{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,8,22]],"date-time":"2025-08-22T22:10:02Z","timestamp":1755900602548,"version":"3.44.0"},"publisher-location":"New York, NY, USA","reference-count":33,"publisher":"ACM","license":[{"start":{"date-parts":[[2023,12,6]],"date-time":"2023-12-06T00:00:00Z","timestamp":1701820800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2023,12,6]]},"DOI":"10.1145\/3638782.3638785","type":"proceedings-article","created":{"date-parts":[[2024,4,18]],"date-time":"2024-04-18T11:07:37Z","timestamp":1713438457000},"page":"12-18","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":0,"title":["A Continuous Authentication Scheme for Digital Therapeutics Using Denoising Autoencoder"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0009-0005-9562-1858","authenticated-orcid":false,"given":"Chengling","family":"Wang","sequence":"first","affiliation":[{"name":"College of Computer and Cyber Security, Fujian Normal University, China"}]},{"ORCID":"https:\/\/orcid.org\/0009-0003-1336-8111","authenticated-orcid":false,"given":"Yunru","family":"Ma","sequence":"additional","affiliation":[{"name":"School of Health, Fujian Medical University, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-3882-7041","authenticated-orcid":false,"given":"Yuexin","family":"Zhang","sequence":"additional","affiliation":[{"name":"College of Computer and Cyber Security, Fujian Normal University, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-2606-5406","authenticated-orcid":false,"given":"Ayong","family":"Ye","sequence":"additional","affiliation":[{"name":"College of Computer and Cyber Security, Fujian Normal University, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-8972-3373","authenticated-orcid":false,"given":"Li","family":"Xu","sequence":"additional","affiliation":[{"name":"College of Computer and Cyber Security, Fujian Normal University, China"}]}],"member":"320","published-online":{"date-parts":[[2024,4,18]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1007\/s00415-021-10608-4"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2020.3020076"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1109\/TMC.2020.2974941"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2021.102557"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1109\/TITB.2009.2036165"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.3390\/s21175967"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.4103\/jfmpc.jfmpc_105_20"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.2174\/2666958702101010032"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.3390\/s17092043"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2018.02.020"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.patcog.2017.09.005"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/3314023"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1109\/CSCWD54268.2022.9776313"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-74826-5_13"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2022.3221813"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2021.3108822"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11042-015-3188-y"},{"key":"e_1_3_2_1_18_1","volume-title":"An introduction to autoencoders. arXiv preprint arXiv:2201.03898","author":"Michelucci Umberto","year":"2022","unstructured":"Umberto Michelucci. 2022. An introduction to autoencoders. arXiv preprint arXiv:2201.03898 (2022)."},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1109\/TMC.2017.2686855"},{"key":"e_1_3_2_1_20_1","volume-title":"Continuous Authentication Using Gait Patterns. In International Conference on Signal & Data Processing. Springer, 447\u2013459","author":"Nair J","year":"2022","unstructured":"Aparna\u00a0J Nair, B Premjith, Diksha Shukla, and KP Soman. 2022. Continuous Authentication Using Gait Patterns. In International Conference on Signal & Data Processing. Springer, 447\u2013459."},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.smhl.2020.100162"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-981-15-1084-7_78"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.compeleceng.2022.107817"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1109\/PERCOM.2017.7917865"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.2196\/jmir.4052"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.compeleceng.2023.108663"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2018.2860592"},{"key":"e_1_3_2_1_28_1","volume-title":"Gait-based identification for elderly users in wearable healthcare systems. Information fusion 53","author":"Sun Fangmin","year":"2020","unstructured":"Fangmin Sun, Weilin Zang, Raffaele Gravina, Giancarlo Fortino, and Ye Li. 2020. Gait-based identification for elderly users in wearable healthcare systems. Information fusion 53 (2020), 134\u2013144."},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1109\/PERCOM.2016.7456521"},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.procs.2020.09.001"},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.3390\/s18010179"},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1109\/IPSN.2016.7460726"},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1109\/JBHI.2013.2253613"}],"event":{"name":"ICCNS 2023: 2023 13th International Conference on Communication and Network Security","acronym":"ICCNS 2023","location":"Fuzhou China"},"container-title":["Proceedings of the 2023 13th International Conference on Communication and Network Security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3638782.3638785","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3638782.3638785","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,8,22]],"date-time":"2025-08-22T21:35:49Z","timestamp":1755898549000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3638782.3638785"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,12,6]]},"references-count":33,"alternative-id":["10.1145\/3638782.3638785","10.1145\/3638782"],"URL":"https:\/\/doi.org\/10.1145\/3638782.3638785","relation":{},"subject":[],"published":{"date-parts":[[2023,12,6]]},"assertion":[{"value":"2024-04-18","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}