{"id":"https://openalex.org/W2962326827","doi":"https://doi.org/10.1109/icc.2019.8761435","title":"ICAuth: Implicit and Continuous Authentication When the Screen Is Awake","display_name":"ICAuth: Implicit and Continuous Authentication When the Screen Is Awake","publication_year":2019,"publication_date":"2019-05-01","ids":{"openalex":"https://openalex.org/W2962326827","doi":"https://doi.org/10.1109/icc.2019.8761435","mag":"2962326827"},"language":"en","primary_location":{"is_oa":false,"landing_page_url":"https://doi.org/10.1109/icc.2019.8761435","pdf_url":null,"source":null,"license":null,"license_id":null,"version":null,"is_accepted":false,"is_published":false},"type":"article","type_crossref":"proceedings-article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5101623391","display_name":"Cong Wu","orcid":"https://orcid.org/0000-0002-0930-0283"},"institutions":[{"id":"https://openalex.org/I37461747","display_name":"Wuhan University","ror":"https://ror.org/033vjfk17","country_code":"CN","type":"education","lineage":["https://openalex.org/I37461747"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Cong Wu","raw_affiliation_strings":["School of Cyber Science and Engineering, Wuhan University, Wuhan, China"],"affiliations":[{"raw_affiliation_string":"School of Cyber Science and Engineering, Wuhan University, Wuhan, China","institution_ids":["https://openalex.org/I37461747"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5004999865","display_name":"Kun He","orcid":"https://orcid.org/0000-0003-3472-419X"},"institutions":[{"id":"https://openalex.org/I37461747","display_name":"Wuhan University","ror":"https://ror.org/033vjfk17","country_code":"CN","type":"education","lineage":["https://openalex.org/I37461747"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Kun He","raw_affiliation_strings":["School of Cyber Science and Engineering, Wuhan University, Wuhan, China"],"affiliations":[{"raw_affiliation_string":"School of Cyber Science and Engineering, Wuhan University, Wuhan, China","institution_ids":["https://openalex.org/I37461747"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100394917","display_name":"Jing Chen","orcid":"https://orcid.org/0000-0002-7212-5297"},"institutions":[{"id":"https://openalex.org/I4210105229","display_name":"City University of Hong Kong, Shenzhen Research Institute","ror":"https://ror.org/00xc0ma20","country_code":"CN","type":"education","lineage":["https://openalex.org/I4210105229"]},{"id":"https://openalex.org/I37461747","display_name":"Wuhan University","ror":"https://ror.org/033vjfk17","country_code":"CN","type":"education","lineage":["https://openalex.org/I37461747"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Jing Chen","raw_affiliation_strings":["Shenzhen Institute of Wuhan University, Shenzhen, China"],"affiliations":[{"raw_affiliation_string":"Shenzhen Institute of Wuhan University, Shenzhen, China","institution_ids":["https://openalex.org/I4210105229","https://openalex.org/I37461747"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5100529319","display_name":"Ruiying Du","orcid":"https://orcid.org/0000-0002-3634-3385"},"institutions":[],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Ruiying Du","raw_affiliation_strings":["Collaborative Innovation Center of Geospatial Technology, Wuhan, China"],"affiliations":[{"raw_affiliation_string":"Collaborative Innovation Center of Geospatial Technology, Wuhan, China","institution_ids":[]}]}],"institution_assertions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":[],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":0.527,"has_fulltext":true,"fulltext_origin":"ngrams","cited_by_count":7,"citation_normalized_percentile":{"value":0.580349,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":82,"max":83},"biblio":{"volume":null,"issue":null,"first_page":"1","last_page":"6"},"is_retracted":false,"is_paratext":false,"primary_topic":{"id":"https://openalex.org/T11800","display_name":"User Authentication and Security Systems","score":0.9999,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11800","display_name":"User Authentication and Security Systems","score":0.9999,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9951,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12238","display_name":"Green IT and Sustainability","score":0.99,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/information-sensitivity","display_name":"Information sensitivity","score":0.45615426}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.83149624},{"id":"https://openalex.org/C170130773","wikidata":"https://www.wikidata.org/wiki/Q216378","display_name":"Usability","level":2,"score":0.75813305},{"id":"https://openalex.org/C148417208","wikidata":"https://www.wikidata.org/wiki/Q4825882","display_name":"Authentication (law)","level":2,"score":0.6915417},{"id":"https://openalex.org/C109297577","wikidata":"https://www.wikidata.org/wiki/Q161157","display_name":"Password","level":2,"score":0.5919338},{"id":"https://openalex.org/C2779343474","wikidata":"https://www.wikidata.org/wiki/Q3109175","display_name":"Context (archaeology)","level":2,"score":0.56478053},{"id":"https://openalex.org/C186967261","wikidata":"https://www.wikidata.org/wiki/Q5082128","display_name":"Mobile device","level":2,"score":0.5589626},{"id":"https://openalex.org/C192209626","wikidata":"https://www.wikidata.org/wiki/Q190909","display_name":"Focus (optics)","level":2,"score":0.5561809},{"id":"https://openalex.org/C82876162","wikidata":"https://www.wikidata.org/wiki/Q17096504","display_name":"Latency (audio)","level":2,"score":0.47208282},{"id":"https://openalex.org/C107457646","wikidata":"https://www.wikidata.org/wiki/Q207434","display_name":"Human\u2013computer interaction","level":1,"score":0.4575249},{"id":"https://openalex.org/C137822555","wikidata":"https://www.wikidata.org/wiki/Q2587068","display_name":"Information sensitivity","level":2,"score":0.45615426},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.44663212},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.12940216},{"id":"https://openalex.org/C151730666","wikidata":"https://www.wikidata.org/wiki/Q7205","display_name":"Paleontology","level":1,"score":0.0},{"id":"https://openalex.org/C76155785","wikidata":"https://www.wikidata.org/wiki/Q418","display_name":"Telecommunications","level":1,"score":0.0},{"id":"https://openalex.org/C121332964","wikidata":"https://www.wikidata.org/wiki/Q413","display_name":"Physics","level":0,"score":0.0},{"id":"https://openalex.org/C120665830","wikidata":"https://www.wikidata.org/wiki/Q14620","display_name":"Optics","level":1,"score":0.0},{"id":"https://openalex.org/C86803240","wikidata":"https://www.wikidata.org/wiki/Q420","display_name":"Biology","level":0,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"is_oa":false,"landing_page_url":"https://doi.org/10.1109/icc.2019.8761435","pdf_url":null,"source":null,"license":null,"license_id":null,"version":null,"is_accepted":false,"is_published":false}],"best_oa_location":null,"sustainable_development_goals":[],"grants":[],"datasets":[],"versions":[],"referenced_works_count":17,"referenced_works":["https://openalex.org/W168460004","https://openalex.org/W1685464609","https://openalex.org/W2017658349","https://openalex.org/W2028570584","https://openalex.org/W2028849308","https://openalex.org/W2064060458","https://openalex.org/W2070381776","https://openalex.org/W2076618162","https://openalex.org/W2083295738","https://openalex.org/W2103388834","https://openalex.org/W2304304210","https://openalex.org/W2603199035","https://openalex.org/W2616905612","https://openalex.org/W2619786436","https://openalex.org/W2776818420","https://openalex.org/W2963930878","https://openalex.org/W87400274"],"related_works":["https://openalex.org/W4399463150","https://openalex.org/W2656445685","https://openalex.org/W2263162522","https://openalex.org/W2134080857","https://openalex.org/W2115218409","https://openalex.org/W2090949570","https://openalex.org/W2002093701","https://openalex.org/W1989237518","https://openalex.org/W143386018","https://openalex.org/W1004582678"],"abstract_inverted_index":{"Implicit":[0],"authentication":[1,36,59,138,207,217],"has":[2],"become":[3],"increasingly":[4],"popular":[5],"over":[6],"recent":[7],"years":[8],"due":[9],"to":[10,41,74,106,198],"the":[11,43,50,83,86,107,130,140,149,155,159,212],"fact":[12],"that":[13,99,200],"it":[14],"relieves":[15],"users":[16],"from":[17,55,176],"explicit":[18],"actions":[19],"such":[20],"as":[21],"remembering":[22],"and":[23,33,47,67,89,97,119,129,153,189,216],"entering":[24],"passwords.":[25],"This":[26],"paper":[27],"puts":[28],"forward":[29],"ICAuth,":[30],"a":[31,169],"general":[32],"simple":[34],"implicit":[35,57],"method":[37],"for":[38],"mobile":[39,95],"devices,":[40],"authenticate":[42],"current":[44,150],"user":[45,58,151],"implicitly":[46],"continuously":[48,152],"when":[49],"screen":[51],"is":[52,72,195,202],"awake.":[53],"Distinct":[54],"existing":[56],"methods":[60],"which":[61],"only":[62],"focus":[63],"on":[64,94],"behavioral":[65,87,101,127],"characteristics":[66,88,102],"ignore":[68],"contextual":[69,90,133],"information,":[70],"ICAuth":[71,135,166,201],"devised":[73],"understand":[75],"different":[76],"behaviors":[77],"in":[78],"various":[79],"contexts.":[80],"We":[81,164],"investigate":[82],"correlations":[84],"between":[85],"information":[91],"via":[92,147,157],"sensors":[93,110,118],"devices":[96],"observe":[98],"user's":[100],"are":[103,111],"strongly":[104],"related":[105],"context.":[108],"These":[109],"divided":[112],"into":[113],"two":[114],"kinds,":[115],"including":[116,172],"fine-grained":[117,123],"coarse-grained":[120,131],"sensors,":[121],"where":[122],"sensor":[124],"data":[125],"represent":[126],"features":[128],"depict":[132],"information.":[134],"provides":[136],"continuous":[137],"without":[139],"involvement":[141],"of":[142,161,184,187,191,222],"users.":[143],"It":[144],"promotes":[145],"security":[146],"authenticating":[148],"improves":[154],"usability":[156],"eliminating":[158],"limitation":[160],"specific":[162],"behaviors.":[163],"evaluate":[165],"comprehensively":[167],"with":[168,219],"large":[170],"dataset":[171],"340842":[173],"samples":[174],"collected":[175],"142":[177],"subjects.":[178],"Our":[179],"approach":[180],"achieves":[181],"an":[182],"accuracy":[183],"96.85%,":[185],"FNR":[186],"2.95%,":[188],"FPR":[190],"4.01%.":[192],"Security":[193],"analysis":[194],"also":[196],"conducted":[197],"demonstrate":[199],"resilient":[203],"against":[204],"common":[205],"smartphone":[206],"threats.":[208],"Finally,":[209],"we":[210],"show":[211],"low":[213],"power":[214],"consumption":[215],"latency":[218],"2.2":[220],"seconds":[221],"ICAuth.":[223]},"cited_by_api_url":"https://api.openalex.org/works?filter=cites:W2962326827","counts_by_year":[{"year":2024,"cited_by_count":4},{"year":2022,"cited_by_count":2},{"year":2020,"cited_by_count":1}],"updated_date":"2025-01-19T09:34:27.105941","created_date":"2019-07-23"}