Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
research-article

Fine-Grained and Context-Aware Behavioral Biometrics for Pattern Lock on Smartphones

Published: 30 March 2021 Publication History

Abstract

Pattern lock has been widely used in smartphones as a simple and effective authentication mechanism, which however is shown to be vulnerable to various attacks. In this paper, we design a novel authentication system for more secure pattern unlocking on smartphones. The basic idea is to utilize various behavior information of the user during pattern unlocking as additional authentication fingerprints, so that even if the pattern password is leaked to an attacker, the system remains safe and protected. To accommodate a variety of user contexts by our system, a context-aware module is proposed to distinguish any of such contexts (e.g., body postures when drawing the pattern) and use it to guide the authentication. Moreover, we design a polyline weighted strategy with overlapping based on the consistency of pattern lock, which analyzes the behavior information of the user during the unlock process in a fine-grained manner and takes an overall consideration the results of different polylines. Based on 14,850 samples collected from 77 participants, we have extensively evaluated the proposed system. The results demonstrate that it outperforms state-of-the-art implicit authentication based pattern lock approaches, and that each key module in our system is effective.

References

[1]
Orean Alpar. 2015. Intelligent biometric pattern password authentication systems for touchscreens. Expert Systems with Applications 42, 17-18 (2015), 6286--6294. https://doi.org/10.1016/j.eswa.2015.04.052
[2]
Panagiotis Andriotis, George Oikonomou, Alexios Mylonas, and Theo Tryfonas. 2016. A study on usability and security features of the Android pattern lock screen. Information & Computer Security 24, 1 (2016), 53--72. https://doi.org/10.1108/ICS-01-2015-0001
[3]
Julio Angulo and Erik Wästlund. 2012. Exploring Touch-Screen Biometrics for User Identification on Smart Phones. In Privacy and Identity Management for Life, Jan Camenisch, Bruno Crispo, Simone Fischer-Hübner, Ronald Leenes, and Giovanni Russello (Eds.). Springer Berlin Heidelberg, Berlin, Heidelberg, 130--143. https://doi.org/10.1007/978-3-642-31668-5_10
[4]
Sunpreet S. Arora, Kai Cao, Anil K. Jain, and Nicholas G. Paulter. 2014. 3D Fingerprint Phantoms. In Proceedings of the 2014 22nd International Conference on Pattern Recognition (ICPR '14). IEEE Computer Society, USA, 684--689. https://doi.org/10.1109/ICPR.2014.128
[5]
Adam J. Aviv, Devon Budzitowski, and Ravi Kuber. 2015. Is Bigger Better? Comparing User-Generated Passwords on 3x3 vs. 4x4 Grid Sizes for Android's Pattern Unlock. In Proceedings of the 31st Annual Computer Security Applications Conference (Los Angeles, CA, USA) (ACSAC 2015). Association for Computing Machinery, New York, NY, USA, 301--310. https://doi.org/10.1145/2818000.2818014
[6]
Attaullah Buriro, Bruno Crispo, Filippo Delfrari, and Konrad Wrona. 2016. Hold and Sign: A Novel Behavioral Biometrics for Smartphone User Authentication. In 2016 IEEE Security and Privacy Workshops (SPW). 276--285. https://doi.org/10.1109/SPW.2016.20
[7]
Attaullah Buriro, Bruno Crispo, and Yury Zhauniarovich. 2017. Please hold on: Unobtrusive user authentication using smartphone's built-in sensors. In 2017 IEEE International Conference on Identity, Security and Behavior Analysis (ISBA). 1--8. https://doi.org/10.1109/ISBA.2017.7947684
[8]
Seunghun Cha, Sungsu Kwag, Hyoungshick Kim, and Jun Ho Huh. 2017. Boosting the Guessing Attack Performance on Android Lock Patterns with Smudge Attacks. In Proceedings of the 2017 ACM on Asia Conference on Computer and Communications Security (Abu Dhabi, United Arab Emirates) (ASIA CCS '17). Association for Computing Machinery, New York, NY, USA, 313--326. https://doi.org/10.1145/3052973.3052989
[9]
Huijie Chen, Fan Li, Wan Du, Song Yang, Matthew Conn, and Yu Wang. 2020. Listen to Your Fingers: User Authentication Based on Geometry Biometrics of Touch Gesture. Proc. ACM Interact. Mob. Wearable Ubiquitous Technol. 4, 3, Article 75 (Sept. 2020), 23 pages. https://doi.org/10.1145/3411809
[10]
Sun Chen, Wang Yang, and Jun Zheng. 2014. Dissecting pattern unlock: The effect of pattern strength meter on pattern selection. Journal of Information Security & Applications 19, 4-5 (2014), 308--320. https://doi.org/10.1016/j.jisa.2014.10.009
[11]
Geumhwan Cho, Jun Ho Huh, Junsung Cho, Seongyeol Oh, Youngbae Song, and Hyoungshick Kim. 2017. SysPal: System-Guided Pattern Locks for Android. In 2017 IEEE Symposium on Security and Privacy (SP). 338--356. https://doi.org/10.1109/SP.2017.61
[12]
Alexander De Luca, Alina Hang, Frederik Brudy, Christian Lindner, and Heinrich Hussmann. 2012. Touch Me Once and i Know It's You! Implicit Authentication Based on Touch Screen Patterns. In Proceedings of the SIGCHI Conference on Human Factors in Computing Systems (Austin, Texas, USA) (CHI '12). Association for Computing Machinery, New York, NY, USA, 987--996. https://doi.org/10.1145/2207676.2208544
[13]
Developers. [n.d.]. Use the geomagnetic field sensor.
[14]
Isao Echizen and Tateo Ogane. 2018. BiometricJammer: Use of Pseudo Fingerprint to Prevent Fingerprint Extraction from Camera Images without Inconveniencing Users. In 2018 IEEE International Conference on Systems, Man, and Cybernetics (SMC). 2825--2831. https://doi.org/10.1109/SMC.2018.00481
[15]
Tao Feng, Jun Yang, Zhixian Yan, Emmanuel Munguia Tapia, and Weidong Shi. 2014. TIPS: Context-Aware Implicit User Identification Using Touch Screen in Uncontrolled Environments. In Proceedings of the 15th Workshop on Mobile Computing Systems and Applications (Santa Barbara, California) (HotMobile '14). Association for Computing Machinery, New York, NY, USA, Article 9, 6 pages. https://doi.org/10.1145/2565585.2565592
[16]
S. Milton Ganesh, P. Vijayakumar, and L. Jegatha Deborah. 2017. A Secure Gesture Based Authentication Scheme to Unlock the Smartphones. In 2017 Second International Conference on Recent Trends and Challenges in Computational Models (ICRTCCM). 153--158. https://doi.org/10.1109/ICRTCCM.2017.31
[17]
Ines Goicoechea-Telleria, Ana Garcia-Peral, Anas Husseis, and Raul Sanchez-Reillo. 2018. Presentation Attack Detection Evaluation on Mobile Devices: Simplest Approach for Capturing and Lifting a Latent Fingerprint. In 2018 International Carnahan Conference on Security Technology (ICCST). 1--5. https://doi.org/10.1109/CCST.2018.8585605
[18]
Jonathan Gurary, Ye Zhu, Nahed Alnahash, and Huirong Fu. 2016. Implicit Authentication for Mobile Devices Using Typing Behavior. In Human Aspects of Information Security, Privacy, and Trust, Theo Tryfonas (Ed.), Vol. 9750. Springer International Publishing, Cham, 25--36. https://doi.org/10.1007/978-3-319-39381-0_3
[19]
Daniel Hintze, Matthias Füller, Sebastian Scholz, Rainhard D. Findling, Muhammad Muaaz, Philipp Kapfer, Eckhard Koch, and René Mayrhofer. 2019. CORMORANT: Ubiquitous Risk-Aware Multi-Modal Biometric Authentication across Mobile Devices. Proc. ACM Interact. Mob. Wearable Ubiquitous Technol. 3, 3, Article 85 (Sept. 2019), 23 pages. https://doi.org/10.1145/3351243
[20]
Seyedehzahra Hosseini. 2018. Fingerprint vulnerability: A survey. In 2018 4th International Conference on Web Research (ICWR). 70--77. https://doi.org/10.1109/ICWR.2018.8387240
[21]
Daiki Izumoto and Yasushi Yamazaki. 2019. Security enhancement for touch panel based user authentication on smartphones. In 2019 Asia-Pacific Signal and Information Processing Association Annual Summit and Conference (APSIPA ASC). 218--223. https://doi.org/10.1109/APSIPAASC47483.2019.9023212
[22]
Hassan Khan and Urs Hengartner. 2014. Towards Application-Centric Implicit Authentication on Smartphones. In Proceedings of the 15th Workshop on Mobile Computing Systems and Applications (Santa Barbara, California) (HotMobile '14). Association for Computing Machinery, New York, NY, USA, Article 10, 6 pages. https://doi.org/10.1145/2565585.2565590
[23]
Hassan Khan, Urs Hengartner, and Daniel Vogel. 2016. Targeted Mimicry Attacks on Touch Input Based Implicit Authentication Schemes. In Proceedings of the 14th Annual International Conference on Mobile Systems, Applications, and Services (Singapore, Singapore) (MobiSys '16). Association for Computing Machinery, New York, NY, USA, 387--398. https://doi.org/10.1145/2906388.2906404
[24]
Yeeun Ku, Leo Hyun Park, Sooyeon Shin, and Taekyoung Kwon. 2019. Draw It As Shown: Behavioral Pattern Lock for Mobile User Authentication. IEEE Access 7 (2019), 69363--69378. https://doi.org/10.1109/ACCESS.2019.2918647
[25]
Yuki Kubo, Ryosuke Takada, Buntarou Shizuki, and Shin Takahashi. 2017. Exploring Context-Aware User Interfaces for Smartphone-Smartwatch Cross-Device Interaction. Proc. ACM Interact. Mob. Wearable Ubiquitous Technol. 1, 3, Article 69 (Sept. 2017), 21 pages. https://doi.org/10.1145/3130934
[26]
Alona Levy, Ben Nassi, Yuval Elovici, and Erez Shmueli. 2018. Handwritten Signature Verification Using Wrist-Worn Devices. Proc. ACM Interact. Mob. Wearable Ubiquitous Technol. 2, 3, Article 119 (Sept. 2018), 26 pages. https://doi.org/10.1145/3264929
[27]
Yantao Li, Hailong Hu, and Gang Zhou. 2019. Using Data Augmentation in Continuous Authentication on Smartphones. IEEE Internet of Things Journal 6, 1 (2019), 628--640. https://doi.org/10.1109/JIOT.2018.2851185
[28]
Yantao Li, Hailong Hu, Gang Zhou, and Shaojiang Deng. 2018. Sensor-Based Continuous Authentication Using Cost-Effective Kernel Ridge Regression. IEEE Access 6 (2018), 32554--32565. https://doi.org/10.1109/ACCESS.2018.2841347
[29]
Buyu Liu. 2018. An Authentication Scheme Based On Gesture Recognition(In Chinese). Master's thesis. Beijing Jiaotong University.
[30]
Can Liu, Gradeigh D. Clark, and Janne Lindqvist. 2017. Guessing Attacks on User-Generated Gesture Passwords. Proc. ACM Interact. Mob. Wearable Ubiquitous Technol. 1, 1, Article 3 (March 2017), 24 pages. https://doi.org/10.1145/3053331
[31]
Chao Liang Liu, Cheng Jung Tsai, Ting Yi Chang, Wang Jui Tsai, and Po Kai Zhong. 2015. Implementing Multiple Biometric Features for a Recall-Based Graphical Keystroke Dynamics Authentication System on a Smart Phone. J. Netw. Comput. Appl. 53, C (July 2015), 128--139. https://doi.org/10.1016/j.jnca.2015.03.006
[32]
Yingqi Liu, Shiqing Ma, Yousra Aafer, Wen Chuan Lee, and Xiangyu Zhang. 2018. Trojaning Attack on Neural Networks. In Proceedings of the 25th Annual Network and Distributed System Security Symposium. NDSS 2018, San Diego, California, USA. https://doi.org/10.14722/ndss.2018.23300
[33]
Ahmed Mahfouz, Tarek M. Mahmoud, and Ahmed Sharaf Eldin. 2017. A survey on behavioral biometric authentication on smartphones. Journal of Information Security & Applications 37, dec. (2017), 28--37. https://doi.org/10.1016/j.jisa.2017.10.002
[34]
Weizhi Meng, Wenjuan Li, Duncan S. Wong, and Jianying Zhou. 2016. TMGuard: A Touch Movement-Based Security Mechanism for Screen Unlock Patterns on Smartphones. In Applied Cryptography and Network Security, Mark Manulis, Ahmad-Reza Sadeghi, and Steve Schneider (Eds.), Vol. 9696. Springer International Publishing, Cham, 629--647. https://doi.org/10.1007/978-3-319-39555-5_34
[35]
Michele Nappi, Stefano Ricciardi, and Massimo Tistarelli. 2018. Context awareness in biometric systems and methods: State of the art and future scenarios. Image & Vision Computing 76, AUG. (2018), 27--37. https://doi.org/10.1016/j.imavis.2018.05.001
[36]
Felix Ott, Mohamad Wehbi, Tim Hamann, Jens Barth, Björn Eskofier, and Christopher Mutschler. 2020. The OnHW Dataset: Online Handwriting Recognition from IMU-Enhanced Ballpoint Pens with Machine Learning. Proc. ACM Interact. Mob. Wearable Ubiquitous Technol. 4, 3, Article 92 (Sept. 2020), 20 pages. https://doi.org/10.1145/3411842
[37]
Aditya Singh Rathore, Weijin Zhu, Afee Daiyan, Chenhan Xu, Kun Wang, Feng Lin, Kui Ren, and Wenyao Xu. 2020. SonicPrint: A Generally Adoptable and Secure Fingerprint Biometrics in Smart Devices. In Proceedings of the 18th International Conference on Mobile Systems, Applications, and Services (Toronto, Ontario, Canada) (MobiSys '20). Association for Computing Machinery, New York, NY, USA, 121--134. https://doi.org/10.1145/3386901.3388939
[38]
Bernhard Schölkopf, John C. Platt, John C. Shawe-Taylor, Alex J. Smola, and Robert C. Williamson. 2001. Estimating the Support of a High-Dimensional Distribution. Neural Comput. 13, 7 (July 2001), 1443--1471. https://doi.org/10.1162/089976601750264965
[39]
Meng Shen, Zelin Liao, Liehuang Zhu, Ke Xu, and Xiaojiang Du. 2019. VLA: A Practical Visible Light-Based Attack on Face Recognition Systems in Physical World. Proc. ACM Interact. Mob. Wearable Ubiquitous Technol. 3, 3, Article 103 (Sept. 2019), 19 pages. https://doi.org/10.1145/3351261
[40]
Yilei Shi, Haimo Zhang, Kaixing Zhao, Jiashuo Cao, Mengmeng Sun, and Suranga Nanayakkara. 2020. Ready, Steady, Touch! Sensing Physical Contact with a Finger-Mounted IMU. Proc. ACM Interact. Mob. Wearable Ubiquitous Technol. 4, 2, Article 59 (June 2020), 25 pages. https://doi.org/10.1145/3397309
[41]
Zdeňka Sitová, Jaroslav Šedënka, Qing Yang, Ge Peng, Gang Zhou, Paolo Gasti, and Kiran S. Balagani. 2016. HMOG: New Behavioral Biometric Features for Continuous Authentication of Smartphone Users. IEEE Transactions on Information Forensics and Security 11, 5 (2016), 877--892. https://doi.org/10.1109/TIFS.2015.2506542
[42]
Youngbae Song, Geumhwan Cho, Seongyeol Oh, Hyoungshick Kim, and Jun Ho Huh. 2015. On the Effectiveness of Pattern Lock Strength Meters: Measuring the Strength of Real World Pattern Locks. In Proceedings of the 33rd Annual ACM Conference on Human Factors in Computing Systems (Seoul, Republic of Korea) (CHI '15). Association for Computing Machinery, New York, NY, USA, 2343--2352. https://doi.org/10.1145/2702123.2702365
[43]
Pin Shen Teh, Ning Zhang, Andrew Beng Jin Teoh, and Ke Chen. 2016. A Survey on Touch Dynamics Authentication in Mobile Devices. Comput. Secur. 59, C (June 2016), 210--235. https://doi.org/10.1016/j.cose.2016.03.003
[44]
Sebastian Uellenbeck, Markus Dürmuth, Christopher Wolf, and Thorsten Holz. 2013. Quantifying the Security of Graphical Passwords: The Case of Android Unlock Patterns. In Proceedings of the 2013 ACM SIGSAC Conference on Computer & Communications Security (Berlin, Germany) (CCS 13). Association for Computing Machinery, New York, NY, USA, 161--172. https://doi.org/10.1145/2508859.2516700
[45]
Florian Wahl and Oliver Amft. 2018. Data and Expert Models for Sleep Timing and Chronotype Estimation from Smartphone Context Data and Simulations. Proc. ACM Interact. Mob. Wearable Ubiquitous Technol. 2, 3, Article 139 (Sept. 2018), 28 pages. https://doi.org/10.1145/3264949
[46]
Renzhong Wang and Dan Tao. 2019. Context-Aware Implicit Authentication of Smartphone Users Based on Multi-Sensor Behavior. IEEE Access 7 (2019), 119654--119667. https://doi.org/10.1109/ACCESS.2019.2936034
[47]
Renzhong Wang and Dan Tao. 2019. Implicit Authentication Mechanism Based on Context Awareness for Smartphone(In Chinese). (2019), 1--6. https://doi.org/10.13190/j.jbupt.2019-043
[48]
Yuhua Wang, Chunhua Wu, Kangfeng Zheng, and Xiujuan Wang. 2019. Improving Reliability: User Authentication on Smartphones Using Keystroke Biometrics. IEEE Access 7 (2019), 26218--26228. https://doi.org/10.1109/ACCESS.2019.2891603
[49]
Susan Wiedenbeck, Jim Waters, Leonardo Sobrado, and Jean-Camille Birget. 2006. Design and Evaluation of a Shoulder-Surfing Resistant Graphical Password Scheme. In Proceedings of the Working Conference on Advanced Visual Interfaces (Venezia, Italy) (AVI '06). Association for Computing Machinery, New York, NY, USA, 177--184. https://doi.org/10.1145/1133265.1133303
[50]
Jiyun Wu and Zhide Chen. 2015. An Implicit Identity Authentication System Considering Changes of Gesture Based on Keystroke Behaviors. International Journal of Distributed Sensor Networks 2015 (06 2015), 1--16. https://doi.org/10.1155/2015/470274
[51]
Hui Xu, Yangfan Zhou, and Michael R. Lyu. 2014. Towards Continuous and Passive Authentication via Touch Biometrics: An Experimental Study on Smartphones. In 10th Symposium On Usable Privacy and Security (SOUPS 2014). USENIX Association, Menlo Park, CA, 187--198. https://www.usenix.org/conference/soups2014/proceedings/presentation/xu
[52]
Yafang Yang, Bin Guo, Zhu Wang, Mingyang Li, Zhiwen Yu, and Xingshe Zhou. 2019. BehaveSense: Continuous authentication for security-sensitive mobile apps using behavioral biometrics. Ad Hoc Networks 84 (2019), 9--18. https://doi.org/10.1016/j.adhoc.2018.09.015
[53]
Guixin Ye, Zhanyong Tang, Dingyi Fang, Xiaojiang Chen, Willy Wolff, Adam J. Aviv, and Zheng Wang. 2018. A Video-Based Attack for Android Pattern Lock. ACM Trans. Priv. Secur. 21, 4, Article 19 (July 2018), 31 pages. https://doi.org/10.1145/3230740
[54]
Muhammad Rehman Zafar and Munam Ali Shah. 2016. Fingerprint authentication and security risks in smart devices. In 2016 22nd International Conference on Automation and Computing (ICAC). IEEE, 548--553. https://doi.org/10.1109/IConAC.2016.7604977
[55]
Yongtuo Zhang, Wen Hu, Weitao Xu, Chun Tung Chou, and Jiankun Hu. 2018. Continuous Authentication Using Eye Movement Response of Implicit Visual Stimuli. Proc. ACM Interact. Mob. Wearable Ubiquitous Technol. 1, 4, Article 177 (Jan. 2018), 22 pages. https://doi.org/10.1145/3161410
[56]
Nan Zheng, Kun Bai, Hai Huang, and Haining Wang. 2014. You Are How You Touch: User Verification on Smartphones via Tapping Behaviors. In 2014 IEEE 22nd International Conference on Network Protocols. IEEE, 221--232. https://doi.org/10.1109/ICNP.2014.43
[57]
Man Zhou, Qian Wang, Jingxiao Yang, Qi Li, Feng Xiao, Zhibo Wang, and Xiaofeng Chen. 2018. PatternListener: Cracking Android Pattern Lock Using Acoustic Signals. In Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security (Toronto, Canada) (CCS '18). Association for Computing Machinery, New York, NY, USA, 1775--1787. https://doi.org/10.1145/3243734.3243777

Cited By

View all
  • (2024)User Authentication in the IoT and IIoT EnvironmentSmart and Agile Cybersecurity for IoT and IIoT Environments10.4018/979-8-3693-3451-5.ch008(169-194)Online publication date: 30-Jun-2024
  • (2024)SigningRing: Signature-based Authentication using Inertial Sensors on a Ring Form-factorProceedings of the Workshop on Body-Centric Computing Systems10.1145/3662009.3662019(11-16)Online publication date: 3-Jun-2024
  • (2024)FingerPattern: Securing Pattern Lock via Fingerprint-Dependent Friction SoundIEEE Transactions on Mobile Computing10.1109/TMC.2023.333814823:6(7210-7224)Online publication date: Jun-2024
  • Show More Cited By

Index Terms

  1. Fine-Grained and Context-Aware Behavioral Biometrics for Pattern Lock on Smartphones

    Recommendations

    Comments

    Information & Contributors

    Information

    Published In

    cover image Proceedings of the ACM on Interactive, Mobile, Wearable and Ubiquitous Technologies
    Proceedings of the ACM on Interactive, Mobile, Wearable and Ubiquitous Technologies  Volume 5, Issue 1
    March 2021
    1272 pages
    EISSN:2474-9567
    DOI:10.1145/3459088
    Issue’s Table of Contents
    Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

    Publisher

    Association for Computing Machinery

    New York, NY, United States

    Publication History

    Published: 30 March 2021
    Published in IMWUT Volume 5, Issue 1

    Permissions

    Request permissions for this article.

    Check for updates

    Author Tags

    1. context-aware
    2. implicit authentication
    3. pattern lock

    Qualifiers

    • Research-article
    • Research
    • Refereed

    Funding Sources

    Contributors

    Other Metrics

    Bibliometrics & Citations

    Bibliometrics

    Article Metrics

    • Downloads (Last 12 months)64
    • Downloads (Last 6 weeks)12
    Reflects downloads up to 15 Oct 2024

    Other Metrics

    Citations

    Cited By

    View all
    • (2024)User Authentication in the IoT and IIoT EnvironmentSmart and Agile Cybersecurity for IoT and IIoT Environments10.4018/979-8-3693-3451-5.ch008(169-194)Online publication date: 30-Jun-2024
    • (2024)SigningRing: Signature-based Authentication using Inertial Sensors on a Ring Form-factorProceedings of the Workshop on Body-Centric Computing Systems10.1145/3662009.3662019(11-16)Online publication date: 3-Jun-2024
    • (2024)FingerPattern: Securing Pattern Lock via Fingerprint-Dependent Friction SoundIEEE Transactions on Mobile Computing10.1109/TMC.2023.333814823:6(7210-7224)Online publication date: Jun-2024
    • (2024)Touch Authentication for Sharing Context Using Within-Group Similarity StructureIEEE Internet of Things Journal10.1109/JIOT.2024.340232311:17(28281-28296)Online publication date: 1-Sep-2024
    • (2024)The Self-Detection Method of the Puppet Attack in Biometric FingerprintingIEEE Internet of Things Journal10.1109/JIOT.2024.336571411:10(18824-18838)Online publication date: 15-May-2024
    • (2024)AttAuth: An Implicit Authentication Framework for Smartphone Users Using Multimodality DataIEEE Internet of Things Journal10.1109/JIOT.2023.331471711:4(6928-6942)Online publication date: 15-Feb-2024
    • (2024)A Systematic Review of Human Activity Recognition Based on Mobile Devices: Overview, Progress and TrendsIEEE Communications Surveys & Tutorials10.1109/COMST.2024.335759126:2(890-929)Online publication date: 23-Jan-2024
    • (2024)B2authPervasive and Mobile Computing10.1016/j.pmcj.2024.10188899:COnline publication date: 2-Jul-2024
    • (2024)M2auth: A multimodal behavioral biometric authentication using feature-level fusionNeural Computing and Applications10.1007/s00521-024-10403-yOnline publication date: 14-Sep-2024
    • (2024)Pattern unlocking guided multi‐modal continuous authentication for smartphone with multi‐branch context‐aware representation learning and auto encoderTransactions on Emerging Telecommunications Technologies10.1002/ett.490835:1Online publication date: 15-Jan-2024
    • Show More Cited By

    View Options

    Get Access

    Login options

    Full Access

    View options

    PDF

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader

    Media

    Figures

    Other

    Tables

    Share

    Share

    Share this Publication link

    Share on social media