{"id":"https://openalex.org/W2785413798","doi":"https://doi.org/10.1109/btas.2017.8272684","title":"Using associative classification to authenticate mobile device users","display_name":"Using associative classification to authenticate mobile device users","publication_year":2017,"publication_date":"2017-10-01","ids":{"openalex":"https://openalex.org/W2785413798","doi":"https://doi.org/10.1109/btas.2017.8272684","mag":"2785413798"},"language":"en","primary_location":{"id":"doi:10.1109/btas.2017.8272684","is_oa":false,"landing_page_url":"https://doi.org/10.1109/btas.2017.8272684","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2017 IEEE International Joint Conference on Biometrics (IJCB)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5051747380","display_name":"Tempestt Neal","orcid":"https://orcid.org/0000-0002-6807-6277"},"institutions":[],"countries":[],"is_corresponding":true,"raw_author_name":"Tempestt J. Neal","raw_affiliation_strings":["Dept. of Computer and Information Science and Engineering"],"affiliations":[{"raw_affiliation_string":"Dept. of Computer and Information Science and Engineering","institution_ids":[]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5055751228","display_name":"Damon L. Woodard","orcid":"https://orcid.org/0000-0002-0471-177X"},"institutions":[{"id":"https://openalex.org/I33213144","display_name":"University of Florida","ror":"https://ror.org/02y3ad647","country_code":"US","type":"education","lineage":["https://openalex.org/I33213144"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Damon L. Woodard","raw_affiliation_strings":["Dept. of Electrical and Computer Engineering, University of Florida Gainesville, FL"],"affiliations":[{"raw_affiliation_string":"Dept. of Electrical and Computer Engineering, University of Florida Gainesville, FL","institution_ids":["https://openalex.org/I33213144"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5051747380"],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":4.3526,"has_fulltext":false,"cited_by_count":9,"citation_normalized_percentile":{"value":0.95284727,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":89,"max":99},"biblio":{"volume":"97","issue":null,"first_page":"71","last_page":"79"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11800","display_name":"User Authentication and Security Systems","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11800","display_name":"User Authentication and Security Systems","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12801","display_name":"Bluetooth and Wireless Communication Technologies","score":0.9882000088691711,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11309","display_name":"Music and Audio Processing","score":0.9555000066757202,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8144285678863525},{"id":"https://openalex.org/keywords/password","display_name":"Password","score":0.8013560771942139},{"id":"https://openalex.org/keywords/biometrics","display_name":"Biometrics","score":0.7686809301376343},{"id":"https://openalex.org/keywords/mobile-device","display_name":"Mobile device","score":0.6268956065177917},{"id":"https://openalex.org/keywords/bluetooth","display_name":"Bluetooth","score":0.6116902828216553},{"id":"https://openalex.org/keywords/authentication","display_name":"Authentication (law)","score":0.5813000798225403},{"id":"https://openalex.org/keywords/identification","display_name":"Identification (biology)","score":0.5609700679779053},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.5181580781936646},{"id":"https://openalex.org/keywords/feature-extraction","display_name":"Feature extraction","score":0.5134986042976379},{"id":"https://openalex.org/keywords/associative-property","display_name":"Associative property","score":0.4894019663333893},{"id":"https://openalex.org/keywords/mobile-computing","display_name":"Mobile computing","score":0.4590422809123993},{"id":"https://openalex.org/keywords/human\u2013computer-interaction","display_name":"Human\u2013computer interaction","score":0.37085357308387756},{"id":"https://openalex.org/keywords/world-wide-web","display_name":"World Wide Web","score":0.21327903866767883},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.19213417172431946},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.179104745388031},{"id":"https://openalex.org/keywords/wireless","display_name":"Wireless","score":0.10981479287147522}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8144285678863525},{"id":"https://openalex.org/C109297577","wikidata":"https://www.wikidata.org/wiki/Q161157","display_name":"Password","level":2,"score":0.8013560771942139},{"id":"https://openalex.org/C184297639","wikidata":"https://www.wikidata.org/wiki/Q177765","display_name":"Biometrics","level":2,"score":0.7686809301376343},{"id":"https://openalex.org/C186967261","wikidata":"https://www.wikidata.org/wiki/Q5082128","display_name":"Mobile device","level":2,"score":0.6268956065177917},{"id":"https://openalex.org/C546215728","wikidata":"https://www.wikidata.org/wiki/Q39531","display_name":"Bluetooth","level":3,"score":0.6116902828216553},{"id":"https://openalex.org/C148417208","wikidata":"https://www.wikidata.org/wiki/Q4825882","display_name":"Authentication (law)","level":2,"score":0.5813000798225403},{"id":"https://openalex.org/C116834253","wikidata":"https://www.wikidata.org/wiki/Q2039217","display_name":"Identification (biology)","level":2,"score":0.5609700679779053},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.5181580781936646},{"id":"https://openalex.org/C52622490","wikidata":"https://www.wikidata.org/wiki/Q1026626","display_name":"Feature extraction","level":2,"score":0.5134986042976379},{"id":"https://openalex.org/C159423971","wikidata":"https://www.wikidata.org/wiki/Q177251","display_name":"Associative property","level":2,"score":0.4894019663333893},{"id":"https://openalex.org/C144543869","wikidata":"https://www.wikidata.org/wiki/Q2738570","display_name":"Mobile computing","level":2,"score":0.4590422809123993},{"id":"https://openalex.org/C107457646","wikidata":"https://www.wikidata.org/wiki/Q207434","display_name":"Human\u2013computer interaction","level":1,"score":0.37085357308387756},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.21327903866767883},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.19213417172431946},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.179104745388031},{"id":"https://openalex.org/C555944384","wikidata":"https://www.wikidata.org/wiki/Q249","display_name":"Wireless","level":2,"score":0.10981479287147522},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.0},{"id":"https://openalex.org/C76155785","wikidata":"https://www.wikidata.org/wiki/Q418","display_name":"Telecommunications","level":1,"score":0.0},{"id":"https://openalex.org/C202444582","wikidata":"https://www.wikidata.org/wiki/Q837863","display_name":"Pure mathematics","level":1,"score":0.0},{"id":"https://openalex.org/C86803240","wikidata":"https://www.wikidata.org/wiki/Q420","display_name":"Biology","level":0,"score":0.0},{"id":"https://openalex.org/C59822182","wikidata":"https://www.wikidata.org/wiki/Q441","display_name":"Botany","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/btas.2017.8272684","is_oa":false,"landing_page_url":"https://doi.org/10.1109/btas.2017.8272684","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2017 IEEE International Joint Conference on Biometrics (IJCB)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"display_name":"Peace, Justice and strong institutions","id":"https://metadata.un.org/sdg/16","score":0.44999998807907104}],"awards":[],"funders":[{"id":"https://openalex.org/F4320310260","display_name":"University of Notre Dame","ror":"https://ror.org/00mkhxb43"}],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":33,"referenced_works":["https://openalex.org/W8065818","https://openalex.org/W60969841","https://openalex.org/W139653465","https://openalex.org/W1498691765","https://openalex.org/W1578151950","https://openalex.org/W1623342295","https://openalex.org/W1680400516","https://openalex.org/W1837124624","https://openalex.org/W1966310026","https://openalex.org/W1966666559","https://openalex.org/W2065075311","https://openalex.org/W2098880846","https://openalex.org/W2107643854","https://openalex.org/W2134013617","https://openalex.org/W2138061404","https://openalex.org/W2143625384","https://openalex.org/W2164675859","https://openalex.org/W2166559705","https://openalex.org/W2181155974","https://openalex.org/W2213463004","https://openalex.org/W2238043993","https://openalex.org/W2290345351","https://openalex.org/W2292833244","https://openalex.org/W2325135768","https://openalex.org/W2404010118","https://openalex.org/W2502981269","https://openalex.org/W2535614671","https://openalex.org/W2552781435","https://openalex.org/W2563706969","https://openalex.org/W2572839764","https://openalex.org/W6602551626","https://openalex.org/W6605764532","https://openalex.org/W6685574973"],"related_works":["https://openalex.org/W4220926637","https://openalex.org/W2362681120","https://openalex.org/W2376320007","https://openalex.org/W4376643979","https://openalex.org/W2322402661","https://openalex.org/W2389079374","https://openalex.org/W2372429262","https://openalex.org/W2903653170","https://openalex.org/W2351967314","https://openalex.org/W2967161677"],"abstract_inverted_index":{"Because":[0],"passwords":[1],"and":[2,26,70,94],"personal":[3],"identification":[4],"numbers":[5],"are":[6,68,73],"easily":[7],"forgotten,":[8],"stolen,":[9],"or":[10],"reused":[11],"on":[12,101],"multiple":[13],"accounts,":[14],"the":[15,77,122],"current":[16],"norm":[17],"for":[18,105],"mobile":[19,38,103],"device":[20,39,104],"security":[21,43],"is":[22],"quickly":[23],"becoming":[24],"inefficient":[25],"inconvenient.":[27],"Thus,":[28,84],"manufacturers":[29],"have":[30,55],"worked":[31],"to":[32,37,50,57,118],"make":[33],"physiological":[34],"biometrics":[35,47],"accessible":[36],"owners":[40],"as":[41,61,127],"improved":[42],"measures.":[44],"While":[45],"behavioral":[46],"has":[48],"yet":[49],"receive":[51],"commercial":[52],"attention,":[53],"researchers":[54],"continued":[56],"consider":[58],"these":[59],"approaches":[60],"well.":[62],"However,":[63],"studies":[64],"of":[65,79,91,124],"interactive":[66],"data":[67,96],"limited,":[69],"efforts":[71],"which":[72],"aimed":[74],"at":[75],"improving":[76],"performance":[78,89],"such":[80],"techniques":[81],"remain":[82],"relevant.":[83],"this":[85],"paper":[86],"provides":[87],"a":[88,102,128],"analysis":[90],"application,":[92],"Bluetooth,":[93],"Wi-Fi":[95],"collected":[97],"from":[98],"189":[99],"subjects":[100],"user":[106,111],"verification.":[107],"Results":[108],"indicate":[109],"that":[110],"authentication":[112],"can":[113],"be":[114],"achieved":[115],"with":[116],"up":[117],"91%":[119],"accuracy,":[120],"demonstrating":[121],"effectiveness":[123],"associative":[125],"classification":[126],"feature":[129],"extraction":[130],"technique.":[131]},"counts_by_year":[{"year":2020,"cited_by_count":1},{"year":2019,"cited_by_count":7},{"year":2018,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
