Research Article

Who Is Using the Phone? Representation-Learning-Based Continuous Authentication on Smartphones

Table 2

Features used in key-in feature graph.

TypeVariableLabel

Raw datap, size, touchmajor, touchminorDown, move, up
x, y
acc, gyr, ori
Calculated data, , Down, move, up
acc, gyr, ori