{"id":"https://openalex.org/W2187703332","doi":"https://doi.org/10.1007/978-3-319-24369-6_18","title":"U-Stroke Pattern Modeling for End User Identity Verification Through Ubiquitous Input Device","display_name":"U-Stroke Pattern Modeling for End User Identity Verification Through Ubiquitous Input Device","publication_year":2015,"publication_date":"2015-01-01","ids":{"openalex":"https://openalex.org/W2187703332","doi":"https://doi.org/10.1007/978-3-319-24369-6_18","mag":"2187703332"},"language":"en","primary_location":{"id":"doi:10.1007/978-3-319-24369-6_18","is_oa":false,"landing_page_url":"https://doi.org/10.1007/978-3-319-24369-6_18","pdf_url":null,"source":{"id":"https://openalex.org/S106296714","display_name":"Lecture notes in computer science","issn_l":"0302-9743","issn":["0302-9743","1611-3349"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319900","host_organization_name":"Springer Science+Business Media","host_organization_lineage":["https://openalex.org/P4310319900","https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Science+Business Media","Springer Nature"],"type":"book series"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Lecture Notes in Computer Science","raw_type":"book-chapter"},"type":"book-chapter","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"gold","oa_url":"https://inria.hal.science/hal-01444467","any_repository_has_fulltext":null},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5058382805","display_name":"Tapalina Bhattasali","orcid":null},"institutions":[{"id":"https://openalex.org/I106542073","display_name":"University of Calcutta","ror":"https://ror.org/01e7v7w47","country_code":"IN","type":"education","lineage":["https://openalex.org/I106542073"]}],"countries":["IN"],"is_corresponding":true,"raw_author_name":"Tapalina Bhattasali","raw_affiliation_strings":["Department of Computer Science & Engineering, University of Calcutta, Kolkata, India"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science & Engineering, University of Calcutta, Kolkata, India","institution_ids":["https://openalex.org/I106542073"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5001172312","display_name":"Nabendu Chaki","orcid":"https://orcid.org/0000-0003-3242-680X"},"institutions":[{"id":"https://openalex.org/I106542073","display_name":"University of Calcutta","ror":"https://ror.org/01e7v7w47","country_code":"IN","type":"education","lineage":["https://openalex.org/I106542073"]}],"countries":["IN"],"is_corresponding":false,"raw_author_name":"Nabendu Chaki","raw_affiliation_strings":["Department of Computer Science & Engineering, University of Calcutta, Kolkata, India"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science & Engineering, University of Calcutta, Kolkata, India","institution_ids":["https://openalex.org/I106542073"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5084828574","display_name":"Khalid Saeed","orcid":"https://orcid.org/0000-0002-7741-7045"},"institutions":[{"id":"https://openalex.org/I1323121030","display_name":"Bialystok University of Technology","ror":"https://ror.org/02bzfsy61","country_code":"PL","type":"education","lineage":["https://openalex.org/I1323121030"]}],"countries":["PL"],"is_corresponding":false,"raw_author_name":"Khalid Saeed","raw_affiliation_strings":["Faculty of Computer Science, Bialystok University of Technology, BIALYSTOK, Poland","Faculty of Computer Science, Bialystok University of Technology, Bialystok, Poland"],"affiliations":[{"raw_affiliation_string":"Faculty of Computer Science, Bialystok University of Technology, BIALYSTOK, Poland","institution_ids":["https://openalex.org/I1323121030"]},{"raw_affiliation_string":"Faculty of Computer Science, Bialystok University of Technology, Bialystok, Poland","institution_ids":["https://openalex.org/I1323121030"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5082851518","display_name":"Rituparna Chaki","orcid":"https://orcid.org/0000-0003-1060-5778"},"institutions":[{"id":"https://openalex.org/I106542073","display_name":"University of Calcutta","ror":"https://ror.org/01e7v7w47","country_code":"IN","type":"education","lineage":["https://openalex.org/I106542073"]}],"countries":["IN"],"is_corresponding":false,"raw_author_name":"Rituparna Chaki","raw_affiliation_strings":["A.K.Choudhury School of Information Technology, University of Calcutta, Kolkata, India"],"affiliations":[{"raw_affiliation_string":"A.K.Choudhury School of Information Technology, University of Calcutta, Kolkata, India","institution_ids":["https://openalex.org/I106542073"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5058382805"],"corresponding_institution_ids":["https://openalex.org/I106542073"],"apc_list":{"value":5000,"currency":"EUR","value_usd":5392},"apc_paid":{"value":5000,"currency":"EUR","value_usd":5392},"fwci":0.5705,"has_fulltext":false,"cited_by_count":2,"citation_normalized_percentile":{"value":0.66145497,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":94},"biblio":{"volume":null,"issue":null,"first_page":"219","last_page":"230"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11800","display_name":"User Authentication and Security Systems","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11800","display_name":"User Authentication and Security Systems","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12607","display_name":"Personal Information Management and User Behavior","score":0.9751999974250793,"subfield":{"id":"https://openalex.org/subfields/1802","display_name":"Information Systems and Management"},"field":{"id":"https://openalex.org/fields/18","display_name":"Decision Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},{"id":"https://openalex.org/T10803","display_name":"Innovative Human-Technology Interaction","score":0.9570000171661377,"subfield":{"id":"https://openalex.org/subfields/1709","display_name":"Human-Computer Interaction"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8814258575439453},{"id":"https://openalex.org/keywords/human\u2013computer-interaction","display_name":"Human\u2013computer interaction","score":0.5991265177726746},{"id":"https://openalex.org/keywords/identity","display_name":"Identity (music)","score":0.5688890218734741},{"id":"https://openalex.org/keywords/domain","display_name":"Domain (mathematical analysis)","score":0.5588353872299194},{"id":"https://openalex.org/keywords/ubiquitous-computing","display_name":"Ubiquitous computing","score":0.5536881685256958},{"id":"https://openalex.org/keywords/process","display_name":"Process (computing)","score":0.5050986409187317},{"id":"https://openalex.org/keywords/behavioral-modeling","display_name":"Behavioral modeling","score":0.5033048987388611},{"id":"https://openalex.org/keywords/end-user","display_name":"End user","score":0.45310279726982117},{"id":"https://openalex.org/keywords/behavioral-pattern","display_name":"Behavioral pattern","score":0.4488832354545593},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.22585302591323853},{"id":"https://openalex.org/keywords/world-wide-web","display_name":"World Wide Web","score":0.14529788494110107},{"id":"https://openalex.org/keywords/software-engineering","display_name":"Software engineering","score":0.13041937351226807}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8814258575439453},{"id":"https://openalex.org/C107457646","wikidata":"https://www.wikidata.org/wiki/Q207434","display_name":"Human\u2013computer interaction","level":1,"score":0.5991265177726746},{"id":"https://openalex.org/C2778355321","wikidata":"https://www.wikidata.org/wiki/Q17079427","display_name":"Identity (music)","level":2,"score":0.5688890218734741},{"id":"https://openalex.org/C36503486","wikidata":"https://www.wikidata.org/wiki/Q11235244","display_name":"Domain (mathematical analysis)","level":2,"score":0.5588353872299194},{"id":"https://openalex.org/C172195944","wikidata":"https://www.wikidata.org/wiki/Q541265","display_name":"Ubiquitous computing","level":2,"score":0.5536881685256958},{"id":"https://openalex.org/C98045186","wikidata":"https://www.wikidata.org/wiki/Q205663","display_name":"Process (computing)","level":2,"score":0.5050986409187317},{"id":"https://openalex.org/C78639753","wikidata":"https://www.wikidata.org/wiki/Q3318160","display_name":"Behavioral modeling","level":2,"score":0.5033048987388611},{"id":"https://openalex.org/C91262260","wikidata":"https://www.wikidata.org/wiki/Q528074","display_name":"End user","level":2,"score":0.45310279726982117},{"id":"https://openalex.org/C83804111","wikidata":"https://www.wikidata.org/wiki/Q1063558","display_name":"Behavioral pattern","level":2,"score":0.4488832354545593},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.22585302591323853},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.14529788494110107},{"id":"https://openalex.org/C115903868","wikidata":"https://www.wikidata.org/wiki/Q80993","display_name":"Software engineering","level":1,"score":0.13041937351226807},{"id":"https://openalex.org/C24890656","wikidata":"https://www.wikidata.org/wiki/Q82811","display_name":"Acoustics","level":1,"score":0.0},{"id":"https://openalex.org/C134306372","wikidata":"https://www.wikidata.org/wiki/Q7754","display_name":"Mathematical analysis","level":1,"score":0.0},{"id":"https://openalex.org/C121332964","wikidata":"https://www.wikidata.org/wiki/Q413","display_name":"Physics","level":0,"score":0.0},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.0},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.0}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1007/978-3-319-24369-6_18","is_oa":false,"landing_page_url":"https://doi.org/10.1007/978-3-319-24369-6_18","pdf_url":null,"source":{"id":"https://openalex.org/S106296714","display_name":"Lecture notes in computer science","issn_l":"0302-9743","issn":["0302-9743","1611-3349"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319900","host_organization_name":"Springer Science+Business Media","host_organization_lineage":["https://openalex.org/P4310319900","https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Science+Business Media","Springer Nature"],"type":"book series"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Lecture Notes in Computer Science","raw_type":"book-chapter"},{"id":"pmh:oai:HAL:hal-01444467v1","is_oa":true,"landing_page_url":"https://inria.hal.science/hal-01444467","pdf_url":null,"source":null,"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"14th Computer Information Systems and Industrial Management (CISIM), Sep 2015, Warsaw, Poland. pp.219-230, &#x27E8;10.1007/978-3-319-24369-6_18&#x27E9;","raw_type":"Conference papers"}],"best_oa_location":{"id":"pmh:oai:HAL:hal-01444467v1","is_oa":true,"landing_page_url":"https://inria.hal.science/hal-01444467","pdf_url":null,"source":null,"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"14th Computer Information Systems and Industrial Management (CISIM), Sep 2015, Warsaw, Poland. pp.219-230, &#x27E8;10.1007/978-3-319-24369-6_18&#x27E9;","raw_type":"Conference papers"},"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":15,"referenced_works":["https://openalex.org/W241814209","https://openalex.org/W655303773","https://openalex.org/W1591491921","https://openalex.org/W1976081290","https://openalex.org/W2017658349","https://openalex.org/W2038790378","https://openalex.org/W2055389916","https://openalex.org/W2056706392","https://openalex.org/W2090465075","https://openalex.org/W2098924240","https://openalex.org/W2102932275","https://openalex.org/W2146995712","https://openalex.org/W2149019984","https://openalex.org/W2151854612","https://openalex.org/W2535614671"],"related_works":["https://openalex.org/W2152238375","https://openalex.org/W3088948716","https://openalex.org/W432535052","https://openalex.org/W4210491229","https://openalex.org/W4384559558","https://openalex.org/W4285612255","https://openalex.org/W2075878881","https://openalex.org/W2013973943","https://openalex.org/W2354206928","https://openalex.org/W2151997734"],"abstract_inverted_index":{"Identity":[0],"verification":[1],"on":[2,63,141],"ubiquitous":[3,106],"input":[4,103],"devices":[5,104],"is":[6,23,41,94,121],"a":[7],"major":[8],"concern":[9],"to":[10,25,42,80,84,96,110,123,128,144],"validate":[11],"end-users,":[12],"because":[13],"of":[14,16,38,46,71,113,137],"mobility":[15],"the":[17,69],"devices.":[18],"User":[19],"device":[20,32,51],"interaction":[21],"(UDI)":[22],"capable":[24],"capture":[26,97],"end-users\u2019":[27],"behavioral":[28,98],"nature":[29],"from":[30,49,68,101],"their":[31,146],"usage":[33,47,70],"pattern.":[34],"The":[35],"primary":[36],"goal":[37],"this":[39,90,142,149],"paper":[40],"collect":[43],"heterogeneous":[44],"parameters":[45,76],"patterns":[48],"any":[50],"and":[52,118],"build":[53],"personal":[54],"profile":[55,83],"with":[56],"good-recognition":[57],"capability.":[58],"This":[59,132],"work":[60],"mainly":[61,100],"focuses":[62],"finding":[64],"multiple":[65],"features":[66],"captured":[67],"smart":[72,102],"devices;":[73],"so":[74],"that":[75],"could":[77],"be":[78],"used":[79],"compose":[81],"hybrid":[82],"verify":[85,129],"end-":[86],"users":[87],"accurately.":[88],"In":[89,108],"paper,":[91],"U-Stroke":[92,125],"modeling":[93],"proposed":[95,122],"data":[99,126],"in":[105],"environment.":[107],"addition":[109],"this,":[111],"concept":[112],"CCDA":[114],"(capture,":[115],"checking,":[116],"decision,":[117],"action)":[119],"model":[120],"process":[124],"efficiently":[127],"end-user\u2019s":[130],"identity.":[131],"proposal":[133],"can":[134],"draw":[135],"attention":[136],"many":[138],"researchers":[139],"working":[140],"domain":[143],"extend":[145],"research":[147],"towards":[148],"direction.":[150]},"counts_by_year":[{"year":2021,"cited_by_count":1},{"year":2015,"cited_by_count":1}],"updated_date":"2026-03-10T16:38:18.471706","created_date":"2025-10-10T00:00:00"}
