{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,25]],"date-time":"2026-03-25T13:50:34Z","timestamp":1774446634978,"version":"3.50.1"},"reference-count":195,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2023,7,26]],"date-time":"2023-07-26T00:00:00Z","timestamp":1690329600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"},{"start":{"date-parts":[[2023,7,26]],"date-time":"2023-07-26T00:00:00Z","timestamp":1690329600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"}],"funder":[{"DOI":"10.13039\/501100010790","name":"Erasmus+","doi-asserted-by":"publisher","award":["2020-1-EL01-KA226-HE-094869"],"award-info":[{"award-number":["2020-1-EL01-KA226-HE-094869"]}],"id":[{"id":"10.13039\/501100010790","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001871","name":"Funda\u00e7\u00e3o para a Ci\u00eancia e a Tecnologia","doi-asserted-by":"publisher","id":[{"id":"10.13039\/501100001871","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Smart Learn. Environ."],"abstract":"<jats:title>Abstract<\/jats:title><jats:p>The worldwide shift to distance learning at Higher Education Institutions (HEIs) during the COVID-19 global pandemic has raised several concerns about the credibility of online academic activities, especially regarding student identity management. Traditional online frameworks cannot guarantee the authenticity of the enrolled student, which requires instructors to manually verify their identities, a time-consuming task that compromises academic quality. This article presents a comprehensive review of existing efforts around continuous user identification, focusing on intelligent proctoring systems and automatic identification methods, as well as their applicability in this domain. We conclude that there is a clear need for continuous user identification technology by HEIs, but existing systems lack agile system integration models that combine many inputs, such as face, voice and behavioural data in a practical manner, and encounter numerous barriers related to data protection during implementation.<\/jats:p>","DOI":"10.1186\/s40561-023-00255-9","type":"journal-article","created":{"date-parts":[[2023,7,26]],"date-time":"2023-07-26T08:02:23Z","timestamp":1690358543000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":15,"title":["Continuous user identification in distance learning: a recent technology perspective"],"prefix":"10.1186","volume":"10","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-1447-0439","authenticated-orcid":false,"given":"David","family":"Portugal","sequence":"first","affiliation":[]},{"given":"Jos\u00e9 N.","family":"Faria","sequence":"additional","affiliation":[]},{"given":"Marios","family":"Belk","sequence":"additional","affiliation":[]},{"given":"Pedro","family":"Martins","sequence":"additional","affiliation":[]},{"given":"Argyris","family":"Constantinides","sequence":"additional","affiliation":[]},{"given":"Anna","family":"Pietron","sequence":"additional","affiliation":[]},{"given":"Andreas","family":"Pitsillides","sequence":"additional","affiliation":[]},{"given":"Nikolaos","family":"Avouris","sequence":"additional","affiliation":[]},{"given":"Christos A.","family":"Fidas","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2023,7,26]]},"reference":[{"issue":"6","key":"255_CR1","doi-asserted-by":"publisher","first-page":"951","DOI":"10.3390\/sym12060951","volume":"12","author":"MA Acquah","year":"2020","unstructured":"Acquah, M. A., Chen, N., Pan, J.-S., Yang, H.-M., & Yan, B. (2020). Securing fingerprint template using blockchain and distributed storage system. Symmetry, 12(6), 951.","journal-title":"Symmetry"},{"issue":"12","key":"255_CR2","doi-asserted-by":"publisher","first-page":"2037","DOI":"10.1109\/TPAMI.2006.244","volume":"28","author":"T Ahonen","year":"2006","unstructured":"Ahonen, T., Hadid, A., & Pietikainen, M. (2006). Face description with local binary patterns: Application to face recognition. IEEE Transactions on Pattern Analysis and Machine Intelligence, 28(12), 2037\u20132041.","journal-title":"IEEE Transactions on Pattern Analysis and Machine Intelligence"},{"issue":"1","key":"255_CR3","doi-asserted-by":"publisher","first-page":"146","DOI":"10.24059\/olj.v21i1.885","volume":"21","author":"HM Alessio","year":"2017","unstructured":"Alessio, H. M., Malay, N., Maurer, K., Bailer, A. J., & Rubin, B. (2017). Examining the effect of proctoring on online test scores. Online Learning, 21(1), 146\u2013161.","journal-title":"Online Learning"},{"issue":"1","key":"255_CR4","doi-asserted-by":"publisher","first-page":"13","DOI":"10.24846\/v24i1y201502","volume":"24","author":"A Alexandru","year":"2015","unstructured":"Alexandru, A., Tirziu, E., Tudora, E., & Bica, O. (2015). Enhanced education by using intelligent agents in multi-agent adaptive e-learning systems. Studies in Informatics and Control, 24(1), 13\u201322.","journal-title":"Studies in Informatics and Control"},{"key":"255_CR5","doi-asserted-by":"crossref","unstructured":"Amin, T.B., & Mahmood, I. (2008) Speech recognition using dynamic time warping. In 2008 2nd international conference on advances in space technologies, pp. 74\u201379 . IEEE","DOI":"10.1109\/ICAST.2008.4747690"},{"key":"255_CR6","unstructured":"Arkorful, V., & Abaidoo, N. (2014) The role of e-learning, the advantages and disadvantages of its adoption in Higher Education. CRC Publications"},{"key":"255_CR7","doi-asserted-by":"crossref","unstructured":"Asha, S., & Chellappan, C. (2008) Authentication of e-learners using multimodal biometric technology. In 2008 international symposium on biometrics and security technologies, pp. 1\u20136. IEEE","DOI":"10.1109\/ISBAST.2008.4547640"},{"key":"255_CR9","doi-asserted-by":"crossref","unstructured":"Ashibani, Y., & Mahmoud, Q.H. (2018) A behavior profiling model for user authentication in iot networks based on app usage patterns. In IECON 2018-44th annual conference of the IEEE industrial electronics society, pp. 2841\u20132846. IEEE","DOI":"10.1109\/IECON.2018.8592761"},{"key":"255_CR8","doi-asserted-by":"crossref","unstructured":"Ashibani, Y., & Mahmoud, Q.H. (2019) A behavior-based proactive user authentication model utilizing mobile application usage patterns. In Canadian conference on artificial intelligence, pp. 284\u2013295. Springer","DOI":"10.1007\/978-3-030-18305-9_23"},{"issue":"1","key":"255_CR10","doi-asserted-by":"publisher","first-page":"309","DOI":"10.1121\/1.1971460","volume":"45","author":"BS Atal","year":"1969","unstructured":"Atal, B. S. (1969). Automatic speaker recognition based on pitch contours. The Journal of the Acoustical Society of America, 45(1), 309.","journal-title":"The Journal of the Acoustical Society of America"},{"issue":"7","key":"255_CR11","doi-asserted-by":"publisher","first-page":"1609","DOI":"10.1109\/TMM.2017.2656064","volume":"19","author":"Y Atoum","year":"2017","unstructured":"Atoum, Y., Chen, L., Liu, A. X., Hsu, S. D., & Liu, X. (2017). Automated online exam proctoring. IEEE Transactions on Multimedia, 19(7), 1609\u20131624.","journal-title":"IEEE Transactions on Multimedia"},{"key":"255_CR12","doi-asserted-by":"publisher","first-page":"77","DOI":"10.1016\/j.cose.2014.03.005","volume":"43","author":"KO Bailey","year":"2014","unstructured":"Bailey, K. O., Okolica, J. S., & Peterson, G. L. (2014). User identification and authentication using multi-modal behavioral biometrics. Computers and Security, 43, 77\u201389.","journal-title":"Computers and Security"},{"key":"255_CR13","unstructured":"Bakia, M., Shear, L., Toyama, Y., & Lasseter, A. (2012). Understanding the implications of online learning for educational productivity. US Department of Education: Office of Educational Technology."},{"key":"255_CR14","doi-asserted-by":"crossref","unstructured":"Baltru\u0161aitis, T., Robinson, P., & Morency, L.-P. (2016) Openface: an open source facial behavior analysis toolkit. In 2016 IEEE winter conference on applications of computer vision (WACV), pp. 1\u201310 . IEEE","DOI":"10.1109\/WACV.2016.7477553"},{"issue":"7","key":"255_CR15","doi-asserted-by":"publisher","first-page":"711","DOI":"10.1109\/34.598228","volume":"19","author":"PN Belhumeur","year":"1997","unstructured":"Belhumeur, P. N., Hespanha, J. P., & Kriegman, D. J. (1997). Eigenfaces vs. fisherfaces: Recognition using class specific linear projection. IEEE Transactions on Pattern Analysis and Machine Intelligence, 19(7), 711\u2013720.","journal-title":"IEEE Transactions on Pattern Analysis and Machine Intelligence"},{"issue":"6","key":"255_CR16","doi-asserted-by":"publisher","first-page":"1373","DOI":"10.1162\/089976603321780317","volume":"15","author":"M Belkin","year":"2003","unstructured":"Belkin, M., & Niyogi, P. (2003). Laplacian eigenmaps for dimensionality reduction and data representation. Neural Computation, 15(6), 1373\u20131396.","journal-title":"Neural Computation"},{"key":"255_CR17","doi-asserted-by":"crossref","unstructured":"Benesty, J., Sondhi, M.M., & Huang, Y. et al.: (2008) Springer handbook of speech processing vol. 1. Springer.","DOI":"10.1007\/978-3-540-49127-9_1"},{"issue":"4","key":"255_CR18","doi-asserted-by":"publisher","first-page":"367","DOI":"10.1145\/581271.581272","volume":"5","author":"F Bergadano","year":"2002","unstructured":"Bergadano, F., Gunetti, D., & Picardi, C. (2002). User authentication through keystroke dynamics. ACM Transactions on Information and System Security (TISSEC), 5(4), 367\u2013397.","journal-title":"ACM Transactions on Information and System Security (TISSEC)"},{"key":"255_CR19","unstructured":"Beust, P., Duchatelle, I., & Cauchard, V. (2018) Exams taken at the student\u2019s home. In Online, Open and Flexible Higher Education Conference, EADTU 2018"},{"issue":"8","key":"255_CR20","doi-asserted-by":"publisher","first-page":"5","DOI":"10.1016\/S0969-4765(20)30109-0","volume":"2020","author":"A Bhalla","year":"2020","unstructured":"Bhalla, A. (2020). The latest evolution of biometrics. Biometric Technology Today, 2020(8), 5\u20138.","journal-title":"Biometric Technology Today"},{"key":"255_CR21","doi-asserted-by":"crossref","unstructured":"Bhargav-Spantzel, A., Squicciarini, A.C., Xue, R., & Bertino, E. (2010) Multifactor identity verification using aggregated proof of knowledge. In IEEE Transactions on Systems, Man, and Cybernetics, Part C (Applications and Reviews) 40(4), 372\u2013383","DOI":"10.1109\/TSMCC.2010.2045755"},{"key":"255_CR22","doi-asserted-by":"crossref","unstructured":"Blanchard, N., Bixler, R., Joyce, T., & D\u2019Mello, S. (2014) Automated physiological-based detection of mind wandering during learning. In International conference on intelligent tutoring systems, pp. 55\u201360. Springer","DOI":"10.1007\/978-3-319-07221-0_7"},{"key":"255_CR23","unstructured":"Boddeti, V.N. (2018). Secure face matching using fully homomorphic encryption. In 2018 IEEE 9th international conference on biometrics theory, applications and systems (BTAS), pp. 1\u201310. IEEE"},{"key":"255_CR24","doi-asserted-by":"crossref","unstructured":"Boles, A., & Rad, P. (2017). Voice biometrics: Deep learning-based voiceprint authentication system. In 2017 12th system of systems engineering conference (SoSE), pp. 1\u20136 . IEEE","DOI":"10.1109\/SYSOSE.2017.7994971"},{"issue":"2","key":"255_CR25","doi-asserted-by":"publisher","first-page":"42","DOI":"10.1109\/MSP.2012.2230218","volume":"30","author":"J Bringer","year":"2013","unstructured":"Bringer, J., Chabanne, H., & Patey, A. (2013). Privacy-preserving biometric identification using secure multiparty computation: An overview and recent trends. IEEE Signal Processing Magazine, 30(2), 42\u201352.","journal-title":"IEEE Signal Processing Magazine"},{"key":"255_CR26","doi-asserted-by":"crossref","unstructured":"Buschek, D., De\u00a0Luca, A., & Alt, F. (2015) Improving accuracy, applicability and usability of keystroke biometrics on mobile touchscreen devices. In Proceedings of the 33rd annual ACM conference on human factors in computing systems, pp. 1393\u20131402","DOI":"10.1145\/2702123.2702252"},{"key":"255_CR27","doi-asserted-by":"crossref","unstructured":"Cai, H., & King, I. (2020) Education technology for online learning in times of crisis. In 2020 IEEE international conference on teaching, assessment, and learning for engineering (TALE), pp 758\u2013763 . IEEE","DOI":"10.1109\/TALE48869.2020.9368387"},{"key":"255_CR28","doi-asserted-by":"crossref","unstructured":"Cao, Q., Shen, L., Xie, W., Parkhi, O.M., & Zisserman, A. (2018) Vggface2: A dataset for recognising faces across pose and age. In Proceedings of the IEEE International conference on automatic face and gesture recognition (FG 2018), pp. 67\u201374","DOI":"10.1109\/FG.2018.00020"},{"key":"255_CR29","unstructured":"Cavoukian, A., Stoianov, A., & Carter, F. (2008) Keynote paper: Biometric encryption: Technology for strong authentication, security and privacy. In Policies and Research in Identity Management, pp. 57\u201377. Springer."},{"issue":"1","key":"255_CR30","first-page":"11","volume":"5","author":"S Chakroborty","year":"2009","unstructured":"Chakroborty, S., & Saha, G. (2009). Improved text-independent speaker identification using fused MFCC & IMFCC feature sets based on Gaussian filter. International Journal of Signal Processing, 5(1), 11\u201319.","journal-title":"International Journal of Signal Processing"},{"issue":"5","key":"255_CR31","doi-asserted-by":"publisher","first-page":"1157","DOI":"10.1016\/j.jss.2011.12.044","volume":"85","author":"T-Y Chang","year":"2012","unstructured":"Chang, T.-Y., Tsai, C.-J., & Lin, J.-H. (2012). A graphical-based password keystroke dynamic authentication system for touch screen handheld mobile devices. Journal of Systems and Software, 85(5), 1157\u20131165.","journal-title":"Journal of Systems and Software"},{"issue":"7","key":"255_CR32","doi-asserted-by":"publisher","first-page":"940","DOI":"10.1080\/02602938.2020.1719975","volume":"45","author":"A Chirumamilla","year":"2020","unstructured":"Chirumamilla, A., Sindre, G., & Nguyen-Duc, A. (2020). Cheating in e-exams and paper exams: The perceptions of engineering students and teachers in Norway. Assessment and Evaluation in Higher Education, 45(7), 940\u2013957.","journal-title":"Assessment and Evaluation in Higher Education"},{"key":"255_CR33","doi-asserted-by":"crossref","unstructured":"Chua, S.S., Bondad, J.B., Lumapas, Z.R., & Garcia, J.D.L. (2019) Online examination system with cheating prevention using question bank randomization and tab locking. In 2019 4th international conference on information technology (InCIT), pp. 126\u2013131. IEEE","DOI":"10.1109\/INCIT.2019.8912065"},{"key":"255_CR34","doi-asserted-by":"crossref","unstructured":"Chun, H., Elmehdwi, Y., Li, F., Bhattacharya, P., & Jiang, W. (2014)Outsourceable two-party privacy-preserving biometric authentication. In Proceedings of the 9th ACM symposium on information, computer and communications security, pp. 401\u2013412","DOI":"10.1145\/2590296.2590343"},{"issue":"1","key":"255_CR35","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/s10207-006-0006-6","volume":"6","author":"NL Clarke","year":"2007","unstructured":"Clarke, N. L., & Furnell, S. M. (2007). Authenticating mobile phone users using keystroke analysis. International journal of information security, 6(1), 1\u201314.","journal-title":"International journal of information security"},{"key":"255_CR36","doi-asserted-by":"crossref","unstructured":"Coghlan, S., Miller, T., & Paterson, J. Good proctor or \u201c big or brother\u201d ? Ethics of online exam supervision technologies. Philosophy and Technology, 1\u201326 (2021)","DOI":"10.1007\/s13347-021-00476-1"},{"issue":"24","key":"255_CR37","doi-asserted-by":"publisher","first-page":"10367","DOI":"10.3390\/su122410367","volume":"12","author":"C Coman","year":"2020","unstructured":"Coman, C., T\u00eeru, L. G., Mese\u015fan-Schmitz, L., Stanciu, C., & Bularca, M. C. (2020). Online teaching and learning in higher education during the coronavirus pandemic: Students\u2019 perspective. Sustainability, 12(24), 10367.","journal-title":"Sustainability"},{"key":"255_CR39","doi-asserted-by":"crossref","unstructured":"Constantinides, A., Faria, J., Sousak, T., Martins, P., Portugal, D., Belk, M., Pitsillides, A., & Fidas, C. (2023). TRUSTID: Intelligent and Continuous Online Student Identity Management in Higher Education. In Adjunct proceedings of the 31st ACM conference on user modeling, adaptation and personalization, pp. 110\u2013114","DOI":"10.1145\/3563359.3597410"},{"key":"255_CR38","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijhcs.2021.102602","volume":"149","author":"A Constantinides","year":"2021","unstructured":"Constantinides, A., Fidas, C., Belk, M., Pietron, A. M., Han, T., & Pitsillides, A. (2021). From hot-spots towards experience-spots: Leveraging on users\u2019s sociocultural experiences to enhance security in cued-recall graphical authentication. International Journal of Human-Computer Studies, 149, 102602.","journal-title":"International Journal of Human-Computer Studies"},{"key":"255_CR40","doi-asserted-by":"crossref","unstructured":"Dabbah, M., Woo, W., & Dlay, S. (2007). Secure authentication for face recognition. In 2007 IEEE symposium on computational intelligence in image and signal processing, pp. 121\u2013126 IEEE","DOI":"10.1109\/CIISP.2007.369304"},{"key":"255_CR43","doi-asserted-by":"crossref","unstructured":"Deng, J., Dong, W., Richard, S., Li, L.-J., Li, K., & Fei-Fei, L. (2009). Imagenet: A large-scale hierarchical image database. In Proceedings of the IEEE conference on computer vision and pattern recognition","DOI":"10.1109\/CVPR.2009.5206848"},{"key":"255_CR41","doi-asserted-by":"crossref","unstructured":"Deng, J., Guo, J., Xue, N., & Zafeiriou, S. (2019). Arcface: Additive angular margin loss for deep face recognition. In Proceedings of the IEEE conference on computer vision and pattern recognition","DOI":"10.1109\/CVPR.2019.00482"},{"key":"255_CR42","doi-asserted-by":"crossref","unstructured":"Deng, L., Hinton, G., & Kingsbury, B. (2013) New types of deep neural network learning for speech recognition and related applications: An overview. In 2013 IEEE International conference on acoustics, speech and signal processing, pp. 8599\u20138603 . IEEE","DOI":"10.1109\/ICASSP.2013.6639344"},{"key":"255_CR44","doi-asserted-by":"publisher","first-page":"22199","DOI":"10.1109\/ACCESS.2017.2762475","volume":"5","author":"G Dimauro","year":"2017","unstructured":"Dimauro, G., Di Nicola, V., Bevilacqua, V., Caivano, D., & Girardi, F. (2017). Assessment of speech intelligibility in Parkinson\u2019s disease using a speech-to-text system. IEEE Access, 5, 22199\u201322208.","journal-title":"IEEE Access"},{"key":"255_CR45","doi-asserted-by":"crossref","unstructured":"Dornaika, F., Assoum, A., & Ruichek, Y. (2015) Graph optimized laplacian eigenmaps for face recognition. In Proceedings of the intelligent robots and computer vision XXXII: Algorithms and techniques, pp. 91\u2013100","DOI":"10.1117\/12.2078277"},{"key":"255_CR46","doi-asserted-by":"crossref","unstructured":"Draffin, B., Zhu, J., & Zhang, J. (2013) Keysens: Passive user authentication through micro-behavior modeling of soft keyboard interaction. In: International Conference on Mobile Computing, Applications, and Services, pp. 184\u2013201 . Springer","DOI":"10.1007\/978-3-319-05452-0_14"},{"key":"255_CR47","doi-asserted-by":"crossref","unstructured":"Dzulkifly, S., Aris, H., & Janahiraman, TV. (2020) Enhanced continuous face recognition algorithm for bandwidth constrained network in real time application. In Proceedings of the 2020 The 9th international conference on informatics, environment, energy and applications, pp. 131\u2013135","DOI":"10.1145\/3386762.3386778"},{"key":"255_CR48","unstructured":"El Bachari, E., Abelwahed, E., & El\u00a0Adnani, M. (2010) An adaptive learning model using learner\u2019s preference. In International conference on models of information and communication systems"},{"key":"255_CR49","doi-asserted-by":"crossref","unstructured":"Faria, J.N., Portugal, D., Martins, P., Belk, M., Constantinides, A., Pitsillides, A., & Fidas, C. (2023) Image-based Face Verification for Student Identity Management-the TRUSTID Case Study. In Adjunct proceedings of the 31st ACM conference on user modeling, adaptation and personalization, pp. 66\u201371","DOI":"10.1145\/3563359.3597397"},{"key":"255_CR50","doi-asserted-by":"publisher","first-page":"83","DOI":"10.1016\/j.patrec.2017.03.027","volume":"113","author":"G Fenu","year":"2018","unstructured":"Fenu, G., Marras, M., & Boratto, L. (2018). A multi-biometric system for continuous student authentication in e-learning platforms. Pattern Recognition Letters, 113, 83\u201392.","journal-title":"Pattern Recognition Letters"},{"issue":"6","key":"255_CR51","doi-asserted-by":"publisher","first-page":"566","DOI":"10.3390\/educsci13060566","volume":"13","author":"CA Fidas","year":"2023","unstructured":"Fidas, C. A., Belk, M., Constantinides, A., Portugal, D., Martins, P., Pietron, A. M., Pitsillides, A., & Avouris, N. (2023). Ensuring academic integrity and trust in online learning environments: A longitudinal study of an ai-centered proctoring system in tertiary educational institutions. Education Sciences, 13(6), 566.","journal-title":"Education Sciences"},{"key":"255_CR52","doi-asserted-by":"crossref","unstructured":"Fidas, C., Belk, M., Portugal, D., & Pitsillides, A. (2021) Privacy-preserving biometric-driven data for student identity management: Challenges and approaches. In Adjunct Proceedings of the 29th ACM Conference on User Modeling, Adaptation and Personalization, pp. 368\u2013370","DOI":"10.1145\/3450614.3464470"},{"key":"255_CR53","unstructured":"Foster, D., & Layman, H. (2013) Online proctoring systems compared. Online verf\u00fcgbar unter https:\/\/ivetriedthat.com\/wp-content\/uploads\/2014\/07\/Caveon-Test-Security.pdf"},{"issue":"1","key":"255_CR54","doi-asserted-by":"publisher","first-page":"136","DOI":"10.1109\/TIFS.2012.2225048","volume":"8","author":"M Frank","year":"2012","unstructured":"Frank, M., Biedert, R., Ma, E., Martinovic, I., & Song, D. (2012). Touchalytics: On the applicability of touchscreen input as a behavioral biometric for continuous authentication. IEEE Transactions on Information Forensics and Security, 8(1), 136\u2013148.","journal-title":"IEEE Transactions on Information Forensics and Security"},{"key":"255_CR55","unstructured":"Gascon, H., Uellenbeck, S., Wolf, C., & Rieck, K. (2014). Continuous authentication on mobile devices by analysis of typing motion behavior. Sicherheit 2014\u2013Sicherheit, Schutz und Zuverl\u00e4ssigkeit"},{"issue":"6","key":"255_CR56","doi-asserted-by":"publisher","first-page":"687","DOI":"10.1007\/BF02208251","volume":"36","author":"R Genereux","year":"1995","unstructured":"Genereux, R., & McLeod, B. (1995). Circumstances surrounding cheating: A questionnaire study of college students. Research in Higher Education, 36(6), 687\u2013704. https:\/\/doi.org\/10.1007\/BF02208251","journal-title":"Research in Higher Education"},{"key":"255_CR57","doi-asserted-by":"crossref","unstructured":"Goel, A., Agarwal, A., Vatsa, M., Singh, R., & Ratha, N. (2019) Securing cnn model and biometric template using blockchain. In 2019 IEEE 10th international conference on biometrics theory, applications and systems (BTAS), pp. 1\u20137 . IEEE","DOI":"10.1109\/BTAS46853.2019.9185999"},{"issue":"8","key":"255_CR59","doi-asserted-by":"publisher","first-page":"3488","DOI":"10.3390\/su12083488","volume":"12","author":"CS Gonz\u00e1lez-Gonz\u00e1lez","year":"2020","unstructured":"Gonz\u00e1lez-Gonz\u00e1lez, C. S., Infante-Moro, A., & Infante-Moro, J. C. (2020). Implementation of e-proctoring in online teaching: A study about motivational factors. Sustainability, 12(8), 3488.","journal-title":"Sustainability"},{"issue":"3","key":"255_CR58","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/3314023","volume":"52","author":"L Gonzalez-Manzano","year":"2019","unstructured":"Gonzalez-Manzano, L., Fuentes, J. M. D., & Ribagorda, A. (2019). Leveraging user-related internet of things for continuous authentication: A survey. ACM Computing Surveys (CSUR), 52(3), 1\u201338.","journal-title":"ACM Computing Surveys (CSUR)"},{"key":"255_CR60","unstructured":"Grajek, S. (2021) Educause covid-19 quick poll results: Grading and proctoring. Educause review https:\/\/er.educause.edu\/blogs\/2020\/4\/educause-covid-19-quickpoll-results-grading-and-proctoring. Accessed 18"},{"key":"255_CR61","doi-asserted-by":"crossref","unstructured":"Gruber, I., Hlavac, M., Zelezny, M., & Karpov, A. (2017) Facing face recognition with resnet: Round one. In Proceedings of the international conference on interactive collaborative robotics, pp. 67\u201374","DOI":"10.1007\/978-3-319-66471-2_8"},{"key":"255_CR62","doi-asserted-by":"crossref","unstructured":"Guill\u00e9n-G\u00e1mez, F.D., Garc\u00eda-Magari\u00f1o, I., & Palacios-Navarro, G. (2018) Comparative analysis between different facial authentication tools for assessing their integration in m-health mobile applications. In World conference on information systems and technologies, pp. 1153\u20131161 . Springer","DOI":"10.1007\/978-3-319-77712-2_110"},{"issue":"4","key":"255_CR63","doi-asserted-by":"publisher","first-page":"1042","DOI":"10.1109\/TIFS.2017.2777787","volume":"13","author":"H Gunasinghe","year":"2017","unstructured":"Gunasinghe, H., & Bertino, E. (2017). Privbiomtauth: Privacy preserving biometrics-based and user centric protocol for user authentication from mobile phones. IEEE Transactions on Information Forensics and Security, 13(4), 1042\u20131057.","journal-title":"IEEE Transactions on Information Forensics and Security"},{"key":"255_CR64","unstructured":"Guo, G.-D., & Zhang, H.-J. (2001) Boosting for fast face recognition. In Proceedings of the IEEE ICCV workshop on recognition, analysis, and tracking of faces and gestures in real-time systems"},{"issue":"11","key":"255_CR65","doi-asserted-by":"publisher","first-page":"1949","DOI":"10.1109\/TASLP.2018.2848701","volume":"26","author":"H Hadian","year":"2018","unstructured":"Hadian, H., Sameti, H., Povey, D., & Khudanpur, S. (2018). Flat-start single-stage discriminatively trained hmm-based models for ASR. IEEE\/ACM Transactions on Audio, Speech, and Language Processing, 26(11), 1949\u20131961.","journal-title":"IEEE\/ACM Transactions on Audio, Speech, and Language Processing"},{"issue":"3","key":"255_CR66","doi-asserted-by":"publisher","first-page":"167","DOI":"10.1023\/A:1011183429707","volume":"43","author":"ZM Hafed","year":"2001","unstructured":"Hafed, Z. M., & Levine, M. D. (2001). Face recognition using the discrete cosine transform. International Journal of Computer Vision, 43(3), 167\u2013188.","journal-title":"International Journal of Computer Vision"},{"issue":"2","key":"255_CR67","doi-asserted-by":"publisher","first-page":"63","DOI":"10.1177\/002383096300600202","volume":"6","author":"WA Hargreaves","year":"1963","unstructured":"Hargreaves, W. A., & Starkweather, J. A. (1963). Recognition of speaker identity. Language and Speech, 6(2), 63\u201367.","journal-title":"Language and Speech"},{"issue":"2","key":"255_CR68","doi-asserted-by":"publisher","first-page":"1497","DOI":"10.47059\/revistageintec.v11i2.1776","volume":"11","author":"S Harish","year":"2021","unstructured":"Harish, S., Rajalakshmi, D., Ramesh, T., Ram, S. G., & Dharmendra, M. (2021). New features for webcam proctoring using python and opencv. Revista Geintec-Gestao Inovacao E Tecnologias, 11(2), 1497\u20131513.","journal-title":"Revista Geintec-Gestao Inovacao E Tecnologias"},{"issue":"4","key":"255_CR69","first-page":"565","volume":"1","author":"MR Hasan","year":"2004","unstructured":"Hasan, M. R., Jamil, M., Rahman, M., et al. (2004). Speaker identification using MEL frequency cepstral coefficients. Variations, 1(4), 565\u2013568.","journal-title":"Variations"},{"key":"255_CR71","doi-asserted-by":"crossref","unstructured":"He, K., Zhang, X., Ren, S., & Sun, J. (2016). Deep residual learning for image recognition. In Proceedings of the IEEE conference on computer vision and pattern recognition","DOI":"10.1109\/CVPR.2016.90"},{"issue":"3","key":"255_CR70","doi-asserted-by":"publisher","first-page":"328","DOI":"10.1109\/TPAMI.2005.55","volume":"27","author":"X He","year":"2005","unstructured":"He, X., Yan, S., Hu, Y., Niyogi, P., & Zhang, H.-J. (2005). Face recognition using Laplacianfaces. IEEE Transactions on Pattern Analysis and Machine Intelligence, 27(3), 328\u2013340.","journal-title":"IEEE Transactions on Pattern Analysis and Machine Intelligence"},{"key":"255_CR72","doi-asserted-by":"crossref","unstructured":"Heisele, B., Ho, P., & Poggio, T. (2001) Face recognition with support vector machine: Global versus component-based approach. In Proceedings of the IEEE international conference on computer vision","DOI":"10.21236\/ADA459707"},{"key":"255_CR73","unstructured":"Helms, N. (2021) Against Proctoring Software. https:\/\/colab.plymouthcreate.net\/2021\/04\/07\/against-proctoring-software\/. [Online; accessed 05-November-2021]"},{"key":"255_CR74","doi-asserted-by":"crossref","unstructured":"Henry, J. V., & Oliver, M. (2021). Who will watch the watchmen? the ethico-political arrangements of algorithmic proctoring for academic integrity. Postdigital Science and Education , 1\u201324.","DOI":"10.1007\/s42438-021-00273-1"},{"issue":"6","key":"255_CR75","doi-asserted-by":"publisher","first-page":"82","DOI":"10.1109\/MSP.2012.2205597","volume":"29","author":"G Hinton","year":"2012","unstructured":"Hinton, G., Deng, L., Yu, D., Dahl, G. E., Mohamed, A.-R., Jaitly, N., Senior, A., Vanhoucke, V., Nguyen, P., Sainath, T. N., et al. (2012). Deep neural networks for acoustic modeling in speech recognition: The shared views of four research groups. IEEE Signal Processing Magazine, 29(6), 82\u201397.","journal-title":"IEEE Signal Processing Magazine"},{"key":"255_CR76","doi-asserted-by":"crossref","unstructured":"Hu, H., & Zahorian, S.A. (2010). Dimensionality reduction methods for hmm phonetic recognition. In 2010 IEEE international conference on acoustics, speech and signal processing, pp. 4854\u20134857. IEEE","DOI":"10.1109\/ICASSP.2010.5495130"},{"issue":"2","key":"255_CR77","doi-asserted-by":"publisher","first-page":"137","DOI":"10.1006\/csla.1993.1007","volume":"7","author":"X Huang","year":"1993","unstructured":"Huang, X., Alleva, F., Hon, H.-W., Hwang, M.-Y., Lee, K.-F., & Rosenfeld, R. (1993). The SPHINX-II speech recognition system: An overview. Computer Speech and Language, 7(2), 137\u2013148.","journal-title":"Computer Speech and Language"},{"issue":"2","key":"255_CR78","doi-asserted-by":"publisher","first-page":"150","DOI":"10.1109\/89.222875","volume":"1","author":"X Huang","year":"1993","unstructured":"Huang, X., & Lee, K.-F. (1993). On speaker-independent, speaker-dependent, and speaker-adaptive speech recognition. IEEE Transactions on Speech and Audio processing, 1(2), 150\u2013157.","journal-title":"IEEE Transactions on Speech and Audio processing"},{"key":"255_CR79","unstructured":"Huang, R., Liu, D., Tlili, A., Yang, J., & Wang, H. et al.: (2020) Handbook on facilitating flexible learning during educational disruption: The Chinese experience in maintaining undisrupted learning in COVID-19 outbreak. Smart Learning Institute of Beijing Normal University, 1\u201354"},{"key":"255_CR80","unstructured":"Huang, G.B., Ramesh, M., Berg, T., & Learned-Miller, E. (2007) Labeled faces in the wild: A database for studying face recognition in unconstrained environments. Technical Report 07-49, University of Massachusetts, Amherst (2007)."},{"issue":"4","key":"255_CR81","doi-asserted-by":"publisher","first-page":"509","DOI":"10.5944\/openpraxis.12.4.1113","volume":"12","author":"MJ Hussein","year":"2020","unstructured":"Hussein, M. J., Yusuf, J., Deb, A. S., Fong, L., & Naidu, S. (2020). An evaluation of online proctoring tools. Open Praxis, 12(4), 509\u2013525.","journal-title":"Open Praxis"},{"key":"255_CR82","doi-asserted-by":"publisher","first-page":"80","DOI":"10.1016\/j.patrec.2015.12.013","volume":"79","author":"AK Jain","year":"2016","unstructured":"Jain, A. K., Nandakumar, K., & Ross, A. (2016). 50 years of biometric research: Accomplishments, challenges, and opportunities. Pattern Recognition Letters, 79, 80\u2013105.","journal-title":"Pattern Recognition Letters"},{"issue":"1","key":"255_CR83","doi-asserted-by":"publisher","first-page":"4","DOI":"10.1109\/TCSVT.2003.818349","volume":"14","author":"AK Jain","year":"2004","unstructured":"Jain, A. K., Ross, A., & Prabhakar, S. (2004). An introduction to biometric recognition. IEEE Transactions on Circuits and Systems for Video Technology, 14(1), 4\u201320.","journal-title":"IEEE Transactions on Circuits and Systems for Video Technology"},{"key":"255_CR84","doi-asserted-by":"crossref","unstructured":"Jindal, A.K., Chalamala, S.R., & Jami, S.K. (2019) Securing face templates using deep convolutional neural network and random projection. In 2019 IEEE international conference on consumer electronics (ICCE), pp. 1\u20136 . IEEE","DOI":"10.1109\/ICCE.2019.8662094"},{"key":"255_CR85","doi-asserted-by":"crossref","unstructured":"Jindal, A.K., Shaik, I., Vasudha, V., Chalamala, S.R., Rajan, M., & Lodha S. (2020) Secure and privacy preserving method for biometric template protection using fully homomorphic encryption. In 2020 IEEE 19th international conference on trust, security and privacy in computing and communications (TrustCom), pp. 1127\u20131134. IEEE","DOI":"10.1109\/TrustCom50675.2020.00149"},{"key":"255_CR86","doi-asserted-by":"crossref","unstructured":"Kaur, N., Prasad, P., Alsadoon, A., Pham, L., & Elchouemi, A. (2016) An enhanced model of biometric authentication in e-learning: Using a combination of biometric features to access e-learning environments. In 2016 International conference on advances in electrical, electronic and systems engineering (ICAEES), pp. 138\u2013143. IEEE","DOI":"10.1109\/ICAEES.2016.7888025"},{"issue":"4","key":"255_CR87","doi-asserted-by":"publisher","first-page":"62","DOI":"10.3991\/ijet.v12i04.6478","volume":"12","author":"Y Khlifi","year":"2017","unstructured":"Khlifi, Y., & El-Sabagh, H. A. (2017). A novel authentication scheme for e-assessments based on student behavior over e-learning platform. International Journal of Emerging Technologies in Learning, 12(4), 62.","journal-title":"International Journal of Emerging Technologies in Learning"},{"issue":"2","key":"255_CR88","doi-asserted-by":"publisher","first-page":"40","DOI":"10.1109\/97.991133","volume":"9","author":"KI Kim","year":"2002","unstructured":"Kim, K. I., Jung, K., & Kim, H. J. (2002). Face recognition using kernel principal component analysis. IEEE Signal Processing Letters, 9(2), 40\u201342.","journal-title":"IEEE Signal Processing Letters"},{"issue":"9","key":"255_CR89","first-page":"317","volume":"18","author":"S-I Kim","year":"2020","unstructured":"Kim, S.-I., & Lee, K. (2020). A study on the operation of smart remote lecture-focusing on cisco webex meeting. Journal of Digital Convergence, 18(9), 317\u2013322.","journal-title":"Journal of Digital Convergence"},{"issue":"1","key":"255_CR90","doi-asserted-by":"publisher","first-page":"12","DOI":"10.1016\/j.specom.2009.08.009","volume":"52","author":"T Kinnunen","year":"2010","unstructured":"Kinnunen, T., & Li, H. (2010). An overview of text-independent speaker recognition: From features to supervectors. Speech Communication, 52(1), 12\u201340.","journal-title":"Speech Communication"},{"key":"255_CR91","doi-asserted-by":"crossref","unstructured":"Kla\u0161nja-Mili\u0107evi\u0107, A., Vesin, B., Ivanovi\u0107, M., Budimac, Z., & Jain, L. C. (2016). E-learning systems: Intelligent techniques for personalization (Vol. 112). Springer.","DOI":"10.1007\/978-3-319-41163-7"},{"issue":"2","key":"255_CR92","first-page":"287","volume":"13","author":"E Kremic","year":"2016","unstructured":"Kremic, E., & Subasi, A. (2016). Performance of random forest and SVM in face recognition. International Arab Journal of Information Technology, 13(2), 287\u2013293.","journal-title":"International Arab Journal of Information Technology"},{"key":"255_CR93","unstructured":"Krizhevsky, A., Sutskever, I., & Hinton, G.E. (2012) Imagenet classification with deep convolutional neural networks. In Advances in Neural Information Processing Systems, pp. 1097\u20131105"},{"key":"255_CR94","doi-asserted-by":"crossref","unstructured":"Kulagli\u0107, S., Muja\u010di\u0107, S., Serdarevi\u0107, I.K., & Kasapovi\u0107 S. (2013) Influence of learning styles on improving efficiency of adaptive educational hypermedia systems. In 2013 12th International conference on information technology based higher education and training (ITHET), pp 1\u20137 . IEEE","DOI":"10.1109\/ITHET.2013.6671060"},{"key":"255_CR95","doi-asserted-by":"crossref","unstructured":"Kumar Jindal, A., Chalamala, S., & Kumar\u00a0Jami, S.(2018). Face template protection using deep convolutional neural network. In Proceedings of the IEEE conference on computer vision and pattern recognition workshops, pp. 462\u2013470","DOI":"10.1109\/CVPRW.2018.00087"},{"issue":"2","key":"255_CR96","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/2933241","volume":"49","author":"RD Labati","year":"2016","unstructured":"Labati, R. D., Genovese, A., Mu\u00f1oz, E., Piuri, V., Scotti, F., & Sforza, G. (2016). Biometric recognition in automated border control: A survey. ACM Computing Surveys (CSUR), 49(2), 1\u201339.","journal-title":"ACM Computing Surveys (CSUR)"},{"key":"255_CR97","doi-asserted-by":"publisher","first-page":"72398","DOI":"10.1109\/ACCESS.2021.3079375","volume":"9","author":"M Labayen","year":"2021","unstructured":"Labayen, M., Vea, R., Fl\u00f3rez, J., Aginako, N., & Sierra, B. (2021). Online student authentication and proctoring system based on multimodal biometrics technology. IEEE Access, 9, 72398\u201372411.","journal-title":"IEEE Access"},{"issue":"11","key":"255_CR98","doi-asserted-by":"publisher","first-page":"4417","DOI":"10.1007\/s12652-018-1123-6","volume":"10","author":"I Lamiche","year":"2019","unstructured":"Lamiche, I., Bin, G., Jing, Y., Yu, Z., & Hadid, A. (2019). A continuous smartphone authentication method based on gait patterns and keystroke dynamics. Journal of Ambient Intelligence and Humanized Computing, 10(11), 4417\u20134430.","journal-title":"Journal of Ambient Intelligence and Humanized Computing"},{"key":"255_CR100","doi-asserted-by":"crossref","unstructured":"Leaton Gray, S. (2017) Biometrics in schools: The role of authentic and inauthentic social transactions. British sociological association (BSA) conference","DOI":"10.1007\/978-3-319-71559-9_21"},{"issue":"3","key":"255_CR101","doi-asserted-by":"publisher","first-page":"229","DOI":"10.1007\/s10207-013-0209-6","volume":"13","author":"F Li","year":"2014","unstructured":"Li, F., Clarke, N., Papadaki, M., & Dowland, P. (2014). Active authentication for mobile devices utilising behaviour profiling. International Journal of Information Security, 13(3), 229\u2013244.","journal-title":"International Journal of Information Security"},{"key":"255_CR102","unstructured":"Li, F., Clarke, N., Papadaki, M., & Dowland, P. (2011) Behaviour profiling for transparent authentication for mobile devices. In European conference on information warfare and security (ECIW). Academic Publishing Ltd."},{"key":"255_CR103","doi-asserted-by":"crossref","unstructured":"Li, X., Chang, K.-m., Yuan, Y., & Hauptmann, A. (2015) Massive open online proctor: Protecting the credibility of moocs certificates. In Proceedings of the 18th ACM Conference on Computer Supported Cooperative Work and Social Computing, pp. 1129\u20131137","DOI":"10.1145\/2675133.2675245"},{"key":"255_CR104","doi-asserted-by":"crossref","unstructured":"Lin, T.-Y., Maire, M., Belongie, S., Hays, J., Perona, P., Ramanan, D., Doll\u00e1r, P., & Zitnick, CL. (2014). Microsoft coco: Common objects in context. In Proceedings of the European conference on computer vision","DOI":"10.1007\/978-3-319-10602-1_48"},{"issue":"4","key":"255_CR105","doi-asserted-by":"publisher","first-page":"467","DOI":"10.1109\/TIP.2002.999679","volume":"11","author":"C Liu","year":"2002","unstructured":"Liu, C., & Wechsler, H. (2002). Gabor feature based classification using the enhanced fisher linear discriminant model for face recognition. IEEE Transactions on Image Processing, 11(4), 467\u2013476.","journal-title":"IEEE Transactions on Image Processing"},{"key":"255_CR106","doi-asserted-by":"crossref","unstructured":"Liu, W., Wen, Y., Yu, Z., Li, M., Raj, B., & Song, L. (2017) Sphereface: Deep hypersphere embedding for face recognition. In Proceedings of the IEEE conference on computer vision and pattern recognition, pp. 212\u2013220","DOI":"10.1109\/CVPR.2017.713"},{"key":"255_CR107","doi-asserted-by":"crossref","unstructured":"Machuletz, D., Laube, S., & B\u00f6hme, R. (2018) Webcam covering as planned behavior. In Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems, pp. 1\u201313","DOI":"10.1145\/3173574.3173754"},{"key":"255_CR108","doi-asserted-by":"crossref","unstructured":"Mady, H., & Hilles, S.M.S. (2018) Face recognition and detection using random forest and combination of lbp and hog features. In Proceedings of the international conference on smart computing and electronic enterprise","DOI":"10.1109\/ICSCEE.2018.8538377"},{"key":"255_CR109","doi-asserted-by":"crossref","unstructured":"Maniar, S., Sukhani, K., Shah, K., & Dhage, S. (2021) Automated proctoring system using computer vision techniques. In 2021 International conference on system, computation, automation and networking (ICSCAN), pp. 1\u20136 . IEEE","DOI":"10.1109\/ICSCAN53069.2021.9526411"},{"key":"255_CR110","unstructured":"Mare, S., Baker, M., & Gummeson, J. (2016). A study of authentication in daily life. In Twelfth symposium on usable privacy and security (SOUPS 2016), pp. 189\u2013206"},{"issue":"3","key":"255_CR111","doi-asserted-by":"publisher","first-page":"397","DOI":"10.1111\/j.1467-8535.2005.00471.x","volume":"36","author":"M Martin","year":"2005","unstructured":"Martin, M. (2005). Seeing is believing: The role of videoconferencing in distance learning. British Journal of Educational Technology, 36(3), 397\u2013405.","journal-title":"British Journal of Educational Technology"},{"key":"255_CR112","unstructured":"Massner, C. K. (2021) The use of videoconferencing in higher education. Communication Management"},{"key":"255_CR113","doi-asserted-by":"crossref","unstructured":"Meng, J., Zhang, J., & Zhao, H. (2012) Overview of the speech recognition technology. In 2012 Fourth international conference on computational and information sciences, pp. 199\u2013202 . IEEE","DOI":"10.1109\/ICCIS.2012.202"},{"key":"255_CR114","unstructured":"Metzger, R., & Maudoodi, R. (2020) Using access reports and api logs as additional tools to identify exam cheating. In Society for information technology and teacher education international conference, pp. 294\u2013299. Association for the Advancement of Computing in Education (AACE)"},{"issue":"4","key":"255_CR115","doi-asserted-by":"publisher","first-page":"469","DOI":"10.1109\/JSYST.2009.2038957","volume":"3","author":"A Moini","year":"2009","unstructured":"Moini, A., & Madni, A. M. (2009). Leveraging biometrics for user authentication in online learning: A systems perspective. IEEE Systems Journal, 3(4), 469\u2013476.","journal-title":"IEEE Systems Journal"},{"key":"255_CR116","doi-asserted-by":"crossref","unstructured":"Monaco, J.V., Stewart, J.C., Cha, S.-H., & Tappert, C.C. (2013) Behavioral biometric verification of student identity in online course assessment and authentication of authors in literary works. In 2013 IEEE sixth international conference on biometrics: theory, applications and systems (BTAS), pp. 1\u20138. IEEE","DOI":"10.1109\/BTAS.2013.6712743"},{"key":"255_CR117","unstructured":"Mondal, S., & Bours, P. (2013) Continuous authentication using mouse dynamics. In 2013 International conference of the BIOSIG special interest group (BIOSIG), pp. 1\u201312. IEEE"},{"key":"255_CR118","unstructured":"Montebello, M. (2018) Ai injected e-learning. Springer International Publishing (745). Online verf\u00fcgbar unter https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-67928-0.pdf, zuletzt gepr\u00fcft am 19, 2018"},{"issue":"5","key":"255_CR119","doi-asserted-by":"publisher","first-page":"1","DOI":"10.14569\/IJACSA.2018.090512","volume":"9","author":"LK Musambo","year":"2018","unstructured":"Musambo, L. K., & Phiri, J. (2018). Student facial authentication model based on openCV\u2019s object detection method and QR code for Zambian higher institutions of learning. International Journal of Advanced Computer Science and Applications, 9(5), 1\u20137.","journal-title":"International Journal of Advanced Computer Science and Applications"},{"key":"255_CR120","doi-asserted-by":"publisher","first-page":"101027","DOI":"10.1016\/j.csl.2019.101027","volume":"60","author":"A Nagrani","year":"2020","unstructured":"Nagrani, A., Chung, J. S., Xie, W., & Zisserman, A. (2020). Voxceleb: Large-scale speaker verification in the wild. Computer Speech and Language, 60, 101027.","journal-title":"Computer Speech and Language"},{"key":"255_CR121","doi-asserted-by":"publisher","first-page":"19143","DOI":"10.1109\/ACCESS.2019.2896880","volume":"7","author":"AB Nassif","year":"2019","unstructured":"Nassif, A. B., Shahin, I., Attili, I., Azzeh, M., & Shaalan, K. (2019). Speech recognition using deep neural networks: A systematic review. IEEE Access, 7, 19143\u201319165.","journal-title":"IEEE Access"},{"issue":"2","key":"255_CR122","doi-asserted-by":"publisher","first-page":"15","DOI":"10.1080\/08923640009527052","volume":"14","author":"P Navarro","year":"2000","unstructured":"Navarro, P., & Shoemaker, J. (2000). Performance and perceptions of distance learners in cyberspace. American Journal of Distance Education, 14(2), 15\u201335.","journal-title":"American Journal of Distance Education"},{"key":"255_CR123","doi-asserted-by":"crossref","unstructured":"Nigam, A., Pasricha, R., Singh, T., & Churi, P. (2021) A systematic review on ai-based proctoring systems: Past, present and future. Education and Information Technologies, 1\u201325","DOI":"10.1007\/s10639-021-10597-x"},{"key":"255_CR124","unstructured":"Norris, M. (2019) University online cheating\u2013How to mitigate the damage. Research in Higher Education Journal, 37"},{"key":"255_CR125","unstructured":"O\u2019Reilly, G., & Creagh, J. (2016) A categorization of online proctoring. In: Global Learn, pp. 542\u2013552. Association for the Advancement of Computing in Education (AACE)"},{"issue":"2","key":"255_CR126","doi-asserted-by":"publisher","first-page":"438","DOI":"10.24036\/jelt.v9i2.109293","volume":"9","author":"M Okmawati","year":"2020","unstructured":"Okmawati, M. (2020). The use of google classroom during pandemic. Journal of English Language Teaching, 9(2), 438\u2013443.","journal-title":"Journal of English Language Teaching"},{"key":"255_CR127","unstructured":"Omar, A., & Abdul Razak, S. (2020) Remote learning in the time of covid-19: an interactive learning calculus ii for engineers (mat235) by using microsoft teams digital platform. In Virtual Symposium on Teaching and Learning (VSTL)."},{"issue":"1","key":"255_CR128","doi-asserted-by":"publisher","first-page":"1","DOI":"10.3390\/cryptography2010001","volume":"2","author":"A Ometov","year":"2018","unstructured":"Ometov, A., Bezzateev, S., M\u00e4kitalo, N., Andreev, S., Mikkonen, T., & Koucheryavy, Y. (2018). Multi-factor authentication: A survey. Cryptography, 2(1), 1.","journal-title":"Cryptography"},{"key":"255_CR129","doi-asserted-by":"crossref","unstructured":"Othman, A., & Callahan, J. (2018). The horcrux protocol: a method for decentralized biometric-based self-sovereign identity. In 2018 international joint conference on neural networks (IJCNN), pp. 1\u20137 IEEE","DOI":"10.1109\/IJCNN.2018.8489316"},{"key":"255_CR130","doi-asserted-by":"publisher","first-page":"7129505","DOI":"10.1155\/2017\/7129505","volume":"2017","author":"E Pagnin","year":"2017","unstructured":"Pagnin, E., & Mitrokotsa, A. (2017). Privacy-preserving biometric authentication: Challenges and directions. Security and Communication Networks, 2017, 7129505.","journal-title":"Security and Communication Networks"},{"key":"255_CR131","doi-asserted-by":"crossref","unstructured":"Pandey, R.K., Zhou, Y., Kota, B.U., & Govindaraju, V. (2016) Deep secure encoding for face template protection. In 2016 IEEE conference on computer vision and pattern recognition workshops (CVPRW), pp. 77\u201383. IEEE","DOI":"10.1109\/CVPRW.2016.17"},{"key":"255_CR132","doi-asserted-by":"crossref","unstructured":"Parkhi, O.M., Vedaldi, A., & Zisserman, A. (2015) Deep face recognition. In Proceedings of the British machine vision conference, pp. 41\u201314112","DOI":"10.5244\/C.29.41"},{"key":"255_CR133","unstructured":"Partners, I. (2021) Online exam proctoring market forecast to 2027 . https:\/\/www.marketwatch.com\/press-release\/online-exam-proctoring-market-size-and-growth-2021-2027-major-key-players-analysis-changing-trends-size-share-industry-development-opportunities-and-challenges-includes-covid-19-impact-analysis-2021-08-19. Accessed 2021-11-05"},{"key":"255_CR134","doi-asserted-by":"crossref","unstructured":"Peacocke, R.D., & Graf, D.H. (1995) An introduction to speech and speaker recognition. In Readings in human\u2013computer interaction, pp. 546\u2013553. Elsevier.","DOI":"10.1016\/B978-0-08-051574-8.50057-1"},{"issue":"2","key":"255_CR135","doi-asserted-by":"publisher","first-page":"91","DOI":"10.1049\/iet-bmt.2017.0065","volume":"7","author":"A Poddar","year":"2018","unstructured":"Poddar, A., Sahidullah, M., & Saha, G. (2018). Speaker verification with short utterances: A review of challenges, trends and opportunities. IET Biometrics, 7(2), 91\u2013101.","journal-title":"IET Biometrics"},{"issue":"1","key":"255_CR136","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1504\/IJBET.2020.110334","volume":"34","author":"A Prakash","year":"2020","unstructured":"Prakash, A., Krishnaveni, R., & Dhanalakshmi, R. (2020). Continuous user authentication using multimodal biometric traits with optimal feature level fusion. International Journal of Biomedical Engineering and Technology, 34(1), 1\u201319.","journal-title":"International Journal of Biomedical Engineering and Technology"},{"key":"255_CR137","doi-asserted-by":"publisher","unstructured":"Prathish, S., Narayanan, A., & Bijlani, K. (2016)An intelligent system for online exam monitoring. In 2016 International conference on information science (ICIS), pp. 138\u2013143. https:\/\/doi.org\/10.1109\/INFOSCI.2016.7845315","DOI":"10.1109\/INFOSCI.2016.7845315"},{"issue":"2","key":"255_CR138","doi-asserted-by":"publisher","first-page":"257","DOI":"10.1109\/5.18626","volume":"77","author":"LR Rabiner","year":"1989","unstructured":"Rabiner, L. R. (1989). A tutorial on hidden Markov models and selected applications in speech recognition. Proceedings of the IEEE, 77(2), 257\u2013286.","journal-title":"Proceedings of the IEEE"},{"issue":"4","key":"255_CR139","doi-asserted-by":"publisher","first-page":"561","DOI":"10.1109\/TPAMI.2007.1004","volume":"29","author":"NK Ratha","year":"2007","unstructured":"Ratha, N. K., Chikkerur, S., Connell, J. H., & Bolle, R. M. (2007). Generating cancelable fingerprint templates. IEEE Transactions on Pattern Analysis and Machine Intelligence, 29(4), 561\u2013572.","journal-title":"IEEE Transactions on Pattern Analysis and Machine Intelligence"},{"key":"255_CR140","doi-asserted-by":"crossref","unstructured":"Rathgeb, C., P\u00f6ppelmann, K., & Gonzalez-Sosa, E. (2020) Biometric technologies for elearning: State-of-the-art, issues and challenges. In 2020 18th International conference on emerging elearning technologies and applications (ICETA), pp. 558\u2013563. IEEE","DOI":"10.1109\/ICETA51985.2020.9379242"},{"key":"255_CR141","doi-asserted-by":"crossref","unstructured":"Ravanelli, M., & Bengio, Y. (2018) Speaker recognition from raw waveform with SINCNET. In 2018 IEEE spoken language technology workshop (SLT), pp. 1021\u20131028. IEEE","DOI":"10.1109\/SLT.2018.8639585"},{"issue":"4","key":"255_CR142","doi-asserted-by":"publisher","first-page":"501","DOI":"10.1109\/PROC.1976.10158","volume":"64","author":"DR Reddy","year":"1976","unstructured":"Reddy, D. R. (1976). Speech recognition by machine: A review. Proceedings of the IEEE, 64(4), 501\u2013531.","journal-title":"Proceedings of the IEEE"},{"key":"255_CR143","doi-asserted-by":"crossref","unstructured":"Rouhani, S., & Deters, R. (2019) Blockchain based access control systems: State of the art and challenges. In IEEE\/WIC\/ACM international conference on web intelligence, pp. 423\u2013428","DOI":"10.1145\/3350546.3352561"},{"key":"255_CR144","doi-asserted-by":"publisher","first-page":"5994","DOI":"10.1109\/ACCESS.2018.2889996","volume":"7","author":"Z Rui","year":"2018","unstructured":"Rui, Z., & Yan, Z. (2018). A survey on biometric authentication: Toward secure and privacy-preserving identification. IEEE Access, 7, 5994\u20136009.","journal-title":"IEEE Access"},{"issue":"2","key":"255_CR145","doi-asserted-by":"publisher","first-page":"176","DOI":"10.1109\/TASSP.1975.1162664","volume":"23","author":"M Sambur","year":"1975","unstructured":"Sambur, M. (1975). Selection of acoustic features for speaker identification. IEEE Transactions on Acoustics, Speech, and Signal Processing, 23(2), 176\u2013182.","journal-title":"IEEE Transactions on Acoustics, Speech, and Signal Processing"},{"key":"255_CR146","doi-asserted-by":"crossref","unstructured":"Sandnes, F.E., & Zhang, X. (2012) User identification based on touch dynamics. In 2012 9th international conference on ubiquitous intelligence and computing and 9th international conference on autonomic and trusted computing, pp. 256\u2013263. IEEE","DOI":"10.1109\/UIC-ATC.2012.45"},{"key":"255_CR147","doi-asserted-by":"crossref","unstructured":"Sarier, N.D. (2018). Privacy preserving biometric identification on the bitcoin blockchain. In International symposium on cyberspace safety and security, pp. 254\u2013269. Springer","DOI":"10.1007\/978-3-030-01689-0_20"},{"issue":"2","key":"255_CR148","doi-asserted-by":"publisher","first-page":"262","DOI":"10.1109\/JSYST.2012.2221932","volume":"7","author":"B Sayed","year":"2013","unstructured":"Sayed, B., Traor\u00e9, I., Woungang, I., & Obaidat, M. S. (2013). Biometric authentication using mouse gesture dynamics. IEEE Systems Journal, 7(2), 262\u2013274.","journal-title":"IEEE Systems Journal"},{"key":"255_CR149","unstructured":"Schleicher, A. (2021) The state of education - one year into COVID. https:\/\/oecdedutoday.com\/state-of-education-one-year-into-covid\/. [Online; Accessed Oct-01-2021]"},{"key":"255_CR150","doi-asserted-by":"crossref","unstructured":"Schroff, F., Kalenichenko, D., & Philbin, J. (2015). Facenet: A unified embedding for face recognition and clustering. In Proceedings of the IEEE conference on computer vision and pattern recognition, pp. 815\u2013823","DOI":"10.1109\/CVPR.2015.7298682"},{"key":"255_CR151","doi-asserted-by":"crossref","unstructured":"Selwyn, N., O\u2019Neill, C., Smith, G., Andrejevic, M., & Gu, X. (2021) A necessary evil? the rise of online exam proctoring in Australian universities. Media International Australia, 1329878\u2013211005862","DOI":"10.1177\/1329878X211005862"},{"key":"255_CR152","doi-asserted-by":"crossref","unstructured":"Seurin, M., Strub, F., Preux, P., & Pietquin, O. (2020) A machine of few words\u2013interactive speaker recognition with reinforcement learning. arXiv preprint arXiv:2008.03127","DOI":"10.21437\/Interspeech.2020-2892"},{"issue":"2","key":"255_CR153","doi-asserted-by":"publisher","first-page":"86","DOI":"10.1109\/MIC.2017.33","volume":"21","author":"M Shahzad","year":"2017","unstructured":"Shahzad, M., & Singh, M. P. (2017). Continuous authentication and authorization for the internet of things. IEEE Internet Computing, 21(2), 86\u201390.","journal-title":"IEEE Internet Computing"},{"issue":"1","key":"255_CR154","doi-asserted-by":"publisher","first-page":"16","DOI":"10.1109\/TIFS.2012.2223677","volume":"8","author":"C Shen","year":"2012","unstructured":"Shen, C., Cai, Z., Guan, X., Du, Y., & Maxion, R. A. (2012). User authentication through mouse dynamics. IEEE Transactions on Information Forensics and Security, 8(1), 16\u201330.","journal-title":"IEEE Transactions on Information Forensics and Security"},{"issue":"2","key":"255_CR155","doi-asserted-by":"publisher","first-page":"335","DOI":"10.1109\/TDSC.2017.2771295","volume":"17","author":"C Shen","year":"2017","unstructured":"Shen, C., Chen, Y., Guan, X., & Maxion, R. A. (2017). Pattern-growth based mining mouse-interaction behavior for an active user authentication system. IEEE Transactions on Dependable and Secure Computing, 17(2), 335\u2013349.","journal-title":"IEEE Transactions on Dependable and Secure Computing"},{"key":"255_CR157","doi-asserted-by":"crossref","unstructured":"Shen, C., Zhang, Y., Cai, Z., Yu, T., & Guan, X. (2015). Touch-interaction behavior for continuous user authentication on smartphones. In 2015 International conference on biometrics (ICB), pp. 157\u2013162 . IEEE","DOI":"10.1109\/ICB.2015.7139046"},{"issue":"3","key":"255_CR156","doi-asserted-by":"publisher","first-page":"498","DOI":"10.1109\/TIFS.2015.2503258","volume":"11","author":"C Shen","year":"2015","unstructured":"Shen, C., Zhang, Y., Guan, X., & Maxion, R. A. (2015). Performance analysis of touch-interaction behavior for active smartphone authentication. IEEE Transactions on Information Forensics and Security, 11(3), 498\u2013513.","journal-title":"IEEE Transactions on Information Forensics and Security"},{"key":"255_CR158","doi-asserted-by":"crossref","unstructured":"Shen, C., Cai, Z., & Guan, X. (2012) Continuous authentication for mouse dynamics: A pattern-growth approach. In IEEE\/IFIP International conference on dependable systems and networks (DSN 2012), pp. 1\u201312. IEEE","DOI":"10.1109\/DSN.2012.6263955"},{"key":"255_CR159","doi-asserted-by":"crossref","unstructured":"Shi, E., Niu, Y., Jakobsson, M., & Chow, R. (2010) Implicit authentication through learning user behavior. In International conference on information security, pp. 99\u2013113. Springer","DOI":"10.1007\/978-3-642-18178-8_9"},{"key":"255_CR160","doi-asserted-by":"crossref","unstructured":"Silva, H., Louren\u00e7o, A., Fred, A., & Filipe, J. (2011). Clinical data privacy and customization via biometrics based on ecg signals. In Symposium of the Austrian HCI and usability engineering group, pp. 121\u2013132. Springer","DOI":"10.1007\/978-3-642-25364-5_12"},{"key":"255_CR161","unstructured":"Simonyan, K., & Zisserman, A. (2015) Very deep convolutional networks for large-scale image recognition. In Proceedings of the international conference on learning representations (ICLR)."},{"issue":"06","key":"255_CR162","doi-asserted-by":"publisher","first-page":"4494","DOI":"10.35444\/IJANA.2020.11068","volume":"11","author":"P Sinha","year":"2020","unstructured":"Sinha, P., & Yadav, A. (2020). Remote proctored theory and objective online examination. International Journal of Advanced Networking and Applications, 11(06), 4494\u20134500.","journal-title":"International Journal of Advanced Networking and Applications"},{"issue":"1","key":"255_CR163","doi-asserted-by":"publisher","first-page":"56","DOI":"10.58729\/1941-6679.1445","volume":"29","author":"L Slusky","year":"2020","unstructured":"Slusky, L. (2020). Cybersecurity of online proctoring systems. Journal of International Technology and Information Management, 29(1), 56\u201383.","journal-title":"Journal of International Technology and Information Management"},{"issue":"2","key":"255_CR164","first-page":"196","volume":"4","author":"BS Stern","year":"2004","unstructured":"Stern, B. S. (2004). A comparison of online and face-to-face instruction in an undergraduate foundations of American education course. Contemporary Issues in Technology and Teacher Education, 4(2), 196\u2013213.","journal-title":"Contemporary Issues in Technology and Teacher Education"},{"key":"255_CR165","unstructured":"Stolcke, A., Shriberg, E., Ferrer, L., Kajarekar, S., Sonmez, K., & Tur, G. (2007) Speech recognition as feature extraction for speaker recognition. In 2007 IEEE workshop on signal processing applications for public security and forensics, pp. 1\u20135. IEEE"},{"key":"255_CR166","doi-asserted-by":"crossref","unstructured":"Taigman, Y., Yang, M., Ranzato, M.A., & Wolf, L. (2014) Deepface: Closing the gap to human-level performance in face verification. In Proceedings of the IEEE conference on computer vision and pattern recognition","DOI":"10.1109\/CVPR.2014.220"},{"issue":"12","key":"255_CR167","doi-asserted-by":"publisher","first-page":"1892","DOI":"10.1109\/TPAMI.2006.250","volume":"28","author":"AB Teoh","year":"2006","unstructured":"Teoh, A. B., Goh, A., & Ngo, D. C. (2006). Random multispace quantization as an analytic mechanism for biohashing of biometric and random identity inputs. IEEE Transactions on Pattern Analysis and Machine Intelligence, 28(12), 1892\u20131901.","journal-title":"IEEE Transactions on Pattern Analysis and Machine Intelligence"},{"key":"255_CR168","doi-asserted-by":"crossref","unstructured":"Tian, Y., Li, Y., Liu, X., Deng, R.H., & Sengupta, B. (2018) Pribioauth: Privacy-preserving biometric-based remote user authentication. In 2018 IEEE conference on dependable and secure computing (DSC), pp. 1\u20138 . IEEE","DOI":"10.1109\/DESEC.2018.8625169"},{"key":"255_CR169","doi-asserted-by":"publisher","first-page":"179","DOI":"10.1109\/OJCS.2021.3068385","volume":"2","author":"QN Tran","year":"2021","unstructured":"Tran, Q. N., Turnbull, B. P., & Hu, J. (2021). Biometrics and privacy-preservation: How do they evolve? IEEE Open Journal of the Computer Society, 2, 179\u2013191.","journal-title":"IEEE Open Journal of the Computer Society"},{"key":"255_CR170","doi-asserted-by":"publisher","first-page":"72","DOI":"10.1109\/OJCS.2021.3053032","volume":"2","author":"QN Tran","year":"2021","unstructured":"Tran, Q. N., Turnbull, B. P., Wu, H.-T., Silva, A., Kormusheva, K., & Hu, J. (2021). A survey on privacy-preserving blockchain systems (PPBS) and a novel PPBS-based framework for smart agriculture. IEEE Open Journal of the Computer Society, 2, 72\u201384.","journal-title":"IEEE Open Journal of the Computer Society"},{"key":"255_CR171","doi-asserted-by":"publisher","first-page":"1185","DOI":"10.1016\/j.chb.2015.02.014","volume":"55","author":"HM Truong","year":"2016","unstructured":"Truong, H. M. (2016). Integrating learning styles and adaptive e-learning system: Current developments, problems and opportunities. Computers in Human Behavior, 55, 1185\u20131193.","journal-title":"Computers in Human Behavior"},{"key":"255_CR172","doi-asserted-by":"crossref","unstructured":"Tse, K.-W., & Hung, K. (2019). Behavioral biometrics scheme with keystroke and swipe dynamics for user authentication on mobile platform. In 2019 IEEE 9th Symposium on Computer Applications and Industrial Electronics (ISCAIE), pp. 125\u2013130 . IEEE","DOI":"10.1109\/ISCAIE.2019.8743995"},{"issue":"1","key":"255_CR173","doi-asserted-by":"publisher","first-page":"71","DOI":"10.1162\/jocn.1991.3.1.71","volume":"3","author":"M Turk","year":"1991","unstructured":"Turk, M., & Pentland, A. (1991a). Eigenfaces for recognition. Journal of Cognitive Neuroscience, 3(1), 71\u201386. https:\/\/doi.org\/10.1162\/jocn.1991.3.1.71","journal-title":"Journal of Cognitive Neuroscience"},{"key":"255_CR174","unstructured":"Turk, M., & Pentland, A. (1991b) Face recognition using eigenfaces. In Proceedings of the IEEE conference on computer vision and pattern recognition, pp. 586\u2013591"},{"key":"255_CR175","doi-asserted-by":"crossref","unstructured":"Ullah, A., Xiao, H., & Barker, T. (2016). A classification of threats to remote online examinations. In 2016 IEEE 7th annual information technology, electronics and mobile communication conference (IEMCON), pp. 1\u20137 . IEEE","DOI":"10.1109\/IEMCON.2016.7746085"},{"issue":"6","key":"255_CR176","doi-asserted-by":"publisher","first-page":"948","DOI":"10.1109\/JPROC.2004.827372","volume":"92","author":"U Uludag","year":"2004","unstructured":"Uludag, U., Pankanti, S., Prabhakar, S., & Jain, A. K. (2004). Biometric cryptosystems: Issues and challenges. Proceedings of the IEEE, 92(6), 948\u2013960.","journal-title":"Proceedings of the IEEE"},{"issue":"3","key":"255_CR177","first-page":"88","volume":"6","author":"J Vajpai","year":"2016","unstructured":"Vajpai, J., & Bora, A. (2016). Industrial applications of automatic speech recognition systems. International Journal of Engineering Research and Applications, 6(3), 88\u201395.","journal-title":"International Journal of Engineering Research and Applications"},{"issue":"1","key":"255_CR99","doi-asserted-by":"publisher","first-page":"19","DOI":"10.1016\/S0095-4470(19)30723-5","volume":"13","author":"D Van Lancker","year":"1985","unstructured":"Van Lancker, D., Kreiman, J., & Emmorey, K. (1985). Familiar voice recognition: patterns and parameters part I: Recognition of backward voices. Journal of Phonetics, 13(1), 19\u201338.","journal-title":"Journal of Phonetics"},{"key":"255_CR178","unstructured":"Vicens, P. (1969). Aspects of speech recognition by computer. PhD thesis, Stanford University."},{"key":"255_CR179","doi-asserted-by":"crossref","unstructured":"Villa, M., Gofman, M., Mitra, S., Almadan, A., Krishnan, A., & Rattani, A. A survey of biometric and machine learning methods for tracking students\u2019 attention and engagement. In 2020 19th IEEE international conference on machine learning and applications (ICMLA), pp. 948\u2013955 (2020). IEEE","DOI":"10.1109\/ICMLA51294.2020.00154"},{"key":"255_CR180","unstructured":"Waibel, A., & Lee, K.-F. (1990) Readings in speech recognition. Morgan Kaufmann."},{"key":"255_CR181","doi-asserted-by":"crossref","unstructured":"Wan, V., & Carmichael, J. (2005) Polynomial dynamic time warping kernel support vector machines for dysarthric speech recognition with sparse training data. In Ninth European conference on speech communication and technology","DOI":"10.21437\/Interspeech.2005-853"},{"key":"255_CR182","doi-asserted-by":"publisher","DOI":"10.1016\/j.compedu.2020.103818","volume":"149","author":"AI Wang","year":"2020","unstructured":"Wang, A. I., & Tahir, R. (2020). The effect of using kahoot! for learning\u2014A literature review. Computers and Education, 149, 103818. https:\/\/doi.org\/10.1016\/j.compedu.2020.103818","journal-title":"Computers and Education"},{"key":"255_CR183","doi-asserted-by":"crossref","unstructured":"Wang, F., Xiang, X., Cheng, J., & Yuille, A.L. (2017). Normface: L2 hypersphere embedding for face verification. arXiv preprint arXiv:1704.06369","DOI":"10.1145\/3123266.3123359"},{"key":"255_CR184","doi-asserted-by":"crossref","unstructured":"Wen, Y., Zhang, K., Li, Z., & Qiao, Y. (2016) A discriminative feature learning approach for deep face recognition. In Proceedings of the European conference on computer vision, pp. 499\u2013515","DOI":"10.1007\/978-3-319-46478-7_31"},{"issue":"2","key":"255_CR185","doi-asserted-by":"publisher","first-page":"210","DOI":"10.1109\/TPAMI.2008.79","volume":"31","author":"J Wright","year":"2009","unstructured":"Wright, J., Yang, A., Ganesh, A., Sastry, S. S., & Yi, M. (2009). Robust face recognition via sparse representation. IEEE Transactions on Pattern Analysis and Machine Intelligence, 31(2), 210\u2013227.","journal-title":"IEEE Transactions on Pattern Analysis and Machine Intelligence"},{"key":"255_CR186","doi-asserted-by":"crossref","unstructured":"Yang, M., Zhang, L., Yang, J., & Zhang, D. (2011) Robust sparse coding for face recognition. In Proceedings of the IEEE conference on computer vision and pattern recognition, pp. 625\u2013632","DOI":"10.1109\/CVPR.2011.5995393"},{"key":"255_CR195","unstructured":"Yi, D., Lei, Z., Liao, S., & Li, S.Z. (2014) Learning face representation from scratch. arXiv preprint arXiv:1411.7923"},{"key":"255_CR187","doi-asserted-by":"crossref","unstructured":"Yu, D., & Deng, L. (2016) Automatic speech recognition. Springer.","DOI":"10.1007\/978-1-4471-5779-3"},{"issue":"6","key":"255_CR188","doi-asserted-by":"publisher","first-page":"791","DOI":"10.1111\/ipd.12648","volume":"30","author":"S Zafar","year":"2020","unstructured":"Zafar, S., Lai, Y., Sexton, C., & Siddiqi, A. (2020). Virtual reality as a novel educational tool in pre-clinical paediatric dentistry training: Students\u2019 perceptions. International Journal of Paediatric Dentistry, 30(6), 791\u2013797. https:\/\/doi.org\/10.1111\/ipd.12648","journal-title":"International Journal of Paediatric Dentistry"},{"key":"255_CR192","unstructured":"Zhang, L., Yang, M., & Feng, X. (2011) Sparse representation or collaborative representation: Which helps face recognition? In Proceedings of the IEEE international conference on computer vision, pp. 471\u2013478"},{"issue":"3","key":"255_CR189","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/3316481","volume":"52","author":"R Zhang","year":"2019","unstructured":"Zhang, R., Xue, R., & Liu, L. (2019). Security and privacy on blockchain. ACM Computing Surveys (CSUR), 52(3), 1\u201334.","journal-title":"ACM Computing Surveys (CSUR)"},{"key":"255_CR190","unstructured":"Zhang, Y., & Liu, L. (2018). Using computer speech recognition technology to evaluate spoken English. Educational Sciences: Theory & Practice, 18(5)."},{"key":"255_CR191","unstructured":"Zhang, Z., Zhang, M., Chang, Y., Esche, S.K., & Chassapis, C. (2016). A virtual laboratory system with biometric authentication and remote proctoring based on facial recognition. In 2016 ASEE Annual conference and exposition"},{"issue":"3","key":"255_CR193","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/2893185","volume":"18","author":"N Zheng","year":"2016","unstructured":"Zheng, N., Paloski, A., & Wang, H. (2016). An efficient user verification system using angle-based mouse movement biometrics. ACM Transactions on Information and System Security (TISSEC), 18(3), 1\u201327.","journal-title":"ACM Transactions on Information and System Security (TISSEC)"},{"key":"255_CR194","doi-asserted-by":"crossref","unstructured":"Zheng, J., Chen, J.-C., Bodla, N., Patel, V.M., & Chellappa, R. (2016) Vlad encoded deep convolutional features for unconstrained face verification. In Proceedings of the IEEE international conference on pattern recognition","DOI":"10.1109\/ICIP.2016.7532906"}],"container-title":["Smart Learning Environments"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1186\/s40561-023-00255-9.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1186\/s40561-023-00255-9\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1186\/s40561-023-00255-9.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,7,26]],"date-time":"2023-07-26T08:04:52Z","timestamp":1690358692000},"score":1,"resource":{"primary":{"URL":"https:\/\/slejournal.springeropen.com\/articles\/10.1186\/s40561-023-00255-9"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,7,26]]},"references-count":195,"journal-issue":{"issue":"1","published-online":{"date-parts":[[2023,12]]}},"alternative-id":["255"],"URL":"https:\/\/doi.org\/10.1186\/s40561-023-00255-9","relation":{},"ISSN":["2196-7091"],"issn-type":[{"value":"2196-7091","type":"electronic"}],"subject":[],"published":{"date-parts":[[2023,7,26]]},"assertion":[{"value":"9 May 2023","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"16 July 2023","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"26 July 2023","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"This article does not contain any studies with human participants or animals performed by any of the authors","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Ethics approval and consent to participate"}},{"value":"The authors declare that they have no conflict of interest.","order":3,"name":"Ethics","group":{"name":"EthicsHeading","label":"Competing interests"}}],"article-number":"38"}}