{"id":"https://openalex.org/W2090869555","doi":"https://doi.org/10.1109/tifs.2014.2350916","title":"Mobile User Authentication Using Statistical Touch Dynamics Images","display_name":"Mobile User Authentication Using Statistical Touch Dynamics Images","publication_year":2014,"publication_date":"2014-08-22","ids":{"openalex":"https://openalex.org/W2090869555","doi":"https://doi.org/10.1109/tifs.2014.2350916","mag":"2090869555"},"language":"en","primary_location":{"id":"doi:10.1109/tifs.2014.2350916","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tifs.2014.2350916","pdf_url":null,"source":{"id":"https://openalex.org/S61310614","display_name":"IEEE Transactions on Information Forensics and Security","issn_l":"1556-6013","issn":["1556-6013","1556-6021"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Information Forensics and Security","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5044233783","display_name":"Xi Zhao","orcid":"https://orcid.org/0000-0001-9983-6366"},"institutions":[{"id":"https://openalex.org/I87445476","display_name":"Xi'an Jiaotong University","ror":"https://ror.org/017zhmm22","country_code":"CN","type":"education","lineage":["https://openalex.org/I87445476"]},{"id":"https://openalex.org/I44461941","display_name":"University of Houston","ror":"https://ror.org/048sx0r50","country_code":"US","type":"education","lineage":["https://openalex.org/I44461941"]}],"countries":["CN","US"],"is_corresponding":true,"raw_author_name":"Xi Zhao","raw_affiliation_strings":["School of Electronic and Information Engineering, Xian Jiaotong University, Xi\u2019an, China","Dept. of Comput. Sci., Univ. of Houston, Houston, TX, USA#TAB#"],"affiliations":[{"raw_affiliation_string":"School of Electronic and Information Engineering, Xian Jiaotong University, Xi\u2019an, China","institution_ids":["https://openalex.org/I87445476"]},{"raw_affiliation_string":"Dept. of Comput. Sci., Univ. of Houston, Houston, TX, USA#TAB#","institution_ids":["https://openalex.org/I44461941"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100747830","display_name":"Tao Feng","orcid":"https://orcid.org/0000-0003-1611-9017"},"institutions":[{"id":"https://openalex.org/I44461941","display_name":"University of Houston","ror":"https://ror.org/048sx0r50","country_code":"US","type":"education","lineage":["https://openalex.org/I44461941"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Tao Feng","raw_affiliation_strings":["Department of Computer Science, University of Houston, Houston, TX, USA","Dept. of Comput. Sci., Univ. of Houston, Houston, TX, USA#TAB#"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science, University of Houston, Houston, TX, USA","institution_ids":["https://openalex.org/I44461941"]},{"raw_affiliation_string":"Dept. of Comput. Sci., Univ. of Houston, Houston, TX, USA#TAB#","institution_ids":["https://openalex.org/I44461941"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5109410921","display_name":"Weidong Shi","orcid":"https://orcid.org/0000-0002-9005-3071"},"institutions":[{"id":"https://openalex.org/I44461941","display_name":"University of Houston","ror":"https://ror.org/048sx0r50","country_code":"US","type":"education","lineage":["https://openalex.org/I44461941"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Weidong Shi","raw_affiliation_strings":["Department of Computer Science, University of Houston, Houston, TX, USA","Dept. of Comput. Sci., Univ. of Houston, Houston, TX, USA#TAB#"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science, University of Houston, Houston, TX, USA","institution_ids":["https://openalex.org/I44461941"]},{"raw_affiliation_string":"Dept. of Comput. Sci., Univ. of Houston, Houston, TX, USA#TAB#","institution_ids":["https://openalex.org/I44461941"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5031773367","display_name":"Ioannis A. Kakadiaris","orcid":"https://orcid.org/0000-0002-0591-1079"},"institutions":[{"id":"https://openalex.org/I44461941","display_name":"University of Houston","ror":"https://ror.org/048sx0r50","country_code":"US","type":"education","lineage":["https://openalex.org/I44461941"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Ioannis A. Kakadiaris","raw_affiliation_strings":["Department of Computer Science, University of Houston, Houston, TX, USA","Dept. of Comput. Sci., Univ. of Houston, Houston, TX, USA#TAB#"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science, University of Houston, Houston, TX, USA","institution_ids":["https://openalex.org/I44461941"]},{"raw_affiliation_string":"Dept. of Comput. Sci., Univ. of Houston, Houston, TX, USA#TAB#","institution_ids":["https://openalex.org/I44461941"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5044233783"],"corresponding_institution_ids":["https://openalex.org/I44461941","https://openalex.org/I87445476"],"apc_list":null,"apc_paid":null,"fwci":18.9336,"has_fulltext":false,"cited_by_count":67,"citation_normalized_percentile":{"value":0.99087548,"is_in_top_1_percent":true,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":96,"max":99},"biblio":{"volume":"9","issue":"11","first_page":"1780","last_page":"1789"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11800","display_name":"User Authentication and Security Systems","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11800","display_name":"User Authentication and Security Systems","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10828","display_name":"Biometric Identification and Security","score":0.995199978351593,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9922000169754028,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8501954078674316},{"id":"https://openalex.org/keywords/biometrics","display_name":"Biometrics","score":0.8082720041275024},{"id":"https://openalex.org/keywords/usability","display_name":"Usability","score":0.7003912925720215},{"id":"https://openalex.org/keywords/gesture","display_name":"Gesture","score":0.6755286455154419},{"id":"https://openalex.org/keywords/authentication","display_name":"Authentication (law)","score":0.5379289984703064},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.5044578313827515},{"id":"https://openalex.org/keywords/android","display_name":"Android (operating system)","score":0.49854254722595215},{"id":"https://openalex.org/keywords/mobile-device","display_name":"Mobile device","score":0.4777368903160095},{"id":"https://openalex.org/keywords/feature-extraction","display_name":"Feature extraction","score":0.45638540387153625},{"id":"https://openalex.org/keywords/discriminative-model","display_name":"Discriminative model","score":0.43825334310531616},{"id":"https://openalex.org/keywords/gesture-recognition","display_name":"Gesture recognition","score":0.43130090832710266},{"id":"https://openalex.org/keywords/feature","display_name":"Feature (linguistics)","score":0.4107380509376526},{"id":"https://openalex.org/keywords/computer-vision","display_name":"Computer vision","score":0.4036855399608612},{"id":"https://openalex.org/keywords/human\u2013computer-interaction","display_name":"Human\u2013computer interaction","score":0.3871901333332062},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.14760076999664307},{"id":"https://openalex.org/keywords/world-wide-web","display_name":"World Wide Web","score":0.09606373310089111}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8501954078674316},{"id":"https://openalex.org/C184297639","wikidata":"https://www.wikidata.org/wiki/Q177765","display_name":"Biometrics","level":2,"score":0.8082720041275024},{"id":"https://openalex.org/C170130773","wikidata":"https://www.wikidata.org/wiki/Q216378","display_name":"Usability","level":2,"score":0.7003912925720215},{"id":"https://openalex.org/C207347870","wikidata":"https://www.wikidata.org/wiki/Q371174","display_name":"Gesture","level":2,"score":0.6755286455154419},{"id":"https://openalex.org/C148417208","wikidata":"https://www.wikidata.org/wiki/Q4825882","display_name":"Authentication (law)","level":2,"score":0.5379289984703064},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.5044578313827515},{"id":"https://openalex.org/C557433098","wikidata":"https://www.wikidata.org/wiki/Q94","display_name":"Android (operating system)","level":2,"score":0.49854254722595215},{"id":"https://openalex.org/C186967261","wikidata":"https://www.wikidata.org/wiki/Q5082128","display_name":"Mobile device","level":2,"score":0.4777368903160095},{"id":"https://openalex.org/C52622490","wikidata":"https://www.wikidata.org/wiki/Q1026626","display_name":"Feature extraction","level":2,"score":0.45638540387153625},{"id":"https://openalex.org/C97931131","wikidata":"https://www.wikidata.org/wiki/Q5282087","display_name":"Discriminative model","level":2,"score":0.43825334310531616},{"id":"https://openalex.org/C159437735","wikidata":"https://www.wikidata.org/wiki/Q1519524","display_name":"Gesture recognition","level":3,"score":0.43130090832710266},{"id":"https://openalex.org/C2776401178","wikidata":"https://www.wikidata.org/wiki/Q12050496","display_name":"Feature (linguistics)","level":2,"score":0.4107380509376526},{"id":"https://openalex.org/C31972630","wikidata":"https://www.wikidata.org/wiki/Q844240","display_name":"Computer vision","level":1,"score":0.4036855399608612},{"id":"https://openalex.org/C107457646","wikidata":"https://www.wikidata.org/wiki/Q207434","display_name":"Human\u2013computer interaction","level":1,"score":0.3871901333332062},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.14760076999664307},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.09606373310089111},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.0},{"id":"https://openalex.org/C41895202","wikidata":"https://www.wikidata.org/wiki/Q8162","display_name":"Linguistics","level":1,"score":0.0},{"id":"https://openalex.org/C138885662","wikidata":"https://www.wikidata.org/wiki/Q5891","display_name":"Philosophy","level":0,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/tifs.2014.2350916","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tifs.2014.2350916","pdf_url":null,"source":{"id":"https://openalex.org/S61310614","display_name":"IEEE Transactions on Information Forensics and Security","issn_l":"1556-6013","issn":["1556-6013","1556-6021"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Information Forensics and Security","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/10","display_name":"Reduced inequalities","score":0.7300000190734863}],"awards":[{"id":"https://openalex.org/G1042413621","display_name":null,"funder_award_id":"CNS 1205708","funder_id":"https://openalex.org/F4320306076","funder_display_name":"National Science Foundation"}],"funders":[{"id":"https://openalex.org/F4320306076","display_name":"National Science Foundation","ror":"https://ror.org/021nxhr62"}],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":31,"referenced_works":["https://openalex.org/W130203786","https://openalex.org/W1559450307","https://openalex.org/W1583320325","https://openalex.org/W1626992774","https://openalex.org/W1969852918","https://openalex.org/W1976081290","https://openalex.org/W1984665551","https://openalex.org/W2001276412","https://openalex.org/W2013045163","https://openalex.org/W2014112714","https://openalex.org/W2026446967","https://openalex.org/W2061828128","https://openalex.org/W2098790836","https://openalex.org/W2111805153","https://openalex.org/W2115973169","https://openalex.org/W2119633713","https://openalex.org/W2131991463","https://openalex.org/W2145559639","https://openalex.org/W2151854612","https://openalex.org/W2152395371","https://openalex.org/W2153795273","https://openalex.org/W2156503193","https://openalex.org/W2158275940","https://openalex.org/W2161364624","https://openalex.org/W2163620685","https://openalex.org/W2171644656","https://openalex.org/W2535614671","https://openalex.org/W6605259211","https://openalex.org/W6633196054","https://openalex.org/W6634694934","https://openalex.org/W6636759762"],"related_works":["https://openalex.org/W2066003895","https://openalex.org/W2902873204","https://openalex.org/W2185750513","https://openalex.org/W4312416068","https://openalex.org/W3147379364","https://openalex.org/W2010878661","https://openalex.org/W2026258298","https://openalex.org/W3204639664","https://openalex.org/W2970836791","https://openalex.org/W2805039731"],"abstract_inverted_index":{"Behavioral":[0],"biometrics":[1,23],"have":[2,70,91],"recently":[3],"begun":[4],"to":[5,48],"gain":[6],"attention":[7],"for":[8,21,52],"mobile":[9],"user":[10,53],"authentication.":[11,62],"The":[12],"feasibility":[13],"of":[14,87],"touch":[15,35,45,74],"gestures":[16],"as":[17,79],"a":[18,33],"novel":[19],"modality":[20],"behavioral":[22],"has":[24],"been":[25,71,93],"investigated.":[26],"In":[27],"this":[28],"paper,":[29],"we":[30],"propose":[31],"applying":[32],"statistical":[34,39],"dynamics":[36],"image":[37],"(aka":[38],"feature":[40],"model)":[41],"trained":[42],"from":[43],"graphic":[44],"gesture":[46,75],"features":[47],"retain":[49],"discriminative":[50],"power":[51],"authentication":[54],"while":[55],"significantly":[56],"reducing":[57],"computational":[58],"time":[59],"during":[60],"online":[61],"Systematic":[63],"evaluation":[64],"and":[65,85],"comparisons":[66],"with":[67],"state-of-the-art":[68],"methods":[69],"performed":[72],"on":[73],"data":[76],"sets.":[77],"Implemented":[78],"an":[80],"Android":[81],"App,":[82],"the":[83,88],"usability":[84],"effectiveness":[86],"proposed":[89],"method":[90],"also":[92],"evaluated.":[94]},"counts_by_year":[{"year":2024,"cited_by_count":4},{"year":2023,"cited_by_count":4},{"year":2022,"cited_by_count":5},{"year":2021,"cited_by_count":5},{"year":2020,"cited_by_count":8},{"year":2019,"cited_by_count":10},{"year":2018,"cited_by_count":7},{"year":2017,"cited_by_count":8},{"year":2016,"cited_by_count":6},{"year":2015,"cited_by_count":7},{"year":2014,"cited_by_count":3}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
