Continuous user authentication on smartphone via behavioral biometrics: a survey

PK Rayani, S Changder - Multimedia Tools and Applications, 2023 - Springer
The use of ubiquitous devices is increasing worldwide due to signs of progress in
sophisticated hardware technology with cutting-edge features. These features offer most …

[HTML][HTML] A survey of identity recognition via data fusion and feature learning

Z Qin, P Zhao, T Zhuang, F Deng, Y Ding, D Chen - Information Fusion, 2023 - Elsevier
With the rapid development of the Mobile Internet and the Industrial Internet of Things, a
variety of applications put forward an urgent demand for user and device identity …

Adversary models for mobile device authentication

R Mayrhofer, S Sigg - ACM Computing Surveys (CSUR), 2021 - dl.acm.org
Mobile device authentication has been a highly active research topic for over 10 years, with
a vast range of methods proposed and analyzed. In related areas, such as secure channel …

Continuous user authentication featuring keystroke dynamics based on robust recurrent confidence model and ensemble learning approach

AT Kiyani, A Lasebae, K Ali, MU Rehman, B Haq - IEEE Access, 2020 - ieeexplore.ieee.org
User authentication is considered to be an important aspect of any cyber security program.
However, one-time validation of user's identity is not strong to provide resilient security …

A classifications framework for continuous biometric authentication (2018–2024)

D Boshoff, GP Hancke - Computers & Security, 2025 - Elsevier
The increase in personal devices, the amount of private and sensitive information these
devices store/process, and the importance of this information have introduced vital security …

Continuous User Authentication on Multiple Smart Devices

Y Wang, X Zhang, H Hu - Information, 2023 - mdpi.com
Recent developments in the mobile and intelligence industry have led to an explosion in the
use of multiple smart devices such as smartphones, tablets, smart bracelets, etc. To achieve …

[HTML][HTML] A Review on Secure Authentication Mechanisms for Mobile Security

SSU Hasan, A Ghani, A Daud, H Akbar, MF Khan - Sensors, 2025 - mdpi.com
Cybersecurity, complimenting authentication, has become the backbone of the Internet of
Things. In the authentication process, the word authentication is of the utmost importance, as …

Adversarial attacks on continuous authentication security: A dynamic game approach

S Sarıtaş, E Shereen, H Sandberg, G Dán - International Conference on …, 2019 - Springer
Identity theft through phishing and session hijacking attacks has become a major attack
vector in recent years, and is expected to become more frequent due to the pervasive use of …

What is more important for touch dynamics based mobile user authentication?

K Wang, L Zhou - PACIS 2020 Proceedings, 2020 - par.nsf.gov
Mobile user authentication (MUA) has become a gatekeeper for securing a wealth of
personal and sensitive information residing on mobile devices. Keystrokes and touch …

A comprehensive review on secure biometric-based continuous authentication and user profiling

S Ayeswarya, KJ Singh - IEEE Access, 2024 - ieeexplore.ieee.org
Authentication systems are pivotal in fortifying security measures against unauthorized
access. Yet, they often fall short of effectively combating impersonation attacks, leaving …