
OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!
If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.
Requested Article:
Sensor-Based Continuous Authentication of Smartphones’ Users Using Behavioral Biometrics: A Contemporary Survey
Mohammed Abuhamad, Ahmed Abusnaina, DaeHun Nyang, et al.
IEEE Internet of Things Journal (2020) Vol. 8, Iss. 1, pp. 65-84
Open Access | Times Cited: 132
Mohammed Abuhamad, Ahmed Abusnaina, DaeHun Nyang, et al.
IEEE Internet of Things Journal (2020) Vol. 8, Iss. 1, pp. 65-84
Open Access | Times Cited: 132
Showing 1-25 of 132 citing articles:
Multi-sensor information fusion based on machine learning for real applications in human activity recognition: State-of-the-art and research challenges
Sen Qiu, Hongkai Zhao, Nan Jiang, et al.
Information Fusion (2021) Vol. 80, pp. 241-265
Closed Access | Times Cited: 439
Sen Qiu, Hongkai Zhao, Nan Jiang, et al.
Information Fusion (2021) Vol. 80, pp. 241-265
Closed Access | Times Cited: 439
AI for Identity and Access Management (IAM) in the Cloud: Exploring the Potential of Artificial Intelligence to Improve User Authentication, Authorization, and Access Control within Cloud-Based Systems
Samuel Oladiipo Olabanji, Oluwaseun Oladeji Olaniyi, Chinasa Susan Adigwe, et al.
Asian Journal of Research in Computer Science (2024) Vol. 17, Iss. 3, pp. 38-56
Open Access | Times Cited: 30
Samuel Oladiipo Olabanji, Oluwaseun Oladeji Olaniyi, Chinasa Susan Adigwe, et al.
Asian Journal of Research in Computer Science (2024) Vol. 17, Iss. 3, pp. 38-56
Open Access | Times Cited: 30
Robust Natural Language Processing: Recent Advances, Challenges, and Future Directions
Marwan Omar, Soohyeon Choi, DaeHun Nyang, et al.
IEEE Access (2022) Vol. 10, pp. 86038-86056
Open Access | Times Cited: 61
Marwan Omar, Soohyeon Choi, DaeHun Nyang, et al.
IEEE Access (2022) Vol. 10, pp. 86038-86056
Open Access | Times Cited: 61
Security, Privacy, and Usability in Continuous Authentication: A Survey
Ahmed Fraz Baig, Sigurd Eskeland
Sensors (2021) Vol. 21, Iss. 17, pp. 5967-5967
Open Access | Times Cited: 55
Ahmed Fraz Baig, Sigurd Eskeland
Sensors (2021) Vol. 21, Iss. 17, pp. 5967-5967
Open Access | Times Cited: 55
A Survey of Privacy Vulnerabilities of Mobile Device Sensors
Paula Delgado-Santos, Giuseppe Stragapede, Rubén Tolosana, et al.
ACM Computing Surveys (2022) Vol. 54, Iss. 11s, pp. 1-30
Open Access | Times Cited: 40
Paula Delgado-Santos, Giuseppe Stragapede, Rubén Tolosana, et al.
ACM Computing Surveys (2022) Vol. 54, Iss. 11s, pp. 1-30
Open Access | Times Cited: 40
Mobile Keystroke Biometrics Using Transformers
Giuseppe Stragapede, Paula Delgado-Santos, Rubén Tolosana, et al.
(2023), pp. 1-6
Open Access | Times Cited: 23
Giuseppe Stragapede, Paula Delgado-Santos, Rubén Tolosana, et al.
(2023), pp. 1-6
Open Access | Times Cited: 23
Comprehensive survey: Biometric user authentication application, evaluation, and discussion
Reem Alrawili, Ali Abdullah S. AlQahtani, Muhammad Khurram Khan
Computers & Electrical Engineering (2024) Vol. 119, pp. 109485-109485
Open Access | Times Cited: 10
Reem Alrawili, Ali Abdullah S. AlQahtani, Muhammad Khurram Khan
Computers & Electrical Engineering (2024) Vol. 119, pp. 109485-109485
Open Access | Times Cited: 10
HGSSA-bi LSTM: A Secure Multimodal Biometric Sensing Using Optimized Bi-Directional Long Short-Term Memory with Self-Attention
Juhi Priyani, Pankaj Nanglia, Paramjit Singh, et al.
ECS Sensors Plus (2024) Vol. 3, Iss. 1, pp. 011401-011401
Open Access | Times Cited: 7
Juhi Priyani, Pankaj Nanglia, Paramjit Singh, et al.
ECS Sensors Plus (2024) Vol. 3, Iss. 1, pp. 011401-011401
Open Access | Times Cited: 7
A Comprehensive Review on Secure Biometric-Based Continuous Authentication and User Profiling
S. Ayeswarya, K. John Singh
IEEE Access (2024) Vol. 12, pp. 82996-83021
Open Access | Times Cited: 5
S. Ayeswarya, K. John Singh
IEEE Access (2024) Vol. 12, pp. 82996-83021
Open Access | Times Cited: 5
TypeFormer: transformers for mobile keystroke biometrics
Giuseppe Stragapede, María Paula Delgado, Rubén Tolosana, et al.
Neural Computing and Applications (2024) Vol. 36, Iss. 29, pp. 18531-18545
Open Access | Times Cited: 5
Giuseppe Stragapede, María Paula Delgado, Rubén Tolosana, et al.
Neural Computing and Applications (2024) Vol. 36, Iss. 29, pp. 18531-18545
Open Access | Times Cited: 5
Privacy-Preserving Sensor-Based Continuous Authentication and User Profiling: A Review
Luis Hernández–Álvarez, José M. de Fuentes, Lorena González‐Manzano, et al.
Sensors (2020) Vol. 21, Iss. 1, pp. 92-92
Open Access | Times Cited: 40
Luis Hernández–Álvarez, José M. de Fuentes, Lorena González‐Manzano, et al.
Sensors (2020) Vol. 21, Iss. 1, pp. 92-92
Open Access | Times Cited: 40
MMAuth: A Continuous Authentication Framework on Smartphones Using Multiple Modalities
Zhihao Shen, Shun Li, Xi Zhao, et al.
IEEE Transactions on Information Forensics and Security (2022) Vol. 17, pp. 1450-1465
Closed Access | Times Cited: 27
Zhihao Shen, Shun Li, Xi Zhao, et al.
IEEE Transactions on Information Forensics and Security (2022) Vol. 17, pp. 1450-1465
Closed Access | Times Cited: 27
Continuous user authentication on smartphone via behavioral biometrics: a survey
Praveen Kumar Rayani, Suvamoy Changder
Multimedia Tools and Applications (2022) Vol. 82, Iss. 2, pp. 1633-1667
Closed Access | Times Cited: 27
Praveen Kumar Rayani, Suvamoy Changder
Multimedia Tools and Applications (2022) Vol. 82, Iss. 2, pp. 1633-1667
Closed Access | Times Cited: 27
Adaptive Deep Feature Fusion for Continuous Authentication With Data Augmentation
Yantao Li, Li Liu, Huafeng Qin, et al.
IEEE Transactions on Mobile Computing (2022) Vol. 22, Iss. 10, pp. 5690-5705
Open Access | Times Cited: 24
Yantao Li, Li Liu, Huafeng Qin, et al.
IEEE Transactions on Mobile Computing (2022) Vol. 22, Iss. 10, pp. 5690-5705
Open Access | Times Cited: 24
IncreAuth: Incremental-Learning-Based Behavioral Biometric Authentication on Smartphones
Zhihao Shen, Shun Li, Xi Zhao, et al.
IEEE Internet of Things Journal (2023) Vol. 11, Iss. 1, pp. 1589-1603
Closed Access | Times Cited: 12
Zhihao Shen, Shun Li, Xi Zhao, et al.
IEEE Internet of Things Journal (2023) Vol. 11, Iss. 1, pp. 1589-1603
Closed Access | Times Cited: 12
Healthcare Security: Post-Quantum Continuous Authentication with Behavioral Biometrics using Vector Similarity Search
Basudeb Bera, Sutanu Nandi, Ashok Kumar Das, et al.
IEEE Transactions on Information Forensics and Security (2025) Vol. 20, pp. 1597-1612
Closed Access
Basudeb Bera, Sutanu Nandi, Ashok Kumar Das, et al.
IEEE Transactions on Information Forensics and Security (2025) Vol. 20, pp. 1597-1612
Closed Access
A Review of the Authentication Techniques for Internet of Things Devices in Smart Cities: Opportunities, Challenges, and Future Directions
Ashwag Alotaibi, Huda Aldawghan, Ahmed Aljughaiman
Sensors (2025) Vol. 25, Iss. 6, pp. 1649-1649
Open Access
Ashwag Alotaibi, Huda Aldawghan, Ahmed Aljughaiman
Sensors (2025) Vol. 25, Iss. 6, pp. 1649-1649
Open Access
RESEARCH OF INNOVATIVE AUTHENTICATION: A DEEP DIVE INTO BIOMETRIC ACCESS TECHNOLOGIES
D. Kaiypbergen, Yenlik Begimbayeva
Herald of Kazakh-British technical university (2025) Vol. 22, Iss. 1, pp. 103-113
Open Access
D. Kaiypbergen, Yenlik Begimbayeva
Herald of Kazakh-British technical university (2025) Vol. 22, Iss. 1, pp. 103-113
Open Access
DeFFusion: CNN-based Continuous Authentication Using Deep Feature Fusion
Yantao Li, Tao Peng, Shaojiang Deng, et al.
ACM Transactions on Sensor Networks (2021) Vol. 18, Iss. 2, pp. 1-20
Closed Access | Times Cited: 29
Yantao Li, Tao Peng, Shaojiang Deng, et al.
ACM Transactions on Sensor Networks (2021) Vol. 18, Iss. 2, pp. 1-20
Closed Access | Times Cited: 29
Deep Learning-based Continuous Authentication for an IoT-enabled healthcare service
Amiya Kumar Sahu, Suraj Sharma, Rohit Raja
Computers & Electrical Engineering (2022) Vol. 99, pp. 107817-107817
Closed Access | Times Cited: 20
Amiya Kumar Sahu, Suraj Sharma, Rohit Raja
Computers & Electrical Engineering (2022) Vol. 99, pp. 107817-107817
Closed Access | Times Cited: 20
Accelerometer-Based Key Generation and Distribution Method for Wearable IoT Devices
Fangmin Sun, Weilin Zang, Haohua Huang, et al.
IEEE Internet of Things Journal (2020) Vol. 8, Iss. 3, pp. 1636-1650
Open Access | Times Cited: 27
Fangmin Sun, Weilin Zang, Haohua Huang, et al.
IEEE Internet of Things Journal (2020) Vol. 8, Iss. 3, pp. 1636-1650
Open Access | Times Cited: 27
Touch-based continuous mobile device authentication: State-of-the-art, challenges and opportunities
Ahmad Zairi Zaidi, Chun Yong Chong, Zhe Jin, et al.
Journal of Network and Computer Applications (2021) Vol. 191, pp. 103162-103162
Open Access | Times Cited: 26
Ahmad Zairi Zaidi, Chun Yong Chong, Zhe Jin, et al.
Journal of Network and Computer Applications (2021) Vol. 191, pp. 103162-103162
Open Access | Times Cited: 26
A Survey on Quantitative Risk Estimation Approaches for Secure and Usable User Authentication on Smartphones
Μαρία Παπαϊωάννου, Filippos Pelekoudas‐Oikonomou, Γεώργιος Μαντάς, et al.
Sensors (2023) Vol. 23, Iss. 6, pp. 2979-2979
Open Access | Times Cited: 10
Μαρία Παπαϊωάννου, Filippos Pelekoudas‐Oikonomou, Γεώργιος Μαντάς, et al.
Sensors (2023) Vol. 23, Iss. 6, pp. 2979-2979
Open Access | Times Cited: 10
A Survey of Wearable Devices Pairing Based on Biometric Signals
Jafar Pourbemany, Ye Zhu, Riccardo Bettati
IEEE Access (2023) Vol. 11, pp. 26070-26085
Open Access | Times Cited: 9
Jafar Pourbemany, Ye Zhu, Riccardo Bettati
IEEE Access (2023) Vol. 11, pp. 26070-26085
Open Access | Times Cited: 9
Behavioral authentication for security and safety
Cheng Wang, Hao Tang, Hangyu Zhu, et al.
Security and Safety (2024) Vol. 3, pp. 2024003-2024003
Open Access | Times Cited: 3
Cheng Wang, Hao Tang, Hangyu Zhu, et al.
Security and Safety (2024) Vol. 3, pp. 2024003-2024003
Open Access | Times Cited: 3