{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,8,26]],"date-time":"2024-08-26T17:04:24Z","timestamp":1724691864309},"reference-count":53,"publisher":"Institution of Engineering and Technology (IET)","issue":"2","license":[{"start":{"date-parts":[[2022,1,11]],"date-time":"2022-01-11T00:00:00Z","timestamp":1641859200000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/creativecommons.org\/licenses\/by-nc-nd\/4.0\/"},{"start":{"date-parts":[[2022,1,11]],"date-time":"2022-01-11T00:00:00Z","timestamp":1641859200000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/doi.wiley.com\/10.1002\/tdm_license_1.1"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IET Biometrics"],"published-print":{"date-parts":[[2022,3]]},"DOI":"10.1049\/bme2.12065","type":"journal-article","created":{"date-parts":[[2022,1,11]],"date-time":"2022-01-11T14:39:41Z","timestamp":1641911981000},"page":"157-170","source":"Crossref","is-referenced-by-count":10,"title":["Framework for user behavioural biometric identification using a\u00a0multimodal scheme with keystroke trajectory feature and recurrent neural network on a mobile platform"],"prefix":"10.1049","volume":"11","author":[{"ORCID":"http:\/\/orcid.org\/0000-0001-6396-4323","authenticated-orcid":false,"given":"Ka\u2010Wing","family":"Tse","sequence":"first","affiliation":[{"name":"School of Science and Technology Hong Kong Metropolitan University Hong Kong China"}]},{"ORCID":"http:\/\/orcid.org\/0000-0002-5421-7622","authenticated-orcid":false,"given":"Kevin","family":"Hung","sequence":"additional","affiliation":[{"name":"School of Science and Technology Hong Kong Metropolitan University Hong Kong China"}]}],"member":"265","published-online":{"date-parts":[[2022,1,11]]},"reference":[{"key":"e_1_2_9_2_1","doi-asserted-by":"publisher","DOI":"10.1145\/2785830.2785835"},{"key":"e_1_2_9_3_1","first-page":"243","volume-title":"SOUPS 14: Proceedings of the Tenth Symposium on Usable Privacy and Security","author":"Stobert E.","year":"2014"},{"key":"e_1_2_9_4_1","doi-asserted-by":"publisher","DOI":"10.1049\/iet\u2010ipr.2018.5972"},{"key":"e_1_2_9_5_1","doi-asserted-by":"publisher","DOI":"10.1109\/IIH-MSP.2012.17"},{"key":"e_1_2_9_6_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.patcog.2018.01.026"},{"issue":"2","key":"e_1_2_9_7_1","first-page":"020901","article-title":"Finger multibiometric cryptosystems: fusion strategy and template security","volume":"19","author":"Peng J.","year":"2014","journal-title":"J. Biomed. Opt"},{"key":"e_1_2_9_8_1","doi-asserted-by":"publisher","DOI":"10.1109\/I2MTC.2019.8827094"},{"key":"e_1_2_9_9_1","doi-asserted-by":"publisher","DOI":"10.1109\/SPIN48934.2020.9070853"},{"key":"e_1_2_9_10_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2017.2784352"},{"key":"e_1_2_9_11_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2018.06.020"},{"key":"e_1_2_9_12_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.neunet.2019.11.009"},{"key":"e_1_2_9_13_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-92627-8_17"},{"key":"e_1_2_9_14_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11042-018-6834-3"},{"key":"e_1_2_9_15_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-23222-5_4"},{"key":"e_1_2_9_16_1","doi-asserted-by":"publisher","DOI":"10.1109\/CSCloud.2016.23"},{"key":"e_1_2_9_17_1","first-page":"59","volume-title":"IWAISe: First International Workshop on Artificial Intelligence in Security","author":"Maheshwary S.","year":"2017"},{"key":"e_1_2_9_18_1","volume-title":"Recurrent neural network\u2010based user authentication for freely typed keystroke data","author":"Kim J.","year":"2018"},{"key":"e_1_2_9_19_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2020.101861"},{"key":"e_1_2_9_20_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS"},{"key":"e_1_2_9_21_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-981-15-1304-6_15"},{"key":"e_1_2_9_22_1","doi-asserted-by":"publisher","DOI":"10.1111\/2041\u2010210X.12453"},{"key":"e_1_2_9_23_1","doi-asserted-by":"publisher","DOI":"10.1038\/s41467\u2010020\u201019105\u20100"},{"key":"e_1_2_9_24_1","volume-title":"Review and perspective for distance based trajectory clustering","author":"Besse P.","year":"2015"},{"key":"e_1_2_9_25_1","article-title":"Hacker fakes German minister\u2019s fingerprints using photos of her hands","author":"Hern A.","year":"2014","journal-title":"The Guardian"},{"key":"e_1_2_9_26_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICTC.2016.7763394"},{"key":"e_1_2_9_27_1","doi-asserted-by":"publisher","DOI":"10.1155\/2018\/2567463"},{"key":"e_1_2_9_28_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-33622-0_4"},{"key":"e_1_2_9_29_1","doi-asserted-by":"publisher","DOI":"10.1002\/sec.776"},{"key":"e_1_2_9_30_1","doi-asserted-by":"publisher","DOI":"10.1109\/SPW.2016.12"},{"key":"e_1_2_9_31_1","doi-asserted-by":"publisher","DOI":"10.1109\/CSCS.2015.16"},{"key":"e_1_2_9_32_1","doi-asserted-by":"publisher","DOI":"10.1002\/spy2.48"},{"key":"e_1_2_9_33_1","doi-asserted-by":"publisher","DOI":"10.1145\/3230820.3230824"},{"key":"e_1_2_9_34_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11042\u2010010\u20100635\u20107"},{"key":"e_1_2_9_35_1","doi-asserted-by":"publisher","DOI":"10.1109\/ISCAIE.2019.8743995"},{"key":"e_1_2_9_36_1","volume-title":"Python 3 Reference Manual","author":"Van Rossum G.","year":"2009"},{"key":"e_1_2_9_37_1","doi-asserted-by":"publisher","DOI":"10.1109\/MCSE.2007.55"},{"key":"e_1_2_9_38_1","doi-asserted-by":"publisher","DOI":"10.1038\/s41586\u2010020\u20102649\u20102"},{"key":"e_1_2_9_39_1","first-page":"51","article-title":"Data structures for statistical computing in python","volume":"445","author":"McKinney W.","year":"2010","journal-title":"Proc. 9th Python Sci. Conf"},{"key":"e_1_2_9_40_1","first-page":"2825","article-title":"Scikit\u2010learn: machine learning in Python","volume":"12","author":"Pedregosa F.","year":"2011","journal-title":"J. Mach. Learn. Res"},{"key":"e_1_2_9_41_1","first-page":"265","volume-title":"12th $USENIX$ Symposium on Operating Systems Design and Implementation ($OSDI$ 16)","author":"Abadi M.","year":"2016"},{"key":"e_1_2_9_42_1","volume-title":"Keras","author":"Chollet F.","year":"2015"},{"key":"e_1_2_9_43_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2014.03.005"},{"key":"e_1_2_9_44_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2016.2636092"},{"key":"e_1_2_9_45_1","doi-asserted-by":"publisher","DOI":"10.1109\/ISCAIE47305.2020.9108839"},{"key":"e_1_2_9_46_1","first-page":"2553","volume-title":"Advances in Neural Information Processing Systems","author":"Szegedy C.","year":"2013"},{"key":"e_1_2_9_47_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2015.7298682"},{"key":"e_1_2_9_48_1","first-page":"123","volume-title":"The 28th Modern Artificial Intelligence and Cognitive Science Conference (MAICS)","author":"Lemley J.","year":"2017"},{"key":"e_1_2_9_49_1","doi-asserted-by":"publisher","DOI":"10.1007\/s41066\u2010019\u201000158\u20106"},{"key":"e_1_2_9_50_1","first-page":"3104","volume-title":"Advances in Neural Information Processing Systems 27","author":"Sutskever I.","year":"2014"},{"key":"e_1_2_9_51_1","first-page":"80","article-title":"Application of recurrent neural networks for user verification based on keystroke dynamics","volume":"3","author":"Kobojek P.","year":"2016","journal-title":"J. Telecommun. Inf. Technol"},{"key":"e_1_2_9_52_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.enconman.2018.04.021"},{"key":"e_1_2_9_53_1","doi-asserted-by":"publisher","DOI":"10.3390\/en11040705"},{"key":"e_1_2_9_54_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11042-013-1551-4"}],"container-title":["IET Biometrics"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/onlinelibrary.wiley.com\/doi\/pdf\/10.1049\/bme2.12065","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/onlinelibrary.wiley.com\/doi\/full-xml\/10.1049\/bme2.12065","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/onlinelibrary.wiley.com\/doi\/pdf\/10.1049\/bme2.12065","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,7,21]],"date-time":"2022-07-21T04:38:56Z","timestamp":1658378336000},"score":1,"resource":{"primary":{"URL":"https:\/\/onlinelibrary.wiley.com\/doi\/10.1049\/bme2.12065"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,1,11]]},"references-count":53,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2022,3]]}},"alternative-id":["10.1049\/bme2.12065"],"URL":"https:\/\/doi.org\/10.1049\/bme2.12065","archive":["Portico"],"relation":{},"ISSN":["2047-4938","2047-4946"],"issn-type":[{"value":"2047-4938","type":"print"},{"value":"2047-4946","type":"electronic"}],"subject":[],"published":{"date-parts":[[2022,1,11]]}}}