Abstract: With the widespread use of smartphones, more and more private information is stored on them, which requires a more secure authentication method. Continuous authentication methods show ...