{"id":"https://openalex.org/W2962823371","doi":"https://doi.org/10.1109/tifs.2019.2930429","title":"User Authentication Based on Mouse Dynamics Using Deep Neural Networks: A Comprehensive Study","display_name":"User Authentication Based on Mouse Dynamics Using Deep Neural Networks: A Comprehensive Study","publication_year":2019,"publication_date":"2019-07-22","ids":{"openalex":"https://openalex.org/W2962823371","doi":"https://doi.org/10.1109/tifs.2019.2930429","mag":"2962823371"},"language":"en","primary_location":{"id":"doi:10.1109/tifs.2019.2930429","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tifs.2019.2930429","pdf_url":null,"source":{"id":"https://openalex.org/S61310614","display_name":"IEEE Transactions on Information Forensics and Security","issn_l":"1556-6013","issn":["1556-6013","1556-6021"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Information Forensics and Security","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5102748341","display_name":"Penny Chong","orcid":"https://orcid.org/0000-0002-4422-6576"},"institutions":[{"id":"https://openalex.org/I152815399","display_name":"Singapore University of Technology and Design","ror":"https://ror.org/05j6fvn87","country_code":"SG","type":"education","lineage":["https://openalex.org/I152815399"]}],"countries":["SG"],"is_corresponding":true,"raw_author_name":"Penny Chong","raw_affiliation_strings":["ST Engineering Electronics-SUTD Cyber Security Laboratory, Singapore University of Technology and Design, Singapore","Information Systems Technology and Design Pillar, Singapore University of Technology and Design, Singapore"],"affiliations":[{"raw_affiliation_string":"ST Engineering Electronics-SUTD Cyber Security Laboratory, Singapore University of Technology and Design, Singapore","institution_ids":["https://openalex.org/I152815399"]},{"raw_affiliation_string":"Information Systems Technology and Design Pillar, Singapore University of Technology and Design, Singapore","institution_ids":["https://openalex.org/I152815399"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5072913672","display_name":"Yuval Elovici","orcid":"https://orcid.org/0000-0002-9641-128X"},"institutions":[{"id":"https://openalex.org/I152815399","display_name":"Singapore University of Technology and Design","ror":"https://ror.org/05j6fvn87","country_code":"SG","type":"education","lineage":["https://openalex.org/I152815399"]},{"id":"https://openalex.org/I124227911","display_name":"Ben-Gurion University of the Negev","ror":"https://ror.org/05tkyf982","country_code":"IL","type":"education","lineage":["https://openalex.org/I124227911"]}],"countries":["IL","SG"],"is_corresponding":false,"raw_author_name":"Yuval Elovici","raw_affiliation_strings":["ST Engineering Electronics-SUTD Cyber Security Laboratory, Singapore University of Technology and Design, Singapore","Department of Software and Information Systems Engineering, Ben-Gurion University of the Negev, Beer-Sheva, Israel"],"affiliations":[{"raw_affiliation_string":"ST Engineering Electronics-SUTD Cyber Security Laboratory, Singapore University of Technology and Design, Singapore","institution_ids":["https://openalex.org/I152815399"]},{"raw_affiliation_string":"Department of Software and Information Systems Engineering, Ben-Gurion University of the Negev, Beer-Sheva, Israel","institution_ids":["https://openalex.org/I124227911"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5072460783","display_name":"Alexander Binder","orcid":"https://orcid.org/0000-0001-9605-6209"},"institutions":[{"id":"https://openalex.org/I152815399","display_name":"Singapore University of Technology and Design","ror":"https://ror.org/05j6fvn87","country_code":"SG","type":"education","lineage":["https://openalex.org/I152815399"]}],"countries":["SG"],"is_corresponding":false,"raw_author_name":"Alexander Binder","raw_affiliation_strings":["Information Systems Technology and Design Pillar, Singapore University of Technology and Design, Singapore","ST Engineering Electronics-SUTD Cyber Security Laboratory, Singapore University of Technology and Design, Singapore"],"affiliations":[{"raw_affiliation_string":"Information Systems Technology and Design Pillar, Singapore University of Technology and Design, Singapore","institution_ids":["https://openalex.org/I152815399"]},{"raw_affiliation_string":"ST Engineering Electronics-SUTD Cyber Security Laboratory, Singapore University of Technology and Design, Singapore","institution_ids":["https://openalex.org/I152815399"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5102748341"],"corresponding_institution_ids":["https://openalex.org/I152815399"],"apc_list":null,"apc_paid":null,"fwci":13.711,"has_fulltext":false,"cited_by_count":85,"citation_normalized_percentile":{"value":0.9876791,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":99,"max":100},"biblio":{"volume":"15","issue":null,"first_page":"1086","last_page":"1101"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11800","display_name":"User Authentication and Security Systems","score":0.9991000294685364,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11800","display_name":"User Authentication and Security Systems","score":0.9991000294685364,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10667","display_name":"Emotion and Mood Recognition","score":0.9941999912261963,"subfield":{"id":"https://openalex.org/subfields/3205","display_name":"Experimental and Cognitive Psychology"},"field":{"id":"https://openalex.org/fields/32","display_name":"Psychology"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},{"id":"https://openalex.org/T10331","display_name":"Video Surveillance and Tracking Methods","score":0.9819999933242798,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8802902102470398},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.7223774790763855},{"id":"https://openalex.org/keywords/convolutional-neural-network","display_name":"Convolutional neural network","score":0.6458760499954224},{"id":"https://openalex.org/keywords/machine-learning","display_name":"Machine learning","score":0.6407104730606079},{"id":"https://openalex.org/keywords/deep-learning","display_name":"Deep learning","score":0.583853006362915},{"id":"https://openalex.org/keywords/leverage","display_name":"Leverage (statistics)","score":0.5708900094032288},{"id":"https://openalex.org/keywords/transfer-of-learning","display_name":"Transfer of learning","score":0.5425586700439453},{"id":"https://openalex.org/keywords/initialization","display_name":"Initialization","score":0.5226823687553406},{"id":"https://openalex.org/keywords/feature-extraction","display_name":"Feature extraction","score":0.5005953311920166},{"id":"https://openalex.org/keywords/usability","display_name":"Usability","score":0.4474513530731201},{"id":"https://openalex.org/keywords/feature-learning","display_name":"Feature learning","score":0.42020711302757263},{"id":"https://openalex.org/keywords/human\u2013computer-interaction","display_name":"Human\u2013computer interaction","score":0.1252531111240387}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8802902102470398},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.7223774790763855},{"id":"https://openalex.org/C81363708","wikidata":"https://www.wikidata.org/wiki/Q17084460","display_name":"Convolutional neural network","level":2,"score":0.6458760499954224},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.6407104730606079},{"id":"https://openalex.org/C108583219","wikidata":"https://www.wikidata.org/wiki/Q197536","display_name":"Deep learning","level":2,"score":0.583853006362915},{"id":"https://openalex.org/C153083717","wikidata":"https://www.wikidata.org/wiki/Q6535263","display_name":"Leverage (statistics)","level":2,"score":0.5708900094032288},{"id":"https://openalex.org/C150899416","wikidata":"https://www.wikidata.org/wiki/Q1820378","display_name":"Transfer of learning","level":2,"score":0.5425586700439453},{"id":"https://openalex.org/C114466953","wikidata":"https://www.wikidata.org/wiki/Q6034165","display_name":"Initialization","level":2,"score":0.5226823687553406},{"id":"https://openalex.org/C52622490","wikidata":"https://www.wikidata.org/wiki/Q1026626","display_name":"Feature extraction","level":2,"score":0.5005953311920166},{"id":"https://openalex.org/C170130773","wikidata":"https://www.wikidata.org/wiki/Q216378","display_name":"Usability","level":2,"score":0.4474513530731201},{"id":"https://openalex.org/C59404180","wikidata":"https://www.wikidata.org/wiki/Q17013334","display_name":"Feature learning","level":2,"score":0.42020711302757263},{"id":"https://openalex.org/C107457646","wikidata":"https://www.wikidata.org/wiki/Q207434","display_name":"Human\u2013computer interaction","level":1,"score":0.1252531111240387},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/tifs.2019.2930429","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tifs.2019.2930429","pdf_url":null,"source":{"id":"https://openalex.org/S61310614","display_name":"IEEE Transactions on Information Forensics and Security","issn_l":"1556-6013","issn":["1556-6013","1556-6021"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Information Forensics and Security","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":33,"referenced_works":["https://openalex.org/W603908379","https://openalex.org/W1787224781","https://openalex.org/W1832693441","https://openalex.org/W1849277567","https://openalex.org/W1951216520","https://openalex.org/W1982112776","https://openalex.org/W2030390520","https://openalex.org/W2054177909","https://openalex.org/W2064675550","https://openalex.org/W2093197020","https://openalex.org/W2096733369","https://openalex.org/W2097117768","https://openalex.org/W2112796928","https://openalex.org/W2140129380","https://openalex.org/W2153152039","https://openalex.org/W2155893237","https://openalex.org/W2171759622","https://openalex.org/W2195388612","https://openalex.org/W2468114283","https://openalex.org/W2517225990","https://openalex.org/W2536166232","https://openalex.org/W2550436552","https://openalex.org/W2766640141","https://openalex.org/W2787721734","https://openalex.org/W2886809373","https://openalex.org/W2888520269","https://openalex.org/W2889207897","https://openalex.org/W2899771611","https://openalex.org/W3099206234","https://openalex.org/W6618372016","https://openalex.org/W6639204139","https://openalex.org/W6640820311","https://openalex.org/W6756040250"],"related_works":["https://openalex.org/W3204184292","https://openalex.org/W3176564347","https://openalex.org/W1985458517","https://openalex.org/W2355833770","https://openalex.org/W3031039437","https://openalex.org/W3095877357","https://openalex.org/W183202219","https://openalex.org/W4386121542","https://openalex.org/W2440023763","https://openalex.org/W2962474440"],"abstract_inverted_index":{"Recently":[0],"conducted":[1],"research":[2],"demonstrated":[3],"the":[4,19,33,45,79,130,136,139,144,161,166,180,185],"potential":[5],"use":[6],"of":[7,35,81,87,179],"mouse":[8,38,56,181],"dynamics":[9],"as":[10,149,151],"a":[11,66,101,112,152],"behavioral":[12],"biometric":[13],"for":[14,40,55,117,176,189],"user":[15],"authentication":[16],"systems.":[17],"However,":[18],"state-of-the-art":[20],"methods":[21,30],"in":[22,194],"this":[23],"field":[24],"rely":[25],"on":[26,89,119],"classical":[27,153],"machine":[28,154],"learning":[29,53,118,155],"that":[31,78,95,106],"necessitate":[32],"design":[34],"hand":[36],"crafted":[37],"features":[39,162],"feature":[41,46],"extraction.":[42],"To":[43],"simplify":[44],"extraction":[47],"process,":[48],"we":[49,99,164],"leverage":[50],"various":[51],"deep":[52,146],"architectures":[54,147],"movement":[57],"sequences":[58],"classification,":[59],"including":[60],"convolutional":[61,71,103],"networks,":[62,64],"recurrent":[63,73],"and":[65,72,192],"hybrid":[67],"model":[68],"which":[69,110],"combines":[70],"layers.":[74],"It":[75],"is":[76,111,133],"known":[77],"training":[80],"these":[82],"networks":[83],"with":[84],"random":[85],"initialization":[86],"weights":[88],"small":[90,120],"datasets":[91],"will":[92],"produce":[93],"models":[94,186],"perform":[96],"poorly.":[97],"Therefore,":[98],"consider":[100],"two-dimensional":[102],"neural":[104],"network":[105],"allows":[107],"transfer":[108],"learning,":[109],"domain":[113],"adaptation":[114],"technique":[115],"effective":[116],"datasets.":[121],"Although":[122],"employing":[123],"such":[124],"architecture":[125,140],"may":[126],"seem":[127],"counterintuitive,":[128],"since":[129],"temporal":[131],"information":[132],"discarded":[134],"from":[135],"input":[137],"data,":[138],"has":[141],"outperformed":[142],"all":[143],"other":[145],"investigated,":[148],"well":[150],"method.":[156],"In":[157,183],"order":[158],"to":[159,172],"understand":[160],"learned,":[163],"adopt":[165],"layer-wise":[167],"relevance":[168,174],"propagation":[169],"(LRP)":[170],"algorithm":[171],"compute":[173],"scores":[175],"each":[177],"part":[178],"curves.":[182],"addition,":[184],"are":[187],"measured":[188],"their":[190],"usability":[191],"effectiveness":[193],"realistic":[195],"scenarios.":[196]},"counts_by_year":[{"year":2026,"cited_by_count":2},{"year":2025,"cited_by_count":11},{"year":2024,"cited_by_count":16},{"year":2023,"cited_by_count":17},{"year":2022,"cited_by_count":14},{"year":2021,"cited_by_count":14},{"year":2020,"cited_by_count":11}],"updated_date":"2026-03-12T08:34:05.389933","created_date":"2025-10-10T00:00:00"}
