Research Article

Who Is Using the Phone? Representation-Learning-Based Continuous Authentication on Smartphones

Figure 5

Interval feature graphs constructed during continuously input passwords by five random users (partial).