“…In the past, different approaches for authenticating the users of mobile devices have been developed. These approaches use either statistical features extracted on touch gestures [52], [67], [33], [69], [68], [44], [26], values that are captured by the sensors for identifying the user based on its motions [51], [38], [18], [22], [14], [70], [50], [37], [15], [30], [49], [65], [25], or correlate the touch gestures and motion sensors [29], [16], [20], [21]. However, these existing approaches are 1) restricted to identifying a user among a set of known users, thus can only detect intruders that were part of the training data [30], [33], [52], [65], [67], 2) require training the model when a new user joins the system limiting their scalability [15], [24], [70], or 3) work only in certain situations and not in a continuous way, e.g., when picking up the phone [19], [20], [21].…”