
for continuous user re-authentication in mobile apps.
In Proceedings of the 27
th
ACM International Con-
ference on Information and Knowledge Management,
pages 2027–2035.
Amos, B., Ludwiczuk, B., Satyanarayanan, M., et al.
(2016). Openface: A general-purpose face recognition
library with mobile applications. CMU School of
Computer Science, 6(2):20.
Android (Accessed on 10-01-2025a). Biometrics. https://so
urce.android.com/docs/security/features/biometric.
online web resource.
Android (Accessed on 10-01-2025b). Developers guide:
Sensorevent. https://developer.android.com/referenc
e/android/hardware/SensorEvent.html. online web
resource.
Boshoff, D., Scriba, A., Nkrow, R., and Hancke, G. P.
(2023). Phone pick-up authentication: A gesture-
based smartphone authentication mechanism. In Pro-
ceedings of the IEEE International Conference on In-
dustrial Technology (ICIT), pages 1–6. IEEE.
Boutros, F., Damer, N., Kirchbuchner, F., and Kuijper, A.
(2022). Elasticface: Elastic margin loss for deep face
recognition. In Proceedings of the IEEE/CVF Con-
ference on Computer Vision and Pattern Recognition,
pages 1578–1587.
Busch, M., Westphal, J., and M
¨
uller, T. (2020). Unearthing
the {TrustedCore}: A critical review on {Huawei’s}
trusted execution environment. In Proceedings of the
14
th
USENIX Workshop on Offensive Technologies
(WOOT 20).
Centeno, M. P., van Moorsel, A., and Castruccio, S.
(2017). Smartphone continuous authentication us-
ing deep learning autoencoders. In Proceedings of
the 15
th
Annual Conference on Privacy, Security and
Trust (PST), pages 147–1478. IEEE.
Chen, S., Liu, Y., Gao, X., and Han, Z. (2018). Mobile-
facenets: Efficient cnns for accurate real-time face
verification on mobile devices. In Proceedings of the
13
th
Chinese Conference on Biometric Recognition,
pages 428–438. Springer.
Choi, K., Ryu, H., and Kim, J. (2021). Deep residual
networks for user authentication via hand-object ma-
nipulations. Sensors, 21(9):2981.
Christ, M., Braun, N., Neuffer, J., and Kempa-Liehr, A. W.
(2018). Time series feature extraction on basis of
scalable hypothesis tests (tsfresh–a python package).
Neurocomputing, 307:72–77.
Duong, C. N., Quach, K. G., Jalata, I., Le, N., and Luu, K.
(2019). Mobiface: A lightweight deep learning face
recognition on mobile devices. In Proceedings of the
10
th
international conference on biometrics theory,
applications and systems (BTAS), pages 1–6. IEEE.
Fathy, M. E., Patel, V. M., and Chellappa, R. (2015).
Face-based active authentication on mobile devices.
In Proceedings of the IEEE International Conference
on acoustics, speech and signal processing (ICASSP),
pages 1687–1691. IEEE.
Gupta, S. (2020). Next-generation user authentication
schemes for IoT applications. PhD thesis, PhD thesis,
Ph.D. dissertation, University of Trento, Italy.
Gupta, S., Buriro, A., and Crispo, B. (2019). A risk-driven
model to minimize the effects of human factors on
smart devices. In International Workshop on Emerg-
ing Technologies for Authorization and Authentica-
tion, pages 156–170. Springer.
Gupta, S., Buriro, A., and Crispo, B. (2020). A chimerical
dataset combining physiological and behavioral bio-
metric traits for reliable user authentication on smart
devices and ecosystems. Data in brief, 28:104924.
Gupta, S. and Crispo, B. (2023). Usable identity and access
management schemes for smart cities. In Collabora-
tive Approaches for Cyber Security in Cyber-Physical
Systems, pages 47–61. Springer.
Gupta, S., Kacimi, M., and Crispo, B. (2022a). Step
& turn—a novel bimodal behavioral biometric-based
user verification scheme for physical access control.
Computers & Security, 118:102722.
Gupta, S., Kumar, R., Kacimi, M., and Crispo, B. (2022b).
Ideauth: A novel behavioral biometric-based implicit
deauthentication scheme for smartphones. Pattern
Recognition Letters, 157:8–15.
Gupta, S., Maple, C., Crispo, B., Raja, K., Yautsiukhin,
A., and Martinelli, F. (2023). A survey of human-
computer interaction (hci) & natural habits-based be-
havioural biometric modalities for user recognition
schemes. Pattern Recognition, page 109453.
Ibsen, M., Rathgeb, C., Fischer, D., Drozdowski, P.,
and Busch, C. (2022). Digital face manipulation
in biometric systems. In Proceedings of the Hand-
book of Digital Face Manipulation and Detection:
From DeepFakes to Morphing Attacks, pages 27–43.
Springer International Publishing Cham.
Joshi, I., Grimmer, M., Rathgeb, C., Busch, C., Bremond,
F., and Dantcheva, A. (2024). Synthetic data in human
analysis: A survey. IEEE Transactions on Pattern
Analysis and Machine Intelligence.
Karras, T., Aittala, M., Hellsten, J., Laine, S., Lehtinen, J.,
and Aila, T. (2020). Training generative adversarial
networks with limited data. In Proceedings of the
NeurIPS, pages 1–12.
Kumar, R., Kundu, P. P., and Phoha, V. V. (2018). Continu-
ous authentication using one-class classifiers and their
fusion. In Proceedings of the 4
th
International Con-
ference on Identity, Security, and Behavior Analysis
(ISBA), pages 1–8. IEEE.
Li, Y., Tao, P., Deng, S., and Zhou, G. (2021). Deffusion:
Cnn-based continuous authentication using deep fea-
ture fusion. ACM Transactions on Sensor Networks
(TOSN).
Liang, Y., Samtani, S., Guo, B., and Yu, Z. (2020). Behav-
ioral biometrics for continuous authentication in the
internet-of-things era: An artificial intelligence per-
spective. IEEE Internet of Things Journal, 7(9):9128–
9143.
LJPvd, M. and Hinton, G. (2008). Visualizing high-
dimensional data using t-sne. J Mach Learn Res,
9(2579-2605):9.
Markert, P., Bailey, D. V., Golla, M., D
¨
urmuth, M., and
Aviv, A. J. (2021). On the security of smartphone un-
Evaluating a Bimodal User Verification Robustness Against Synthetic Data Attacks
35