OpenAlex Citation Counts

OpenAlex Citations Logo

OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!

If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.

Requested Article:

Fine-Grained and Context-Aware Behavioral Biometrics for Pattern Lock on Smartphones
Dai Shi, Dan Tao, Jiangtao Wang, et al.
Proceedings of the ACM on Interactive Mobile Wearable and Ubiquitous Technologies (2021) Vol. 5, Iss. 1, pp. 1-30
Closed Access | Times Cited: 25

Showing 25 citing articles:

A Systematic Review of Human Activity Recognition Based on Mobile Devices: Overview, Progress and Trends
Yafeng Yin, Lei Xie, Zhiwei Jiang, et al.
IEEE Communications Surveys & Tutorials (2024) Vol. 26, Iss. 2, pp. 890-929
Closed Access | Times Cited: 16

Touchscreen gestures as images. A transfer learning approach for soft biometric traits recognition
Alfonso Guarino, Delfina Malandrino, Rocco Zaccagnino, et al.
Expert Systems with Applications (2023) Vol. 219, pp. 119614-119614
Open Access | Times Cited: 21

Deep Learning and Machine Learning, Better Together Than Apart: A Review on Biometrics Mobile Authentication
Sara Kokal, Mounika Vanamala, Rushit Dave
Journal of Cybersecurity and Privacy (2023) Vol. 3, Iss. 2, pp. 227-258
Open Access | Times Cited: 15

Recovering Fingerprints from In-Display Fingerprint Sensors via Electromagnetic Side Channel
Tao Ni, Xiaokuan Zhang, Qingchuan Zhao
Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security (2023), pp. 253-267
Closed Access | Times Cited: 12

B2auth: A contextual fine-grained behavioral biometric authentication framework for real-world deployment
Ahmed Mahfouz, Ahmed Hamdy, Mohamed Alaa Eldin, et al.
Pervasive and Mobile Computing (2024) Vol. 99, pp. 101888-101888
Closed Access | Times Cited: 4

A Review on Secure Authentication Mechanisms for Mobile Security
Syed Shabih Hasan, Anwar Ghani, Ali Daud, et al.
Sensors (2025) Vol. 25, Iss. 3, pp. 700-700
Open Access

Toward Robust Detection of Puppet Attacks via Characterizing Fingertip-Touch Behaviors
Cong Wu, Kun He, Jing Chen, et al.
IEEE Transactions on Dependable and Secure Computing (2021) Vol. 19, Iss. 6, pp. 4002-4018
Closed Access | Times Cited: 18

The Self-Detection Method of the Puppet Attack in Biometric Fingerprinting
Guyue Li, Yiyun Ma, Wenhao Wang, et al.
IEEE Internet of Things Journal (2024) Vol. 11, Iss. 10, pp. 18824-18838
Closed Access | Times Cited: 2

SwipePass
Yongliang Chen, Tao Ni, Weitao Xu, et al.
Proceedings of the ACM on Interactive Mobile Wearable and Ubiquitous Technologies (2022) Vol. 6, Iss. 3, pp. 1-25
Closed Access | Times Cited: 11

M2auth: A multimodal behavioral biometric authentication using feature-level fusion
Ahmed Mahfouz, Hebatollah Mostafa, Tarek M. Mahmoud, et al.
Neural Computing and Applications (2024)
Closed Access | Times Cited: 1

PresSafe: Barometer-Based On-Screen Pressure-Assisted Implicit Authentication for Smartphones
Muyan Yao, Dan Tao, Ruipeng Gao, et al.
IEEE Internet of Things Journal (2022) Vol. 10, Iss. 1, pp. 285-302
Open Access | Times Cited: 5

On the Long-Term Effects of Continuous Keystroke Authentication
Jun Ho Huh, Sungsu Kwag, Iljoo Kim, et al.
Proceedings of the ACM on Interactive Mobile Wearable and Ubiquitous Technologies (2023) Vol. 7, Iss. 2, pp. 1-32
Closed Access | Times Cited: 2

AttAuth: An Implicit Authentication Framework for Smartphone Users Using Multimodality Data
Chengmei Zhao, Feng Gao, Zhihao Shen
IEEE Internet of Things Journal (2023) Vol. 11, Iss. 4, pp. 6928-6942
Closed Access | Times Cited: 2

FingerPattern: Securing Pattern Lock via Fingerprint-Dependent Friction Sound
Man Zhou, Yuting Zhou, Shuao Su, et al.
IEEE Transactions on Mobile Computing (2023) Vol. 23, Iss. 6, pp. 7210-7224
Closed Access | Times Cited: 2

Your Device May Know You Better Than You Know Yourself-Continuous Authentication on Novel Dataset using Machine Learning
Pedro Gomes do Nascimento, Pidge Witiak, Tucker MacCallum, et al.
International Journal of Computer Science and Information Technology (2024) Vol. 16, Iss. 1, pp. 53-65
Open Access

Touch Authentication for Sharing Context Using Within-Group Similarity Structure
Yunpeng Song, Yulin Zhang, Zhongmin Cai, et al.
IEEE Internet of Things Journal (2024) Vol. 11, Iss. 17, pp. 28281-28296
Closed Access

User Authentication in the IoT and IIoT Environment
Ahmed Mahfouz
Advances in information security, privacy, and ethics book series (2024), pp. 169-194
Closed Access

A Robust Continuous Authentication System Using Smartphone Sensors and Wasserstein Generative Adversarial Networks
Shihong Zou, Huizhong Sun, Guosheng Xu, et al.
Security and Communication Networks (2023) Vol. 2023, pp. 1-11
Open Access | Times Cited: 1

EchoIA: A Cloud-Based Implicit Authentication Leveraging User Feedback
Yingyuan Yang, Jiangnan Li, Sunshin Lee, et al.
Network (2022) Vol. 2, Iss. 1, pp. 190-202
Open Access | Times Cited: 1

MicroCam
Yongquan Hu, Hui-Shyong Yeo, Mingyue Yuan, et al.
Proceedings of the ACM on Interactive Mobile Wearable and Ubiquitous Technologies (2023) Vol. 7, Iss. 3, pp. 1-28
Open Access

An Adaptive Context-Aware Authentication System on Smartphones Using Machine Learning
Aiman M. Ayyal Awwad
International Journal of Safety and Security Engineering (2023) Vol. 13, Iss. 5, pp. 903-915
Open Access

Pattern unlocking guided multi‐modal continuous authentication for smartphone with multi‐branch context‐aware representation learning and auto encoder
Muyan Yao, Zuodong Jin, Ruipeng Gao, et al.
Transactions on Emerging Telecommunications Technologies (2023)
Closed Access

Sensor Data Normalization Among Heterogeneous Smartphones for Implicit Authentication
Zuodong Jin, Muyan Yao, Dan Tao
Lecture notes in computer science (2022), pp. 331-345
Closed Access

Stepping Into the Next Decade of Ubiquitous and Pervasive Computing: UbiComp and ISWC 2021
Rahul Majethia, Shreya Ghosh, Hannah R. Nolasco, et al.
IEEE Pervasive Computing (2022) Vol. 21, Iss. 2, pp. 87-99
Open Access

Page 1

Scroll to top