{"id":"https://openalex.org/W2742615025","doi":"https://doi.org/10.1109/tifs.2017.2737969","title":"Performance Analysis of Multi-Motion Sensor Behavior for Active Smartphone Authentication","display_name":"Performance Analysis of Multi-Motion Sensor Behavior for Active Smartphone Authentication","publication_year":2017,"publication_date":"2017-08-09","ids":{"openalex":"https://openalex.org/W2742615025","doi":"https://doi.org/10.1109/tifs.2017.2737969","mag":"2742615025"},"language":"en","primary_location":{"id":"doi:10.1109/tifs.2017.2737969","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tifs.2017.2737969","pdf_url":null,"source":{"id":"https://openalex.org/S61310614","display_name":"IEEE Transactions on Information Forensics and Security","issn_l":"1556-6013","issn":["1556-6013","1556-6021"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Information Forensics and Security","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5101843177","display_name":"Chao Shen","orcid":"https://orcid.org/0000-0002-6959-0569"},"institutions":[{"id":"https://openalex.org/I87445476","display_name":"Xi'an Jiaotong University","ror":"https://ror.org/017zhmm22","country_code":"CN","type":"education","lineage":["https://openalex.org/I87445476"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Chao Shen","raw_affiliation_strings":["MOE Key Laboratory for Intelligent Networks and Network Security, Xi\u2019an Jiaotong University, Xi\u2019an, China","MOE Key Laboratory for Intelligent Networks and Network Security, Xi'an Jiaotong University, Xi'an, China"],"raw_orcid":"https://orcid.org/0000-0002-6959-0569","affiliations":[{"raw_affiliation_string":"MOE Key Laboratory for Intelligent Networks and Network Security, Xi\u2019an Jiaotong University, Xi\u2019an, China","institution_ids":["https://openalex.org/I87445476"]},{"raw_affiliation_string":"MOE Key Laboratory for Intelligent Networks and Network Security, Xi'an Jiaotong University, Xi'an, China","institution_ids":["https://openalex.org/I87445476"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5102020607","display_name":"Yuanxun Li","orcid":"https://orcid.org/0009-0005-7518-4005"},"institutions":[{"id":"https://openalex.org/I87445476","display_name":"Xi'an Jiaotong University","ror":"https://ror.org/017zhmm22","country_code":"CN","type":"education","lineage":["https://openalex.org/I87445476"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Yuanxun Li","raw_affiliation_strings":["MOE Key Laboratory for Intelligent Networks and Network Security, Xi\u2019an Jiaotong University, Xi\u2019an, China","MOE Key Laboratory for Intelligent Networks and Network Security, Xi'an Jiaotong University, Xi'an, China"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"MOE Key Laboratory for Intelligent Networks and Network Security, Xi\u2019an Jiaotong University, Xi\u2019an, China","institution_ids":["https://openalex.org/I87445476"]},{"raw_affiliation_string":"MOE Key Laboratory for Intelligent Networks and Network Security, Xi'an Jiaotong University, Xi'an, China","institution_ids":["https://openalex.org/I87445476"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100411559","display_name":"Yufei Chen","orcid":"https://orcid.org/0000-0003-3786-928X"},"institutions":[{"id":"https://openalex.org/I87445476","display_name":"Xi'an Jiaotong University","ror":"https://ror.org/017zhmm22","country_code":"CN","type":"education","lineage":["https://openalex.org/I87445476"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Yufei Chen","raw_affiliation_strings":["MOE Key Laboratory for Intelligent Networks and Network Security, Xi\u2019an Jiaotong University, Xi\u2019an, China","MOE Key Laboratory for Intelligent Networks and Network Security, Xi'an Jiaotong University, Xi'an, China"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"MOE Key Laboratory for Intelligent Networks and Network Security, Xi\u2019an Jiaotong University, Xi\u2019an, China","institution_ids":["https://openalex.org/I87445476"]},{"raw_affiliation_string":"MOE Key Laboratory for Intelligent Networks and Network Security, Xi'an Jiaotong University, Xi'an, China","institution_ids":["https://openalex.org/I87445476"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5075845093","display_name":"Xiaohong Guan","orcid":"https://orcid.org/0000-0002-8826-0362"},"institutions":[{"id":"https://openalex.org/I87445476","display_name":"Xi'an Jiaotong University","ror":"https://ror.org/017zhmm22","country_code":"CN","type":"education","lineage":["https://openalex.org/I87445476"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Xiaohong Guan","raw_affiliation_strings":["MOE Key Laboratory for Intelligent Networks and Network Security, Xi\u2019an Jiaotong University, Xi\u2019an, China","MOE Key Laboratory for Intelligent Networks and Network Security, Xi'an Jiaotong University, Xi'an, China"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"MOE Key Laboratory for Intelligent Networks and Network Security, Xi\u2019an Jiaotong University, Xi\u2019an, China","institution_ids":["https://openalex.org/I87445476"]},{"raw_affiliation_string":"MOE Key Laboratory for Intelligent Networks and Network Security, Xi'an Jiaotong University, Xi'an, China","institution_ids":["https://openalex.org/I87445476"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5068712049","display_name":"Roy A. Maxion","orcid":"https://orcid.org/0000-0002-2833-7276"},"institutions":[{"id":"https://openalex.org/I74973139","display_name":"Carnegie Mellon University","ror":"https://ror.org/05x2bcf33","country_code":"US","type":"education","lineage":["https://openalex.org/I74973139"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Roy A. Maxion","raw_affiliation_strings":["Computer Science Department, Carnegie Mellon University, Pittsburgh, PA, USA"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"Computer Science Department, Carnegie Mellon University, Pittsburgh, PA, USA","institution_ids":["https://openalex.org/I74973139"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":5,"corresponding_author_ids":["https://openalex.org/A5101843177"],"corresponding_institution_ids":["https://openalex.org/I87445476"],"apc_list":null,"apc_paid":null,"fwci":42.4962,"has_fulltext":false,"cited_by_count":196,"citation_normalized_percentile":{"value":0.99789128,"is_in_top_1_percent":true,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":90,"max":100},"biblio":{"volume":"13","issue":"1","first_page":"48","last_page":"62"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11800","display_name":"User Authentication and Security Systems","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11800","display_name":"User Authentication and Security Systems","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9955999851226807,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10828","display_name":"Biometric Identification and Security","score":0.9807999730110168,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8270566463470459},{"id":"https://openalex.org/keywords/usability","display_name":"Usability","score":0.6309993863105774},{"id":"https://openalex.org/keywords/authentication","display_name":"Authentication (law)","score":0.5797208547592163},{"id":"https://openalex.org/keywords/android","display_name":"Android (operating system)","score":0.46798133850097656},{"id":"https://openalex.org/keywords/scalability","display_name":"Scalability","score":0.450738787651062},{"id":"https://openalex.org/keywords/human\u2013computer-interaction","display_name":"Human\u2013computer interaction","score":0.42317959666252136},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.3432692885398865},{"id":"https://openalex.org/keywords/real-time-computing","display_name":"Real-time computing","score":0.3220529556274414},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.3034322261810303}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8270566463470459},{"id":"https://openalex.org/C170130773","wikidata":"https://www.wikidata.org/wiki/Q216378","display_name":"Usability","level":2,"score":0.6309993863105774},{"id":"https://openalex.org/C148417208","wikidata":"https://www.wikidata.org/wiki/Q4825882","display_name":"Authentication (law)","level":2,"score":0.5797208547592163},{"id":"https://openalex.org/C557433098","wikidata":"https://www.wikidata.org/wiki/Q94","display_name":"Android (operating system)","level":2,"score":0.46798133850097656},{"id":"https://openalex.org/C48044578","wikidata":"https://www.wikidata.org/wiki/Q727490","display_name":"Scalability","level":2,"score":0.450738787651062},{"id":"https://openalex.org/C107457646","wikidata":"https://www.wikidata.org/wiki/Q207434","display_name":"Human\u2013computer interaction","level":1,"score":0.42317959666252136},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.3432692885398865},{"id":"https://openalex.org/C79403827","wikidata":"https://www.wikidata.org/wiki/Q3988","display_name":"Real-time computing","level":1,"score":0.3220529556274414},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.3034322261810303},{"id":"https://openalex.org/C77088390","wikidata":"https://www.wikidata.org/wiki/Q8513","display_name":"Database","level":1,"score":0.0},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/tifs.2017.2737969","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tifs.2017.2737969","pdf_url":null,"source":{"id":"https://openalex.org/S61310614","display_name":"IEEE Transactions on Information Forensics and Security","issn_l":"1556-6013","issn":["1556-6013","1556-6021"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Information Forensics and Security","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[{"score":0.5600000023841858,"display_name":"Reduced inequalities","id":"https://metadata.un.org/sdg/10"}],"awards":[{"id":"https://openalex.org/G1623000210","display_name":null,"funder_award_id":"2015T81032","funder_id":"https://openalex.org/F4320321543","funder_display_name":"China Postdoctoral Science Foundation"},{"id":"https://openalex.org/G2796034236","display_name":null,"funder_award_id":"xjj2015115","funder_id":"https://openalex.org/F4320335787","funder_display_name":"Fundamental Research Funds for the Central Universities"},{"id":"https://openalex.org/G386631920","display_name":null,"funder_award_id":"CNS-1319117","funder_id":"https://openalex.org/F4320337388","funder_display_name":"Division of Computer and Network Systems"},{"id":"https://openalex.org/G3937309767","display_name":null,"funder_award_id":"2014M560783","funder_id":"https://openalex.org/F4320321543","funder_display_name":"China Postdoctoral Science Foundation"},{"id":"https://openalex.org/G4842950919","display_name":null,"funder_award_id":"61773310","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G661625202","display_name":null,"funder_award_id":"2015JQ6216","funder_id":"https://openalex.org/F4320324173","funder_display_name":"Natural Science Foundation of Shaanxi Province"},{"id":"https://openalex.org/G6968888324","display_name":null,"funder_award_id":"61403301","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"}],"funders":[{"id":"https://openalex.org/F4320306113","display_name":"U.S. Department of State","ror":"https://ror.org/03vvynj75"},{"id":"https://openalex.org/F4320310207","display_name":"Carnegie Mellon University","ror":"https://ror.org/05x2bcf33"},{"id":"https://openalex.org/F4320320300","display_name":"European Commission","ror":"https://ror.org/00k4n6c32"},{"id":"https://openalex.org/F4320321001","display_name":"National Natural Science Foundation of China","ror":"https://ror.org/01h0zpd94"},{"id":"https://openalex.org/F4320321543","display_name":"China Postdoctoral Science Foundation","ror":"https://ror.org/0426zh255"},{"id":"https://openalex.org/F4320324173","display_name":"Natural Science Foundation of Shaanxi Province","ror":null},{"id":"https://openalex.org/F4320335787","display_name":"Fundamental Research Funds for the Central Universities","ror":null},{"id":"https://openalex.org/F4320337388","display_name":"Division of Computer and Network Systems","ror":"https://ror.org/02rdzmk74"}],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":78,"referenced_works":["https://openalex.org/W87400274","https://openalex.org/W138371643","https://openalex.org/W168460004","https://openalex.org/W573549652","https://openalex.org/W776418363","https://openalex.org/W1483327747","https://openalex.org/W1492832934","https://openalex.org/W1510924833","https://openalex.org/W1526773826","https://openalex.org/W1537211966","https://openalex.org/W1561944426","https://openalex.org/W1584467222","https://openalex.org/W1626992774","https://openalex.org/W1642437656","https://openalex.org/W1680400516","https://openalex.org/W1778879674","https://openalex.org/W1982696459","https://openalex.org/W1984665551","https://openalex.org/W1985269311","https://openalex.org/W1989329630","https://openalex.org/W1995945562","https://openalex.org/W2006976778","https://openalex.org/W2012927760","https://openalex.org/W2017658349","https://openalex.org/W2019915615","https://openalex.org/W2037840628","https://openalex.org/W2038457848","https://openalex.org/W2038790378","https://openalex.org/W2045638068","https://openalex.org/W2054352220","https://openalex.org/W2058308744","https://openalex.org/W2062273853","https://openalex.org/W2074406744","https://openalex.org/W2076804129","https://openalex.org/W2090465075","https://openalex.org/W2090869555","https://openalex.org/W2098044144","https://openalex.org/W2102932275","https://openalex.org/W2105594594","https://openalex.org/W2111397260","https://openalex.org/W2112639990","https://openalex.org/W2115973169","https://openalex.org/W2116668505","https://openalex.org/W2119352075","https://openalex.org/W2125838338","https://openalex.org/W2127551029","https://openalex.org/W2129793529","https://openalex.org/W2131904035","https://openalex.org/W2151854612","https://openalex.org/W2159756799","https://openalex.org/W2163660327","https://openalex.org/W2190581264","https://openalex.org/W2202744952","https://openalex.org/W2216189124","https://openalex.org/W2280718384","https://openalex.org/W2293480925","https://openalex.org/W2295638584","https://openalex.org/W2304304210","https://openalex.org/W2384622555","https://openalex.org/W2395887656","https://openalex.org/W2418813317","https://openalex.org/W2471556897","https://openalex.org/W2535614671","https://openalex.org/W2559659702","https://openalex.org/W3106889297","https://openalex.org/W4230946174","https://openalex.org/W6629279466","https://openalex.org/W6636759762","https://openalex.org/W6636831236","https://openalex.org/W6655382975","https://openalex.org/W6663776826","https://openalex.org/W6675245884","https://openalex.org/W6679539681","https://openalex.org/W6683615901","https://openalex.org/W6697167593","https://openalex.org/W6711687077","https://openalex.org/W6716948707","https://openalex.org/W6730277782"],"related_works":["https://openalex.org/W2429057255","https://openalex.org/W2187546663","https://openalex.org/W148745890","https://openalex.org/W4389670110","https://openalex.org/W2611942503","https://openalex.org/W4315621326","https://openalex.org/W2899790217","https://openalex.org/W2598865957","https://openalex.org/W1576092969","https://openalex.org/W2524154428"],"abstract_inverted_index":{"The":[0],"increasing":[1],"use":[2],"of":[3,49,59,78,84,90,115,145,179,185,236],"smartphones":[4],"as":[5],"personal":[6,11],"computing":[7],"platforms":[8],"to":[9,109,131,191,195,199,203,208,213,233],"access":[10],"information":[12,94],"has":[13],"stressed":[14],"the":[15,55,79,85,132,142,216,227,234,237],"demand":[16],"for":[17,24,63,135,168],"secure":[18],"and":[19,23,46,57,65,73,81,98,106,112,129,166,170,173,181,206,218],"usable":[20],"authentication":[21,68,224],"techniques,":[22,126],"constantly":[25],"protecting":[26],"privacy.":[27],"Smartphone":[28],"sensors":[29],"can":[30,174,231],"measure":[31],"users'":[32,116],"unique":[33],"behavioral":[34],"characteristics":[35],"when":[36],"they":[37],"interact":[38],"with":[39],"smartphones,":[40],"based":[41],"on":[42,189],"different":[43,204],"habits,":[44],"gestures,":[45],"angle":[47],"preferences":[48],"touch":[50,117,148],"actions.":[51,118],"This":[52],"paper":[53],"investigates":[54],"reliability":[56],"applicability":[58],"using":[60,123,141],"motion-sensor":[61,161],"behavior":[62,162,209],"active":[64,169],"continuous":[66,171],"smartphone":[67],"across":[69,153],"various":[70,154],"operational":[71,155],"scenarios,":[72],"presents":[74],"a":[75,176,182],"systematic":[76],"evaluation":[77],"distinctiveness":[80],"permanence":[82],"properties":[83],"behavior.":[86],"For":[87],"each":[88],"sample":[89],"sensor":[91,143],"behavior,":[92],"kinematic":[93],"sequences":[95],"are":[96,101,139,211],"extracted":[97],"analyzed,":[99],"which":[100],"characterized":[102],"by":[103],"statistic-,":[104],"frequency-,":[105],"wavelet-domain":[107],"features,":[108],"provide":[110],"accurate":[111],"fine-grained":[113],"characterization":[114],"A":[119],"Markov-based":[120],"decision":[121],"procedure,":[122],"one-class":[124],"learning":[125],"is":[127],"developed":[128],"applied":[130],"feature":[133],"space":[134],"performing":[136],"authentication.":[137],"Analyses":[138],"conducted":[140],"data":[144],"520":[146],"200":[147],"actions":[149],"from":[150],"102":[151],"subjects":[152],"scenarios.":[156],"Extensive":[157],"experiments":[158,188],"show":[159],"that":[160,230],"exhibits":[163],"sufficient":[164],"discriminability":[165],"stability":[167],"authentication,":[172],"achieve":[175],"false-rejection":[177],"rate":[178,184],"5.03%":[180],"false-acceptance":[183],"3.98%.":[186],"Additional":[187],"usability":[190],"operation":[192],"length,":[193],"sensitivity":[194],"application":[196],"scenario,":[197],"scalability":[198],"user":[200],"size,":[201],"contribution":[202],"sensors,":[205],"response":[207],"change":[210],"provided":[212],"further":[214],"explore":[215],"effectiveness":[217],"applicability.":[219],"We":[220],"also":[221],"implement":[222],"an":[223],"system":[225,229],"into":[226],"Android":[228],"react":[232],"presence":[235],"legitimate":[238],"user.":[239]},"counts_by_year":[{"year":2026,"cited_by_count":2},{"year":2025,"cited_by_count":13},{"year":2024,"cited_by_count":31},{"year":2023,"cited_by_count":20},{"year":2022,"cited_by_count":19},{"year":2021,"cited_by_count":27},{"year":2020,"cited_by_count":28},{"year":2019,"cited_by_count":35},{"year":2018,"cited_by_count":20},{"year":2017,"cited_by_count":1}],"updated_date":"2026-04-28T14:05:53.105641","created_date":"2025-10-10T00:00:00"}
