{"id":"https://openalex.org/W2210541598","doi":"https://doi.org/10.1109/milcom.2015.7357627","title":"Comparison of PIN- and pattern-based behavioral biometric authentication on mobile devices","display_name":"Comparison of PIN- and pattern-based behavioral biometric authentication on mobile devices","publication_year":2015,"publication_date":"2015-10-01","ids":{"openalex":"https://openalex.org/W2210541598","doi":"https://doi.org/10.1109/milcom.2015.7357627","mag":"2210541598"},"language":"en","primary_location":{"id":"doi:10.1109/milcom.2015.7357627","is_oa":false,"landing_page_url":"https://doi.org/10.1109/milcom.2015.7357627","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"MILCOM 2015 - 2015 IEEE Military Communications Conference","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5100324124","display_name":"Yanyan Li","orcid":"https://orcid.org/0000-0002-1784-9735"},"institutions":[{"id":"https://openalex.org/I102401767","display_name":"University of Arkansas at Little Rock","ror":"https://ror.org/04fttyv97","country_code":"US","type":"education","lineage":["https://openalex.org/I102401767"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Yanyan Li","raw_affiliation_strings":["University of Arkansas at Little Rock"],"affiliations":[{"raw_affiliation_string":"University of Arkansas at Little Rock","institution_ids":["https://openalex.org/I102401767"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5079974872","display_name":"Junshuang Yang","orcid":null},"institutions":[{"id":"https://openalex.org/I102401767","display_name":"University of Arkansas at Little Rock","ror":"https://ror.org/04fttyv97","country_code":"US","type":"education","lineage":["https://openalex.org/I102401767"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Junshuang Yang","raw_affiliation_strings":["University of Arkansas at Little Rock"],"affiliations":[{"raw_affiliation_string":"University of Arkansas at Little Rock","institution_ids":["https://openalex.org/I102401767"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5048083201","display_name":"Mengjun Xie","orcid":"https://orcid.org/0000-0001-5089-9614"},"institutions":[{"id":"https://openalex.org/I102401767","display_name":"University of Arkansas at Little Rock","ror":"https://ror.org/04fttyv97","country_code":"US","type":"education","lineage":["https://openalex.org/I102401767"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Mengjun Xie","raw_affiliation_strings":["University of Arkansas at Little Rock"],"affiliations":[{"raw_affiliation_string":"University of Arkansas at Little Rock","institution_ids":["https://openalex.org/I102401767"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5079435921","display_name":"Dylan Carlson","orcid":null},"institutions":[{"id":"https://openalex.org/I147276918","display_name":"Lake Superior State University","ror":"https://ror.org/00yeysh84","country_code":"US","type":"education","lineage":["https://openalex.org/I147276918"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Dylan Carlson","raw_affiliation_strings":["Lake Superior State University"],"affiliations":[{"raw_affiliation_string":"Lake Superior State University","institution_ids":["https://openalex.org/I147276918"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5032967320","display_name":"Han Gil Jang","orcid":null},"institutions":[{"id":"https://openalex.org/I184889055","display_name":"Washington and Lee University","ror":"https://ror.org/05r9xgf14","country_code":"US","type":"education","lineage":["https://openalex.org/I184889055"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Han Gil Jang","raw_affiliation_strings":["Washington and Lee University"],"affiliations":[{"raw_affiliation_string":"Washington and Lee University","institution_ids":["https://openalex.org/I184889055"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5030951014","display_name":"Jiang Bian","orcid":"https://orcid.org/0000-0002-2238-5429"},"institutions":[{"id":"https://openalex.org/I33213144","display_name":"University of Florida","ror":"https://ror.org/02y3ad647","country_code":"US","type":"education","lineage":["https://openalex.org/I33213144"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Jiang Bian","raw_affiliation_strings":["University of Florida"],"affiliations":[{"raw_affiliation_string":"University of Florida","institution_ids":["https://openalex.org/I33213144"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":6,"corresponding_author_ids":["https://openalex.org/A5100324124"],"corresponding_institution_ids":["https://openalex.org/I102401767"],"apc_list":null,"apc_paid":null,"fwci":6.3568,"has_fulltext":false,"cited_by_count":14,"citation_normalized_percentile":{"value":0.96454574,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":89,"max":97},"biblio":{"volume":null,"issue":null,"first_page":"1317","last_page":"1322"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11800","display_name":"User Authentication and Security Systems","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11800","display_name":"User Authentication and Security Systems","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10828","display_name":"Biometric Identification and Security","score":0.9911999702453613,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9700000286102295,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/biometrics","display_name":"Biometrics","score":0.9291808009147644},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7549057602882385},{"id":"https://openalex.org/keywords/authentication","display_name":"Authentication (law)","score":0.7462820410728455},{"id":"https://openalex.org/keywords/usability","display_name":"Usability","score":0.7280056476593018},{"id":"https://openalex.org/keywords/histogram","display_name":"Histogram","score":0.6079071164131165},{"id":"https://openalex.org/keywords/behavioral-pattern","display_name":"Behavioral pattern","score":0.5874254703521729},{"id":"https://openalex.org/keywords/mobile-device","display_name":"Mobile device","score":0.5453176498413086},{"id":"https://openalex.org/keywords/pattern-recognition","display_name":"Pattern recognition (psychology)","score":0.4529721140861511},{"id":"https://openalex.org/keywords/behavioral-modeling","display_name":"Behavioral modeling","score":0.4276292026042938},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.3900240361690521},{"id":"https://openalex.org/keywords/human\u2013computer-interaction","display_name":"Human\u2013computer interaction","score":0.26708847284317017},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.2009720802307129},{"id":"https://openalex.org/keywords/image","display_name":"Image (mathematics)","score":0.069053053855896}],"concepts":[{"id":"https://openalex.org/C184297639","wikidata":"https://www.wikidata.org/wiki/Q177765","display_name":"Biometrics","level":2,"score":0.9291808009147644},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7549057602882385},{"id":"https://openalex.org/C148417208","wikidata":"https://www.wikidata.org/wiki/Q4825882","display_name":"Authentication (law)","level":2,"score":0.7462820410728455},{"id":"https://openalex.org/C170130773","wikidata":"https://www.wikidata.org/wiki/Q216378","display_name":"Usability","level":2,"score":0.7280056476593018},{"id":"https://openalex.org/C53533937","wikidata":"https://www.wikidata.org/wiki/Q185020","display_name":"Histogram","level":3,"score":0.6079071164131165},{"id":"https://openalex.org/C83804111","wikidata":"https://www.wikidata.org/wiki/Q1063558","display_name":"Behavioral pattern","level":2,"score":0.5874254703521729},{"id":"https://openalex.org/C186967261","wikidata":"https://www.wikidata.org/wiki/Q5082128","display_name":"Mobile device","level":2,"score":0.5453176498413086},{"id":"https://openalex.org/C153180895","wikidata":"https://www.wikidata.org/wiki/Q7148389","display_name":"Pattern recognition (psychology)","level":2,"score":0.4529721140861511},{"id":"https://openalex.org/C78639753","wikidata":"https://www.wikidata.org/wiki/Q3318160","display_name":"Behavioral modeling","level":2,"score":0.4276292026042938},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.3900240361690521},{"id":"https://openalex.org/C107457646","wikidata":"https://www.wikidata.org/wiki/Q207434","display_name":"Human\u2013computer interaction","level":1,"score":0.26708847284317017},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.2009720802307129},{"id":"https://openalex.org/C115961682","wikidata":"https://www.wikidata.org/wiki/Q860623","display_name":"Image (mathematics)","level":2,"score":0.069053053855896},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.0},{"id":"https://openalex.org/C115903868","wikidata":"https://www.wikidata.org/wiki/Q80993","display_name":"Software engineering","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/milcom.2015.7357627","is_oa":false,"landing_page_url":"https://doi.org/10.1109/milcom.2015.7357627","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"MILCOM 2015 - 2015 IEEE Military Communications Conference","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[{"id":"https://openalex.org/F4320306076","display_name":"National Science Foundation","ror":"https://ror.org/021nxhr62"}],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":27,"referenced_works":["https://openalex.org/W1492832934","https://openalex.org/W1505010935","https://openalex.org/W1567158539","https://openalex.org/W1626992774","https://openalex.org/W1976081290","https://openalex.org/W1988463028","https://openalex.org/W2017658349","https://openalex.org/W2022376209","https://openalex.org/W2030112111","https://openalex.org/W2040320186","https://openalex.org/W2041942569","https://openalex.org/W2044798763","https://openalex.org/W2052525588","https://openalex.org/W2055389916","https://openalex.org/W2086553822","https://openalex.org/W2090465075","https://openalex.org/W2102932275","https://openalex.org/W2111303254","https://openalex.org/W2121750345","https://openalex.org/W2131976234","https://openalex.org/W2151854612","https://openalex.org/W2163582782","https://openalex.org/W2952848219","https://openalex.org/W6629279466","https://openalex.org/W6630155293","https://openalex.org/W6636759762","https://openalex.org/W6675245884"],"related_works":["https://openalex.org/W2152238375","https://openalex.org/W3088948716","https://openalex.org/W432535052","https://openalex.org/W3104966193","https://openalex.org/W2042764164","https://openalex.org/W4221111679","https://openalex.org/W4210491229","https://openalex.org/W2316325142","https://openalex.org/W45791792","https://openalex.org/W4384559558"],"abstract_inverted_index":{"Personal":[0],"identification":[1],"numbers":[2],"(PIN)":[3],"and":[4,49,79,87,97,100,105,113,121,124,132,161,184,192],"unlock":[5],"patterns":[6],"are":[7,18,151,176],"highly":[8],"popular":[9],"authentication":[10,32,36,53,75,83,136,200],"mechanisms":[11,25],"on":[12,47,54,73,171,181,197],"smart":[13],"mobile":[14,202],"devices":[15],"but":[16,58,146],"they":[17],"not":[19,147],"sufficiently":[20],"secure.":[21],"PIN":[22],"or":[23],"pattern":[24],"enhanced":[26],"by":[27],"additional,":[28],"implicit":[29],"behavioral":[30,51,81,115,134,188,198],"biometric":[31,52,82,116,135,189,199],"can":[33,138,156],"offer":[34],"stronger":[35],"assurance":[37],"while":[38],"preserving":[39],"usability,":[40],"therefore":[41],"becoming":[42],"very":[43],"attractive.":[44],"Individual":[45],"studies":[46],"PIN-":[48],"pattern-based":[50,80,98,133],"smartphones":[55],"were":[56],"conducted":[57],"their":[59],"results":[60,128,160],"cannot":[61],"be":[62],"directly":[63],"compared.":[64],"In":[65],"this":[66],"work,":[67],"we":[68],"present":[69],"a":[70,91],"comparison":[71],"study":[72],"the":[74,141,167,182],"accuracy":[76,145],"between":[77],"PIN-based":[78,96,131],"using":[84],"both":[85,95,119],"smartphone":[86],"tablet.":[88],"We":[89,109],"developed":[90],"uniform":[92],"framework":[93],"for":[94,118,201],"schemes":[99,137],"used":[101],"two":[102],"representative":[103],"methods-Histogram":[104],"DTW-for":[106],"user":[107],"verification.":[108],"recruited":[110],"15":[111],"users":[112],"collected":[114],"data":[117],"simple":[120],"complex":[122],"PINs":[123],"patterns.":[125],"Our":[126,174],"experimental":[127],"show":[129],"that":[130],"achieve":[139,157],"about":[140],"same":[142],"level":[143],"of":[144,186],"all":[148],"verification":[149,190],"methods":[150,191],"equal.":[152],"The":[153],"Histogram":[154],"method":[155,169],"more":[158,194],"consistent":[159],"handle":[162],"template":[163],"aging":[164],"better":[165],"than":[166],"DTW":[168],"based":[170],"our":[172],"results.":[173],"findings":[175],"expected":[177],"to":[178],"shed":[179],"light":[180],"exploration":[183],"analysis":[185],"effective":[187],"facilitate":[193],"comprehensive":[195],"investigation":[196],"devices.":[203]},"counts_by_year":[{"year":2025,"cited_by_count":1},{"year":2024,"cited_by_count":1},{"year":2021,"cited_by_count":1},{"year":2019,"cited_by_count":3},{"year":2018,"cited_by_count":3},{"year":2017,"cited_by_count":2},{"year":2016,"cited_by_count":3}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
