[1] ALGHAMDI S J, ELREFAEI L A.Dynamic authentication of smartphone users based on touchscreen gestures[J].Arabian Journal for Science and Engineering, 2018, 43(2):789-810. [2] LI Y T, ZOU B, DENG S J, et al.Using feature fusion strategies in continuous authentication on smartphones[J].IEEE Internet Computing, 2020, 24(2):49-56. [3] EHATISHAM U H, AZAM A M, NAEEM U, et al.Continuous authentication of smartphone users based on activity pattern recognition using passive mobile sensing[J].Journal of Network and Computer Applications, 2018, 109(1):24-35. [4] GARBUZ A, EPISHKINA A, KOGOS K.Continuous authentication of smartphone users via swipes and taps analysis[C]//Proceedings of 2019 European Intelligence and Security Informatics Conference.Washington D.C., USA:IEEE Press, 2019:48-53. [5] VOLAKA H C, ALPTEKIN G, BASAR O E, et al.Towards continuous authentication on mobile phones using deep learning models[J].Procedia Computer Science, 2019, 155:177-184. [6] SHEN C, LI Y X, CHEN Y F, et al.Performance analysis of multi-motion sensor behavior for active smartphone authentication[J].IEEE Transactions on Information Forensics and Security, 2017, 13(1):48-62. [7] SITOVÁ Z, ŠEDĚNKA J, YANG Q, et al.HMOG:new behavioral biometric features for continuous authentication of smartphone users[J].IEEE Transactions on Information Forensics and Security, 2016, 11(5):877-892. [8] DIEZ F P, TOUCEDA D S, SIERRA J M, et al.Toward self-authenticable wearable devices[J].IEEE Wireless Communications, 2015, 22(1):36-43. [9] LEE W H, LEE R.Implicit sensor-based authentication of smartphone users with smartwatch[C]//Proceedings of 2016 Hardware and Architectural Support for Security and Privacy.New York, USA:ACM Press, 2016:1-8. [10] WANG F, LI Z J, HAN J S.Continuous user authentication by contactless wireless sensing[J].IEEE Internet of Things Journal, 2019, 6(5):8323-8331. [11] ACAR A, AKSU H, ULUAGAC A S, et al.A usable and robust continuous authentication framework using wearables[J].IEEE Transactions on Mobile Computing, 2021, 20(6):2140-2153. [12] LEE H, HWANG J Y, LEE S, et al.A parameterized model to select discriminating features on keystroke dynamics authentication on smartphones[J].Pervasive and Mobile Computing, 2019, 54:45-57. [13] ALSULTAN A, WARWICK K, WEI H.Improving the performance of free-text keystroke dynamics authentication by fusion[J].Applied Soft Computing, 2017, 70(2):1024-1033. [14] LU X F, ZHANG S F, YI S W.Continuous authentication by free-text keystroke based on CNN plus RNN[J].Procedia Computer Science, 2019, 147(1):314-318. [15] HO J C, KANG D K.Mini-batch bagging and attribute ranking for accurate user authentication in keystroke dynamics[J].Pattern Recognition, 2017, 70(10):139-151. [16] PENG G, ZHOU G, DAVID T N, et al.Continuous authentication with touch behavioral biometrics and voice on wearable glasses[J].IEEE Transactions on Human Machine Systems, 2017, 47(3):404-416. [17] 杨力, 马卓茹, 张程辉, 等.基于步态特征的移动平台持续认证方案[J].通信学报, 2019, 4(7):126-134. YANG L, MA Z R, ZHANG C H, et al Mobile platform continuous authentication scheme based on gait characteristics[J].Journal on Communications, 2019, 40(7):126-134.(in Chinese) [18] TRIVINO G, ALVAREZ A, BAILADOR G.Application of the computational theory of perceptions to human gait pattern recognition[J].Pattern Recognition, 2010, 43(7):2572-2581. [19] BO C, ZHANG L, JUNG T, et al.Continuous user identification via touch and movement behavioral biometrics[C]//Proceedings of the 33rd International Performance Computing and Communications Conference.Washington D.C., USA:IEEE Press, 2014:1-8. [20] FRANK M, BIEDERT R, MA E, et al.Touchalytics:on the applicability of touchscreen input as a behavioral biometric for continuous authentication[J].IEEE Transactions on Information Forensics and Security, 2012, 8(1):136-148. [21] GONG N Z, PAYER M, MOAZZEZI R, et al.Forgery-resistant touch-based authentication on mobile devices[J].Hydrological Processes, 2015, 26(23):499-510. [22] WANG X, YU T, MENGSHOEL O, et al.Towards continuous and passive authentication across mobile devices:an empirical study[C]//Proceedings of the 10th ACM Conference on Distributed and Event-based Systems.New York, USA:ACM Press, 2017:35-45. [23] YANG Y F, GUO B, WANG Z, et al.BehaveSense:continuous authentication for security-sensitive mobile APPs using behavioral biometrics[J].Ad Hoc Networks, 2019, 84(1):9-18. [24] CENELEC.Alarm and electronic security systems, electronic access control systems.system and components requirements:BSEN60839-11-1[S].London, UK:Brithsh Standard, 2013:62. [25] JOSE C J, RAJASREE M S.Implicit continuous user authentication using swipe actions on mobile touch screen with ANN classifier[C]//Proceedings of International Conference on Artificial Intelligence, Smart Grid and Smart City Applications.Berlin, Germany:Springer, 2020:353-363. [26] CHANG I, LOW C Y, CHOI S, et al.Kernel deep regression network for touch-stroke dynamics authentication[J].IEEE Signal Processing Letters, 2018, 25(7):1109-1113. [27] SHEN C, ZHANG Y, GUAN X H, et al.Performance analysis of touch-interaction behavior for active smartphone authentication[J].IEEE Transactions on Information Forensics and Security, 2016, 11(3):498-513. [28] QIAO M Y, ZHANG S Y, SUNG A H, et al.A novel touchscreen-based authentication scheme using static and dynamic hand biometrics[C]//Proceedings of the 39th Annual Computer Software and Applications Conference.New York, USA:ACM Press.2015:494-503. |