
OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!
If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.
Requested Article:
A continuous smartphone authentication method based on gait patterns and keystroke dynamics
Imane Lamiche, Bin Guo, Jing Yao, et al.
Journal of Ambient Intelligence and Humanized Computing (2018) Vol. 10, Iss. 11, pp. 4417-4430
Closed Access | Times Cited: 66
Imane Lamiche, Bin Guo, Jing Yao, et al.
Journal of Ambient Intelligence and Humanized Computing (2018) Vol. 10, Iss. 11, pp. 4417-4430
Closed Access | Times Cited: 66
Showing 1-25 of 66 citing articles:
Sensor-Based Continuous Authentication of Smartphones’ Users Using Behavioral Biometrics: A Contemporary Survey
Mohammed Abuhamad, Ahmed Abusnaina, DaeHun Nyang, et al.
IEEE Internet of Things Journal (2020) Vol. 8, Iss. 1, pp. 65-84
Open Access | Times Cited: 132
Mohammed Abuhamad, Ahmed Abusnaina, DaeHun Nyang, et al.
IEEE Internet of Things Journal (2020) Vol. 8, Iss. 1, pp. 65-84
Open Access | Times Cited: 132
Behavioral biometrics & continuous user authentication on mobile devices: A survey
Ioannis Stylios, Spyros Kokolakis, Olga Thanou, et al.
Information Fusion (2020) Vol. 66, pp. 76-99
Closed Access | Times Cited: 79
Ioannis Stylios, Spyros Kokolakis, Olga Thanou, et al.
Information Fusion (2020) Vol. 66, pp. 76-99
Closed Access | Times Cited: 79
A Systematic Literature Review on Multimodal Machine Learning: Applications, Challenges, Gaps and Future Directions
Arnab Barua, Mobyen Uddin Ahmed, Shahina Begum
IEEE Access (2023) Vol. 11, pp. 14804-14831
Open Access | Times Cited: 27
Arnab Barua, Mobyen Uddin Ahmed, Shahina Begum
IEEE Access (2023) Vol. 11, pp. 14804-14831
Open Access | Times Cited: 27
The utility of behavioral biometrics in user authentication and demographic characteristic detection: a scoping review
Olivia Finnegan, J. W. White, Bridget Armstrong, et al.
Systematic Reviews (2024) Vol. 13, Iss. 1
Open Access | Times Cited: 9
Olivia Finnegan, J. W. White, Bridget Armstrong, et al.
Systematic Reviews (2024) Vol. 13, Iss. 1
Open Access | Times Cited: 9
Sensor-based authentication in smartphone: A systematic review
Moceheb Lazam Shuwandy, A. S. Jouda, M.A. Ahmed, et al.
Journal of Engineering Research (2024)
Open Access | Times Cited: 8
Moceheb Lazam Shuwandy, A. S. Jouda, M.A. Ahmed, et al.
Journal of Engineering Research (2024)
Open Access | Times Cited: 8
A survey of human-computer interaction (HCI) & natural habits-based behavioural biometric modalities for user recognition schemes
Sandeep Gupta, Carsten Maple, Bruno Crispo, et al.
Pattern Recognition (2023) Vol. 139, pp. 109453-109453
Closed Access | Times Cited: 21
Sandeep Gupta, Carsten Maple, Bruno Crispo, et al.
Pattern Recognition (2023) Vol. 139, pp. 109453-109453
Closed Access | Times Cited: 21
Leveraging Machine Learning for Wi-Fi-Based Environmental Continuous Two-Factor Authentication
Ali Abdullah S. AlQahtani, Thamraa Alshayeb, Mahmoud Nabil, et al.
IEEE Access (2024) Vol. 12, pp. 13277-13289
Open Access | Times Cited: 5
Ali Abdullah S. AlQahtani, Thamraa Alshayeb, Mahmoud Nabil, et al.
IEEE Access (2024) Vol. 12, pp. 13277-13289
Open Access | Times Cited: 5
Continuous user authentication on smartphone via behavioral biometrics: a survey
Praveen Kumar Rayani, Suvamoy Changder
Multimedia Tools and Applications (2022) Vol. 82, Iss. 2, pp. 1633-1667
Closed Access | Times Cited: 27
Praveen Kumar Rayani, Suvamoy Changder
Multimedia Tools and Applications (2022) Vol. 82, Iss. 2, pp. 1633-1667
Closed Access | Times Cited: 27
Adaptive Deep Feature Fusion for Continuous Authentication With Data Augmentation
Yantao Li, Li Liu, Huafeng Qin, et al.
IEEE Transactions on Mobile Computing (2022) Vol. 22, Iss. 10, pp. 5690-5705
Open Access | Times Cited: 24
Yantao Li, Li Liu, Huafeng Qin, et al.
IEEE Transactions on Mobile Computing (2022) Vol. 22, Iss. 10, pp. 5690-5705
Open Access | Times Cited: 24
Implicit Identity Authentication Method Based on User Posture Perception
Bo Hu, Tang Shi-gang, Fangzheng Huang, et al.
Electronics (2025) Vol. 14, Iss. 5, pp. 835-835
Open Access
Bo Hu, Tang Shi-gang, Fangzheng Huang, et al.
Electronics (2025) Vol. 14, Iss. 5, pp. 835-835
Open Access
Multi-modal Biometric Authentication: Harnessing Human Gait and Keystroke Dynamics for Enhanced Security
Sandip Dutta, Utpal Roy, Soumen Roy
Communications in computer and information science (2025), pp. 311-322
Closed Access
Sandip Dutta, Utpal Roy, Soumen Roy
Communications in computer and information science (2025), pp. 311-322
Closed Access
Enhancing the Security of Pattern Unlock with Surface EMG-Based Biometrics
Qingqing Li, Penghui Dong, Jun Zheng
Applied Sciences (2020) Vol. 10, Iss. 2, pp. 541-541
Open Access | Times Cited: 36
Qingqing Li, Penghui Dong, Jun Zheng
Applied Sciences (2020) Vol. 10, Iss. 2, pp. 541-541
Open Access | Times Cited: 36
Passphrase and keystroke dynamics authentication: Usable security
Bhaveer Bhana, Stephen Flowerday
Computers & Security (2020) Vol. 96, pp. 101925-101925
Closed Access | Times Cited: 32
Bhaveer Bhana, Stephen Flowerday
Computers & Security (2020) Vol. 96, pp. 101925-101925
Closed Access | Times Cited: 32
Understanding insiders in cloud adopted organizations: A survey on taxonomies, incident analysis, defensive solutions, challenges
S. Asha, D. Shanmugapriya
Future Generation Computer Systems (2024) Vol. 158, pp. 427-446
Closed Access | Times Cited: 3
S. Asha, D. Shanmugapriya
Future Generation Computer Systems (2024) Vol. 158, pp. 427-446
Closed Access | Times Cited: 3
A Three-Step Authentication Model for Mobile Phone User Using Keystroke Dynamics
Baljit Singh Saini, Parminder Singh, Anand Nayyar, et al.
IEEE Access (2020) Vol. 8, pp. 125909-125922
Open Access | Times Cited: 30
Baljit Singh Saini, Parminder Singh, Anand Nayyar, et al.
IEEE Access (2020) Vol. 8, pp. 125909-125922
Open Access | Times Cited: 30
A Systematic Literature Review on Latest Keystroke Dynamics Based Models
Soumen Roy, Jitesh Pradhan, Abhinav Kumar, et al.
IEEE Access (2022) Vol. 10, pp. 92192-92236
Open Access | Times Cited: 16
Soumen Roy, Jitesh Pradhan, Abhinav Kumar, et al.
IEEE Access (2022) Vol. 10, pp. 92192-92236
Open Access | Times Cited: 16
Continuous user identification in distance learning: a recent technology perspective
David Portugal, José N. Faria, Marios Belk, et al.
Smart Learning Environments (2023) Vol. 10, Iss. 1
Open Access | Times Cited: 10
David Portugal, José N. Faria, Marios Belk, et al.
Smart Learning Environments (2023) Vol. 10, Iss. 1
Open Access | Times Cited: 10
An Intelligent Scheme for Continuous Authentication of Smartphone Using Deep Auto Encoder and Softmax Regression Model Easy for User Brain
Vishnu Shankar, Karan Singh
IEEE Access (2019) Vol. 7, pp. 48645-48654
Open Access | Times Cited: 29
Vishnu Shankar, Karan Singh
IEEE Access (2019) Vol. 7, pp. 48645-48654
Open Access | Times Cited: 29
Password policy characteristics and keystroke biometric authentication
Simon Parkinson, Saad Khan, Andrew Crampton, et al.
IET Biometrics (2021) Vol. 10, Iss. 2, pp. 163-178
Open Access | Times Cited: 22
Simon Parkinson, Saad Khan, Andrew Crampton, et al.
IET Biometrics (2021) Vol. 10, Iss. 2, pp. 163-178
Open Access | Times Cited: 22
Unsupervised Sensor-Based Continuous Authentication With Low-Rank Transformer Using Learning-to-Rank Algorithms
Zhenyu Yang, Yantao Li, Gang Zhou
IEEE Transactions on Mobile Computing (2024) Vol. 23, Iss. 9, pp. 8839-8854
Closed Access | Times Cited: 2
Zhenyu Yang, Yantao Li, Gang Zhou
IEEE Transactions on Mobile Computing (2024) Vol. 23, Iss. 9, pp. 8839-8854
Closed Access | Times Cited: 2
Gait identification using a new time-warped similarity metric based on smartphone inertial signals
Sougata Deb, Youheng Ou Yang, Matthew Chin Heng Chua, et al.
Journal of Ambient Intelligence and Humanized Computing (2020) Vol. 11, Iss. 10, pp. 4041-4053
Closed Access | Times Cited: 19
Sougata Deb, Youheng Ou Yang, Matthew Chin Heng Chua, et al.
Journal of Ambient Intelligence and Humanized Computing (2020) Vol. 11, Iss. 10, pp. 4041-4053
Closed Access | Times Cited: 19
Examining the Current Status and Emerging Trends in Continuous Authentication Technologies through Citation Network Analysis
Jongkil Jay Jeong, Yevhen Zolotavkin, Robin Doss
ACM Computing Surveys (2022) Vol. 55, Iss. 6, pp. 1-31
Closed Access | Times Cited: 11
Jongkil Jay Jeong, Yevhen Zolotavkin, Robin Doss
ACM Computing Surveys (2022) Vol. 55, Iss. 6, pp. 1-31
Closed Access | Times Cited: 11
Biometric keystroke barcoding: A next-gen authentication framework
Orcan Alpar
Expert Systems with Applications (2021) Vol. 177, pp. 114980-114980
Closed Access | Times Cited: 15
Orcan Alpar
Expert Systems with Applications (2021) Vol. 177, pp. 114980-114980
Closed Access | Times Cited: 15
Accurate feature extraction for multimodal biometrics combining iris and palmprint
Ritesh Vyas, Tirupathiraju Kanumuri, Gyanendra Sheoran, et al.
Journal of Ambient Intelligence and Humanized Computing (2021) Vol. 13, Iss. 12, pp. 5581-5589
Open Access | Times Cited: 13
Ritesh Vyas, Tirupathiraju Kanumuri, Gyanendra Sheoran, et al.
Journal of Ambient Intelligence and Humanized Computing (2021) Vol. 13, Iss. 12, pp. 5581-5589
Open Access | Times Cited: 13
BioPrivacy: Development of a Keystroke Dynamics Continuous Authentication System
Ioannis Stylios, Ανδρέας Σκάλκος, Spyros Kokolakis, et al.
Lecture notes in computer science (2022), pp. 158-170
Closed Access | Times Cited: 9
Ioannis Stylios, Ανδρέας Σκάλκος, Spyros Kokolakis, et al.
Lecture notes in computer science (2022), pp. 158-170
Closed Access | Times Cited: 9