{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,7]],"date-time":"2025-10-07T08:41:57Z","timestamp":1759826517936,"version":"3.32.0"},"reference-count":63,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"2","license":[{"start":{"date-parts":[[2025,2,1]],"date-time":"2025-02-01T00:00:00Z","timestamp":1738368000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2025,2,1]],"date-time":"2025-02-01T00:00:00Z","timestamp":1738368000000},"content-version":"am","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2025,2,1]],"date-time":"2025-02-01T00:00:00Z","timestamp":1738368000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2025,2,1]],"date-time":"2025-02-01T00:00:00Z","timestamp":1738368000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"name":"NSF","award":["20508266","2318671","2318672"],"award-info":[{"award-number":["20508266","2318671","2318672"]}]},{"name":"Google exploreCSR Summer Research 2023"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans. on Mobile Comput."],"published-print":{"date-parts":[[2025,2]]},"DOI":"10.1109\/tmc.2024.3473609","type":"journal-article","created":{"date-parts":[[2024,10,2]],"date-time":"2024-10-02T18:29:29Z","timestamp":1727893769000},"page":"970-984","source":"Crossref","is-referenced-by-count":1,"title":["<i>ScooterID<\/i>: Posture-Based Continuous User Identification From Mobility Scooter Rides"],"prefix":"10.1109","volume":"24","author":[{"ORCID":"https:\/\/orcid.org\/0009-0002-4081-4642","authenticated-orcid":false,"given":"Devan","family":"Shah","sequence":"first","affiliation":[{"name":"Princeton University, Princeton, NJ, USA"}]},{"given":"Ruoqi","family":"Huang","sequence":"additional","affiliation":[{"name":"California State Polytechnic University, Pomona, Pomona, CA, USA"}]},{"given":"Nisha","family":"Vinayaga-Sureshkanth","sequence":"additional","affiliation":[{"name":"University of Texas at San Antonio, San Antonio, TX, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-9235-0387","authenticated-orcid":false,"given":"Tingting","family":"Chen","sequence":"additional","affiliation":[{"name":"California State Polytechnic University, Pomona, Pomona, CA, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-9316-1943","authenticated-orcid":false,"given":"Murtuza","family":"Jadliwala","sequence":"additional","affiliation":[{"name":"University of Texas at San Antonio, San Antonio, TX, USA"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1016\/j.trd.2021.102734"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1016\/j.trd.2021.102803"},{"article-title":"How to prevent mobility scooter theft","year":"2024","author":"Mobility","key":"ref3"},{"article-title":"Youths pictured riding mobility scooter after it was stolen from 85-year-old woman in Salford","year":"2023","author":"Police","key":"ref4"},{"year":"2024","key":"ref5","article-title":"Travel patterns of American adults with disabilities"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2021.3093391"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2020.3004077"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1145\/3373625.3418005"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/BTAS.2016.7791164"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1519\/00139143-200932020-00002"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1016\/j.cosrev.2021.100432"},{"article-title":"Performance and security analysis of gait-based user authentication","year":"2008","author":"Gafurov","key":"ref13"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2014.471"},{"article-title":"Jointsgate: Gait recognition based on graph convolutional networks and joints relationship pyramid mapping","year":"2020","author":"Li","key":"ref15"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1038\/s41598-024-51791-4"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1145\/2858036.2858152"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2015.2506542"},{"key":"ref19","first-page":"24","article-title":"Continuous authentication of smartphone users based on activity pattern recognition using passive mobile sensing","volume-title":"J. Netw. Comput. Appl.","volume":"109","author":"ul Haq","year":"2018"},{"key":"ref20","first-page":"234","article-title":"Continuous user authentication using multi-modal biometrics","volume-title":"Comput. Secur.","volume":"53","author":"Saevanee","year":"2015"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/CIAPP.2017.8167230"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/ICCES48766.2020.9137914"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1145\/3161410"},{"key":"ref24","first-page":"1","article-title":"Continuous authentication using mouse dynamics","volume-title":"Proc. Int. Conf. BIOSIG Special Int. Group","author":"Mondal"},{"key":"ref25","first-page":"41","article-title":"MoveAR: Continuous biometric authentication for augmented reality headsets","volume-title":"Proc. 7th ACM Cyber-Physical Syst. Secur. Workshop","author":"Bhalla"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1162\/neco.1997.9.8.1735"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/ICASSP.2019.8683871"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2020.2973832"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-01264-9_41"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1145\/3448080"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1109\/TPAMI.2021.3087619"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1109\/PerCom53586.2022.9762394"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2023.23194"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1109\/TPAMI.2022.3151865"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1145\/3243043"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1109\/JBHI.2019.2923209"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1109\/JBHI.2022.3144917"},{"key":"ref38","first-page":"1","article-title":"Realistic face reconstruction from deep embeddings","volume-title":"Proc. Int. Conf. Neural Inf. Process. Syst. Workshop Privacy Mach. Learn.","author":"Vendrow"},{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1145\/3517332"},{"key":"ref40","article-title":"MediaPipe: A framework for perceiving and processing reality","author":"Lugaresi","year":"2019","journal-title":"Proc. 3rd Workshop Comput. Vis. AR\/VR, IEEE Comput. Vis. Pattern Recognit."},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1109\/cvpr52729.2023.00721"},{"article-title":"Movenet singlepose lightning","year":"2024","author":"Hub","key":"ref42"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2014.220"},{"key":"ref44","article-title":"Semi-supervised classification with graph convolutional networks","author":"Kipf","year":"2017","journal-title":"Proc. Int. Conf. Learn. Representations"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1109\/IJCNN.2017.7966039"},{"issue":"2","key":"ref46","first-page":"207","article-title":"Distance metric learning for large margin nearest neighbor classification","volume":"10","author":"Weinberger","year":"2009","journal-title":"J. Mach. Learn. Res."},{"key":"ref47","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV.2017.307"},{"issue":"11","key":"ref48","first-page":"2579","article-title":"Visualizing data using t-SNE.","volume":"9","author":"Van der Maaten","year":"2008","journal-title":"J. Mach. Learn. Res."},{"year":"2024","key":"ref49","article-title":"Tewiky tw-05 webcam"},{"key":"ref50","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2021.3105481"},{"key":"ref51","article-title":"How attentive are graph attention networks?","author":"Brody","year":"2022","journal-title":"Proc. Int. Conf. Learn. Representations"},{"key":"ref52","doi-asserted-by":"publisher","DOI":"10.1109\/ICASSP.2013.6638079"},{"key":"ref53","doi-asserted-by":"publisher","DOI":"10.1109\/TMC.2020.2994955"},{"key":"ref54","doi-asserted-by":"publisher","DOI":"10.48550\/ARXIV.1706.03762"},{"article-title":"Relative attention-based one-class adversarial autoencoder for continuous authentication of smartphone users","year":"2022","author":"Hu","key":"ref55"},{"article-title":"Movenet single pose lightning tflite model","year":"2024","author":"Coral","key":"ref56"},{"article-title":"Edge TPU USB accelerator WA1","year":"2024","author":"Coral","key":"ref57"},{"year":"2023","key":"ref58","article-title":"RunwayML Gen 2"},{"year":"2023","key":"ref59","article-title":"Stability AI"},{"key":"ref60","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR52688.2022.01280"},{"key":"ref61","doi-asserted-by":"publisher","DOI":"10.1145\/3581783.3612368"},{"key":"ref62","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR52733.2024.00064"},{"key":"ref63","doi-asserted-by":"publisher","DOI":"10.1109\/3DV.2017.00064"},{"key":"ref64","doi-asserted-by":"publisher","DOI":"10.1109\/tpami.2024.3430860"}],"container-title":["IEEE Transactions on Mobile Computing"],"original-title":[],"link":[{"URL":"https:\/\/ieeexplore.ieee.org\/ielam\/7755\/10836120\/10704617-aam.pdf","content-type":"application\/pdf","content-version":"am","intended-application":"syndication"},{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/7755\/10836120\/10704617.pdf?arnumber=10704617","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,1,10]],"date-time":"2025-01-10T05:43:40Z","timestamp":1736487820000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10704617\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,2]]},"references-count":63,"journal-issue":{"issue":"2"},"URL":"https:\/\/doi.org\/10.1109\/tmc.2024.3473609","relation":{},"ISSN":["1536-1233","1558-0660","2161-9875"],"issn-type":[{"type":"print","value":"1536-1233"},{"type":"electronic","value":"1558-0660"},{"type":"electronic","value":"2161-9875"}],"subject":[],"published":{"date-parts":[[2025,2]]}}}