Research Article
Who Is Using the Phone? Representation-Learning-Based Continuous Authentication on Smartphones
Table 2
Features used in key-in feature graph.
| Type | Variable | Label |
| Raw data | p, size, touchmajor, touchminor | Down, move, up | x, y | | | acc, gyr, ori | Calculated data | , , | Down, move, up | | | | | | | | | | | | | | | | | | acc, gyr, ori | | | | |
|
|