iBet uBet web content aggregator. Adding the entire web to your favor.
iBet uBet web content aggregator. Adding the entire web to your favor.



Link to original content: https://api.openalex.org/works/doi:10.1177/1550147719899371
{"id":"https://openalex.org/W2999880567","doi":"https://doi.org/10.1177/1550147719899371","title":"Mobile terminal identity authentication system based on behavioral characteristics","display_name":"Mobile terminal identity authentication system based on behavioral characteristics","publication_year":2020,"publication_date":"2020-01-01","ids":{"openalex":"https://openalex.org/W2999880567","doi":"https://doi.org/10.1177/1550147719899371","mag":"2999880567"},"language":"en","primary_location":{"is_oa":true,"landing_page_url":"https://doi.org/10.1177/1550147719899371","pdf_url":"https://journals.sagepub.com/doi/pdf/10.1177/1550147719899371","source":{"id":"https://openalex.org/S64417657","display_name":"International Journal of Distributed Sensor Networks","issn_l":"1550-1329","issn":["1550-1329","1550-1477"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310319869","host_organization_name":"Hindawi Publishing Corporation","host_organization_lineage":["https://openalex.org/P4310319869"],"host_organization_lineage_names":["Hindawi Publishing Corporation"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true},"type":"article","type_crossref":"journal-article","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"gold","oa_url":"https://journals.sagepub.com/doi/pdf/10.1177/1550147719899371","any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5062053036","display_name":"Xiaoshi Liang","orcid":null},"institutions":[{"id":"https://openalex.org/I183067930","display_name":"Shanghai Jiao Tong University","ror":"https://ror.org/0220qvk04","country_code":"CN","type":"education","lineage":["https://openalex.org/I183067930"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Xiaoshi Liang","raw_affiliation_strings":["School of Cyber Science and Engineering, Shanghai Jiao Tong University, Shanghai, China"],"affiliations":[{"raw_affiliation_string":"School of Cyber Science and Engineering, Shanghai Jiao Tong University, Shanghai, China","institution_ids":["https://openalex.org/I183067930"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5066205926","display_name":"Futai Zou","orcid":"https://orcid.org/0000-0002-5898-7317"},"institutions":[{"id":"https://openalex.org/I183067930","display_name":"Shanghai Jiao Tong University","ror":"https://ror.org/0220qvk04","country_code":"CN","type":"education","lineage":["https://openalex.org/I183067930"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Futai Zou","raw_affiliation_strings":["School of Cyber Science and Engineering, Shanghai Jiao Tong University, Shanghai, China"],"affiliations":[{"raw_affiliation_string":"School of Cyber Science and Engineering, Shanghai Jiao Tong University, Shanghai, China","institution_ids":["https://openalex.org/I183067930"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5053874757","display_name":"Linsen Li","orcid":"https://orcid.org/0000-0003-0967-8160"},"institutions":[{"id":"https://openalex.org/I183067930","display_name":"Shanghai Jiao Tong University","ror":"https://ror.org/0220qvk04","country_code":"CN","type":"education","lineage":["https://openalex.org/I183067930"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Linsen Li","raw_affiliation_strings":["School of Cyber Science and Engineering, Shanghai Jiao Tong University, Shanghai, China"],"affiliations":[{"raw_affiliation_string":"School of Cyber Science and Engineering, Shanghai Jiao Tong University, Shanghai, China","institution_ids":["https://openalex.org/I183067930"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5100709379","display_name":"Ping Yi","orcid":"https://orcid.org/0000-0003-4530-5118"},"institutions":[{"id":"https://openalex.org/I183067930","display_name":"Shanghai Jiao Tong University","ror":"https://ror.org/0220qvk04","country_code":"CN","type":"education","lineage":["https://openalex.org/I183067930"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Ping Yi","raw_affiliation_strings":["School of Cyber Science and Engineering, Shanghai Jiao Tong University, Shanghai, China"],"affiliations":[{"raw_affiliation_string":"School of Cyber Science and Engineering, Shanghai Jiao Tong University, Shanghai, China","institution_ids":["https://openalex.org/I183067930"]}]}],"institution_assertions":[],"countries_distinct_count":1,"institutions_distinct_count":1,"corresponding_author_ids":["https://openalex.org/A5066205926"],"corresponding_institution_ids":["https://openalex.org/I183067930"],"apc_list":{"value":2200,"currency":"USD","value_usd":2200,"provenance":"doaj"},"apc_paid":{"value":2200,"currency":"USD","value_usd":2200,"provenance":"doaj"},"fwci":2.974,"has_fulltext":false,"cited_by_count":12,"citation_normalized_percentile":{"value":0.948601,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":88,"max":89},"biblio":{"volume":"16","issue":"1","first_page":"155014771989937","last_page":"155014771989937"},"is_retracted":false,"is_paratext":false,"primary_topic":{"id":"https://openalex.org/T11800","display_name":"User Authentication Methods and Security Measures","score":0.9999,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11800","display_name":"User Authentication Methods and Security Measures","score":0.9999,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10828","display_name":"Biometric Recognition and Security Systems","score":0.9962,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10388","display_name":"Digital Image Watermarking Techniques","score":0.9885,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/upload","display_name":"Upload","score":0.65438414},{"id":"https://openalex.org/keywords/image-authentication","display_name":"Image Authentication","score":0.579512},{"id":"https://openalex.org/keywords/authentication","display_name":"Authentication","score":0.571416},{"id":"https://openalex.org/keywords/continuous-authentication","display_name":"Continuous Authentication","score":0.536439},{"id":"https://openalex.org/keywords/mode","display_name":"Mode (computer interface)","score":0.4895035},{"id":"https://openalex.org/keywords/perceptron","display_name":"Perceptron","score":0.44309536}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.89796615},{"id":"https://openalex.org/C148417208","wikidata":"https://www.wikidata.org/wiki/Q4825882","display_name":"Authentication (law)","level":2,"score":0.6834422},{"id":"https://openalex.org/C71901391","wikidata":"https://www.wikidata.org/wiki/Q7126699","display_name":"Upload","level":2,"score":0.65438414},{"id":"https://openalex.org/C48677424","wikidata":"https://www.wikidata.org/wiki/Q6888088","display_name":"Mode (computer interface)","level":2,"score":0.4895035},{"id":"https://openalex.org/C2778355321","wikidata":"https://www.wikidata.org/wiki/Q17079427","display_name":"Identity (music)","level":2,"score":0.4444675},{"id":"https://openalex.org/C60908668","wikidata":"https://www.wikidata.org/wiki/Q690207","display_name":"Perceptron","level":3,"score":0.44309536},{"id":"https://openalex.org/C2779664074","wikidata":"https://www.wikidata.org/wiki/Q3518405","display_name":"Terminal (telecommunication)","level":2,"score":0.4336034},{"id":"https://openalex.org/C48103436","wikidata":"https://www.wikidata.org/wiki/Q599031","display_name":"State (computer science)","level":2,"score":0.4288259},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.3911795},{"id":"https://openalex.org/C79403827","wikidata":"https://www.wikidata.org/wiki/Q3988","display_name":"Real-time computing","level":1,"score":0.36816096},{"id":"https://openalex.org/C149635348","wikidata":"https://www.wikidata.org/wiki/Q193040","display_name":"Embedded system","level":1,"score":0.33359396},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.261945},{"id":"https://openalex.org/C107457646","wikidata":"https://www.wikidata.org/wiki/Q207434","display_name":"Human\u2013computer interaction","level":1,"score":0.25017592},{"id":"https://openalex.org/C50644808","wikidata":"https://www.wikidata.org/wiki/Q192776","display_name":"Artificial neural network","level":2,"score":0.21786442},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.2173338},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.13492456},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.08391285},{"id":"https://openalex.org/C121332964","wikidata":"https://www.wikidata.org/wiki/Q413","display_name":"Physics","level":0,"score":0.0},{"id":"https://openalex.org/C24890656","wikidata":"https://www.wikidata.org/wiki/Q82811","display_name":"Acoustics","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"is_oa":true,"landing_page_url":"https://doi.org/10.1177/1550147719899371","pdf_url":"https://journals.sagepub.com/doi/pdf/10.1177/1550147719899371","source":{"id":"https://openalex.org/S64417657","display_name":"International Journal of Distributed Sensor Networks","issn_l":"1550-1329","issn":["1550-1329","1550-1477"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310319869","host_organization_name":"Hindawi Publishing Corporation","host_organization_lineage":["https://openalex.org/P4310319869"],"host_organization_lineage_names":["Hindawi Publishing Corporation"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true}],"best_oa_location":{"is_oa":true,"landing_page_url":"https://doi.org/10.1177/1550147719899371","pdf_url":"https://journals.sagepub.com/doi/pdf/10.1177/1550147719899371","source":{"id":"https://openalex.org/S64417657","display_name":"International Journal of Distributed Sensor Networks","issn_l":"1550-1329","issn":["1550-1329","1550-1477"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310319869","host_organization_name":"Hindawi Publishing Corporation","host_organization_lineage":["https://openalex.org/P4310319869"],"host_organization_lineage_names":["Hindawi Publishing Corporation"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true},"sustainable_development_goals":[],"grants":[{"funder":"https://openalex.org/F4320335777","funder_display_name":"National Key Research and Development Program of China","award_id":"2017YFB0802300"}],"datasets":[],"versions":[],"referenced_works_count":21,"referenced_works":["https://openalex.org/W1483327747","https://openalex.org/W1589402964","https://openalex.org/W1846553358","https://openalex.org/W1988195734","https://openalex.org/W2119018277","https://openalex.org/W2132123667","https://openalex.org/W2148680321","https://openalex.org/W2151854612","https://openalex.org/W2158581396","https://openalex.org/W2295638584","https://openalex.org/W2742615025","https://openalex.org/W2804670270","https://openalex.org/W2804672261","https://openalex.org/W4231109964","https://openalex.org/W4231468058","https://openalex.org/W4234080689","https://openalex.org/W4245744969","https://openalex.org/W4248880341","https://openalex.org/W4254920161","https://openalex.org/W4353004773","https://openalex.org/W4399882596"],"related_works":["https://openalex.org/W4361862506","https://openalex.org/W4321854979","https://openalex.org/W4312214821","https://openalex.org/W3037018281","https://openalex.org/W2972592048","https://openalex.org/W2944823289","https://openalex.org/W2497626292","https://openalex.org/W2390344072","https://openalex.org/W2358319515","https://openalex.org/W2003209439"],"abstract_inverted_index":{"We":[0,69],"propose":[1],"a":[2],"new":[3],"type":[4],"of":[5,27,117,133,139],"authentication":[6,35,92,105,112],"system":[7,48,98,120],"based":[8],"on":[9,51,74],"behavioral":[10],"characteristics":[11],"for":[12,90],"smartphone":[13,42,53],"users.":[14,46],"With":[15],"the":[16,23,25,28,34,52,64,67,75],"sensor":[17],"and":[18,33,44,59,62,80,103,135],"touch":[19,60],"screen":[20],"data":[21,56,65,76],"in":[22,93,122],"smartphone,":[24],"combination":[26],"motion":[29,82,95],"state":[30,83],"detection":[31],"mode":[32,36],"can":[37,108,125],"effectively":[38,99],"distinguish":[39],"between":[40],"legitimate":[41],"users":[43],"other":[45],"The":[47,97,119],"deploys":[49],"software":[50],"to":[54,66,77],"collect":[55],"from":[57],"sensors":[58],"screens,":[61],"upload":[63],"cloud.":[68],"apply":[70],"random":[71],"forest":[72],"algorithm":[73,87],"extract":[78],"features":[79],"achieve":[81,109,126],"detection.":[84],"Multilayer":[85],"perceptron":[86],"is":[88],"used":[89],"user":[91,110],"corresponding":[94],"state.":[96],"implements":[100],"an":[101],"implicit":[102],"continuous":[104],"mode,":[106],"which":[107],"identity":[111],"without":[113],"users\u2019":[114],"being":[115],"aware":[116],"it.":[118],"proposed":[121],"this":[123],"article":[124],"95.96%":[127],"accuracy":[128],"with":[129],"false":[130,136],"rejection":[131],"rate":[132,138],"2.55%":[134],"acceptance":[137],"6.94%.":[140]},"cited_by_api_url":"https://api.openalex.org/works?filter=cites:W2999880567","counts_by_year":[{"year":2024,"cited_by_count":3},{"year":2023,"cited_by_count":2},{"year":2022,"cited_by_count":3},{"year":2021,"cited_by_count":4}],"updated_date":"2024-10-21T10:14:36.056526","created_date":"2020-01-23"}