Research Article

Smartwatch-Based Legitimate User Identification for Cloud-Based Secure Services

Figure 4

Identification time for SVM, NB, KNN, and DT classifiers (a–d).
(a)
(b)
(c)
(d)