{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,7]],"date-time":"2024-09-07T20:55:23Z","timestamp":1725742523674},"reference-count":31,"publisher":"IEEE","license":[{"start":{"date-parts":[[2023,10,11]],"date-time":"2023-10-11T00:00:00Z","timestamp":1696982400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2023,10,11]],"date-time":"2023-10-11T00:00:00Z","timestamp":1696982400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2023,10,11]]},"DOI":"10.1109\/iccst59048.2023.10474263","type":"proceedings-article","created":{"date-parts":[[2024,3,25]],"date-time":"2024-03-25T19:06:57Z","timestamp":1711393617000},"page":"1-6","source":"Crossref","is-referenced-by-count":0,"title":["Biometric Authentication from sEMG: Assessing the Potential of Adaptive Chirp Mode Decomposition"],"prefix":"10.1109","author":[{"given":"Shivam","family":"Sharma","sequence":"first","affiliation":[{"name":"Defence Institute of Advanced Technology,Dept. of Electronics Engineering,Pune,India"}]},{"given":"Rishi Raj","family":"Sharma","sequence":"additional","affiliation":[{"name":"Defence Institute of Advanced Technology,Dept. of Electronics Engineering,Pune,India"}]}],"member":"263","reference":[{"doi-asserted-by":"publisher","key":"ref1","DOI":"10.1109\/MCI.2007.353415"},{"doi-asserted-by":"publisher","key":"ref2","DOI":"10.1002\/widm.1365"},{"doi-asserted-by":"publisher","key":"ref3","DOI":"10.1109\/ACCESS.2018.2849870"},{"doi-asserted-by":"publisher","key":"ref4","DOI":"10.1145\/3230632"},{"doi-asserted-by":"publisher","key":"ref5","DOI":"10.1109\/EMBC44109.2020.9175370"},{"doi-asserted-by":"publisher","key":"ref6","DOI":"10.1016\/B978-0-323-91197-9.00003-5"},{"doi-asserted-by":"publisher","key":"ref7","DOI":"10.4018\/978-1-7998-0326-3.ch006"},{"doi-asserted-by":"publisher","key":"ref8","DOI":"10.1007\/978-981-13-0923-6_57"},{"doi-asserted-by":"publisher","key":"ref9","DOI":"10.1682\/JRRD.2010.09.0177"},{"doi-asserted-by":"publisher","key":"ref10","DOI":"10.1109\/TBME.2003.813539"},{"doi-asserted-by":"publisher","key":"ref11","DOI":"10.1088\/1741-2560\/12\/4\/046005"},{"doi-asserted-by":"publisher","key":"ref12","DOI":"10.1109\/TBME.2013.2250502"},{"doi-asserted-by":"publisher","key":"ref13","DOI":"10.1109\/TNSRE.2014.2304470"},{"doi-asserted-by":"publisher","key":"ref14","DOI":"10.1007\/978-1-4757-4036-3"},{"key":"ref15","article-title":"Open access dataset for electromyography based multi-code biometric authentication","author":"Pradhan","year":"2022","journal-title":"arXiv preprint"},{"doi-asserted-by":"publisher","key":"ref16","DOI":"10.3389\/fbioe.2020.00058"},{"doi-asserted-by":"publisher","key":"ref17","DOI":"10.1109\/JSEN.2021.3079428"},{"doi-asserted-by":"publisher","key":"ref18","DOI":"10.1109\/JBHI.2021.3109595"},{"doi-asserted-by":"publisher","key":"ref19","DOI":"10.1109\/JIOT.2021.3074952"},{"doi-asserted-by":"publisher","key":"ref20","DOI":"10.1109\/TIM.2022.3180434"},{"doi-asserted-by":"publisher","key":"ref21","DOI":"10.1016\/j.ymssp.2018.06.052"},{"doi-asserted-by":"publisher","key":"ref22","DOI":"10.1109\/BIBM52615.2021.9669872"},{"doi-asserted-by":"publisher","key":"ref23","DOI":"10.1109\/10.204774"},{"doi-asserted-by":"publisher","key":"ref24","DOI":"10.14569\/IJACSA.2019.0100612"},{"doi-asserted-by":"publisher","key":"ref25","DOI":"10.3390\/computation7010012"},{"doi-asserted-by":"publisher","key":"ref26","DOI":"10.1016\/j.asoc.2012.03.035"},{"doi-asserted-by":"publisher","key":"ref27","DOI":"10.1016\/0141-5425(82)90021-8"},{"doi-asserted-by":"publisher","key":"ref28","DOI":"10.1016\/S0031-3203(96)00142-2"},{"doi-asserted-by":"publisher","key":"ref29","DOI":"10.1016\/j.patrec.2005.10.010"},{"doi-asserted-by":"publisher","key":"ref30","DOI":"10.1007\/978-3-642-03070-3_13"},{"doi-asserted-by":"publisher","key":"ref31","DOI":"10.1109\/TBIOM.2023.3299948"}],"event":{"name":"2023 IEEE International Carnahan Conference on Security Technology (ICCST)","start":{"date-parts":[[2023,10,11]]},"location":"Pune, India","end":{"date-parts":[[2023,10,15]]}},"container-title":["2023 IEEE International Carnahan Conference on Security Technology (ICCST)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/10474215\/10474227\/10474263.pdf?arnumber=10474263","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,3,26]],"date-time":"2024-03-26T22:04:25Z","timestamp":1711490665000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10474263\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,10,11]]},"references-count":31,"URL":"https:\/\/doi.org\/10.1109\/iccst59048.2023.10474263","relation":{},"subject":[],"published":{"date-parts":[[2023,10,11]]}}}