
JOURNAL OF L
A
T
E
X CLASS FILES, VOL. 14, NO. 8, FEBRUARY 2021 12
[2] D. Buschek, A. De Luca, and F. Alt, “Improving accuracy, applica-
bility and usability of keystroke biometrics on mobile touchscreen
devices,” in Proc. of the ACM Conference on Human Factors in
Computing Systems, 2015, pp. 1393–1402. 1,7
[3] A. Acien, A. Morales, R. Vera-Rodriguez, and J. Fierrez,
“Keystroke mobile authentication: Performance of long-term ap-
proaches and fusion with behavioral profiling,” in Proc. Iberian
Conf. on Pattern Recognition and Image Analysis (IBPRIA), ser. LNCS,
vol. 11868. Springer, July 2019, pp. 12–24. 1
[4] J. Hernandez-Ortega, R. Daza, A. Morales, J. Fierrez, and J. Ortega-
Garcia, “edBB: Biometrics and Behavior for assessing remote ed-
ucation,” in AAAI Workshop on Artificial Intelligence for Education
(AI4EDU), February 2020. 1,11
[5] T. Yasseri, R. Sumi, A. Rung, A. Kornai, and J. Kertesz, “Dynamics
of conflicts in Wikipedia,” PLOS ONE, vol. 7, no. 6, pp. 1–12, 06
2012. 1
[6] J. Fierrez-Aguilar, D. Garcia-Romero, J. Ortega-Garcia, and
J. Gonzalez-Rodriguez, “Adapted user-dependent multimodal
biometric authentication exploiting general information,” Pattern
Recognition Letters, vol. 26, no. 16, pp. 2628–2639, December 2005.
2
[7] A. Acien, J. V. Monaco, A. Morales, R. Vera-Rodriguez, and
J. Fierrez, “TypeNet: Scaling up keystroke biometrics,” in Proc.
IEEE/IAPR International Joint Conference on Biometrics (IJCB),
September 2020. 2
[8] F. Alonso-Fernandez, J. Fierrez, D. Ramos, and J. Gonzalez-
Rodriguez, “Quality-based conditional processing in multi-
biometrics: application to sensor interoperability,” IEEE Trans. on
Systems, Man and Cybernetics Part A, vol. 40, no. 6, pp. 1168–1179,
2010. 2,9
[9] R. Tolosana, R. Vera-Rodriguez, J. Fierrez, A. Morales, and
J. Ortega-Garcia, “Benchmarking desktop and mobile handwriting
across cots devices: the e-biosign biometric database,” PLOS ONE,
vol. 5, no. 12, 2017. 2
[10] F. Monrose and A. Rubin, “Authentication via keystroke dynam-
ics,” in Proc. of the 4th ACM Conference on Computer and Communi-
cations Security, 1997, pp. 48–56. 2,3
[11] D. Gunetti and C. Picardi, “Keystroke analysis of free text,” ACM
Transactions on Information and System Security, vol. 8, no. 3, pp.
312—-347, Aug. 2005. 2,3
[12] J. Kim and P. Kang, “Freely typed keystroke dynamics-based
user authentication for mobile devices based on heterogeneous
features,” Pattern Recognition, vol. 108, p. 107556, 2020. 3,9
[13] H. Gascon, S. Uellenbeck, C. Wolf, and K. Rieck, “Continuous
authentication on mobile devices by analysis of typing motion be-
havior,” Sicherheit 2014–Sicherheit, Schutz und Zuverl¨assigkeit, 2014.
3
[14] H. C¸ eker and S. Upadhyaya, “User authentication with keystroke
dynamics in long-text data,” in Proc. of IEEE 8th International
Conference on Biometrics Theory, Applications and Systems (BTAS),
2016. 3,7,8,9,10
[15] C. Murphy, J. Huang, D. Hou, and S. Schuckers, “Shared dataset
on natural human-computer interaction to support continuous
authentication research,” in Proc. of IEEE/IAPR International Joint
Conference on Biometrics (IJCB), 2017, pp. 525–530. 2,3
[16] J. V. Monaco and C. C. Tappert, “The partially observable Hidden
Markov Model and its application to keystroke dynamics,” Pattern
Recognition, vol. 76, pp. 449–462, 2018. 3,7,8,9,10
[17] D. Deb, A. Ross, A. K. Jain, K. Prakah-Asante, and K. V. Prasad,
“Actions speak louder than (pass)words: Passive authentication
of smartphone users via deep temporal features,” in Proc. of IAPR
International Conference on Biometrics (ICB), 2019. 3,4
[18] A. Morales, J. Fierrez, R. Tolosana, J. Ortega-Garcia, J. Galbally,
M. Gomez-Barrero, A. Anjos, and S. Marcel, “Keystroke Biometrics
Ongoing Competition,” IEEE Access, vol. 4, pp. 7736–7746, Nov.
2016. 2,10
[19] J. V. Monaco, “Robust keystroke biometric anomaly detection,”
arXiv preprint arXiv:1606.09075, Jun. 2016. 2
[20] F. Bergadano, D. Gunetti, and C. Picardi, “User authentication
through keystroke dynamics,” ACM Transactions on Information and
System Security, vol. 5, no. 4, pp. 367–397, Nov. 2002. 2
[21] M. L. Ali, K. Thakur, C. C. Tappert, and M. Qiu, “Keystroke
biometric user verification using Hidden Markov Model,” in Proc.
of IEEE 3rd International Conference on Cyber Security and Cloud
Computing (CSCloud), 2016, pp. 204–209. 2
[22] T. Sim and R. Janakiraman, “Are digraphs good for free-text
keystroke dynamics?” in Proc. of IEEE Conference on Computer
Vision and Pattern Recognition, 2007. 2
[23] K. Palin, A. Feit, S. Kim, P. O. Kristensson, and A. Oulasvirta,
“How do people type on mobile devices? observations from a
study with 37,000 volunteers.” in Proc. of 21st ACM International
Conference on Human-Computer Interaction with Mobile Devices and
Services (MobileHCI’19), 2019. 3,4,9
[24] P. S. Teh, N. Zhang, A. B. J. Teoh, and K. Chen, “A survey on touch
dynamics authentication in mobile devices,” Computers & Security,
vol. 59, pp. 210–235, 2016. 3,7
[25] H. Crawford and E. Ahmadzadeh, “Authentication on the go:
Assessing the effect of movement on mobile device keystroke
dynamics,” in Thirteenth Symposium on Usable Privacy and Security
(SOUPS 2017), 2017, pp. 163–173. 3
[26] V. Dhakal, A. M. Feit, P. O. Kristensson, and A. Oulasvirta,
“Observations on typing from 136 million keystrokes,” in Proc.
of the ACM CHI Conference on Human Factors in Computing Systems,
2018. 3,9
[27] A. Alsultan and K. Warwick, “Keystroke dynamics authentication:
A survey of free-text,” International Journal of Computer Science
Issues (IJCSI), vol. 10, pp. 1–10, 01 2013. 4
[28] R. Tolosana, R. Vera-Rodriguez, J. Fierrez, and J. Ortega-Garcia,
“BioTouchPass2: Touchscreen password biometrics using Time-
Aligned Recurrent Neural Networks,” IEEE Transactions on Infor-
mation Forensics and Security, 2020. 4
[29] Tolosana, Ruben and Vera-Rodriguez, Ruben and Fierrez, Julian
and Ortega-Garcia, Javier, “Deepsign: Deep on-line signature ver-
ification,” IEEE Transactions on Biometrics, Behavior, and Identity
Science, 2021. 4
[30] X. Lu, Z. Shengfei, and Y. Shengwei, “Continuous authentication
by free-text keystroke based on CNN plus RNN,” Procedia Com-
puter Science, vol. 147, pp. 314–318, 01 2019. 4
[31] R. Hadsell, S. Chopra, and Y. Lecun, “Dimensionality reduction
by learning an invariant mapping,” in Proc. Computer Vision and
Pattern Recognition Conference, 2006. 5
[32] K. Q. Weinberger and L. K. Saul, “Distance metric learning for
large margin nearest neighbor classification,” Journal of Machine
Learning Research, vol. 10, pp. 207–244, 2009. 5
[33] A. Morales, J. Fierrez, and J. Ortega-Garcia, “Towards predicting
good users for biometric recognition based on keystroke dynam-
ics,” in Proc. of European Conference on Computer Vision Workshops,
ser. LNCS, vol. 8926. Springer, September 2014, pp. 711–724. 7
[34] J. Fierrez, A. Morales, R. Vera-Rodriguez, and D. Camacho, “Mul-
tiple classifiers in biometrics. Part 2: Trends and challenges,”
Information Fusion, vol. 44, pp. 103–112, November 2018. 7,11
[35] N. Banovic, V. Rao, A. Saravanan, A. K. Dey, and J. Mankoff,
“Quantifying aversion to costly typing errors in expert mobile text
entry,” in Proc. of the CHI Conference on Human Factors in Computing
Systems, 2017, pp. 4229––4241. 7
[36] H. Hyyro, “Bit-parallel approximate string matching algorithms
with transposition,” Journal of Discrete Algorithms, vol. 3, no. 2, pp.
215–229, 2005. 10
[37] I. Kemelmacher-Shlizerman, S. M. Seitz, D. Miller, and E. Brossard,
“The megaface benchmark: 1 million faces for recognition at
scale,” in Proceedings of the IEEE Conference on Computer Vision and
Pattern Recognition, 2016, pp. 4873–4882. 10
[38] C.-Y. Wu, R. Manmatha, A. J. Smola, and P. Krahenbuhl, “Sam-
pling matters in deep embedding learning,” in Proc. of the IEEE
International Conference on Computer Vision, 2017, pp. 2840–2848. 11
[39] R. Tolosana, P. Delgado-Santos, A. Perez-Uribe, R. Vera-Rodriguez,
J. Fierrez, and A. Morales, “DeepWriteSYN: On-line handwriting
synthesis via deep short-term representations,” in AAAI Conf. on
Artificial Intelligence (AAAI), February 2021. 11
[40] A. Acien, A. Morales, R. Vera-Rodriguez, J. Fierrez, and O. Del-
gado, “Smartphone sensors for modeling human-computer inter-
action: General outlook and research datasets for user authen-
tication,” in IEEE Conf. on Computers, Software, and Applications
(COMPSAC), July 2020. 11
[41] A. Acien, A. Morales, R. Vera-Rodriguez, and J. Fierrez, “Mul-
tilock: Mobile active authentication based on multiple biometric
and behavioral patterns,” in Proc. ACM Intl. Conf. on Multimedia,
Workshop on Multimodal Understanding and Learning for Embodied
Applications (MULEA), October 2019, pp. 53–59. 11
[42] A. Acien, A. Morales, J. Fierrez, R. V. Rodriguez, and J. Hernandez-
Ortega, “Active detection of age groups based on touch interac-
tion,” IET Biometrics, vol. 8, no. 1, pp. 101–108, January 2019. 11