{"id":"https://openalex.org/W4362683536","doi":"https://doi.org/10.1109/access.2023.3265357","title":"Benchmarking Neural Network Compression Techniques for Ocular-Based User Authentication on Smartphones","display_name":"Benchmarking Neural Network Compression Techniques for Ocular-Based User Authentication on Smartphones","publication_year":2023,"publication_date":"2023-01-01","ids":{"openalex":"https://openalex.org/W4362683536","doi":"https://doi.org/10.1109/access.2023.3265357"},"language":"en","primary_location":{"id":"doi:10.1109/access.2023.3265357","is_oa":true,"landing_page_url":"https://doi.org/10.1109/access.2023.3265357","pdf_url":"https://ieeexplore.ieee.org/ielx7/6287639/6514899/10093861.pdf","source":{"id":"https://openalex.org/S2485537415","display_name":"IEEE Access","issn_l":"2169-3536","issn":["2169-3536"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Access","raw_type":"journal-article"},"type":"article","indexed_in":["crossref","doaj"],"open_access":{"is_oa":true,"oa_status":"gold","oa_url":"https://ieeexplore.ieee.org/ielx7/6287639/6514899/10093861.pdf","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5010636743","display_name":"Ali Almadan","orcid":"https://orcid.org/0000-0003-0649-1229"},"institutions":[{"id":"https://openalex.org/I39587148","display_name":"Wichita State University","ror":"https://ror.org/00c4e7y75","country_code":"US","type":"education","lineage":["https://openalex.org/I39587148"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Ali Almadan","raw_affiliation_strings":["School of Computing, Wichita State University, Wichita, KS, USA"],"affiliations":[{"raw_affiliation_string":"School of Computing, Wichita State University, Wichita, KS, USA","institution_ids":["https://openalex.org/I39587148"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5081904333","display_name":"Ajita Rattani","orcid":"https://orcid.org/0000-0002-1541-8202"},"institutions":[{"id":"https://openalex.org/I39587148","display_name":"Wichita State University","ror":"https://ror.org/00c4e7y75","country_code":"US","type":"education","lineage":["https://openalex.org/I39587148"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Ajita Rattani","raw_affiliation_strings":["School of Computing, Wichita State University, Wichita, KS, USA"],"affiliations":[{"raw_affiliation_string":"School of Computing, Wichita State University, Wichita, KS, USA","institution_ids":["https://openalex.org/I39587148"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5010636743"],"corresponding_institution_ids":["https://openalex.org/I39587148"],"apc_list":{"value":1850,"currency":"USD","value_usd":1850},"apc_paid":{"value":1850,"currency":"USD","value_usd":1850},"fwci":1.8116,"has_fulltext":true,"cited_by_count":9,"citation_normalized_percentile":{"value":0.85543586,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":94,"max":99},"biblio":{"volume":"11","issue":null,"first_page":"36550","last_page":"36565"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10828","display_name":"Biometric Identification and Security","score":0.9987000226974487,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10828","display_name":"Biometric Identification and Security","score":0.9987000226974487,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11800","display_name":"User Authentication and Security Systems","score":0.9984999895095825,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11448","display_name":"Face recognition and analysis","score":0.9970999956130981,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8434563875198364},{"id":"https://openalex.org/keywords/authentication","display_name":"Authentication (law)","score":0.6145347356796265},{"id":"https://openalex.org/keywords/mobile-device","display_name":"Mobile device","score":0.6139481067657471},{"id":"https://openalex.org/keywords/biometrics","display_name":"Biometrics","score":0.5630577206611633},{"id":"https://openalex.org/keywords/benchmarking","display_name":"Benchmarking","score":0.4927268326282501},{"id":"https://openalex.org/keywords/software-deployment","display_name":"Software deployment","score":0.4599989354610443},{"id":"https://openalex.org/keywords/embedded-system","display_name":"Embedded system","score":0.34410157799720764},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.3182982802391052},{"id":"https://openalex.org/keywords/world-wide-web","display_name":"World Wide Web","score":0.20045432448387146},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.11199533939361572}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8434563875198364},{"id":"https://openalex.org/C148417208","wikidata":"https://www.wikidata.org/wiki/Q4825882","display_name":"Authentication (law)","level":2,"score":0.6145347356796265},{"id":"https://openalex.org/C186967261","wikidata":"https://www.wikidata.org/wiki/Q5082128","display_name":"Mobile device","level":2,"score":0.6139481067657471},{"id":"https://openalex.org/C184297639","wikidata":"https://www.wikidata.org/wiki/Q177765","display_name":"Biometrics","level":2,"score":0.5630577206611633},{"id":"https://openalex.org/C86251818","wikidata":"https://www.wikidata.org/wiki/Q816754","display_name":"Benchmarking","level":2,"score":0.4927268326282501},{"id":"https://openalex.org/C105339364","wikidata":"https://www.wikidata.org/wiki/Q2297740","display_name":"Software deployment","level":2,"score":0.4599989354610443},{"id":"https://openalex.org/C149635348","wikidata":"https://www.wikidata.org/wiki/Q193040","display_name":"Embedded system","level":1,"score":0.34410157799720764},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.3182982802391052},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.20045432448387146},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.11199533939361572},{"id":"https://openalex.org/C144133560","wikidata":"https://www.wikidata.org/wiki/Q4830453","display_name":"Business","level":0,"score":0.0},{"id":"https://openalex.org/C162853370","wikidata":"https://www.wikidata.org/wiki/Q39809","display_name":"Marketing","level":1,"score":0.0}],"mesh":[],"locations_count":3,"locations":[{"id":"doi:10.1109/access.2023.3265357","is_oa":true,"landing_page_url":"https://doi.org/10.1109/access.2023.3265357","pdf_url":"https://ieeexplore.ieee.org/ielx7/6287639/6514899/10093861.pdf","source":{"id":"https://openalex.org/S2485537415","display_name":"IEEE Access","issn_l":"2169-3536","issn":["2169-3536"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Access","raw_type":"journal-article"},{"id":"pmh:oai:doaj.org/article:c4ffccfd8bbd42ddbaef6b50d12a9a5e","is_oa":true,"landing_page_url":"https://doaj.org/article/c4ffccfd8bbd42ddbaef6b50d12a9a5e","pdf_url":null,"source":{"id":"https://openalex.org/S112646816","display_name":"SHILAP Revista de lepidopterolog\u00eda","issn_l":"0300-5267","issn":["0300-5267","2340-4078"],"is_oa":true,"is_in_doaj":true,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"IEEE Access, Vol 11, Pp 36550-36565 (2023)","raw_type":"article"},{"id":"pmh:oai:soar.wichita.edu:10057/25190","is_oa":false,"landing_page_url":"https://doi.org/10.1109/ACCESS.2023.3265357","pdf_url":null,"source":{"id":"https://openalex.org/S4306401479","display_name":"Holmes Museum Of Anthropology (Wichita State University)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I39587148","host_organization_name":"Wichita State University","host_organization_lineage":["https://openalex.org/I39587148"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":null,"raw_type":"Article"}],"best_oa_location":{"id":"doi:10.1109/access.2023.3265357","is_oa":true,"landing_page_url":"https://doi.org/10.1109/access.2023.3265357","pdf_url":"https://ieeexplore.ieee.org/ielx7/6287639/6514899/10093861.pdf","source":{"id":"https://openalex.org/S2485537415","display_name":"IEEE Access","issn_l":"2169-3536","issn":["2169-3536"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Access","raw_type":"journal-article"},"sustainable_development_goals":[{"display_name":"Industry, innovation and infrastructure","score":0.47999998927116394,"id":"https://metadata.un.org/sdg/9"}],"awards":[{"id":"https://openalex.org/G1486542917","display_name":null,"funder_award_id":"2129173","funder_id":"https://openalex.org/F4320306076","funder_display_name":"National Science Foundation"},{"id":"https://openalex.org/G7548903914","display_name":null,"funder_award_id":"13106715","funder_id":"https://openalex.org/F4320338279","funder_display_name":"Air Force Office of Scientific Research"},{"id":"https://openalex.org/G848032724","display_name":null,"funder_award_id":"Science","funder_id":"https://openalex.org/F4320306076","funder_display_name":"National Science Foundation"}],"funders":[{"id":"https://openalex.org/F4320306076","display_name":"National Science Foundation","ror":"https://ror.org/021nxhr62"},{"id":"https://openalex.org/F4320338279","display_name":"Air Force Office of Scientific Research","ror":"https://ror.org/011e9bt93"}],"has_content":{"grobid_xml":true,"pdf":true},"content_urls":{"pdf":"https://content.openalex.org/works/W4362683536.pdf","grobid_xml":"https://content.openalex.org/works/W4362683536.grobid-xml"},"referenced_works_count":62,"referenced_works":["https://openalex.org/W1821462560","https://openalex.org/W2025713906","https://openalex.org/W2066593954","https://openalex.org/W2097533491","https://openalex.org/W2194775991","https://openalex.org/W2285660444","https://openalex.org/W2510901370","https://openalex.org/W2518827115","https://openalex.org/W2559991176","https://openalex.org/W2618862270","https://openalex.org/W2625717657","https://openalex.org/W2767420072","https://openalex.org/W2787401793","https://openalex.org/W2794995117","https://openalex.org/W2818972839","https://openalex.org/W2899788029","https://openalex.org/W2903772286","https://openalex.org/W2951496350","https://openalex.org/W2960833983","https://openalex.org/W2962814013","https://openalex.org/W2963122961","https://openalex.org/W2963140444","https://openalex.org/W2963363373","https://openalex.org/W2963466847","https://openalex.org/W2966086598","https://openalex.org/W2970601456","https://openalex.org/W3006153529","https://openalex.org/W3034368386","https://openalex.org/W3034674511","https://openalex.org/W3042445177","https://openalex.org/W3048254275","https://openalex.org/W3086811561","https://openalex.org/W3097522836","https://openalex.org/W3098486933","https://openalex.org/W3131902737","https://openalex.org/W3131958287","https://openalex.org/W3133760384","https://openalex.org/W3138154797","https://openalex.org/W3172509895","https://openalex.org/W3176479301","https://openalex.org/W3177265267","https://openalex.org/W3206198693","https://openalex.org/W4214820905","https://openalex.org/W4287828539","https://openalex.org/W4297810220","https://openalex.org/W4307645506","https://openalex.org/W6637373629","https://openalex.org/W6687785706","https://openalex.org/W6748035112","https://openalex.org/W6749717203","https://openalex.org/W6755034786","https://openalex.org/W6774302960","https://openalex.org/W6776320331","https://openalex.org/W6779813529","https://openalex.org/W6784155338","https://openalex.org/W6784617295","https://openalex.org/W6787116130","https://openalex.org/W6789080154","https://openalex.org/W6790171490","https://openalex.org/W6791940793","https://openalex.org/W6792510010","https://openalex.org/W6810281471"],"related_works":["https://openalex.org/W4238897586","https://openalex.org/W435179959","https://openalex.org/W2619091065","https://openalex.org/W2059640416","https://openalex.org/W1490753184","https://openalex.org/W2284465472","https://openalex.org/W2291782699","https://openalex.org/W1993948687","https://openalex.org/W2000169967","https://openalex.org/W3104966193"],"abstract_inverted_index":{"With":[0],"the":[1,12,95,119,163,186,205],"unprecedented":[2],"mobile":[3,6,89],"technology":[4],"revolution,":[5],"devices":[7],"have":[8,93,142],"transcended":[9],"from":[10,75],"being":[11],"primary":[13],"means":[14],"of":[15,25,38,80,86,97,121,140,162,207],"communication":[16],"to":[17,118,150],"an":[18,22],"all-in-one":[19],"platform.":[20],"Consequently,":[21],"increasing":[23],"number":[24],"individuals":[26],"are":[27],"accessing":[28],"online":[29],"services":[30],"for":[31,63,101,145,176,211,219],"e-commerce":[32],"and":[33,66,77,84,114,123,173,198,214],"banking":[34],"via":[35],"smartphones":[36,43,133],"instead":[37],"traditional":[39],"desktop":[40],"computers.":[41],"However,":[42,107],"can":[44],"be":[45],"easily":[46],"misplaced,":[47],"lost,":[48],"or":[49],"stolen":[50],"more":[51],"often":[52],"than":[53],"other":[54],"computing":[55],"devices,":[56],"thereby":[57],"demanding":[58],"effective":[59],"user":[60,103,178,221],"authentication":[61,104,222],"mechanisms":[62],"device":[64],"unlocking":[65],"secured":[67],"transactions.":[68],"Ocular":[69],"biometrics":[70],"has":[71],"obtained":[72],"significant":[73],"attention":[74],"academia":[76],"industry":[78],"because":[79],"its":[81],"accuracy,":[82],"security,":[83],"ease":[85],"use":[87],"in":[88,174,216],"devices.":[90],"Several":[91],"studies":[92,141],"demonstrated":[94],"efficacy":[96],"deep":[98],"learning":[99],"models":[100,110,149,218],"ocular-based":[102,147,177,220],"on":[105,131,185,223],"smartphones.":[106,224],"these":[108],"high-performing":[109],"require":[111],"enormous":[112],"space":[113],"computational":[115],"complexity":[116],"due":[117],"millions":[120],"parameters":[122],"computations":[124],"involved.":[125],"These":[126],"requirements":[127],"make":[128],"their":[129],"deployment":[130],"resource-constrained":[132],"challenging.":[134],"To":[135],"this":[136,155],"end,":[137],"a":[138,159,171],"handful":[139],"been":[143],"proposed":[144],"compact-size":[146],"deep-learning":[148],"facilitate":[151],"on-device":[152],"deployment.":[153],"In":[154],"paper,":[156],"we":[157],"conduct":[158],"thorough":[160],"analysis":[161],"existing":[164],"neural":[165],"network":[166],"compression":[167,209],"techniques":[168,210],"applied":[169],"as":[170],"standalone":[172],"combination":[175],"authentication.":[179],"Extensive":[180],"experimental":[181],"validation":[182],"is":[183],"performed":[184],"two":[187],"latest":[188],"large-scale":[189],"ocular":[190],"biometric":[191],"datasets":[192],"collected":[193],"using":[194],"smartphones,":[195],"namely,":[196],"UFPR":[197],"VISOB":[199],"2.0":[200],"datasets.":[201],"This":[202],"study":[203],"benchmarks":[204],"results":[206],"advanced":[208],"further":[212],"research":[213],"development":[215],"lightweight":[217]},"counts_by_year":[{"year":2026,"cited_by_count":2},{"year":2025,"cited_by_count":3},{"year":2024,"cited_by_count":2},{"year":2023,"cited_by_count":2}],"updated_date":"2026-03-15T09:29:46.208133","created_date":"2025-10-10T00:00:00"}
