{"id":"https://openalex.org/W3038214419","doi":"https://doi.org/10.1109/jiot.2020.3006870","title":"CaIAuth: Context-Aware Implicit Authentication When the Screen Is Awake","display_name":"CaIAuth: Context-Aware Implicit Authentication When the Screen Is Awake","publication_year":2020,"publication_date":"2020-07-03","ids":{"openalex":"https://openalex.org/W3038214419","doi":"https://doi.org/10.1109/jiot.2020.3006870","mag":"3038214419"},"language":"en","primary_location":{"is_oa":false,"landing_page_url":"https://doi.org/10.1109/jiot.2020.3006870","pdf_url":null,"source":{"id":"https://openalex.org/S2480266640","display_name":"IEEE Internet of Things Journal","issn_l":"2327-4662","issn":["2327-4662","2372-2541"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":null,"is_accepted":false,"is_published":false},"type":"article","type_crossref":"journal-article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5101623391","display_name":"Cong Wu","orcid":"https://orcid.org/0000-0002-0930-0283"},"institutions":[{"id":"https://openalex.org/I37461747","display_name":"Wuhan University","ror":"https://ror.org/033vjfk17","country_code":"CN","type":"education","lineage":["https://openalex.org/I37461747"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Cong Wu","raw_affiliation_strings":["School of Cyber Science and Engineering, Wuhan University, Wuhan, China"],"affiliations":[{"raw_affiliation_string":"School of Cyber Science and Engineering, Wuhan University, Wuhan, China","institution_ids":["https://openalex.org/I37461747"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5004999865","display_name":"Kun He","orcid":"https://orcid.org/0000-0003-3472-419X"},"institutions":[{"id":"https://openalex.org/I37461747","display_name":"Wuhan University","ror":"https://ror.org/033vjfk17","country_code":"CN","type":"education","lineage":["https://openalex.org/I37461747"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Kun He","raw_affiliation_strings":["School of Cyber Science and Engineering, Wuhan University, Wuhan, China"],"affiliations":[{"raw_affiliation_string":"School of Cyber Science and Engineering, Wuhan University, Wuhan, China","institution_ids":["https://openalex.org/I37461747"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100394917","display_name":"Jing Chen","orcid":"https://orcid.org/0000-0002-7212-5297"},"institutions":[{"id":"https://openalex.org/I37461747","display_name":"Wuhan University","ror":"https://ror.org/033vjfk17","country_code":"CN","type":"education","lineage":["https://openalex.org/I37461747"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Jing Chen","raw_affiliation_strings":["School of Cyber Science and Engineering and Shenzhen Institute, Wuhan University, Wuhan, China"],"affiliations":[{"raw_affiliation_string":"School of Cyber Science and Engineering and Shenzhen Institute, Wuhan University, Wuhan, China","institution_ids":["https://openalex.org/I37461747"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100529319","display_name":"Ruiying Du","orcid":"https://orcid.org/0000-0002-3634-3385"},"institutions":[{"id":"https://openalex.org/I37461747","display_name":"Wuhan University","ror":"https://ror.org/033vjfk17","country_code":"CN","type":"education","lineage":["https://openalex.org/I37461747"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Ruiying Du","raw_affiliation_strings":["School of Cyber Science and Engineering and the Collaborative Innovation Center of Geospatial Technology, Wuhan University, Wuhan, China"],"affiliations":[{"raw_affiliation_string":"School of Cyber Science and Engineering and the Collaborative Innovation Center of Geospatial Technology, Wuhan University, Wuhan, China","institution_ids":["https://openalex.org/I37461747"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5100666554","display_name":"Yang Xiang","orcid":"https://orcid.org/0000-0001-5252-0831"},"institutions":[{"id":"https://openalex.org/I57093077","display_name":"Swinburne University of Technology","ror":"https://ror.org/031rekg67","country_code":"AU","type":"education","lineage":["https://openalex.org/I57093077"]}],"countries":["AU"],"is_corresponding":false,"raw_author_name":"Yang Xiang","raw_affiliation_strings":["School of Software and Electrical Engineering, Swinburne University of Technology, Hawthorn, VIC, Australia"],"affiliations":[{"raw_affiliation_string":"School of Software and Electrical Engineering, Swinburne University of Technology, Hawthorn, VIC, Australia","institution_ids":["https://openalex.org/I57093077"]}]}],"institution_assertions":[],"countries_distinct_count":2,"institutions_distinct_count":2,"corresponding_author_ids":[],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":1.332,"has_fulltext":false,"cited_by_count":11,"citation_normalized_percentile":{"value":0.853588,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":87,"max":88},"biblio":{"volume":"7","issue":"12","first_page":"11420","last_page":"11430"},"is_retracted":false,"is_paratext":false,"primary_topic":{"id":"https://openalex.org/T11800","display_name":"User Authentication and Security Systems","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11800","display_name":"User Authentication and Security Systems","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9997,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12034","display_name":"Digital and Cyber Forensics","score":0.9925,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/lock","display_name":"Lock (firearm)","score":0.49153027},{"id":"https://openalex.org/keywords/word-error-rate","display_name":"Word error rate","score":0.44164455}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.89120877},{"id":"https://openalex.org/C109297577","wikidata":"https://www.wikidata.org/wiki/Q161157","display_name":"Password","level":2,"score":0.77406657},{"id":"https://openalex.org/C148417208","wikidata":"https://www.wikidata.org/wiki/Q4825882","display_name":"Authentication (law)","level":2,"score":0.69910455},{"id":"https://openalex.org/C2779343474","wikidata":"https://www.wikidata.org/wiki/Q3109175","display_name":"Context (archaeology)","level":2,"score":0.66062623},{"id":"https://openalex.org/C170130773","wikidata":"https://www.wikidata.org/wiki/Q216378","display_name":"Usability","level":2,"score":0.6258929},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.522772},{"id":"https://openalex.org/C174839445","wikidata":"https://www.wikidata.org/wiki/Q1134386","display_name":"Lock (firearm)","level":2,"score":0.49153027},{"id":"https://openalex.org/C2779960059","wikidata":"https://www.wikidata.org/wiki/Q7113681","display_name":"Overhead (engineering)","level":2,"score":0.47321716},{"id":"https://openalex.org/C141492731","wikidata":"https://www.wikidata.org/wiki/Q1052621","display_name":"Message authentication code","level":3,"score":0.4724945},{"id":"https://openalex.org/C107457646","wikidata":"https://www.wikidata.org/wiki/Q207434","display_name":"Human\u2013computer interaction","level":1,"score":0.4468985},{"id":"https://openalex.org/C40969351","wikidata":"https://www.wikidata.org/wiki/Q3516228","display_name":"Word error rate","level":2,"score":0.44164455},{"id":"https://openalex.org/C177264268","wikidata":"https://www.wikidata.org/wiki/Q1514741","display_name":"Set (abstract data type)","level":2,"score":0.41476595},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.24397984},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.22042927},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.07549769},{"id":"https://openalex.org/C151730666","wikidata":"https://www.wikidata.org/wiki/Q7205","display_name":"Paleontology","level":1,"score":0.0},{"id":"https://openalex.org/C86803240","wikidata":"https://www.wikidata.org/wiki/Q420","display_name":"Biology","level":0,"score":0.0},{"id":"https://openalex.org/C78519656","wikidata":"https://www.wikidata.org/wiki/Q101333","display_name":"Mechanical engineering","level":1,"score":0.0},{"id":"https://openalex.org/C127413603","wikidata":"https://www.wikidata.org/wiki/Q11023","display_name":"Engineering","level":0,"score":0.0},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"is_oa":false,"landing_page_url":"https://doi.org/10.1109/jiot.2020.3006870","pdf_url":null,"source":{"id":"https://openalex.org/S2480266640","display_name":"IEEE Internet of Things Journal","issn_l":"2327-4662","issn":["2327-4662","2372-2541"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":null,"is_accepted":false,"is_published":false}],"best_oa_location":null,"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/16","display_name":"Peace, justice, and strong institutions","score":0.69}],"grants":[{"funder":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China","award_id":"61572380"},{"funder":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China","award_id":"61702379"},{"funder":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China","award_id":"61972136"},{"funder":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China","award_id":"U1836202"},{"funder":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China","award_id":"61772383"},{"funder":"https://openalex.org/F4320326705","funder_display_name":"Science, Technology and Innovation Commission of Shenzhen Municipality","award_id":"JCYJ20170303170108208"}],"datasets":[],"versions":[],"referenced_works_count":33,"referenced_works":["https://openalex.org/W1492832934","https://openalex.org/W1685464609","https://openalex.org/W2076618162","https://openalex.org/W2097546075","https://openalex.org/W2105378351","https://openalex.org/W2105497548","https://openalex.org/W2144182447","https://openalex.org/W2156017586","https://openalex.org/W2225611246","https://openalex.org/W2304304210","https://openalex.org/W2345317019","https://openalex.org/W2401233188","https://openalex.org/W2509042760","https://openalex.org/W2514743770","https://openalex.org/W2603199035","https://openalex.org/W2613395272","https://openalex.org/W2616905612","https://openalex.org/W2619786436","https://openalex.org/W2775795276","https://openalex.org/W2780577826","https://openalex.org/W2884068903","https://openalex.org/W2893698725","https://openalex.org/W2944963830","https://openalex.org/W2962326827","https://openalex.org/W2963778754","https://openalex.org/W2963857521","https://openalex.org/W2963951026","https://openalex.org/W3101667008","https://openalex.org/W3159649695","https://openalex.org/W4229706427","https://openalex.org/W4254182148","https://openalex.org/W46659105","https://openalex.org/W87400274"],"related_works":["https://openalex.org/W4384303975","https://openalex.org/W4220718301","https://openalex.org/W3048245612","https://openalex.org/W2293472844","https://openalex.org/W2166668397","https://openalex.org/W2116285675","https://openalex.org/W2061637199","https://openalex.org/W1980599209","https://openalex.org/W1555715488","https://openalex.org/W1533309011"],"abstract_inverted_index":{"Relieving":[0],"users":[1,124],"from":[2,142],"the":[3,29,43,63,105],"burden":[4],"of":[5,107],"remembering":[6],"and":[7,15,77,96,115,125,162,171,182],"inputting":[8],"authentication":[9,19,75,90,180],"information":[10],"explicitly,":[11],"such":[12,39],"as":[13,40],"passwords/PINs":[14],"lock":[16],"patterns,":[17],"implicit":[18,31,89],"mechanisms":[20],"have":[21],"gained":[22],"an":[23],"increasing":[24],"concern.":[25],"When":[26],"providing":[27],"authentication,":[28],"existing":[30,71],"methods":[32,72],"only":[33],"depend":[34],"on":[35,42],"a":[36,49,55,86,100,117,137,153,178],"specific":[37],"behavior,":[38],"typing":[41],"screen,":[44],"performing":[45],"gestures,":[46],"or":[47],"taking":[48],"walk.":[50],"However,":[51],"in":[52,99],"real":[53],"applications,":[54],"user's":[56],"behavioral":[57],"characteristics":[58,98],"are":[59],"also":[60],"decided":[61],"by":[62],"context":[64,97],"where":[65],"behavior":[66,95],"is":[67,163],"performed.":[68],"Thus,":[69],"those":[70],"show":[73,148],"limited":[74],"accuracy":[76],"usability.":[78],"To":[79],"address":[80],"these":[81],"issues,":[82],"we":[83],"propose":[84],"CaIAuth,":[85],"reliable":[87],"context-aware":[88,118],"framework,":[91],"which":[92],"profiles":[93],"users'":[94],"holistic":[101],"fashion.":[102],"It":[103],"observes":[104],"states":[106],"context-sensing":[108],"entities":[109],"for":[110],"different":[111],"smartphone":[112],"usage":[113],"patterns":[114],"builds":[116],"model":[119],"to":[120,132],"distinguish":[121],"between":[122],"legitimate":[123],"illegal":[126],"ones.":[127],"We":[128],"conducted":[129],"extensive":[130],"experiments":[131],"evaluate":[133],"system":[134,151],"performance":[135],"with":[136],"large":[138],"data":[139],"set":[140],"collected":[141],"142":[143],"subjects.":[144],"The":[145],"experimental":[146],"results":[147],"that":[149],"our":[150],"achieves":[152,177],"low":[154,179],"equal":[155],"error":[156],"rate":[157],"(EER)":[158],"(e.g.,":[159],"less":[160],"7%)":[161],"resilient":[164],"against":[165],"common":[166],"threats,":[167],"including":[168],"zero-effect":[169],"attack":[170],"mimicry":[172],"attack.":[173],"In":[174],"addition,":[175],"CaIAuth":[176],"delay":[181],"overhead.":[183]},"cited_by_api_url":"https://api.openalex.org/works?filter=cites:W3038214419","counts_by_year":[{"year":2024,"cited_by_count":4},{"year":2023,"cited_by_count":4},{"year":2021,"cited_by_count":1}],"updated_date":"2024-12-28T23:26:24.389534","created_date":"2020-07-10"}