{"id":"https://openalex.org/W2735324851","doi":"https://doi.org/10.1145/3098243.3098244","title":"Towards continuous and passive authentication across mobile devices","display_name":"Towards continuous and passive authentication across mobile devices","publication_year":2017,"publication_date":"2017-07-13","ids":{"openalex":"https://openalex.org/W2735324851","doi":"https://doi.org/10.1145/3098243.3098244","mag":"2735324851"},"language":"en","primary_location":{"id":"doi:10.1145/3098243.3098244","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3098243.3098244","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 10th ACM Conference on Security and Privacy in Wireless and Mobile Networks","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5100411426","display_name":"Xiao Wang","orcid":"https://orcid.org/0000-0001-6117-6745"},"institutions":[{"id":"https://openalex.org/I74973139","display_name":"Carnegie Mellon University","ror":"https://ror.org/05x2bcf33","country_code":"US","type":"education","lineage":["https://openalex.org/I74973139"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Xiao Wang","raw_affiliation_strings":["Carnegie Mellon University"],"affiliations":[{"raw_affiliation_string":"Carnegie Mellon University","institution_ids":["https://openalex.org/I74973139"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100767817","display_name":"Tong Yu","orcid":"https://orcid.org/0000-0002-1819-5614"},"institutions":[{"id":"https://openalex.org/I74973139","display_name":"Carnegie Mellon University","ror":"https://ror.org/05x2bcf33","country_code":"US","type":"education","lineage":["https://openalex.org/I74973139"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Tong Yu","raw_affiliation_strings":["Carnegie Mellon University"],"affiliations":[{"raw_affiliation_string":"Carnegie Mellon University","institution_ids":["https://openalex.org/I74973139"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5009341608","display_name":"Ole J. Mengshoel","orcid":"https://orcid.org/0000-0003-2666-5310"},"institutions":[{"id":"https://openalex.org/I74973139","display_name":"Carnegie Mellon University","ror":"https://ror.org/05x2bcf33","country_code":"US","type":"education","lineage":["https://openalex.org/I74973139"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Ole Mengshoel","raw_affiliation_strings":["Carnegie Mellon University"],"affiliations":[{"raw_affiliation_string":"Carnegie Mellon University","institution_ids":["https://openalex.org/I74973139"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5033964933","display_name":"Patrick Tague","orcid":"https://orcid.org/0000-0002-7561-6112"},"institutions":[{"id":"https://openalex.org/I74973139","display_name":"Carnegie Mellon University","ror":"https://ror.org/05x2bcf33","country_code":"US","type":"education","lineage":["https://openalex.org/I74973139"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Patrick Tague","raw_affiliation_strings":["Carnegie Mellon University"],"affiliations":[{"raw_affiliation_string":"Carnegie Mellon University","institution_ids":["https://openalex.org/I74973139"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5100411426"],"corresponding_institution_ids":["https://openalex.org/I74973139"],"apc_list":null,"apc_paid":null,"fwci":3.869,"has_fulltext":false,"cited_by_count":18,"citation_normalized_percentile":{"value":0.94410614,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":90,"max":97},"biblio":{"volume":null,"issue":null,"first_page":"35","last_page":"45"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11800","display_name":"User Authentication and Security Systems","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11800","display_name":"User Authentication and Security Systems","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9951000213623047,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11045","display_name":"Privacy, Security, and Data Protection","score":0.9901000261306763,"subfield":{"id":"https://openalex.org/subfields/3312","display_name":"Sociology and Political Science"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7777352333068848},{"id":"https://openalex.org/keywords/mobile-device","display_name":"Mobile device","score":0.7442065477371216},{"id":"https://openalex.org/keywords/usability","display_name":"Usability","score":0.7265383005142212},{"id":"https://openalex.org/keywords/leverage","display_name":"Leverage (statistics)","score":0.6539720296859741},{"id":"https://openalex.org/keywords/authentication","display_name":"Authentication (law)","score":0.6497820019721985},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.5471658706665039},{"id":"https://openalex.org/keywords/human\u2013computer-interaction","display_name":"Human\u2013computer interaction","score":0.2787201404571533},{"id":"https://openalex.org/keywords/world-wide-web","display_name":"World Wide Web","score":0.19965490698814392},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.07450294494628906}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7777352333068848},{"id":"https://openalex.org/C186967261","wikidata":"https://www.wikidata.org/wiki/Q5082128","display_name":"Mobile device","level":2,"score":0.7442065477371216},{"id":"https://openalex.org/C170130773","wikidata":"https://www.wikidata.org/wiki/Q216378","display_name":"Usability","level":2,"score":0.7265383005142212},{"id":"https://openalex.org/C153083717","wikidata":"https://www.wikidata.org/wiki/Q6535263","display_name":"Leverage (statistics)","level":2,"score":0.6539720296859741},{"id":"https://openalex.org/C148417208","wikidata":"https://www.wikidata.org/wiki/Q4825882","display_name":"Authentication (law)","level":2,"score":0.6497820019721985},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.5471658706665039},{"id":"https://openalex.org/C107457646","wikidata":"https://www.wikidata.org/wiki/Q207434","display_name":"Human\u2013computer interaction","level":1,"score":0.2787201404571533},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.19965490698814392},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.07450294494628906}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1145/3098243.3098244","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3098243.3098244","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 10th ACM Conference on Security and Privacy in Wireless and Mobile Networks","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/16","display_name":"Peace, Justice and strong institutions","score":0.6499999761581421}],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":29,"referenced_works":["https://openalex.org/W378983897","https://openalex.org/W1264850517","https://openalex.org/W1432560774","https://openalex.org/W1497385253","https://openalex.org/W1565064763","https://openalex.org/W1626992774","https://openalex.org/W1969877606","https://openalex.org/W1976081290","https://openalex.org/W1984170645","https://openalex.org/W1991685971","https://openalex.org/W2008642150","https://openalex.org/W2021124779","https://openalex.org/W2030786923","https://openalex.org/W2041145152","https://openalex.org/W2054352220","https://openalex.org/W2056265745","https://openalex.org/W2058266664","https://openalex.org/W2061985103","https://openalex.org/W2094965171","https://openalex.org/W2102932275","https://openalex.org/W2125713393","https://openalex.org/W2151854612","https://openalex.org/W2165689165","https://openalex.org/W2169360434","https://openalex.org/W2404603298","https://openalex.org/W2535614671","https://openalex.org/W2559684211","https://openalex.org/W2602531037","https://openalex.org/W2797893620"],"related_works":["https://openalex.org/W4389670110","https://openalex.org/W2187546663","https://openalex.org/W2429057255","https://openalex.org/W148745890","https://openalex.org/W2611942503","https://openalex.org/W4315621326","https://openalex.org/W2899790217","https://openalex.org/W1576092969","https://openalex.org/W2598865957","https://openalex.org/W2912135041"],"abstract_inverted_index":{"Mobile":[0],"devices,":[1],"such":[2,35],"as":[3,36],"smartphones":[4],"and":[5,25,38,67,72,131,155],"tablets,":[6],"have":[7,58],"become":[8],"prevalent":[9],"given":[10],"their":[11],"ample":[12],"functionality":[13],"brought":[14],"by":[15],"a":[16,99,133],"variety":[17],"of":[18,85,124],"applications.":[19],"Unfortunately,":[20],"these":[21],"devices":[22,111,130,150],"face":[23],"security":[24,51],"privacy":[26],"threats":[27],"due":[28],"to":[29,44,61,109,112,151],"unauthorized":[30],"access.":[31],"Ordinary":[32],"protection":[33],"mechanisms":[34],"passcode":[37],"fingerprint":[39],"verification":[40],"are":[41],"widely":[42],"employed":[43],"mitigate":[45],"the":[46,143],"threats.":[47],"To":[48,116],"achieve":[49],"strong":[50],"without":[52],"sacrificing":[53],"usability,":[54],"extensive":[55],"research":[56],"efforts":[57],"been":[59],"devoted":[60],"continuous":[62,114],"authentication":[63,86,154],"through":[64],"passive":[65],"sensing":[66],"behavior":[68],"modeling.":[69],"Nowadays,":[70],"more":[71,73],"users":[74],"own":[75],"multiple":[76,128],"devices.":[77,88],"This":[78],"trend":[79],"presents":[80],"opportunities":[81],"for":[82],"further":[83],"optimization":[84],"across":[87],"In":[89],"this":[90,118],"paper,":[91],"we":[92,120,140],"conduct":[93],"an":[94],"empirical":[95],"study":[96],"on":[97,103,127,148],"how":[98],"behavioral":[100],"model":[101],"created":[102],"one":[104],"device":[105],"can":[106,141],"be":[107],"transferred":[108],"other":[110],"bootstrap":[113],"authentication.":[115],"pursue":[117],"goal,":[119],"collect":[121],"160":[122],"sets":[123],"usage":[125],"data":[126],"mobile":[129],"perform":[132],"proof-of-concept":[134],"experiment.":[135],"The":[136],"results":[137],"demonstrate":[138],"that":[139],"leverage":[142],"similarity":[144],"between":[145],"user":[146],"behaviors":[147],"different":[149],"enable":[152],"cross-device":[153],"anomaly":[156],"detection.":[157]},"counts_by_year":[{"year":2025,"cited_by_count":1},{"year":2023,"cited_by_count":3},{"year":2022,"cited_by_count":4},{"year":2021,"cited_by_count":2},{"year":2020,"cited_by_count":4},{"year":2019,"cited_by_count":2},{"year":2018,"cited_by_count":1},{"year":2017,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
