{"id":"https://openalex.org/W2962326827","doi":"https://doi.org/10.1109/icc.2019.8761435","title":"ICAuth: Implicit and Continuous Authentication When the Screen Is Awake","display_name":"ICAuth: Implicit and Continuous Authentication When the Screen Is Awake","publication_year":2019,"publication_date":"2019-05-01","ids":{"openalex":"https://openalex.org/W2962326827","doi":"https://doi.org/10.1109/icc.2019.8761435","mag":"2962326827"},"language":"en","primary_location":{"id":"doi:10.1109/icc.2019.8761435","is_oa":false,"landing_page_url":"https://doi.org/10.1109/icc.2019.8761435","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"ICC 2019 - 2019 IEEE International Conference on Communications (ICC)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5101623391","display_name":"Cong Wu","orcid":"https://orcid.org/0000-0002-0930-0283"},"institutions":[{"id":"https://openalex.org/I37461747","display_name":"Wuhan University","ror":"https://ror.org/033vjfk17","country_code":"CN","type":"education","lineage":["https://openalex.org/I37461747"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Cong Wu","raw_affiliation_strings":["School of Cyber Science and Engineering, Wuhan University, Wuhan, China"],"affiliations":[{"raw_affiliation_string":"School of Cyber Science and Engineering, Wuhan University, Wuhan, China","institution_ids":["https://openalex.org/I37461747"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5004999865","display_name":"Kun He","orcid":"https://orcid.org/0000-0003-3472-419X"},"institutions":[{"id":"https://openalex.org/I37461747","display_name":"Wuhan University","ror":"https://ror.org/033vjfk17","country_code":"CN","type":"education","lineage":["https://openalex.org/I37461747"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Kun He","raw_affiliation_strings":["School of Cyber Science and Engineering, Wuhan University, Wuhan, China"],"affiliations":[{"raw_affiliation_string":"School of Cyber Science and Engineering, Wuhan University, Wuhan, China","institution_ids":["https://openalex.org/I37461747"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100394917","display_name":"Jing Chen","orcid":"https://orcid.org/0000-0002-7212-5297"},"institutions":[{"id":"https://openalex.org/I4210105229","display_name":"City University of Hong Kong, Shenzhen Research Institute","ror":"https://ror.org/00xc0ma20","country_code":"CN","type":"education","lineage":["https://openalex.org/I4210105229"]},{"id":"https://openalex.org/I37461747","display_name":"Wuhan University","ror":"https://ror.org/033vjfk17","country_code":"CN","type":"education","lineage":["https://openalex.org/I37461747"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Jing Chen","raw_affiliation_strings":["Shenzhen Institute of Wuhan University, Shenzhen, China"],"affiliations":[{"raw_affiliation_string":"Shenzhen Institute of Wuhan University, Shenzhen, China","institution_ids":["https://openalex.org/I4210105229","https://openalex.org/I37461747"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5100529319","display_name":"Ruiying Du","orcid":"https://orcid.org/0000-0002-3634-3385"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Ruiying Du","raw_affiliation_strings":["Collaborative Innovation Center of Geospatial Technology, Wuhan, China"],"affiliations":[{"raw_affiliation_string":"Collaborative Innovation Center of Geospatial Technology, Wuhan, China","institution_ids":[]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5101623391"],"corresponding_institution_ids":["https://openalex.org/I37461747"],"apc_list":null,"apc_paid":null,"fwci":1.0175,"has_fulltext":false,"cited_by_count":17,"citation_normalized_percentile":{"value":0.82779351,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":99},"biblio":{"volume":null,"issue":null,"first_page":"1","last_page":"6"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11800","display_name":"User Authentication and Security Systems","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11800","display_name":"User Authentication and Security Systems","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9951000213623047,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12238","display_name":"Green IT and Sustainability","score":0.9900000095367432,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8314962387084961},{"id":"https://openalex.org/keywords/usability","display_name":"Usability","score":0.758133053779602},{"id":"https://openalex.org/keywords/authentication","display_name":"Authentication (law)","score":0.6915416717529297},{"id":"https://openalex.org/keywords/password","display_name":"Password","score":0.5919337868690491},{"id":"https://openalex.org/keywords/context","display_name":"Context (archaeology)","score":0.5647805333137512},{"id":"https://openalex.org/keywords/mobile-device","display_name":"Mobile device","score":0.5589625835418701},{"id":"https://openalex.org/keywords/focus","display_name":"Focus (optics)","score":0.5561808943748474},{"id":"https://openalex.org/keywords/latency","display_name":"Latency (audio)","score":0.47208282351493835},{"id":"https://openalex.org/keywords/human\u2013computer-interaction","display_name":"Human\u2013computer interaction","score":0.4575248956680298},{"id":"https://openalex.org/keywords/information-sensitivity","display_name":"Information sensitivity","score":0.4561542570590973},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.44663211703300476},{"id":"https://openalex.org/keywords/world-wide-web","display_name":"World Wide Web","score":0.12940216064453125}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8314962387084961},{"id":"https://openalex.org/C170130773","wikidata":"https://www.wikidata.org/wiki/Q216378","display_name":"Usability","level":2,"score":0.758133053779602},{"id":"https://openalex.org/C148417208","wikidata":"https://www.wikidata.org/wiki/Q4825882","display_name":"Authentication (law)","level":2,"score":0.6915416717529297},{"id":"https://openalex.org/C109297577","wikidata":"https://www.wikidata.org/wiki/Q161157","display_name":"Password","level":2,"score":0.5919337868690491},{"id":"https://openalex.org/C2779343474","wikidata":"https://www.wikidata.org/wiki/Q3109175","display_name":"Context (archaeology)","level":2,"score":0.5647805333137512},{"id":"https://openalex.org/C186967261","wikidata":"https://www.wikidata.org/wiki/Q5082128","display_name":"Mobile device","level":2,"score":0.5589625835418701},{"id":"https://openalex.org/C192209626","wikidata":"https://www.wikidata.org/wiki/Q190909","display_name":"Focus (optics)","level":2,"score":0.5561808943748474},{"id":"https://openalex.org/C82876162","wikidata":"https://www.wikidata.org/wiki/Q17096504","display_name":"Latency (audio)","level":2,"score":0.47208282351493835},{"id":"https://openalex.org/C107457646","wikidata":"https://www.wikidata.org/wiki/Q207434","display_name":"Human\u2013computer interaction","level":1,"score":0.4575248956680298},{"id":"https://openalex.org/C137822555","wikidata":"https://www.wikidata.org/wiki/Q2587068","display_name":"Information sensitivity","level":2,"score":0.4561542570590973},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.44663211703300476},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.12940216064453125},{"id":"https://openalex.org/C151730666","wikidata":"https://www.wikidata.org/wiki/Q7205","display_name":"Paleontology","level":1,"score":0.0},{"id":"https://openalex.org/C86803240","wikidata":"https://www.wikidata.org/wiki/Q420","display_name":"Biology","level":0,"score":0.0},{"id":"https://openalex.org/C76155785","wikidata":"https://www.wikidata.org/wiki/Q418","display_name":"Telecommunications","level":1,"score":0.0},{"id":"https://openalex.org/C121332964","wikidata":"https://www.wikidata.org/wiki/Q413","display_name":"Physics","level":0,"score":0.0},{"id":"https://openalex.org/C120665830","wikidata":"https://www.wikidata.org/wiki/Q14620","display_name":"Optics","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/icc.2019.8761435","is_oa":false,"landing_page_url":"https://doi.org/10.1109/icc.2019.8761435","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"ICC 2019 - 2019 IEEE International Conference on Communications (ICC)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":18,"referenced_works":["https://openalex.org/W87400274","https://openalex.org/W168460004","https://openalex.org/W1685464609","https://openalex.org/W2017658349","https://openalex.org/W2028570584","https://openalex.org/W2028849308","https://openalex.org/W2064060458","https://openalex.org/W2070381776","https://openalex.org/W2076618162","https://openalex.org/W2083295738","https://openalex.org/W2103388834","https://openalex.org/W2304304210","https://openalex.org/W2603199035","https://openalex.org/W2616905612","https://openalex.org/W2619786436","https://openalex.org/W2776818420","https://openalex.org/W2963930878","https://openalex.org/W6637461618"],"related_works":["https://openalex.org/W143386018","https://openalex.org/W1004582678","https://openalex.org/W2656445685","https://openalex.org/W2115218409","https://openalex.org/W2090949570","https://openalex.org/W2263162522","https://openalex.org/W2134080857","https://openalex.org/W1989237518","https://openalex.org/W2002093701","https://openalex.org/W4399463150"],"abstract_inverted_index":{"Implicit":[0],"authentication":[1,36,59,138,207,217],"has":[2],"become":[3],"increasingly":[4],"popular":[5],"over":[6],"recent":[7],"years":[8],"due":[9],"to":[10,41,74,106,198],"the":[11,43,50,83,86,107,130,140,149,155,159,212],"fact":[12],"that":[13,99,200],"it":[14],"relieves":[15],"users":[16],"from":[17,55,176],"explicit":[18],"actions":[19],"such":[20],"as":[21],"remembering":[22],"and":[23,33,47,67,89,97,119,129,153,189,216],"entering":[24],"passwords.":[25],"This":[26],"paper":[27],"puts":[28],"forward":[29],"ICAuth,":[30],"a":[31,169],"general":[32],"simple":[34],"implicit":[35,57],"method":[37],"for":[38],"mobile":[39,95],"devices,":[40],"authenticate":[42],"current":[44,150],"user":[45,58,151],"implicitly":[46],"continuously":[48,152],"when":[49],"screen":[51],"is":[52,72,195,202],"awake.":[53],"Distinct":[54],"existing":[56],"methods":[60],"which":[61],"only":[62],"focus":[63],"on":[64,94],"behavioral":[65,87,101,127],"characteristics":[66,88,102],"ignore":[68],"contextual":[69,90,133],"information,":[70],"ICAuth":[71,135,166,201],"devised":[73],"understand":[75],"different":[76],"behaviors":[77],"in":[78],"various":[79],"contexts.":[80],"We":[81,164],"investigate":[82],"correlations":[84],"between":[85],"information":[91],"via":[92,147,157],"sensors":[93,110,118],"devices":[96],"observe":[98],"user's":[100],"are":[103,111],"strongly":[104],"related":[105],"context.":[108],"These":[109],"divided":[112],"into":[113],"two":[114],"kinds,":[115],"including":[116,172],"fine-grained":[117,123],"coarse-grained":[120,131],"sensors,":[121],"where":[122],"sensor":[124],"data":[125],"represent":[126],"features":[128],"depict":[132],"information.":[134],"provides":[136],"continuous":[137],"without":[139],"involvement":[141],"of":[142,161,184,187,191,222],"users.":[143],"It":[144],"promotes":[145],"security":[146],"authenticating":[148],"improves":[154],"usability":[156],"eliminating":[158],"limitation":[160],"specific":[162],"behaviors.":[163],"evaluate":[165],"comprehensively":[167],"with":[168,219],"large":[170],"dataset":[171],"340842":[173],"samples":[174],"collected":[175],"142":[177],"subjects.":[178],"Our":[179],"approach":[180],"achieves":[181],"an":[182],"accuracy":[183],"96.85%,":[185],"FNR":[186],"2.95%,":[188],"FPR":[190],"4.01%.":[192],"Security":[193],"analysis":[194],"also":[196],"conducted":[197],"demonstrate":[199],"resilient":[203],"against":[204],"common":[205],"smartphone":[206],"threats.":[208],"Finally,":[209],"we":[210],"show":[211],"low":[213],"power":[214],"consumption":[215],"latency":[218],"2.2":[220],"seconds":[221],"ICAuth.":[223]},"counts_by_year":[{"year":2025,"cited_by_count":5},{"year":2024,"cited_by_count":9},{"year":2022,"cited_by_count":2},{"year":2020,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
