{"id":"https://openalex.org/W2951076533","doi":"https://doi.org/10.1145/3307334.3328625","title":"The Light Will Be with You. Always -- A Novel Continuous Mobile Authentication with the Light Sensor (poster)","display_name":"The Light Will Be with You. Always -- A Novel Continuous Mobile Authentication with the Light Sensor (poster)","publication_year":2019,"publication_date":"2019-06-12","ids":{"openalex":"https://openalex.org/W2951076533","doi":"https://doi.org/10.1145/3307334.3328625","mag":"2951076533"},"language":"en","primary_location":{"id":"doi:10.1145/3307334.3328625","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3307334.3328625","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 17th Annual International Conference on Mobile Systems, Applications, and Services","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5038399656","display_name":"Mohsen Ali Alawami","orcid":"https://orcid.org/0000-0002-1658-9716"},"institutions":[{"id":"https://openalex.org/I848706","display_name":"Sungkyunkwan University","ror":"https://ror.org/04q78tk20","country_code":"KR","type":"education","lineage":["https://openalex.org/I848706"]}],"countries":["KR"],"is_corresponding":true,"raw_author_name":"Mohsen A. Alawami","raw_affiliation_strings":["Sungkyunkwan University, Suwon, Republic of Korea"],"affiliations":[{"raw_affiliation_string":"Sungkyunkwan University, Suwon, Republic of Korea","institution_ids":["https://openalex.org/I848706"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5111381953","display_name":"William Aiken","orcid":null},"institutions":[{"id":"https://openalex.org/I848706","display_name":"Sungkyunkwan University","ror":"https://ror.org/04q78tk20","country_code":"KR","type":"education","lineage":["https://openalex.org/I848706"]}],"countries":["KR"],"is_corresponding":false,"raw_author_name":"William Aiken","raw_affiliation_strings":["Sungkyunkwan University, Suwon, Republic of Korea"],"affiliations":[{"raw_affiliation_string":"Sungkyunkwan University, Suwon, Republic of Korea","institution_ids":["https://openalex.org/I848706"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5016563574","display_name":"Hyoungshick Kim","orcid":"https://orcid.org/0000-0002-1605-3866"},"institutions":[{"id":"https://openalex.org/I848706","display_name":"Sungkyunkwan University","ror":"https://ror.org/04q78tk20","country_code":"KR","type":"education","lineage":["https://openalex.org/I848706"]}],"countries":["KR"],"is_corresponding":false,"raw_author_name":"Hyoungshick Kim","raw_affiliation_strings":["Sungkyunkwan University, Suwon, Republic of Korea"],"affiliations":[{"raw_affiliation_string":"Sungkyunkwan University, Suwon, Republic of Korea","institution_ids":["https://openalex.org/I848706"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5038399656"],"corresponding_institution_ids":["https://openalex.org/I848706"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":4,"citation_normalized_percentile":{"value":0.07658851,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":90,"max":96},"biblio":{"volume":null,"issue":null,"first_page":"560","last_page":"561"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11800","display_name":"User Authentication and Security Systems","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11800","display_name":"User Authentication and Security Systems","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9965999722480774,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11017","display_name":"Chaos-based Image/Signal Encryption","score":0.9839000105857849,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/authentication","display_name":"Authentication (law)","score":0.8027644157409668},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7828683853149414},{"id":"https://openalex.org/keywords/focus","display_name":"Focus (optics)","score":0.6206746101379395},{"id":"https://openalex.org/keywords/intrusion-detection-system","display_name":"Intrusion detection system","score":0.5271938443183899},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.4911215007305145},{"id":"https://openalex.org/keywords/scheme","display_name":"Scheme (mathematics)","score":0.43636658787727356}],"concepts":[{"id":"https://openalex.org/C148417208","wikidata":"https://www.wikidata.org/wiki/Q4825882","display_name":"Authentication (law)","level":2,"score":0.8027644157409668},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7828683853149414},{"id":"https://openalex.org/C192209626","wikidata":"https://www.wikidata.org/wiki/Q190909","display_name":"Focus (optics)","level":2,"score":0.6206746101379395},{"id":"https://openalex.org/C35525427","wikidata":"https://www.wikidata.org/wiki/Q745881","display_name":"Intrusion detection system","level":2,"score":0.5271938443183899},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.4911215007305145},{"id":"https://openalex.org/C77618280","wikidata":"https://www.wikidata.org/wiki/Q1155772","display_name":"Scheme (mathematics)","level":2,"score":0.43636658787727356},{"id":"https://openalex.org/C134306372","wikidata":"https://www.wikidata.org/wiki/Q7754","display_name":"Mathematical analysis","level":1,"score":0.0},{"id":"https://openalex.org/C121332964","wikidata":"https://www.wikidata.org/wiki/Q413","display_name":"Physics","level":0,"score":0.0},{"id":"https://openalex.org/C120665830","wikidata":"https://www.wikidata.org/wiki/Q14620","display_name":"Optics","level":1,"score":0.0},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1145/3307334.3328625","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3307334.3328625","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 17th Annual International Conference on Mobile Systems, Applications, and Services","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/7","display_name":"Affordable and clean energy","score":0.9200000166893005}],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":4,"referenced_works":["https://openalex.org/W2742615025","https://openalex.org/W2805396670","https://openalex.org/W2810022200","https://openalex.org/W2889201898"],"related_works":["https://openalex.org/W2357468538","https://openalex.org/W1577110157","https://openalex.org/W2355007334","https://openalex.org/W2390009783","https://openalex.org/W2012531322","https://openalex.org/W4254602698","https://openalex.org/W2394461323","https://openalex.org/W1975289146","https://openalex.org/W2242172122","https://openalex.org/W2912135041"],"abstract_inverted_index":{"Existing":[0],"continuous":[1,55,63,87],"authentication":[2,13,56,64,88],"proposals":[3],"tend":[4],"to":[5,23,36,73,102,128],"have":[6],"two":[7],"major":[8],"drawbacks.":[9],"First,":[10],"touch-based":[11],"smartphone":[12,22,98],"approaches":[14,29,65],"typically":[15],"require":[16],"explicit":[17],"user":[18],"interactions":[19],"with":[20],"the":[21,34,43,46,54,74,112],"collect":[24],"sufficient":[25],"touch":[26],"data.":[27],"These":[28],"may":[30,52],"provide":[31],"an":[32,50,130],"attacker":[33,51],"opportunity":[35],"steal":[37],"a":[38,85,96],"victim's":[39],"sensitive":[40],"data":[41,94,118],"before":[42,59],"system":[44,89],"detects":[45],"attacker's":[47],"intrusion.":[48],"Likewise,":[49],"disable":[53],"scheme":[57],"itself":[58],"detection.":[60],"Second,":[61],"sensor-based":[62],"inherently":[66],"suffer":[67],"from":[68,95,119],"high":[69],"energy":[70],"consumption":[71],"due":[72],"constant":[75],"usage":[76],"of":[77,114],"multiple":[78],"sensors.":[79],"In":[80],"this":[81],"paper,":[82],"we":[83],"present":[84],"novel":[86],"that":[90],"collects":[91],"light":[92,116],"sensor":[93,117],"user's":[97],"and":[99],"analyzes":[100],"them":[101],"authenticate":[103],"users":[104],"using":[105],"support":[106],"vector":[107],"machines.":[108],"We":[109],"focus":[110],"on":[111],"possibility":[113],"collecting":[115],"users'":[120],"smartphones":[121],"while":[122],"they":[123],"are":[124],"conducting":[125],"daily":[126],"behaviors":[127],"develop":[129],"anomaly":[131],"detection":[132],"system.":[133]},"counts_by_year":[{"year":2025,"cited_by_count":1},{"year":2024,"cited_by_count":1},{"year":2023,"cited_by_count":2}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
