OpenAlex Citation Counts

OpenAlex Citations Logo

OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!

If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.

Requested Article:

AUToSen: Deep-Learning-Based Implicit Continuous Authentication Using Smartphone Sensors
Mohammed Abuhamad, Tamer Abuhmed, Aziz Mohaisen, et al.
IEEE Internet of Things Journal (2020) Vol. 7, Iss. 6, pp. 5008-5020
Closed Access | Times Cited: 117

Showing 26-50 of 117 citing articles:

Digital twin and sensor networks for healthcare monitoring frameworks
Amirhossein Danesh, Shaker El–Sappagh, Tamer Abuhmed
Elsevier eBooks (2025), pp. 217-261
Closed Access

Entry-Point Adaptive Keystroke Dynamics-Based User Authentication for Evolving Passwords
Sandip Dutta, Soumen Roy, R. Mondal, et al.
Communications in computer and information science (2025), pp. 246-257
Closed Access

CNN-Based Continuous Authentication on Smartphones With Conditional Wasserstein Generative Adversarial Network
Yantao Li, Jiaxing Luo, Shaojiang Deng, et al.
IEEE Internet of Things Journal (2021) Vol. 9, Iss. 7, pp. 5447-5460
Closed Access | Times Cited: 24

A Systematic Literature Review on Latest Keystroke Dynamics Based Models
Soumen Roy, Jitesh Pradhan, Abhinav Kumar, et al.
IEEE Access (2022) Vol. 10, pp. 92192-92236
Open Access | Times Cited: 18

Unsupervised Sensor-Based Continuous Authentication With Low-Rank Transformer Using Learning-to-Rank Algorithms
Zhenyu Yang, Yantao Li, Gang Zhou
IEEE Transactions on Mobile Computing (2024) Vol. 23, Iss. 9, pp. 8839-8854
Closed Access | Times Cited: 3

Deep learning based authentication schemes for smart devices in different modalities: progress, challenges, performance, datasets and future directions
Shailendra W. Shende, Jitendra V. Tembhurne, Nishat Afshan Ansari
Multimedia Tools and Applications (2024) Vol. 83, Iss. 28, pp. 71451-71493
Closed Access | Times Cited: 3

Gait2Vec: Continuous Authentication of Smartphone Users Based on Gait Behavior
Langyue He, Cunqing Ma, Chenyang Tu, et al.
2022 IEEE 25th International Conference on Computer Supported Cooperative Work in Design (CSCWD) (2022), pp. 280-285
Closed Access | Times Cited: 13

AuthConFormer: Sensor-based Continuous Authentication of Smartphone Users Using A Convolutional Transformer
Mingming Hu, Kun Zhang, Ruibang You, et al.
Computers & Security (2023) Vol. 127, pp. 103122-103122
Closed Access | Times Cited: 7

SearchAuth: Neural Architecture Search-based Continuous Authentication Using Auto Augmentation Search
Yantao Li, Jiaxing Luo, Shaojiang Deng, et al.
ACM Transactions on Sensor Networks (2023) Vol. 19, Iss. 4, pp. 1-23
Open Access | Times Cited: 7

Toward zero trust in 5G industrial internet collaboration systems
Han Zhang, Ziyan Zhang, Liquan Chen
Digital Communications and Networks (2024)
Open Access | Times Cited: 2

Uncertainty Quantification to Enhance Probabilistic-Fusion-Based User Identification Using Smartphones
Rouhollah Ahmadian, Mehdi Ghatee, Johan Wahlström, et al.
IEEE Internet of Things Journal (2024) Vol. 11, Iss. 20, pp. 33450-33458
Open Access | Times Cited: 2

Enhancing security through continuous biometric authentication using wearable sensors
Laxmi Divya Chhibbar, Sujay Patni, Siddarth Todi, et al.
Internet of Things (2024), pp. 101374-101374
Closed Access | Times Cited: 2

A Hybrid Deep Learning System for Real-World Mobile User Authentication Using Motion Sensors
Tiantian Zhu, Zhengqiu Weng, Guolang Chen, et al.
Sensors (2020) Vol. 20, Iss. 14, pp. 3876-3876
Open Access | Times Cited: 19

Users’ Privacy Attitudes towards the Use of Behavioral Biometrics Continuous Authentication (BBCA) Technologies: A Protection Motivation Theory Approach
Ανδρέας Σκάλκος, Ioannis Stylios, Maria Karyda, et al.
Journal of Cybersecurity and Privacy (2021) Vol. 1, Iss. 4, pp. 743-766
Open Access | Times Cited: 17

Sentiment Analysis of Users’ Reactions on Social Media during the Pandemic
Eldor Abdukhamidov, Firuz Juraev, Mohammed Abuhamad, et al.
Electronics (2022) Vol. 11, Iss. 10, pp. 1648-1648
Open Access | Times Cited: 12

Multisensor-Based Continuous Authentication of Smartphone Users With Two-Stage Feature Extraction
Mingming Hu, Kun Zhang, Ruibang You, et al.
IEEE Internet of Things Journal (2022) Vol. 10, Iss. 6, pp. 4708-4724
Closed Access | Times Cited: 11

A Comprehensive Survey of Context-Aware Continuous Implicit Authentication in Online Learning Environments
Riseul Ryu, Soonja Yeom, David Herbert, et al.
IEEE Access (2023) Vol. 11, pp. 24561-24573
Open Access | Times Cited: 6

Smartphone User Identification/Authentication Using Accelerometer and Gyroscope Data
Eyhab Al-Mahadeen, Mansoor Alghamdi, Ahmad S. Tarawneh, et al.
Sustainability (2023) Vol. 15, Iss. 13, pp. 10456-10456
Open Access | Times Cited: 6

Stationary mobile behavioral biometrics: A survey
Aratrika Ray-Dowling, Daqing Hou, Stephanie Schuckers
Computers & Security (2023) Vol. 128, pp. 103184-103184
Open Access | Times Cited: 6

Cross Deep Learning Method for Effectively Detecting the Propagation of IoT Botnet
Majda Wazzan, Daniyal Algazzawi, Aiiad Albeshri, et al.
Sensors (2022) Vol. 22, Iss. 10, pp. 3895-3895
Open Access | Times Cited: 9

Evaluating multi-modal mobile behavioral biometrics using public datasets
Aratrika Ray-Dowling, Daqing Hou, Stephanie Schuckers, et al.
Computers & Security (2022) Vol. 121, pp. 102868-102868
Closed Access | Times Cited: 9

Continuous Mobile User Authentication Using a Hybrid CNN-Bi-LSTM Approach
Sarah Alzahrani, Joud Alderaan, Dalya Alatawi, et al.
Computers, materials & continua/Computers, materials & continua (Print) (2023) Vol. 75, Iss. 1, pp. 651-667
Open Access | Times Cited: 5

Smartphone-Based CO2e Emission Estimation Using Transportation Mode Classification
Orla Brimacombe, Luis C. González, Johan Wahlström
IEEE Access (2023) Vol. 11, pp. 54782-54794
Open Access | Times Cited: 5

Evaluation of Deep Learning Models for Continuous Authentication Using Behavioral Biometrics
Utku Uslu, Özlem Durmaz İncel, Gülfem Işıklar Alptekin
Procedia Computer Science (2023) Vol. 225, pp. 1272-1281
Open Access | Times Cited: 5

Scroll to top