{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T04:56:12Z","timestamp":1750308972868,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":26,"publisher":"ACM","license":[{"start":{"date-parts":[[2016,10,11]],"date-time":"2016-10-11T00:00:00Z","timestamp":1476144000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2016,10,11]]},"DOI":"10.1145\/2987386.2987410","type":"proceedings-article","created":{"date-parts":[[2016,11,21]],"date-time":"2016-11-21T14:02:02Z","timestamp":1479736922000},"page":"136-141","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":3,"title":["Touch Gesture Data based Authentication Method for Smartphone Users"],"prefix":"10.1145","author":[{"given":"JunGyu","family":"Park","sequence":"first","affiliation":[{"name":"Dept. of Computer and Software, Hanyang University, Seoul, Korea"}]},{"given":"TaeGuen","family":"Kim","sequence":"additional","affiliation":[{"name":"Dept. of Computer and Software, Hanyang University, Seoul, Korea"}]},{"given":"Eul Gyu","family":"Im","sequence":"additional","affiliation":[{"name":"Div. of Computer Science and Engineering, Hanyang University, Seoul, Korea"}]}],"member":"320","published-online":{"date-parts":[[2016,10,11]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"Polemi D. 1997. Biometric techniques: review and evaluation of biometric techniques for identification and authentication including an appraisal of the areas where they are most applicable. Reported prepared for the European Commision DG XIIIC 4 (1997).  Polemi D. 1997. Biometric techniques: review and evaluation of biometric techniques for identification and authentication including an appraisal of the areas where they are most applicable. Reported prepared for the European Commision DG XIIIC 4 (1997)."},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"crossref","unstructured":"Wayman J. Jain A. Maltoni D. and Maio D. 2005. An introduction to biometric authentication systems. Springer London.  Wayman J. Jain A. Maltoni D. and Maio D. 2005. An introduction to biometric authentication systems. Springer London.","DOI":"10.1007\/b138151"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.5555\/552539"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1145\/581271.581272"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1007\/11608288_51"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1145\/982507.982516"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/2207676.2208544"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2012.2225048"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1145\/2207676.2208543"},{"volume-title":"R. Touch gestures based biometric authentication scheme for touchscreen mobile phones. In Proceedings of the Information Security and Cryptology","author":"Meng Y.","key":"e_1_3_2_1_10_1","unstructured":"Meng , Y. and Wong , D . S and Schlegel , R. Touch gestures based biometric authentication scheme for touchscreen mobile phones. In Proceedings of the Information Security and Cryptology . Springer , 331--350. Meng, Y. and Wong, D. S and Schlegel, R. Touch gestures based biometric authentication scheme for touchscreen mobile phones. In Proceedings of the Information Security and Cryptology. Springer, 331--350."},{"volume-title":"Machine transformation of advice into a heuristic search procedure. Machine learning","author":"Mostow D. J.","key":"e_1_3_2_1_11_1","unstructured":"Mostow , D. J. 1983. Machine transformation of advice into a heuristic search procedure. Machine learning . Springer Berlin Heidelberg , 367--403. Mostow, D. J. 1983. Machine transformation of advice into a heuristic search procedure. Machine learning. Springer Berlin Heidelberg, 367--403."},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1021\/ci0342472"},{"key":"e_1_3_2_1_13_1","unstructured":"Motion Sensor https:\/\/developer.android.com\/guide\/topics\/sensors\/sensors_motion.html (visited on 2016-06-25)  Motion Sensor https:\/\/developer.android.com\/guide\/topics\/sensors\/sensors_motion.html (visited on 2016-06-25)"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1021\/ci00027a006"},{"volume-title":"Proceedings of the17th Telecommunications forum TELFOR. 24--26","author":"Novakovic J.","key":"e_1_3_2_1_15_1","unstructured":"Novakovic , J. Using information gain attribute evaluation to classify sonar targets . In Proceedings of the17th Telecommunications forum TELFOR. 24--26 . Novakovic, J. Using information gain attribute evaluation to classify sonar targets. In Proceedings of the17th Telecommunications forum TELFOR. 24--26."},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.ipm.2004.08.006"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.asoc.2012.07.029"},{"key":"e_1_3_2_1_18_1","unstructured":"GainRatioAttributeEval http:\/\/weka.sourceforge.net\/doc.dev\/weka\/attributeSelection\/GainRatioAttributeEval.html (visited on 2016-06-25)  GainRatioAttributeEval http:\/\/weka.sourceforge.net\/doc.dev\/weka\/attributeSelection\/GainRatioAttributeEval.html (visited on 2016-06-25)"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1145\/1656274.1656278"},{"volume-title":"Intelligent Information Systems, 1994. Proceedings of the 1994 Second Australian and New Zealand Conference on. IEEE, 357--361","author":"Holmes G.","key":"e_1_3_2_1_20_1","unstructured":"Holmes , G. , Donkin , A. and Witten , I. H . Weka: A machine learning workbench . In Intelligent Information Systems, 1994. Proceedings of the 1994 Second Australian and New Zealand Conference on. IEEE, 357--361 . Holmes, G., Donkin, A. and Witten, I. H. Weka: A machine learning workbench. In Intelligent Information Systems, 1994. Proceedings of the 1994 Second Australian and New Zealand Conference on. IEEE, 357--361."},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1093\/bioinformatics\/bth261"},{"key":"e_1_3_2_1_22_1","volume-title":"J. and Konig, I. R.","author":"Boulesteix A. L.","year":"2008","unstructured":"Boulesteix , A. L. and Janitza , S . and Kruppa , J. and Konig, I. R. 2008 . Conditional variable importance for random forests. BMC bioinformatics 9, 1 (2008), 1. DOI:http:\/\/dx.doi.org\/10.1186\/1471-2105-9-307 10.1186\/1471-2105-9-307 Boulesteix, A. L. and Janitza, S. and Kruppa, J. and Konig, I. R. 2008. Conditional variable importance for random forests. BMC bioinformatics 9, 1 (2008), 1. DOI:http:\/\/dx.doi.org\/10.1186\/1471-2105-9-307"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1002\/widm.1072"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1109\/IIH-MSP.2012.11"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jss.2011.12.044"},{"volume-title":"Proceedings of the 8th International Conference Interdisciplinarity in Engineering, INTER-ENG, 9--1","author":"Antal M.","key":"e_1_3_2_1_26_1","unstructured":"Antal , M. , Szab\u00f3 , L. Z. and L\u00e1szl\u00f3 , I . 2014. Keystroke dynamics on android platform . In Proceedings of the 8th International Conference Interdisciplinarity in Engineering, INTER-ENG, 9--1 Antal, M., Szab\u00f3, L. Z. and L\u00e1szl\u00f3, I. 2014. Keystroke dynamics on android platform. In Proceedings of the 8th International Conference Interdisciplinarity in Engineering, INTER-ENG, 9--1"}],"event":{"name":"RACS '16: International Conference on Research in Adaptive and Convergent Systems","sponsor":["SIGAPP ACM Special Interest Group on Applied Computing","ACCT Association of Convergent Computing Technology"],"location":"Odense Denmark","acronym":"RACS '16"},"container-title":["Proceedings of the International Conference on Research in Adaptive and Convergent Systems"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2987386.2987410","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2987386.2987410","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T21:38:38Z","timestamp":1750282718000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2987386.2987410"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,10,11]]},"references-count":26,"alternative-id":["10.1145\/2987386.2987410","10.1145\/2987386"],"URL":"https:\/\/doi.org\/10.1145\/2987386.2987410","relation":{},"subject":[],"published":{"date-parts":[[2016,10,11]]},"assertion":[{"value":"2016-10-11","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}