{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,9]],"date-time":"2026-04-09T14:30:27Z","timestamp":1775745027619,"version":"3.50.1"},"reference-count":50,"publisher":"Association for Computing Machinery (ACM)","issue":"4","license":[{"start":{"date-parts":[[2023,7,10]],"date-time":"2023-07-10T00:00:00Z","timestamp":1688947200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"crossref","award":["62072061"],"award-info":[{"award-number":["62072061"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"crossref"}]},{"DOI":"10.13039\/501100012226","name":"Fundamental Research Funds for the Central Universities","doi-asserted-by":"crossref","award":["2021CDJQY-026"],"award-info":[{"award-number":["2021CDJQY-026"]}],"id":[{"id":"10.13039\/501100012226","id-type":"DOI","asserted-by":"crossref"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":["ACM Trans. Sen. Netw."],"published-print":{"date-parts":[[2023,11,30]]},"abstract":"<jats:p>Mobile devices have been playing significant roles in our daily lives, which has made device security and privacy protection extremely important. These mobile devices storing user sensitive and private information, therefore, need rigorous user authentication mechanisms. In this article, we present SearchAuth, a novel continuous authentication system on smartphones exploiting a neural architecture search (NAS) to find an optimal network architecture and an auto augmentation search (AAS) to more effectively train the optimal network along with the best data augmentation policies, by leveraging the accelerometer, gyroscope, and magnetometer on smartphones to capture users\u2019 behavioral patterns. Specifically, SearchAuth consists of three stages, i.e., the offline stage, registration stage, and authentication stage. In the offline stage, we utilize the NAS on sensor data of the accelerometer, gyroscope, and magnetometer to find an optimal network architecture based on the designed search space. With the optimal network architecture, namely, NAS-based model, the AAS automatically optimizes the augmentation of the input data for more effectively training the model that is for feature extraction. In the registration stage, we use the trained NAS-based model to learn and extract deep features from the legitimate user\u2019s data, and train the LOF classifier with 55 features selected by the PCA. In the authentication stage, with the well-trained NAS-based model and LOF classifier, SearchAuth identifies the current user as a legitimate user or an impostor when the user starts operating a smartphone. Based on our dataset, we evaluate the performance of the proposed SearchAuth, and the experimental results demonstrate that SearchAuth surpasses the representative authentication schemes by achieving the best accuracy of 93.95%, F1-score of 94.30%, and EER of 5.30% on the LOF classifier with dataset size of 100.<\/jats:p>","DOI":"10.1145\/3599727","type":"journal-article","created":{"date-parts":[[2023,5,24]],"date-time":"2023-05-24T12:17:49Z","timestamp":1684930669000},"page":"1-23","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":13,"title":["SearchAuth: Neural Architecture Search-based Continuous Authentication Using Auto Augmentation Search"],"prefix":"10.1145","volume":"19","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-7648-5671","authenticated-orcid":false,"given":"Yantao","family":"Li","sequence":"first","affiliation":[{"name":"Chongqing University, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-7356-5526","authenticated-orcid":false,"given":"Jiaxing","family":"Luo","sequence":"additional","affiliation":[{"name":"Chongqing University, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-1246-7399","authenticated-orcid":false,"given":"Shaojiang","family":"Deng","sequence":"additional","affiliation":[{"name":"Chongqing University, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-4425-9837","authenticated-orcid":false,"given":"Gang","family":"Zhou","sequence":"additional","affiliation":[{"name":"Department of Computer Science, William &amp; Mary, USA"}]}],"member":"320","published-online":{"date-parts":[[2023,7,10]]},"reference":[{"key":"e_1_3_1_2_2","doi-asserted-by":"publisher","DOI":"10.1007\/s00264-012-1527-4"},{"key":"e_1_3_1_3_2","first-page":"372","volume-title":"Proceedings of the 2017 ACM on Asia Conference on Computer and Communications Security (ASIA CCS\u201917)","author":"Wang Ding","year":"2017","unstructured":"Ding Wang, Qianchen Gu, Xinyi Huang, and Ping Wang. 2017. Understanding human-chosen pins: Characteristics, distribution and security. In Proceedings of the 2017 ACM on Asia Conference on Computer and Communications Security (ASIA CCS\u201917). 372\u2013385."},{"key":"e_1_3_1_4_2","doi-asserted-by":"publisher","DOI":"10.1145\/2699390"},{"key":"e_1_3_1_5_2","doi-asserted-by":"publisher","DOI":"10.1145\/2976749.2978339"},{"key":"e_1_3_1_6_2","doi-asserted-by":"crossref","first-page":"572","DOI":"10.1109\/ISCSCT.2008.226","volume-title":"Proceedings of the 2008 International Symposium on Computer Science and Computational Technology (ISCSCT\u201908)","author":"Quan Feng","year":"2008","unstructured":"Feng Quan, Su Fei, Cai Anni, and Zhao Feifei. 2008. Cracking cancelable fingerprint template of ratha. In Proceedings of the 2008 International Symposium on Computer Science and Computational Technology (ISCSCT\u201908). 572\u2013575."},{"key":"e_1_3_1_7_2","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2012.2225048"},{"key":"e_1_3_1_8_2","doi-asserted-by":"publisher","DOI":"10.1145\/3117811.3117823"},{"key":"e_1_3_1_9_2","first-page":"1","volume-title":"Proceedings of the IEEE Globecom 2006","author":"Abeni Paolo","year":"2006","unstructured":"Paolo Abeni, Madalina Baltatu, and Rosalia D\u2019Alessandro. 2006. Nis03-4: Implementing biometrics-based authentication for mobile devices. In Proceedings of the IEEE Globecom 2006. 1\u20135."},{"key":"e_1_3_1_10_2","first-page":"187","volume-title":"Proceedings of the 10th Symposium On Usable Privacy and Security (SOUPS\u201914)","author":"Xu Hui","year":"2014","unstructured":"Hui Xu, Yangfan Zhou, and Michael R. Lyu. 2014. Towards continuous and passive authentication via touch biometrics: An experimental study on smartphones. In Proceedings of the 10th Symposium On Usable Privacy and Security (SOUPS\u201914). 187\u2013198."},{"key":"e_1_3_1_11_2","first-page":"1","volume-title":"Proceedings of the Sicherheit 2014","author":"Gascon Hugo","year":"2014","unstructured":"Hugo Gascon, Sebastian Uellenbeck, Christopher Wolf, and Konrad Rieck. 2014. Continuous authentication on mobile devices by analysis of typing motion behavior. In Proceedings of the Sicherheit 2014. 1\u201312."},{"key":"e_1_3_1_12_2","doi-asserted-by":"publisher","DOI":"10.1145\/2536853.2536895"},{"key":"e_1_3_1_13_2","first-page":"147","volume-title":"Proceedings of the 15th Annual Conference on Privacy, Security and Trust (PST\u201917)","author":"Centeno Mario Parre\u00f1o","year":"2017","unstructured":"Mario Parre\u00f1o Centeno, Aad van Moorsel, and Stefano Castruccio. 2017. Smartphone continuous authentication using deep learning autoencoders. In Proceedings of the 15th Annual Conference on Privacy, Security and Trust (PST\u201917). 147\u20131478."},{"issue":"2","key":"e_1_3_1_14_2","first-page":"20","article-title":"DeFFusion: CNN-based continuous authentication using deep feature fusion","volume":"18","author":"Li Yantao","year":"2021","unstructured":"Yantao Li, Peng Tao, Shaojiang Deng, and Gang Zhou. 2021. DeFFusion: CNN-based continuous authentication using deep feature fusion. ACM Transactions on Sensor Networks 18, 2, (2021), 20 pages.","journal-title":"ACM Transactions on Sensor Networks"},{"key":"e_1_3_1_15_2","doi-asserted-by":"publisher","DOI":"10.1145\/3136755.3136817"},{"key":"e_1_3_1_16_2","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2018.2851185"},{"key":"e_1_3_1_17_2","doi-asserted-by":"crossref","unstructured":"Xinyue Zhu Yifan Liu Jiahong Li Tao Wan and Zengchang Qin. 2018. Emotion classification with data augmentation using generative adversarial networks. In Proceedings of the Pacific-Asia Conference on Knowledge Discovery and Data Mining (PAKDD\u201918) . 349\u2013360.","DOI":"10.1007\/978-3-319-93040-4_28"},{"key":"e_1_3_1_18_2","first-page":"2535","volume-title":"Proceedings of the 40th Annual International Conference of the IEEE Engineering in Medicine and Biology Society (EMBC\u201918)","author":"Luo Yun","year":"2018","unstructured":"Yun Luo and Bao-Liang Lu. 2018. EEG data augmentation for emotion recognition using a conditional wasserstein GAN. In Proceedings of the 40th Annual International Conference of the IEEE Engineering in Medicine and Biology Society (EMBC\u201918). 2535\u20132538."},{"key":"e_1_3_1_19_2","doi-asserted-by":"crossref","first-page":"169","DOI":"10.1007\/978-3-030-86890-1_10","volume-title":"Proceedings of the International Conference on Information and Communications Security (ICICS\u201921)","author":"Deng Shaojiang","year":"2021","unstructured":"Shaojiang Deng, Jiaxing Luo, and Yantao Li. 2021. CNN-based continuous authentication on smartphones with auto augmentation search. In Proceedings of the International Conference on Information and Communications Security (ICICS\u201921). 169\u2013186."},{"key":"e_1_3_1_20_2","first-page":"2991","volume-title":"Proceedings of the IEEE International Conference on Image Processing (ICIP\u201916)","author":"Mahbub Upal","year":"2016","unstructured":"Upal Mahbub, Vishal M. Patel, Deepak Chandra, Brandon Barbello, and Rama Chellappa. 2016. Partial face detection for continuous authentication. In Proceedings of the IEEE International Conference on Image Processing (ICIP\u201916). 2991\u20132995."},{"key":"e_1_3_1_21_2","first-page":"204","volume-title":"Proceedings of the 2018 ACM International Symposium on Wearable Computers (ISWC\u201918)","author":"Lu Chris Xiaoxuan","year":"2018","unstructured":"Chris Xiaoxuan Lu, Bowen Du, Peijun Zhao, Hongkai Wen, Yiran Shen, Andrew Markham, and Niki Trigoni. 2018. Deepauth: In-situ authentication for smartwatches via deeply learned behavioural biometrics. In Proceedings of the 2018 ACM International Symposium on Wearable Computers (ISWC\u201918). 204\u2013207."},{"key":"e_1_3_1_22_2","first-page":"181","volume-title":"Proceedings of the 8th European Workshop on Visual Information Processing (EUVIP\u201919)","author":"Maiorana Emanuele","year":"2019","unstructured":"Emanuele Maiorana, Himanka Kalita, and Patrizio Campisi. 2019. Deepkey: Keystroke dynamics and cnn for biometric recognition on mobile devices. In Proceedings of the 8th European Workshop on Visual Information Processing (EUVIP\u201919). 181\u2013186."},{"key":"e_1_3_1_23_2","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2020.2975779"},{"issue":"3","key":"e_1_3_1_24_2","first-page":"27","article-title":"SCANet: Sensor-based continuous authentication with two-stream convolutional neural networks","volume":"16","author":"Li Yantao","year":"2020","unstructured":"Yantao Li, Hailong Hu, Zhangqian Zhu, and Gang Zhou. 2020. SCANet: Sensor-based continuous authentication with two-stream convolutional neural networks. ACM Transactions on Sensor Networks 16, 3(2020), 27 pages.","journal-title":"ACM Transactions on Sensor Networks"},{"key":"e_1_3_1_25_2","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2018.2841347"},{"key":"e_1_3_1_26_2","first-page":"4212","volume-title":"Proceedings of the IEEE International Conference on Acoustics, Speech, and Signal Processing (ICASSP\u201920)","author":"Tschuchnig Maximilian Ernst","year":"2020","unstructured":"Maximilian Ernst Tschuchnig, Cornelia Ferner, and Stefan Wegenkittl. 2020. Sequential IoT data augmentation using generative adversarial networks. In Proceedings of the IEEE International Conference on Acoustics, Speech, and Signal Processing (ICASSP\u201920). 4212\u20134216."},{"key":"e_1_3_1_27_2","doi-asserted-by":"publisher","DOI":"10.1007\/s10845-018-1456-1"},{"key":"e_1_3_1_28_2","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2021.3108822"},{"key":"e_1_3_1_29_2","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2021.3059340"},{"key":"e_1_3_1_30_2","doi-asserted-by":"publisher","DOI":"10.1109\/TMC.2022.3186614"},{"key":"e_1_3_1_31_2","doi-asserted-by":"publisher","DOI":"10.1145\/2668332.2668366"},{"key":"e_1_3_1_32_2","first-page":"4780","volume-title":"Proceedings of the 33rd AAAI Conference on Artificial Intelligence (AAAI\u201919)","author":"Real Esteban","year":"2019","unstructured":"Esteban Real, Alok Aggarwal, Yanping Huang, and Quoc V. Le. 2019. Regularized evolution for image classifier architecture search. In Proceedings of the 33rd AAAI Conference on Artificial Intelligence (AAAI\u201919). 4780\u20134789."},{"key":"e_1_3_1_33_2","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2018.00907"},{"key":"e_1_3_1_34_2","first-page":"1","article-title":"Neural architecture search with reinforcement learning","author":"Zoph Barret","year":"2017","unstructured":"Barret Zoph and Quoc V. Le. 2017. Neural architecture search with reinforcement learning. In Proceedings of the 5th International Conference on Learning Representations (ICLR\u201917) (2017), 1\u201316.","journal-title":"Proceedings of the 5th International Conference on Learning Representations (ICLR\u201917)"},{"key":"e_1_3_1_35_2","unstructured":"John Schulman Filip Wolski Prafulla Dhariwal Alec Radford and Oleg Klimov. 2017. Proximal policy optimization algorithms. arXiv:1707.06347. Retrieved from https:\/\/arxiv.org\/abs\/1707.06347."},{"key":"e_1_3_1_36_2","first-page":"4095","volume-title":"Proceedings of the 35th International Conference on Machine Learning (PMLR\u201918)","author":"Pham Hieu","year":"2018","unstructured":"Hieu Pham, Melody Guan, Barret Zoph, Quoc Le, and Jeff Dean. 2018. Efficient neural architecture search via parameters sharing. In Proceedings of the 35th International Conference on Machine Learning (PMLR\u201918). 4095\u20134104."},{"key":"e_1_3_1_37_2","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV.2019.00140"},{"key":"e_1_3_1_38_2","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2018.00745"},{"key":"e_1_3_1_39_2","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2018.00474"},{"key":"e_1_3_1_40_2","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2019.00020"},{"key":"e_1_3_1_41_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.comcom.2020.08.022"},{"key":"e_1_3_1_42_2","first-page":"6579","volume-title":"Proceedings of the IEEE\/CVF International Conference on Computer Vision (ICCV\u201919)","author":"Lin Chen","year":"2019","unstructured":"Chen Lin, Minghao Guo, Chuming Li, Xin Yuan, Wei Wu, Junjie Yan, Dahua Lin, and Wanli Ouyang. 2019. Online hyper-parameter learning for auto-augmentation strategy. In Proceedings of the IEEE\/CVF International Conference on Computer Vision (ICCV\u201919). 6579\u20136588."},{"key":"e_1_3_1_43_2","doi-asserted-by":"publisher","DOI":"10.1145\/335191.335388"},{"key":"e_1_3_1_44_2","first-page":"2219","volume-title":"Proceedings of the 29th USENIX Security Symposium (USENIX Security 20)","author":"Wu Cong","year":"2020","unstructured":"Cong Wu, Kun He, Jing Chen, Ziming Zhao, and Ruiying Du. 2020. Liveness is not enough: Enhancing fingerprint authentication with behavioral biometrics to defeat puppet attacks. In Proceedings of the 29th USENIX Security Symposium (USENIX Security 20). 2219\u20132236."},{"key":"e_1_3_1_45_2","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2016.90"},{"key":"e_1_3_1_46_2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-01264-9_8"},{"key":"e_1_3_1_47_2","doi-asserted-by":"publisher","DOI":"10.1145\/3241539.3241575"},{"key":"e_1_3_1_48_2","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2015.2506542"},{"key":"e_1_3_1_49_2","doi-asserted-by":"publisher","DOI":"10.1088\/1741-2552\/abb580"},{"key":"e_1_3_1_50_2","first-page":"1311","volume-title":"Proceedings of the IEEE Military Communications Conference (MILCOM\u201915)","author":"Roy Aditi","year":"2015","unstructured":"Aditi Roy, Tzipora Halevi, and Nasir Memon. 2015. An HMM-based multi-sensor approach for continuous mobile authentication. In Proceedings of the IEEE Military Communications Conference (MILCOM\u201915). 1311\u20131316."},{"key":"e_1_3_1_51_2","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2017.2737969"}],"container-title":["ACM Transactions on Sensor Networks"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3599727","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3599727","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T16:47:11Z","timestamp":1750178831000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3599727"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,7,10]]},"references-count":50,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2023,11,30]]}},"alternative-id":["10.1145\/3599727"],"URL":"https:\/\/doi.org\/10.1145\/3599727","relation":{},"ISSN":["1550-4859","1550-4867"],"issn-type":[{"value":"1550-4859","type":"print"},{"value":"1550-4867","type":"electronic"}],"subject":[],"published":{"date-parts":[[2023,7,10]]},"assertion":[{"value":"2021-12-29","order":0,"name":"received","label":"Received","group":{"name":"publication_history","label":"Publication History"}},{"value":"2023-05-20","order":1,"name":"accepted","label":"Accepted","group":{"name":"publication_history","label":"Publication History"}},{"value":"2023-07-10","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}