
OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!
If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.
Requested Article:
Behavioral biometrics & continuous user authentication on mobile devices: A survey
Ioannis Stylios, Spyros Kokolakis, Olga Thanou, et al.
Information Fusion (2020) Vol. 66, pp. 76-99
Closed Access | Times Cited: 79
Ioannis Stylios, Spyros Kokolakis, Olga Thanou, et al.
Information Fusion (2020) Vol. 66, pp. 76-99
Closed Access | Times Cited: 79
Showing 1-25 of 79 citing articles:
Deep Learning Approaches for Continuous Authentication Based on Activity Patterns Using Mobile Sensing
Sakorn Mekruksavanich, Anuchit Jitpattanakul
Sensors (2021) Vol. 21, Iss. 22, pp. 7519-7519
Open Access | Times Cited: 74
Sakorn Mekruksavanich, Anuchit Jitpattanakul
Sensors (2021) Vol. 21, Iss. 22, pp. 7519-7519
Open Access | Times Cited: 74
Physical Security and Safety of IoT Equipment: A Survey of Recent Advances and Opportunities
Xing Yang, Lei Shu, Ye Liu, et al.
IEEE Transactions on Industrial Informatics (2022) Vol. 18, Iss. 7, pp. 4319-4330
Closed Access | Times Cited: 59
Xing Yang, Lei Shu, Ye Liu, et al.
IEEE Transactions on Industrial Informatics (2022) Vol. 18, Iss. 7, pp. 4319-4330
Closed Access | Times Cited: 59
Deep learning pipelines for recognition of gait biometrics with covariates: a comprehensive review
Anubha Parashar, Apoorva Parashar, Weiping Ding, et al.
Artificial Intelligence Review (2023) Vol. 56, Iss. 8, pp. 8889-8953
Closed Access | Times Cited: 25
Anubha Parashar, Apoorva Parashar, Weiping Ding, et al.
Artificial Intelligence Review (2023) Vol. 56, Iss. 8, pp. 8889-8953
Closed Access | Times Cited: 25
Comprehensive survey: Biometric user authentication application, evaluation, and discussion
Reem Alrawili, Ali Abdullah S. AlQahtani, Muhammad Khurram Khan
Computers & Electrical Engineering (2024) Vol. 119, pp. 109485-109485
Open Access | Times Cited: 10
Reem Alrawili, Ali Abdullah S. AlQahtani, Muhammad Khurram Khan
Computers & Electrical Engineering (2024) Vol. 119, pp. 109485-109485
Open Access | Times Cited: 10
The utility of behavioral biometrics in user authentication and demographic characteristic detection: a scoping review
Olivia Finnegan, J. W. White, Bridget Armstrong, et al.
Systematic Reviews (2024) Vol. 13, Iss. 1
Open Access | Times Cited: 9
Olivia Finnegan, J. W. White, Bridget Armstrong, et al.
Systematic Reviews (2024) Vol. 13, Iss. 1
Open Access | Times Cited: 9
Continuous Emotion Recognition for Long-Term Behavior Modeling through Recurrent Neural Networks
Ioannis Kansizoglou, Evangelos Misirlis, Konstantinos A. Tsintotas, et al.
Technologies (2022) Vol. 10, Iss. 3, pp. 59-59
Open Access | Times Cited: 32
Ioannis Kansizoglou, Evangelos Misirlis, Konstantinos A. Tsintotas, et al.
Technologies (2022) Vol. 10, Iss. 3, pp. 59-59
Open Access | Times Cited: 32
Recent advances in anomaly detection in Internet of Things: Status, challenges, and perspectives
Deepak Adhikari, Wei Jiang, Jinyu Zhan, et al.
Computer Science Review (2024) Vol. 54, pp. 100665-100665
Closed Access | Times Cited: 7
Deepak Adhikari, Wei Jiang, Jinyu Zhan, et al.
Computer Science Review (2024) Vol. 54, pp. 100665-100665
Closed Access | Times Cited: 7
Optimizing Privacy-Preserving Continuous Authentication of Mobile Devices
David Monschein, Oliver P. Waldhorst
Lecture notes in computer science (2025), pp. 63-81
Closed Access
David Monschein, Oliver P. Waldhorst
Lecture notes in computer science (2025), pp. 63-81
Closed Access
A review of state-of-the-art in Face Presentation Attack Detection: From early development to advanced deep learning and multi-modal fusion methods
Faseela Abdullakutty, Eyad Elyan, Pamela Johnston
Information Fusion (2021) Vol. 75, pp. 55-69
Open Access | Times Cited: 36
Faseela Abdullakutty, Eyad Elyan, Pamela Johnston
Information Fusion (2021) Vol. 75, pp. 55-69
Open Access | Times Cited: 36
Continuous user authentication on smartphone via behavioral biometrics: a survey
Praveen Kumar Rayani, Suvamoy Changder
Multimedia Tools and Applications (2022) Vol. 82, Iss. 2, pp. 1633-1667
Closed Access | Times Cited: 27
Praveen Kumar Rayani, Suvamoy Changder
Multimedia Tools and Applications (2022) Vol. 82, Iss. 2, pp. 1633-1667
Closed Access | Times Cited: 27
Current Multi-factor of Authentication: Approaches, Requirements, Attacks and Challenges
Ali Hameed Yassir Mohammed, Rudzidatul Akmam Dziyauddin, Liza Abdul Latiff
International Journal of Advanced Computer Science and Applications (2023) Vol. 14, Iss. 1
Open Access | Times Cited: 14
Ali Hameed Yassir Mohammed, Rudzidatul Akmam Dziyauddin, Liza Abdul Latiff
International Journal of Advanced Computer Science and Applications (2023) Vol. 14, Iss. 1
Open Access | Times Cited: 14
IncreAuth: Incremental-Learning-Based Behavioral Biometric Authentication on Smartphones
Zhihao Shen, Shun Li, Xi Zhao, et al.
IEEE Internet of Things Journal (2023) Vol. 11, Iss. 1, pp. 1589-1603
Closed Access | Times Cited: 12
Zhihao Shen, Shun Li, Xi Zhao, et al.
IEEE Internet of Things Journal (2023) Vol. 11, Iss. 1, pp. 1589-1603
Closed Access | Times Cited: 12
A Review of the Authentication Techniques for Internet of Things Devices in Smart Cities: Opportunities, Challenges, and Future Directions
Ashwag Alotaibi, Huda Aldawghan, Ahmed Aljughaiman
Sensors (2025) Vol. 25, Iss. 6, pp. 1649-1649
Open Access
Ashwag Alotaibi, Huda Aldawghan, Ahmed Aljughaiman
Sensors (2025) Vol. 25, Iss. 6, pp. 1649-1649
Open Access
Impact of Built Environments on Human Perception: A Systematic Review of Physiological Measures and Machine Learning
Zhixian Li, Ju Hyun Lee, Lina Yao, et al.
Journal of Building Engineering (2025), pp. 112319-112319
Open Access
Zhixian Li, Ju Hyun Lee, Lina Yao, et al.
Journal of Building Engineering (2025), pp. 112319-112319
Open Access
Key factors driving the adoption of behavioral biometrics and continuous authentication technology: an empirical research
Ioannis Stylios, Spyros Kokolakis, Olga Thanou, et al.
Information and Computer Security (2022) Vol. 30, Iss. 4, pp. 562-582
Closed Access | Times Cited: 19
Ioannis Stylios, Spyros Kokolakis, Olga Thanou, et al.
Information and Computer Security (2022) Vol. 30, Iss. 4, pp. 562-582
Closed Access | Times Cited: 19
Beyond Passwords—Challenges and Opportunities of Future Authentication
Florian Alt, Stefan Schneegaß
IEEE Security & Privacy (2022) Vol. 20, Iss. 1, pp. 82-86
Closed Access | Times Cited: 16
Florian Alt, Stefan Schneegaß
IEEE Security & Privacy (2022) Vol. 20, Iss. 1, pp. 82-86
Closed Access | Times Cited: 16
Analytical study on users’ awareness and acceptability towards adoption of multimodal biometrics (MMB) mechanism in online transactions: a two-stage SEM-ANN approach
Himanshu Purohit, Manish Dadhich, Pawan K. Ajmera
Multimedia Tools and Applications (2022) Vol. 82, Iss. 9, pp. 14239-14263
Open Access | Times Cited: 16
Himanshu Purohit, Manish Dadhich, Pawan K. Ajmera
Multimedia Tools and Applications (2022) Vol. 82, Iss. 9, pp. 14239-14263
Open Access | Times Cited: 16
A Survey on Quantitative Risk Estimation Approaches for Secure and Usable User Authentication on Smartphones
Μαρία Παπαϊωάννου, Filippos Pelekoudas‐Oikonomou, Γεώργιος Μαντάς, et al.
Sensors (2023) Vol. 23, Iss. 6, pp. 2979-2979
Open Access | Times Cited: 10
Μαρία Παπαϊωάννου, Filippos Pelekoudas‐Oikonomou, Γεώργιος Μαντάς, et al.
Sensors (2023) Vol. 23, Iss. 6, pp. 2979-2979
Open Access | Times Cited: 10
A Security Enhanced Android Unlock Scheme Based on Pinch-to-Zoom for Smart Devices
Wenjuan Li, Thomas Gleerup, Jiao Tan, et al.
IEEE Transactions on Consumer Electronics (2023) Vol. 70, Iss. 1, pp. 3985-3993
Closed Access | Times Cited: 9
Wenjuan Li, Thomas Gleerup, Jiao Tan, et al.
IEEE Transactions on Consumer Electronics (2023) Vol. 70, Iss. 1, pp. 3985-3993
Closed Access | Times Cited: 9
Interval type-2 fuzzy temporal convolutional autoencoder for gait-based human identification and authentication
Weiping Ding, Mohamed Abdel‐Basset, Hossam Hawash, et al.
Information Sciences (2022) Vol. 597, pp. 144-165
Closed Access | Times Cited: 15
Weiping Ding, Mohamed Abdel‐Basset, Hossam Hawash, et al.
Information Sciences (2022) Vol. 597, pp. 144-165
Closed Access | Times Cited: 15
AuthConFormer: Sensor-based Continuous Authentication of Smartphone Users Using A Convolutional Transformer
Mingming Hu, Kun Zhang, Ruibang You, et al.
Computers & Security (2023) Vol. 127, pp. 103122-103122
Closed Access | Times Cited: 7
Mingming Hu, Kun Zhang, Ruibang You, et al.
Computers & Security (2023) Vol. 127, pp. 103122-103122
Closed Access | Times Cited: 7
Biometrics for Industry 4.0: a survey of recent applications
Lucia Cascone, Zhiwei Gao, Michele Nappi
Journal of Ambient Intelligence and Humanized Computing (2023) Vol. 14, Iss. 8, pp. 11239-11261
Open Access | Times Cited: 7
Lucia Cascone, Zhiwei Gao, Michele Nappi
Journal of Ambient Intelligence and Humanized Computing (2023) Vol. 14, Iss. 8, pp. 11239-11261
Open Access | Times Cited: 7
Unsupervised Sensor-Based Continuous Authentication With Low-Rank Transformer Using Learning-to-Rank Algorithms
Zhenyu Yang, Yantao Li, Gang Zhou
IEEE Transactions on Mobile Computing (2024) Vol. 23, Iss. 9, pp. 8839-8854
Closed Access | Times Cited: 2
Zhenyu Yang, Yantao Li, Gang Zhou
IEEE Transactions on Mobile Computing (2024) Vol. 23, Iss. 9, pp. 8839-8854
Closed Access | Times Cited: 2
Recent Trends of Authentication Methods in Extended Reality: A Survey
Louisa Hallal, Jason Rhinelander, Ramesh Venkat
Applied System Innovation (2024) Vol. 7, Iss. 3, pp. 45-45
Open Access | Times Cited: 2
Louisa Hallal, Jason Rhinelander, Ramesh Venkat
Applied System Innovation (2024) Vol. 7, Iss. 3, pp. 45-45
Open Access | Times Cited: 2
Users’ Privacy Attitudes towards the Use of Behavioral Biometrics Continuous Authentication (BBCA) Technologies: A Protection Motivation Theory Approach
Ανδρέας Σκάλκος, Ioannis Stylios, Maria Karyda, et al.
Journal of Cybersecurity and Privacy (2021) Vol. 1, Iss. 4, pp. 743-766
Open Access | Times Cited: 17
Ανδρέας Σκάλκος, Ioannis Stylios, Maria Karyda, et al.
Journal of Cybersecurity and Privacy (2021) Vol. 1, Iss. 4, pp. 743-766
Open Access | Times Cited: 17