{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T05:06:11Z","timestamp":1750309571363,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":16,"publisher":"ACM","license":[{"start":{"date-parts":[[2025,5,25]],"date-time":"2025-05-25T00:00:00Z","timestamp":1748131200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2025,5,26]]},"DOI":"10.1145\/3715669.3726830","type":"proceedings-article","created":{"date-parts":[[2025,5,24]],"date-time":"2025-05-24T06:57:59Z","timestamp":1748069879000},"page":"1-3","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":0,"title":["Exploring Individual Differences in Gaze Patterns using Recurrence Plot"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0009-0001-5866-7348","authenticated-orcid":false,"given":"Junichi","family":"Nagasawa","sequence":"first","affiliation":[{"name":"Kwansei Gakuin University, Sanda, Japan"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-3054-313X","authenticated-orcid":false,"given":"Toshiya","family":"Isomoto","sequence":"additional","affiliation":[{"name":"LY Research, LY Corporation, Chiyoda, Tokyo, Japan"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-8426-5978","authenticated-orcid":false,"given":"Takashi","family":"Nagamatsu","sequence":"additional","affiliation":[{"name":"Kobe University, Kobe, Hyogo, Japan"}]}],"member":"320","published-online":{"date-parts":[[2025,5,25]]},"reference":[{"key":"e_1_3_3_2_2_1","doi-asserted-by":"crossref","unstructured":"Abbas Acar Hidayet Aksu A\u00a0Selcuk Uluagac and Kemal Akkaya. 2020. A usable and robust continuous authentication framework using wearables. IEEE Transactions on Mobile Computing 20 6 (2020) 2140\u20132153.","DOI":"10.1109\/TMC.2020.2974941"},{"key":"e_1_3_3_2_3_1","doi-asserted-by":"crossref","unstructured":"Abbas Acar Hidayet Aksu A\u00a0Selcuk Uluagac and Kemal Akkaya. 2021. A usable and robust continuous authentication framework using wearables. IEEE Trans. Mob. Comput. 20 6 (June 2021) 2140\u20132153.","DOI":"10.1109\/TMC.2020.2974941"},{"key":"e_1_3_3_2_4_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2012.49"},{"key":"e_1_3_3_2_5_1","doi-asserted-by":"crossref","unstructured":"Muhammad Ehatisham-ul Haq Muhammad Awais\u00a0Azam Usman Naeem Yasar Amin and Jonathan Loo. 2018a. Continuous authentication of smartphone users based on activity pattern recognition using passive mobile sensing. J. Netw. Comput. Appl. 109 (May 2018) 24\u201335.","DOI":"10.1016\/j.jnca.2018.02.020"},{"key":"e_1_3_3_2_6_1","doi-asserted-by":"crossref","unstructured":"Muhammad Ehatisham-ul Haq Muhammad\u00a0Awais Azam Usman Naeem Yasar Amin and Jonathan Loo. 2018b. Continuous authentication of smartphone users based on activity pattern recognition using passive mobile sensing. Journal of Network and Computer Applications 109 (2018) 24\u201335.","DOI":"10.1016\/j.jnca.2018.02.020"},{"key":"e_1_3_3_2_7_1","doi-asserted-by":"crossref","unstructured":"Habiba Farzand Melvin Abraham Stephen Brewster Mohamed Khamis and Karola Marky. 2024. A Systematic Deconstruction of Human-Centric Privacy & Security Threats on Mobile Phones. International Journal of Human\u2013Computer Interaction (2024) 1\u201324.","DOI":"10.1080\/10447318.2024.2361519"},{"key":"e_1_3_3_2_8_1","doi-asserted-by":"publisher","DOI":"10.1109\/IJCB.2011.6117536"},{"key":"e_1_3_3_2_9_1","doi-asserted-by":"crossref","unstructured":"Anil\u00a0K Jain and Ajay Kumar. 2012. Biometric recognition: an overview. Second generation biometrics: The ethical legal and social context (2012) 49\u201379.","DOI":"10.1007\/978-94-007-3892-8_3"},{"key":"e_1_3_3_2_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/3544548.3581096"},{"key":"e_1_3_3_2_11_1","doi-asserted-by":"crossref","unstructured":"Norbert Marwan M\u00a0Carmen Romano Marco Thiel and J\u00fcrgen Kurths. 2007. Recurrence plots for the analysis of complex systems. Physics reports 438 5-6 (2007) 237\u2013329.","DOI":"10.1016\/j.physrep.2006.11.001"},{"key":"e_1_3_3_2_12_1","doi-asserted-by":"crossref","unstructured":"Ioannis Rigas Oleg Komogortsev and Reza Shadmehr. 2016. Biometric recognition via eye movements: Saccadic vigor and acceleration cues. ACM Transactions on Applied Perception (TAP) 13 2 (2016) 1\u201321.","DOI":"10.1145\/2842614"},{"key":"e_1_3_3_2_13_1","doi-asserted-by":"publisher","DOI":"10.1145\/2947626.2951962"},{"key":"e_1_3_3_2_14_1","doi-asserted-by":"crossref","unstructured":"Hanqiu Wang Zihao Zhan Haoqi Shan Siqi Dai Max Panoff and Shuo Wang. 2024a. GAZEploit: Remote Keystroke Inference Attack by Gaze Estimation from Avatar Views in VR\/MR Devices. arXiv preprint arXiv:https:\/\/arXiv.org\/abs\/2409.08122 (2024).","DOI":"10.1145\/3658644.3690285"},{"key":"e_1_3_3_2_15_1","doi-asserted-by":"publisher","DOI":"10.1145\/3658644.3690285"},{"key":"e_1_3_3_2_16_1","unstructured":"Charles\u00a0L Webber\u00a0Jr and Joseph\u00a0P Zbilut. 2005. Recurrence quantification analysis of nonlinear dynamical systems. Tutorials in contemporary nonlinear methods for the behavioral sciences 94 2005 (2005) 26\u201394."},{"key":"e_1_3_3_2_17_1","unstructured":"Tao Wei and Yulong Zhang. 2015. Fingerprints on mobile devices: Abusing and leaking."}],"event":{"name":"ETRA '25: 2025 Symposium on Eye Tracking Research and Applications","sponsor":["SIGCHI ACM Special Interest Group on Computer-Human Interaction","SIGGRAPH ACM Special Interest Group on Computer Graphics and Interactive Techniques"],"location":"Tokyo Japan","acronym":"ETRA '25"},"container-title":["Proceedings of the 2025 Symposium on Eye Tracking Research and Applications"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3715669.3726830","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"}],"deposited":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T01:19:14Z","timestamp":1750295954000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3715669.3726830"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,5,25]]},"references-count":16,"alternative-id":["10.1145\/3715669.3726830","10.1145\/3715669"],"URL":"https:\/\/doi.org\/10.1145\/3715669.3726830","relation":{},"subject":[],"published":{"date-parts":[[2025,5,25]]},"assertion":[{"value":"2025-05-25","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}