.2984403"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1145\/3117811.3117839"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/ICPADS.2017.00106"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1002\/widm.1365"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1016\/j.jisa.2017.10.002"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.3390\/rs11101220"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/APMC46564.2019.9038224"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1145\/3241539.3267743"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2019.2916777"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/MIC.2019.2941391"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1145\/3314023"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/SmartWorld.2018.00163"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/CSCS.2015.16"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/TMC.2020.2994955"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/TIP.2019.2917862"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-21735-7_7"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/JSEN.2017.2762428"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1145\/2639108.2639143"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1016\/j.pmcj.2019.01.006"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2018.2833388"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/TMC.2016.2557795"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1016\/j.buildenv.2020.106737"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.3390\/s21072287"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM41043.2020.9155539"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1609\/aaai.v32i1.11497"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1145\/3300061.3345437"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1145\/3264944"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1145\/1925861.1925870"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1145\/2789168.2790124"},{"key":"ref32","article-title":"One-class classification: A survey","author":"Perera","year":"2021","journal-title":"arXiv:2101.03064"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1145\/2689746.2689747"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2019.2934489"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1145\/3302506.3310399"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1145\/3397317"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1145\/3290605.3300766"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1109\/SAHCN.2018.8397108"}],"container-title":["IEEE Transactions on Information Forensics and Security"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/10206\/9652463\/09848996.pdf?arnumber=9848996","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,2,1]],"date-time":"2024-02-01T11:09:32Z","timestamp":1706785772000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9848996\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022]]},"references-count":38,"URL":"https:\/\/doi.org\/10.1109\/tifs.2022.3196270","relation":{},"ISSN":["1556-6013","1556-6021"],"issn-type":[{"type":"print","value":"1556-6013"},{"type":"electronic","value":"1556-6021"}],"subject":[],"published":{"date-parts":[[2022]]}}}