
mouse dynamics and deep learning. Secur. Commun.
Netw., 2019.
Jorgensen, Z. and Yu, T. (2011). On mouse dynamics as a
behavioral biometric for authentication. In Proc. ASI-
ACCS.
Lee, H., Lee, Y., Lee, K., and Yim, K. (2016). Security
assessment on the mouse data using mouse loggers.
In Proc. BWCCA.
Lee, K., Esposito, C., and Lee, S.-Y. (2019). Vulnerabil-
ity analysis challenges of the mouse data based on
machine learning for image-based user authentication.
IEEE Access, 7.
Leiva, L. A., Arapakis, I., and Iordanou, C. (2021). My
mouse, my rules: Privacy issues of behavioral user
profiling via mouse tracking. In Proc. CHIIR.
Leiva, L. A., Diaz, M., Ferrer, M. A., and Plamondon, R.
(2020). Human or machine? it is not what you write,
but how you write it. In Proc. ICPR.
Levi, M. and Hazan, I. (2020). Deep learning based sequen-
tial mining for user authentication in web applications.
In Proc. ETAA.
Li, J., Cheng, K., Wang, S., Morstatter, F., Trevino, R. P.,
Tang, J., and Liu, H. (2017). Feature selection: A data
perspective. ACM Comput. Surv., 50(6).
Lin, C.-C., Chang, C.-C., and Liang, D. (2012). A new non-
intrusive authentication approach for data protection
based on mouse dynamics. In Proc. ISBAST.
Liu, Y., Jiang, Y., and Devenere, J. (2020). Using deep
learning for fusion of eye and mouse movement based
user authentication. In Proc. IJCB.
Muda, R., Hamid, N. A., Satar, S. D. M., Mohamad, M.,
Mahadi, N. A., and Ghazali, F. (2017). Mouse move-
ment behavioral biometric for static user authentica-
tion. Advanced Science Letters, 23(6).
Oak, R. (2018). A literature survey on authentication using
behavioural biometric techniques. In Proc. ICICC.
Pramila, R. M., Misbahuddin, M., and Shukla, S. (2022).
A survey on adaptive authentication using machine
learning techniques. In Proc. IDSCS.
Qin, D., Fu, S., Amariucai, G., Qiao, D., and Guan, Y.
(2020). MAUSPAD: Mouse-based authentication us-
ing segmentation-based, progress-adjusted DTW. In
Proc. TrustCom.
Revett, K., Jahankhani, H., de Magalh
˜
aes, S. T., and San-
tos, H. M. D. (2008). A survey of user authentication
based on mouse dynamics. In Proc. ICGeS.
Rose, J., Liu, Y., and Awad, A. (2017). Biometric authenti-
cation using mouse and eye movement data. In Proc.
SPW.
Roth, J., Liu, X., and Metaxas, D. (2014). On continuous
user authentication via typing behavior. IEEE Trans.
Image Process., 23(10).
Shen, C., Cai, Z., Guan, X., and Wang, J. (2012). On the ef-
fectiveness and applicability of mouse dynamics bio-
metric for static authentication: A benchmark study.
In Proc. ICB.
Sherstinsky, A. (2020). Fundamentals of recurrent neural
network (RNN) and long short-term memory (LSTM)
network. Physica D: Nonlinear Phenomena, 404.
Tan, Y. X. M., Binder, A., and Roy, A. (2017). Insights
from curve fitting models in mouse dynamics authen-
tication systems. In Proc. AINS.
Tan, Y. X. M., Iacovazzi, A., Homoliak, I., Elovici, Y., and
Binder, A. (2019). Adversarial attacks on remote user
authentication using behavioural mouse dynamics. In
Proc. IJCNN.
Thomas, P. A. and Mathew, K. P. (2022). An efficient opti-
mized mouse and keystroke dynamics framework for
continuous non-intrusive user authentication. Wirel.
Pers. Commun., 124.
Traore, I., Woungang, I., Obaidat, M. S., Nakkabi, Y.,
and Lai, I. (2012). Combining mouse and keystroke
dynamics biometrics for risk-based authentication in
web environments. In Proc. ICDH.
Wei, A., Zhao, Y., and Cai, Z. (2019). A deep learning
approach to web bot detection using mouse behavioral
biometrics. In Proc. CCBR.
Yamauchi, T. and Bowman, C. (2014). Mining cursor mo-
tions to find the gender, experience, and feelings of
computer users. In Proc. ICDMW.
Yamauchi, T., Seo, J. H., Jett, N., Parks, G., and Bowman,
C. (2015). Gender differences in mouse and cursor
movements. Int. J. Hum. Comput. Interact., 31(12).
Yazji, S., Chen, X., Dick, R. P., and Scheuermann, P.
(2009). Implicit user re-authentication for mobile de-
vices. In Proc. UIC.
Zheng, Y., Yu, L., Haque, S., Zhang, P., and Elmaghraby,
A. S. (2022). Improving cybersecurity through deep
learning on keystroke and mouse dynamics. In Proc.
SPIE Defense + Commercial Sensing.
User Re-Authentication via Mouse Movements and Recurrent Neural Networks
659