{"id":"https://openalex.org/W3013808539","doi":"https://doi.org/10.1145/3377404","title":"Discriminative Power of Typing Features on Desktops, Tablets, and Phones for User Identification","display_name":"Discriminative Power of Typing Features on Desktops, Tablets, and Phones for User Identification","publication_year":2020,"publication_date":"2020-02-05","ids":{"openalex":"https://openalex.org/W3013808539","doi":"https://doi.org/10.1145/3377404","mag":"3013808539"},"language":"en","primary_location":{"id":"doi:10.1145/3377404","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3377404","pdf_url":null,"source":{"id":"https://openalex.org/S4210174050","display_name":"ACM Transactions on Privacy and Security","issn_l":"2471-2566","issn":["2471-2566","2471-2574"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319798","host_organization_name":"Association for Computing Machinery","host_organization_lineage":["https://openalex.org/P4310319798"],"host_organization_lineage_names":["Association for Computing Machinery"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"ACM Transactions on Privacy and Security","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5040320429","display_name":"Amith K. Belman","orcid":"https://orcid.org/0000-0003-1008-3025"},"institutions":[{"id":"https://openalex.org/I70983195","display_name":"Syracuse University","ror":"https://ror.org/025r5qe02","country_code":"US","type":"education","lineage":["https://openalex.org/I70983195"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Amith K. Belman","raw_affiliation_strings":["Syracuse University, NY, USA"],"affiliations":[{"raw_affiliation_string":"Syracuse University, NY, USA","institution_ids":["https://openalex.org/I70983195"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5071471344","display_name":"Vir V. Phoha","orcid":"https://orcid.org/0000-0002-5390-8253"},"institutions":[{"id":"https://openalex.org/I70983195","display_name":"Syracuse University","ror":"https://ror.org/025r5qe02","country_code":"US","type":"education","lineage":["https://openalex.org/I70983195"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Vir V. Phoha","raw_affiliation_strings":["Syracuse University, NY, USA"],"affiliations":[{"raw_affiliation_string":"Syracuse University, NY, USA","institution_ids":["https://openalex.org/I70983195"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5040320429"],"corresponding_institution_ids":["https://openalex.org/I70983195"],"apc_list":null,"apc_paid":null,"fwci":2.9359,"has_fulltext":false,"cited_by_count":15,"citation_normalized_percentile":{"value":0.9251037,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":93,"max":98},"biblio":{"volume":"23","issue":"1","first_page":"1","last_page":"36"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11800","display_name":"User Authentication and Security Systems","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11800","display_name":"User Authentication and Security Systems","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9876999855041504,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10828","display_name":"Biometric Identification and Security","score":0.9799000024795532,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8128440976142883},{"id":"https://openalex.org/keywords/keystroke-logging","display_name":"Keystroke logging","score":0.7813835740089417},{"id":"https://openalex.org/keywords/keystroke-dynamics","display_name":"Keystroke dynamics","score":0.7542970776557922},{"id":"https://openalex.org/keywords/discriminative-model","display_name":"Discriminative model","score":0.7039272785186768},{"id":"https://openalex.org/keywords/identification","display_name":"Identification (biology)","score":0.6915658712387085},{"id":"https://openalex.org/keywords/context","display_name":"Context (archaeology)","score":0.6612357497215271},{"id":"https://openalex.org/keywords/authentication","display_name":"Authentication (law)","score":0.5686703324317932},{"id":"https://openalex.org/keywords/biometrics","display_name":"Biometrics","score":0.45865297317504883},{"id":"https://openalex.org/keywords/set","display_name":"Set (abstract data type)","score":0.4438628852367401},{"id":"https://openalex.org/keywords/word","display_name":"Word (group theory)","score":0.43600213527679443},{"id":"https://openalex.org/keywords/phone","display_name":"Phone","score":0.41930773854255676},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.376674622297287},{"id":"https://openalex.org/keywords/password","display_name":"Password","score":0.3507494628429413},{"id":"https://openalex.org/keywords/speech-recognition","display_name":"Speech recognition","score":0.3349500894546509},{"id":"https://openalex.org/keywords/human\u2013computer-interaction","display_name":"Human\u2013computer interaction","score":0.3303595781326294},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.10366669297218323}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8128440976142883},{"id":"https://openalex.org/C161615301","wikidata":"https://www.wikidata.org/wiki/Q309396","display_name":"Keystroke logging","level":2,"score":0.7813835740089417},{"id":"https://openalex.org/C79540074","wikidata":"https://www.wikidata.org/wiki/Q3269465","display_name":"Keystroke dynamics","level":4,"score":0.7542970776557922},{"id":"https://openalex.org/C97931131","wikidata":"https://www.wikidata.org/wiki/Q5282087","display_name":"Discriminative model","level":2,"score":0.7039272785186768},{"id":"https://openalex.org/C116834253","wikidata":"https://www.wikidata.org/wiki/Q2039217","display_name":"Identification (biology)","level":2,"score":0.6915658712387085},{"id":"https://openalex.org/C2779343474","wikidata":"https://www.wikidata.org/wiki/Q3109175","display_name":"Context (archaeology)","level":2,"score":0.6612357497215271},{"id":"https://openalex.org/C148417208","wikidata":"https://www.wikidata.org/wiki/Q4825882","display_name":"Authentication (law)","level":2,"score":0.5686703324317932},{"id":"https://openalex.org/C184297639","wikidata":"https://www.wikidata.org/wiki/Q177765","display_name":"Biometrics","level":2,"score":0.45865297317504883},{"id":"https://openalex.org/C177264268","wikidata":"https://www.wikidata.org/wiki/Q1514741","display_name":"Set (abstract data type)","level":2,"score":0.4438628852367401},{"id":"https://openalex.org/C90805587","wikidata":"https://www.wikidata.org/wiki/Q10944557","display_name":"Word (group theory)","level":2,"score":0.43600213527679443},{"id":"https://openalex.org/C2778707766","wikidata":"https://www.wikidata.org/wiki/Q202064","display_name":"Phone","level":2,"score":0.41930773854255676},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.376674622297287},{"id":"https://openalex.org/C109297577","wikidata":"https://www.wikidata.org/wiki/Q161157","display_name":"Password","level":2,"score":0.3507494628429413},{"id":"https://openalex.org/C28490314","wikidata":"https://www.wikidata.org/wiki/Q189436","display_name":"Speech recognition","level":1,"score":0.3349500894546509},{"id":"https://openalex.org/C107457646","wikidata":"https://www.wikidata.org/wiki/Q207434","display_name":"Human\u2013computer interaction","level":1,"score":0.3303595781326294},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.10366669297218323},{"id":"https://openalex.org/C86803240","wikidata":"https://www.wikidata.org/wiki/Q420","display_name":"Biology","level":0,"score":0.0},{"id":"https://openalex.org/C138885662","wikidata":"https://www.wikidata.org/wiki/Q5891","display_name":"Philosophy","level":0,"score":0.0},{"id":"https://openalex.org/C4957475","wikidata":"https://www.wikidata.org/wiki/Q242186","display_name":"S/KEY","level":3,"score":0.0},{"id":"https://openalex.org/C59822182","wikidata":"https://www.wikidata.org/wiki/Q441","display_name":"Botany","level":1,"score":0.0},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.0},{"id":"https://openalex.org/C151730666","wikidata":"https://www.wikidata.org/wiki/Q7205","display_name":"Paleontology","level":1,"score":0.0},{"id":"https://openalex.org/C41895202","wikidata":"https://www.wikidata.org/wiki/Q8162","display_name":"Linguistics","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1145/3377404","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3377404","pdf_url":null,"source":{"id":"https://openalex.org/S4210174050","display_name":"ACM Transactions on Privacy and Security","issn_l":"2471-2566","issn":["2471-2566","2471-2574"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319798","host_organization_name":"Association for Computing Machinery","host_organization_lineage":["https://openalex.org/P4310319798"],"host_organization_lineage_names":["Association for Computing Machinery"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"ACM Transactions on Privacy and Security","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/10","score":0.6399999856948853,"display_name":"Reduced inequalities"}],"awards":[{"id":"https://openalex.org/G6196476560","display_name":null,"funder_award_id":"SaTC-1527795","funder_id":"https://openalex.org/F4320306076","funder_display_name":"National Science Foundation"}],"funders":[{"id":"https://openalex.org/F4320306076","display_name":"National Science Foundation","ror":"https://ror.org/021nxhr62"}],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":41,"referenced_works":["https://openalex.org/W351978010","https://openalex.org/W1504458272","https://openalex.org/W1983159352","https://openalex.org/W1991296274","https://openalex.org/W1992305526","https://openalex.org/W2010882865","https://openalex.org/W2039420041","https://openalex.org/W2045011071","https://openalex.org/W2052279280","https://openalex.org/W2083358597","https://openalex.org/W2084748102","https://openalex.org/W2109890574","https://openalex.org/W2115042198","https://openalex.org/W2120218993","https://openalex.org/W2126871739","https://openalex.org/W2128025167","https://openalex.org/W2141605726","https://openalex.org/W2149359921","https://openalex.org/W2153165775","https://openalex.org/W2154123601","https://openalex.org/W2170979474","https://openalex.org/W2293086481","https://openalex.org/W2464551054","https://openalex.org/W2522146934","https://openalex.org/W2550436552","https://openalex.org/W2554541689","https://openalex.org/W2577076311","https://openalex.org/W2582443164","https://openalex.org/W2588062372","https://openalex.org/W2610544804","https://openalex.org/W2762324543","https://openalex.org/W2776952547","https://openalex.org/W2790688901","https://openalex.org/W2792093046","https://openalex.org/W2799906768","https://openalex.org/W2804876597","https://openalex.org/W2807123141","https://openalex.org/W2881632231","https://openalex.org/W2891504192","https://openalex.org/W2944869487","https://openalex.org/W2950767304"],"related_works":["https://openalex.org/W2052279280","https://openalex.org/W3094144434","https://openalex.org/W2159333170","https://openalex.org/W3169822312","https://openalex.org/W2155670618","https://openalex.org/W2277743221","https://openalex.org/W1966864883","https://openalex.org/W2065920179","https://openalex.org/W1563893514","https://openalex.org/W3129147562"],"abstract_inverted_index":{"Research":[0],"in":[1,20,26,60,198,219],"Keystroke-Dynamics":[2],"(KD)":[3],"has":[4],"customarily":[5],"focused":[6],"on":[7,24,105,127,143,150,177,215,231],"temporal":[8],"features":[9,38,58,78,138,171,228,244,253],"without":[10],"considering":[11],"context":[12],"to":[13,203,245],"generate":[14],"user":[15,120,154,193],"templates":[16],"that":[17,36,135,182,226,254],"are":[18,139,146],"used":[19],"authentication.":[21,45],"Additionally,":[22],"work":[23,229,235],"KD":[25,243,252],"hand-held":[27,151,232],"devices":[28,152],"such":[29,260],"as":[30,261],"smart-phones":[31],"and":[32,71,108,124,130,145,207,212],"tablets":[33],"have":[34],"shown":[35],"these":[37,85,190],"alone":[39],"do":[40],"not":[41,140],"perform":[42,84,192],"satisfactorily":[43],"for":[44,153,237],"In":[46],"this":[47],"work,":[48],"we":[49,87],"analyze":[50,72],"the":[51,55,61,73,89,136,160,186,199],"discriminatory":[52,74,142],"power":[53,75],"of":[54,66,76,93,113,159,167,185,201,210,248,257],"most-used":[56],"conventional":[57,137,242],"found":[59],"literature,":[62],"propose":[63],"a":[64,111,162,183,238,246],"set":[65,247],"context-sensitive":[67,249],"or":[68,250],"word-specific":[69,170,251],"features,":[70,191],"proposed":[77,169,227],"using":[79,157,189,241],"their":[80],"classification":[81],"results.":[82],"To":[83],"tasks,":[86],"use":[88],"keystroke":[90],"data":[91],"consisting":[92],"over":[94,110],"650K":[95],"keystrokes,":[96],"collected":[97],"from":[98,240],"20":[99],"unique":[100],"users":[101,176],"during":[102],"different":[103],"activities":[104],"desktops,":[106],"tablets,":[107],"phones,":[109],"span":[112],"two":[114],"months.":[115],"On":[116],"an":[117],"average,":[118],"each":[119],"made":[121],"12.5K,":[122],"9K,":[123],"10K":[125],"keystrokes":[126],"desktop,":[128],"tablet,":[129],"phone,":[131],"respectively.":[132],"We":[133,180,223],"find":[134,181,225],"highly":[141],"desktops":[144],"only":[147],"marginally":[148],"better":[149],"identification.":[155],"By":[156],"information":[158,259],"context,":[161],"subset":[163],"(derived":[164],"after":[165],"analysis)":[166],"our":[168],"offers":[172],"superior":[173],"discrimination":[174],"among":[175],"all":[178],"devices.":[179,233],"majority":[184],"classifiers,":[187],"built":[188],"identification":[194],"well":[195],"with":[196],"accuracies":[197],"range":[200],"90%":[202],"97%,":[204],"average":[205],"precision":[206],"recall":[208],"values":[209],"0.914":[211],"0.901,":[213],"respectively,":[214],"balanced":[216],"test":[217],"samples":[218],"10-fold":[220],"cross":[221],"validation.":[222],"also":[224],"best":[230],"This":[234],"calls":[236],"shift":[239],"take":[255],"advantage":[256],"known":[258],"context.":[262]},"counts_by_year":[{"year":2024,"cited_by_count":4},{"year":2023,"cited_by_count":3},{"year":2022,"cited_by_count":4},{"year":2021,"cited_by_count":2},{"year":2020,"cited_by_count":2}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
