
OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!
If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.
Requested Article:
Behavioral biometrics & continuous user authentication on mobile devices: A survey
Ioannis Stylios, Spyros Kokolakis, Olga Thanou, et al.
Information Fusion (2020) Vol. 66, pp. 76-99
Closed Access | Times Cited: 79
Ioannis Stylios, Spyros Kokolakis, Olga Thanou, et al.
Information Fusion (2020) Vol. 66, pp. 76-99
Closed Access | Times Cited: 79
Showing 51-75 of 79 citing articles:
The Role of Users’ Demographic and Social Attributes for Accepting Biometric Systems: A Greek Case Study
Angeliki Kitsiou, Charikleia Despotidi, Christos Kalloniatis, et al.
Future Internet (2022) Vol. 14, Iss. 11, pp. 328-328
Open Access | Times Cited: 3
Angeliki Kitsiou, Charikleia Despotidi, Christos Kalloniatis, et al.
Future Internet (2022) Vol. 14, Iss. 11, pp. 328-328
Open Access | Times Cited: 3
ZoomPass: A Zoom-Based Android Unlock Scheme on Smart Devices
Thomas Gleerup, Wenjuan Li, Jiao Tan, et al.
Lecture notes in computer science (2022), pp. 245-259
Closed Access | Times Cited: 3
Thomas Gleerup, Wenjuan Li, Jiao Tan, et al.
Lecture notes in computer science (2022), pp. 245-259
Closed Access | Times Cited: 3
ExpressionAuth: Utilizing Avatar Expression Blendshapes for Behavioral Biometrics in VR
Tussoun Jitpanyoyos, Yuya Sato, Soshi Maeda, et al.
2022 IEEE Conference on Virtual Reality and 3D User Interfaces Abstracts and Workshops (VRW) (2024), pp. 679-680
Closed Access
Tussoun Jitpanyoyos, Yuya Sato, Soshi Maeda, et al.
2022 IEEE Conference on Virtual Reality and 3D User Interfaces Abstracts and Workshops (VRW) (2024), pp. 679-680
Closed Access
BioGames: a new paradigm and a behavioral biometrics collection tool for research purposes
Ioannis Stylios, Spyros Kokolakis, Ανδρέας Σκάλκος, et al.
Information and Computer Security (2021) Vol. 30, Iss. 2, pp. 243-254
Closed Access | Times Cited: 4
Ioannis Stylios, Spyros Kokolakis, Ανδρέας Σκάλκος, et al.
Information and Computer Security (2021) Vol. 30, Iss. 2, pp. 243-254
Closed Access | Times Cited: 4
ONE3A: one-against-all authentication model for smartphone using GAN network and optimization techniques
Mohamed Meselhy Eltoukhy, Tarek Gaber, Abdulwahab Ali Almazroi, et al.
PeerJ Computer Science (2024) Vol. 10, pp. e2001-e2001
Open Access
Mohamed Meselhy Eltoukhy, Tarek Gaber, Abdulwahab Ali Almazroi, et al.
PeerJ Computer Science (2024) Vol. 10, pp. e2001-e2001
Open Access
Single-Sensor Sparse Adversarial Perturbation Attacks Against Behavioral Biometrics
Ravin Gunawardena, S. Jayawardena, Suranga Seneviratne, et al.
IEEE Internet of Things Journal (2024) Vol. 11, Iss. 16, pp. 27303-27321
Closed Access
Ravin Gunawardena, S. Jayawardena, Suranga Seneviratne, et al.
IEEE Internet of Things Journal (2024) Vol. 11, Iss. 16, pp. 27303-27321
Closed Access
Recurrent Highway Network-Based Model for Mouse Dynamic Authentication
Lei Cui, Zheheng Liang, Zhenyue Long, et al.
(2024), pp. 442-446
Closed Access
Lei Cui, Zheheng Liang, Zhenyue Long, et al.
(2024), pp. 442-446
Closed Access
Biometric Holographic Encryption and Authentication with Multiple Optics-Biology Keys Based on Inhomogeneous Media Optics
Rui Xu, Ming Feng, Jiaxin Yang, et al.
Chinese Journal of Physics (2024) Vol. 91, pp. 743-756
Closed Access
Rui Xu, Ming Feng, Jiaxin Yang, et al.
Chinese Journal of Physics (2024) Vol. 91, pp. 743-756
Closed Access
A Comparative Analysis of Machine Learning Algorithms for Online Signature Recognition
Mehwish Leghari, Asghar Ali Chandio, Muhammad Ali Soomro, et al.
VFAST Transactions on Software Engineering (2024) Vol. 12, Iss. 2, pp. 231-240
Open Access
Mehwish Leghari, Asghar Ali Chandio, Muhammad Ali Soomro, et al.
VFAST Transactions on Software Engineering (2024) Vol. 12, Iss. 2, pp. 231-240
Open Access
An Effectual Image based Authentication Scheme for Mobile Device using Machine Learning
Kota Lokesh Kumar, Sangram Ray, Priyanka Das
(2024) Vol. 8, pp. 24-30
Closed Access
Kota Lokesh Kumar, Sangram Ray, Priyanka Das
(2024) Vol. 8, pp. 24-30
Closed Access
CNN-based continuous authentication for digital therapeutics using variational autoencoder
Chengling Wang, Yuexin Zhang, Yunru Ma, et al.
The Journal of Supercomputing (2024) Vol. 81, Iss. 1
Closed Access
Chengling Wang, Yuexin Zhang, Yunru Ma, et al.
The Journal of Supercomputing (2024) Vol. 81, Iss. 1
Closed Access
MBBFAuth: Multimodal Behavioral Biometrics Fusion for Continuous Authentication on Non-Portable Devices
Jiajia Li, Qian Yi, Ming K. Lim, et al.
IEEE Transactions on Information Forensics and Security (2024) Vol. 19, pp. 10000-10015
Closed Access
Jiajia Li, Qian Yi, Ming K. Lim, et al.
IEEE Transactions on Information Forensics and Security (2024) Vol. 19, pp. 10000-10015
Closed Access
A Comparative Analysis of Child Activity Recognition Using Machine Learning
Narendra Kumar, Shefali Arora, Lakshay Aggrawal
Lecture notes in networks and systems (2024), pp. 671-680
Closed Access
Narendra Kumar, Shefali Arora, Lakshay Aggrawal
Lecture notes in networks and systems (2024), pp. 671-680
Closed Access
Smartphone Continuous Authentication via Deep Behavioral Features and Isolation Forest
H. Ma, Zhongrui Li, Shiyu Mou
(2024), pp. 479-483
Closed Access
H. Ma, Zhongrui Li, Shiyu Mou
(2024), pp. 479-483
Closed Access
RaiseAuth: a novel bio-behavioral authentication method based on ultra-low-complexity movement
Shuo Zhao, Zhongwen Guo, Xu Cheng, et al.
Complex & Intelligent Systems (2023)
Open Access | Times Cited: 1
Shuo Zhao, Zhongwen Guo, Xu Cheng, et al.
Complex & Intelligent Systems (2023)
Open Access | Times Cited: 1
Outlier Detection for Risk-Based User Authentication on Mobile Devices
Μαρία Παπαϊωάννου, Georgios Zachos, Γεώργιος Μαντάς, et al.
GLOBECOM 2022 - 2022 IEEE Global Communications Conference (2023), pp. 2778-2783
Open Access | Times Cited: 1
Μαρία Παπαϊωάννου, Georgios Zachos, Γεώργιος Μαντάς, et al.
GLOBECOM 2022 - 2022 IEEE Global Communications Conference (2023), pp. 2778-2783
Open Access | Times Cited: 1
TrapCog: An Anti-Noise, Transferable, and Privacy-Preserving Real-Time Mobile User Authentication System With High Accuracy
Jie Ying, Tiantian Zhu, Qiang Liu, et al.
IEEE Transactions on Mobile Computing (2023) Vol. 23, Iss. 4, pp. 2832-2848
Closed Access | Times Cited: 1
Jie Ying, Tiantian Zhu, Qiang Liu, et al.
IEEE Transactions on Mobile Computing (2023) Vol. 23, Iss. 4, pp. 2832-2848
Closed Access | Times Cited: 1
Neural integrated Markov model for effective script identification and classification in biometric system
Miaofang Shen, Jianfang Shen, Yu Lu
Journal of Radiation Research and Applied Sciences (2023) Vol. 16, Iss. 4, pp. 100694-100694
Open Access | Times Cited: 1
Miaofang Shen, Jianfang Shen, Yu Lu
Journal of Radiation Research and Applied Sciences (2023) Vol. 16, Iss. 4, pp. 100694-100694
Open Access | Times Cited: 1
Biometric Cloud Services for Web-Based Examinations
Meennapa Rukhiran, Sorapak Pukdesree, Paniti Netinant
International Journal of Information Technology and Web Engineering (2022) Vol. 17, Iss. 1, pp. 1-25
Open Access | Times Cited: 2
Meennapa Rukhiran, Sorapak Pukdesree, Paniti Netinant
International Journal of Information Technology and Web Engineering (2022) Vol. 17, Iss. 1, pp. 1-25
Open Access | Times Cited: 2
BioPrivacy: a behavioral biometrics continuous authentication system based on keystroke dynamics and touch gestures
Ioannis Stylios, Ανδρέας Σκάλκος, Spyros Kokolakis, et al.
Information and Computer Security (2022) Vol. 30, Iss. 5, pp. 687-704
Closed Access | Times Cited: 2
Ioannis Stylios, Ανδρέας Σκάλκος, Spyros Kokolakis, et al.
Information and Computer Security (2022) Vol. 30, Iss. 5, pp. 687-704
Closed Access | Times Cited: 2
Implicit Continuous User Authentication for Mobile Devices based on Deep Reinforcement Learning
Christy James Jose, M. S. Rajasree
Computer Systems Science and Engineering (2022) Vol. 44, Iss. 2, pp. 1357-1372
Open Access | Times Cited: 1
Christy James Jose, M. S. Rajasree
Computer Systems Science and Engineering (2022) Vol. 44, Iss. 2, pp. 1357-1372
Open Access | Times Cited: 1
Biometrics and Artificial Intelligence: Attacks and Challenges
Luis Hernández–Álvarez, Lorena González‐Manzano, José M. de Fuentes, et al.
Springer eBooks (2022), pp. 213-240
Closed Access | Times Cited: 1
Luis Hernández–Álvarez, Lorena González‐Manzano, José M. de Fuentes, et al.
Springer eBooks (2022), pp. 213-240
Closed Access | Times Cited: 1
Keystroke Presentation Attack: Generative Adversarial Networks for replacing user behaviour
Idoia Eizagirre, Lander Segurola-Gil, Francesco Zola, et al.
(2022), pp. 119-126
Closed Access | Times Cited: 1
Idoia Eizagirre, Lander Segurola-Gil, Francesco Zola, et al.
(2022), pp. 119-126
Closed Access | Times Cited: 1
Forecasting economic result of business logic improvements using Game Theory for modeling user scenarios
O. Kuzmin, Наталія Станасюк, D. A. Berdnik, et al.
Mathematical Modeling and Computing (2021) Vol. 8, Iss. 3, pp. 560-572
Open Access | Times Cited: 1
O. Kuzmin, Наталія Станасюк, D. A. Berdnik, et al.
Mathematical Modeling and Computing (2021) Vol. 8, Iss. 3, pp. 560-572
Open Access | Times Cited: 1
Multimodal Biometric Authentication by Slap Swarm-Based Score Level Fusion
G. Elavarasi, M. Vanitha
Lecture notes on data engineering and communications technologies (2021), pp. 831-842
Closed Access | Times Cited: 1
G. Elavarasi, M. Vanitha
Lecture notes on data engineering and communications technologies (2021), pp. 831-842
Closed Access | Times Cited: 1