“…For implicit authentication on smartphones, various behavior-based classifiers have been proposed that employ a user's location patterns [9,10,11], call/text patterns [8], keystroke patterns [14], proximity to known devices [7], gait patterns [12], and touchscreen input behavior [3,4,5]. Furthermore, some approaches have proposed to combine behavior-based classifiers and contextual information from multiple sources [7,8,15] to implicitly authenticate a user.…”