1. Al-Naffakh N., Clarke N., Li F.: Continuous User Authentication Using Smartwatch Motion Sensor Data. In: (Gal-Oz N., Lewis P. R., Eds.) Trust Management XII. Springer International Publishing, Cham, 2018, pp 15–28
2. Alegre F., Vipperla R., Evans N., Fauve B.: On the vulnerability of automatic speaker recognition to spoofing attacks with artificial signals.. In: 2012 Proceedings of the 20th European Signal Processing Conference (EUSIPCO), 2012, pp 36–40
3. Alzantot M., Sharma Y., Chakraborty S., Srivastava M. (2018) Genattack: Practical black-box attacks with gradient-free optimization. arXiv:1805.11090
4. Avci A., Bosch S., Marin-Perianu M., Marin-Perianu R., Havinga P.: Activity recognition using inertial sensing for healthcare, wellbeing and sports applications: A survey.. In: 23th International conference on architecture of computing systems 2010, 2010, pp 1–10. VDE
5. Bertoni A., Dorigo M.: Implicit parallelism in genetic algorithms. Artif. Intell. 61(2):307–314, 1993