{"id":"https://openalex.org/W3006542076","doi":"https://doi.org/10.1109/icce-tw46550.2019.8992015","title":"Implicit Identity Authentication Mechanism based on Smartphone Touch Dynamics","display_name":"Implicit Identity Authentication Mechanism based on Smartphone Touch Dynamics","publication_year":2019,"publication_date":"2019-05-01","ids":{"openalex":"https://openalex.org/W3006542076","doi":"https://doi.org/10.1109/icce-tw46550.2019.8992015","mag":"3006542076"},"language":"en","primary_location":{"id":"doi:10.1109/icce-tw46550.2019.8992015","is_oa":false,"landing_page_url":"https://doi.org/10.1109/icce-tw46550.2019.8992015","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2019 IEEE International Conference on Consumer Electronics - Taiwan (ICCE-TW)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5081141120","display_name":"Zhang Jianzong","orcid":null},"institutions":[{"id":"https://openalex.org/I21193070","display_name":"Beijing Jiaotong University","ror":"https://ror.org/01yj56c84","country_code":"CN","type":"education","lineage":["https://openalex.org/I21193070"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Jianzong Zhang","raw_affiliation_strings":["Institute of Intelligent Sensing and Information Processing, School of Electronic and Information Engineering, Beijing Jiaotong University,Beijing,100044","Institute of Intelligent Sensing and Information Processing, School of Electronic and Information Engineering, Beijing Jiaotong University, Beijing"],"affiliations":[{"raw_affiliation_string":"Institute of Intelligent Sensing and Information Processing, School of Electronic and Information Engineering, Beijing Jiaotong University,Beijing,100044","institution_ids":["https://openalex.org/I21193070"]},{"raw_affiliation_string":"Institute of Intelligent Sensing and Information Processing, School of Electronic and Information Engineering, Beijing Jiaotong University, Beijing","institution_ids":["https://openalex.org/I21193070"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5062430620","display_name":"Dan Tao","orcid":"https://orcid.org/0000-0002-7368-2132"},"institutions":[{"id":"https://openalex.org/I21193070","display_name":"Beijing Jiaotong University","ror":"https://ror.org/01yj56c84","country_code":"CN","type":"education","lineage":["https://openalex.org/I21193070"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Dan Tao","raw_affiliation_strings":["Institute of Intelligent Sensing and Information Processing, School of Electronic and Information Engineering, Beijing Jiaotong University,Beijing,100044","Institute of Intelligent Sensing and Information Processing, School of Electronic and Information Engineering, Beijing Jiaotong University, Beijing"],"affiliations":[{"raw_affiliation_string":"Institute of Intelligent Sensing and Information Processing, School of Electronic and Information Engineering, Beijing Jiaotong University,Beijing,100044","institution_ids":["https://openalex.org/I21193070"]},{"raw_affiliation_string":"Institute of Intelligent Sensing and Information Processing, School of Electronic and Information Engineering, Beijing Jiaotong University, Beijing","institution_ids":["https://openalex.org/I21193070"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5081141120"],"corresponding_institution_ids":["https://openalex.org/I21193070"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.3029452,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":null,"issue":null,"first_page":"1","last_page":"2"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11800","display_name":"User Authentication and Security Systems","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11800","display_name":"User Authentication and Security Systems","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9919000267982483,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10789","display_name":"Interactive and Immersive Displays","score":0.9814000129699707,"subfield":{"id":"https://openalex.org/subfields/1709","display_name":"Human-Computer Interaction"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8172428607940674},{"id":"https://openalex.org/keywords/password","display_name":"Password","score":0.7105209827423096},{"id":"https://openalex.org/keywords/support-vector-machine","display_name":"Support vector machine","score":0.7091267108917236},{"id":"https://openalex.org/keywords/classifier","display_name":"Classifier (UML)","score":0.5827208757400513},{"id":"https://openalex.org/keywords/k-nearest-neighbors-algorithm","display_name":"k-nearest neighbors algorithm","score":0.5524743795394897},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.48312970995903015},{"id":"https://openalex.org/keywords/random-forest","display_name":"Random forest","score":0.48124098777770996},{"id":"https://openalex.org/keywords/gyroscope","display_name":"Gyroscope","score":0.4716859459877014},{"id":"https://openalex.org/keywords/authentication","display_name":"Authentication (law)","score":0.4676287770271301},{"id":"https://openalex.org/keywords/accelerometer","display_name":"Accelerometer","score":0.46466243267059326},{"id":"https://openalex.org/keywords/pattern-recognition","display_name":"Pattern recognition (psychology)","score":0.38081562519073486},{"id":"https://openalex.org/keywords/data-mining","display_name":"Data mining","score":0.36633557081222534},{"id":"https://openalex.org/keywords/machine-learning","display_name":"Machine learning","score":0.35905858874320984},{"id":"https://openalex.org/keywords/human\u2013computer-interaction","display_name":"Human\u2013computer interaction","score":0.3291394114494324},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.24558275938034058},{"id":"https://openalex.org/keywords/engineering","display_name":"Engineering","score":0.08869302272796631}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8172428607940674},{"id":"https://openalex.org/C109297577","wikidata":"https://www.wikidata.org/wiki/Q161157","display_name":"Password","level":2,"score":0.7105209827423096},{"id":"https://openalex.org/C12267149","wikidata":"https://www.wikidata.org/wiki/Q282453","display_name":"Support vector machine","level":2,"score":0.7091267108917236},{"id":"https://openalex.org/C95623464","wikidata":"https://www.wikidata.org/wiki/Q1096149","display_name":"Classifier (UML)","level":2,"score":0.5827208757400513},{"id":"https://openalex.org/C113238511","wikidata":"https://www.wikidata.org/wiki/Q1071612","display_name":"k-nearest neighbors algorithm","level":2,"score":0.5524743795394897},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.48312970995903015},{"id":"https://openalex.org/C169258074","wikidata":"https://www.wikidata.org/wiki/Q245748","display_name":"Random forest","level":2,"score":0.48124098777770996},{"id":"https://openalex.org/C158488048","wikidata":"https://www.wikidata.org/wiki/Q483400","display_name":"Gyroscope","level":2,"score":0.4716859459877014},{"id":"https://openalex.org/C148417208","wikidata":"https://www.wikidata.org/wiki/Q4825882","display_name":"Authentication (law)","level":2,"score":0.4676287770271301},{"id":"https://openalex.org/C89805583","wikidata":"https://www.wikidata.org/wiki/Q192940","display_name":"Accelerometer","level":2,"score":0.46466243267059326},{"id":"https://openalex.org/C153180895","wikidata":"https://www.wikidata.org/wiki/Q7148389","display_name":"Pattern recognition (psychology)","level":2,"score":0.38081562519073486},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.36633557081222534},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.35905858874320984},{"id":"https://openalex.org/C107457646","wikidata":"https://www.wikidata.org/wiki/Q207434","display_name":"Human\u2013computer interaction","level":1,"score":0.3291394114494324},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.24558275938034058},{"id":"https://openalex.org/C127413603","wikidata":"https://www.wikidata.org/wiki/Q11023","display_name":"Engineering","level":0,"score":0.08869302272796631},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.0},{"id":"https://openalex.org/C146978453","wikidata":"https://www.wikidata.org/wiki/Q3798668","display_name":"Aerospace engineering","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/icce-tw46550.2019.8992015","is_oa":false,"landing_page_url":"https://doi.org/10.1109/icce-tw46550.2019.8992015","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2019 IEEE International Conference on Consumer Electronics - Taiwan (ICCE-TW)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":3,"referenced_works":["https://openalex.org/W2017658349","https://openalex.org/W2800041363","https://openalex.org/W2963930878"],"related_works":["https://openalex.org/W2356006086","https://openalex.org/W1973973903","https://openalex.org/W2545168295","https://openalex.org/W2365897603","https://openalex.org/W4234814094","https://openalex.org/W2156308897","https://openalex.org/W4303613760","https://openalex.org/W2361871310","https://openalex.org/W2417246878","https://openalex.org/W1982154684"],"abstract_inverted_index":{"Information":[0],"security":[1],"has":[2],"now":[3],"become":[4],"an":[5,22,95],"important":[6],"area":[7],"of":[8,17,38,84,104],"concern.":[9],"Considering":[10],"the":[11,56,82,85,91,107],"shortcomings":[12],"in":[13],"traditional":[14],"unlocking":[15],"ways":[16],"smartphones,":[18],"this":[19],"paper":[20],"proposes":[21],"implicit":[23],"identity":[24],"authentication":[25],"mechanism":[26],"by":[27],"extracting":[28],"users'":[29],"touch":[30],"dynamic":[31],"characteristics.":[32],"86-dimensional":[33],"features":[34],"from":[35],"two":[36],"types":[37],"sensor":[39],"data":[40],"(e.g.,":[41],"acceleration":[42],"and":[43,72,106],"gyroscope)":[44],"generated":[45],"when":[46],"a":[47,50],"user":[48],"unlocks":[49],"smartphone":[51],"are":[52],"extracted":[53],"to":[54,76],"characterize":[55],"user's":[57],"behavior.":[58],"Particularly,":[59],"we":[60,80],"adopt":[61],"three":[62],"popular":[63],"classifiers:":[64],"support":[65],"vector":[66],"machine":[67],"(SVM),":[68],"K-nearest":[69],"neighbor":[70],"(KNN)":[71],"random":[73],"forest":[74],"(RF)":[75],"perform":[77],"training.":[78],"Finally,":[79],"verify":[81],"accuracy":[83,97,109],"classifier.":[86],"Experimental":[87],"results":[88],"show":[89],"that":[90],"RF":[92],"classifier":[93],"achieves":[94],"ideal":[96],"rate":[98,110],"for":[99],"passwords":[100],"with":[101],"different":[102],"levels":[103],"repetition,":[105],"average":[108],"is":[111],"over":[112],"98%.":[113]},"counts_by_year":[],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
