pith. machine review for the scientific record. sign in

arxiv: 2511.12468 · v2 · submitted 2025-11-16 · 💻 cs.HC

Detecting LLM-Assisted Academic Dishonesty using Keystroke Dynamics

Pith reviewed 2026-05-17 22:37 UTC · model grok-4.3

classification 💻 cs.HC
keywords keystroke dynamicsLLM detectionacademic dishonestyAI-assisted writingplagiarism detectionbehavioral biometricsadversarial evaluation
0
0 comments X

The pith

Keystroke dynamics distinguish genuine student writing from AI-assisted or paraphrased submissions more reliably than text analysis alone.

A machine-rendered reading of the paper's core claim, the machinery that carries it, and where it could break.

The paper examines whether capturing the way students produce text through keystroke timings, pauses, and edits can detect use of large language models for academic work, including cases where output is paraphrased to evade detection. Current plagiarism tools focus only on the final text and fail against easily modified AI content, so a behavioral approach adds information about the writing process itself. The study expands an earlier experiment with more participants, adds explicit paraphrasing tasks, and tests performance when users know about monitoring and try to hide their actions. Results indicate keystroke models work better than text-only methods in ordinary settings but lose effectiveness under deliberate deception.

Core claim

By collecting keystroke data from participants completing writing tasks under genuine, AI-assisted, and paraphrased conditions, models using timing and editing features achieve higher detection accuracy for LLM-assisted academic dishonesty than state-of-the-art text-only detectors, although accuracy declines in adversarial scenarios where participants attempt to mask their behavior.

What carries the argument

Keystroke dynamics, which record inter-key intervals, pauses, and revision patterns as the text is produced, provide behavioral signals that reflect differences between human cognitive processes and AI generation.

If this is right

  • Keystroke-based models outperform text-only detectors in identifying assisted writing during typical academic submissions.
  • Explicit paraphrasing conditions reduce but do not eliminate the advantage of keystroke features over content analysis.
  • Adversarial testing reveals clear performance drops when users are aware of monitoring and attempt to deceive the system.
  • Comparison with human evaluators shows keystroke approaches maintain an edge in practical, non-adversarial deployment.

Where Pith is reading between the lines

These are editorial extensions of the paper, not claims the author makes directly.

  • Real-time keystroke monitoring could be embedded in writing software to flag potential assistance during the composition process rather than after submission.
  • The same behavioral signals might apply to detecting AI use in professional reports or creative writing outside academic settings.
  • Future work could test whether combining keystroke data with other input signals, such as cursor movements, improves robustness against evasion attempts.

Load-bearing premise

Keystroke timing and editing patterns remain reliably distinguishable between genuine writing and AI-assisted or paraphrased text even when participants are aware of the detection method and attempt to mask their behavior.

What would settle it

An experiment in which participants are instructed to deliberately alter typing speed, pause lengths, and editing habits to imitate either fully human or fully AI-assisted writing, and the keystroke model's accuracy falls to near-chance levels, would falsify the claim of reliable detection.

Figures

Figures reproduced from arXiv: 2511.12468 by Aman Singla, Atharva Mehta, Kartik Bisht, Rajesh Kumar, Rajiv Ratn Shah, Yaman Kumar Singla.

Figure 1
Figure 1. Figure 1: The plagiarism detection framework shows the input [PITH_FULL_IMAGE:figures/full_fig_p005_1.png] view at source ↗
Figure 2
Figure 2. Figure 2: Histogram of F1 scores illustrating the performance of human evaluators in detecting plagiarism. From left to right → (a) Comparison between expert and non-expert evaluators, (b) Comparison between plagiarism styles: paraphrasing versus transcription, and (c) Comparison between evaluation granularity: response-level versus window-level. led to frequent false rejections of bona fide responses. These results… view at source ↗
Figure 4
Figure 4. Figure 4: Decision boundaries: LGBM model decision [PITH_FULL_IMAGE:figures/full_fig_p013_4.png] view at source ↗
Figure 3
Figure 3. Figure 3: TSNE plot for the attack dataset with original data [PITH_FULL_IMAGE:figures/full_fig_p013_3.png] view at source ↗
read the original abstract

The rapid adoption of generative AI tools has heightened concerns regarding academic integrity, as students increasingly engage in dishonest practices by copying or paraphrasing AI-generated content. Existing plagiarism detection systems, which rely primarily on text-intrinsic features, are ineffective at identifying AI-assisted or paraphrased submissions. Our prior conference work introduced a behavioral detection approach that leverages how text is produced, captured through keystroke dynamics, in addition to what is written, enabling discrimination between genuine and assisted writing. That study, conducted on keystroke data from 40 participants, demonstrated promising performance. This paper substantially extends and systemizes the prior work by: (1) expanding the dataset with 90 additional participants and introducing an explicit paraphrasing condition to model realistic plagiarism strategies; (2) formalizing a threat model and evaluating detection under adversarial and deception-oriented scenarios; and (3) performing a comprehensive empirical comparison against state-of-the-art text-only detectors and human evaluators. Experimental results demonstrate that keystroke-based models significantly outperform text-based approaches in practical deployment settings, while revealing limitations under more challenging adversarial conditions.

Editorial analysis

A structured set of objections, weighed in public.

Desk editor's note, referee report, simulated authors' rebuttal, and a circularity audit. Tearing a paper down is the easy half of reading it; the pith above is the substance, this is the friction.

Referee Report

2 major / 2 minor

Summary. The manuscript extends the authors' prior conference work on keystroke dynamics for detecting LLM-assisted academic dishonesty. It adds data from 90 new participants, introduces an explicit paraphrasing condition to model realistic plagiarism, formalizes a threat model that includes adversarial and deception-oriented scenarios, and performs an empirical comparison of keystroke-based models against state-of-the-art text-only detectors and human evaluators. The central claim is that keystroke models significantly outperform text-based approaches in practical deployment settings while exhibiting limitations under more challenging adversarial conditions.

Significance. If the empirical results hold, the work provides a timely behavioral complement to text-intrinsic plagiarism detectors, which are known to struggle with AI-generated or paraphrased content. The dataset expansion, explicit threat-model formalization, and inclusion of adversarial testing represent clear improvements over the prior 40-participant study. The explicit acknowledgment of performance degradation under adversarial conditions strengthens the paper's credibility by avoiding over-claiming robustness.

major comments (2)
  1. [Abstract] Abstract: the claim that 'keystroke-based models significantly outperform text-based approaches' is presented without any quantitative metrics (accuracy, F1, AUC), error bars, dataset statistics, or model specifications. Because this outperformance is the central empirical result, the absence of these details in the summary statement makes it impossible to assess whether the data actually support the stated conclusion.
  2. [Threat Model / Adversarial Scenarios] Threat model and adversarial scenarios: the description of deception-oriented conditions with the 90 new participants does not specify whether participants received training or instructions on realistic evasion tactics (e.g., forced pauses, simulated natural burst patterns, or external typing aids) while still using AI content. If the scenarios are limited to basic paraphrasing without such training, the reported limitations may understate real-world failure modes and thereby weaken the practical-deployment outperformance claim.
minor comments (2)
  1. [Methods / Dataset] Provide participant demographics, typing-task instructions, and exact keystroke feature definitions (timing, editing patterns) in the methods section so that the experimental protocol is fully reproducible.
  2. [Results] All performance tables and figures should include confidence intervals or standard errors and should explicitly label the baseline text-only detectors (e.g., which SOTA models were used).

Simulated Author's Rebuttal

2 responses · 0 unresolved

We thank the referee for the constructive and detailed feedback. We address each major comment point by point below, providing clarifications and indicating revisions to the manuscript where they strengthen the presentation without altering the core findings.

read point-by-point responses
  1. Referee: [Abstract] Abstract: the claim that 'keystroke-based models significantly outperform text-based approaches' is presented without any quantitative metrics (accuracy, F1, AUC), error bars, dataset statistics, or model specifications. Because this outperformance is the central empirical result, the absence of these details in the summary statement makes it impossible to assess whether the data actually support the stated conclusion.

    Authors: We agree that the abstract would benefit from key quantitative details to support the central claim. While abstracts are constrained by length, we have revised it to include specific metrics such as accuracy, F1-score, and AUC (with standard deviations) from the keystroke-based models versus text-only baselines on the expanded 130-participant dataset, along with a brief note on the experimental setup. revision: yes

  2. Referee: [Threat Model / Adversarial Scenarios] Threat model and adversarial scenarios: the description of deception-oriented conditions with the 90 new participants does not specify whether participants received training or instructions on realistic evasion tactics (e.g., forced pauses, simulated natural burst patterns, or external typing aids) while still using AI content. If the scenarios are limited to basic paraphrasing without such training, the reported limitations may understate real-world failure modes and thereby weaken the practical-deployment outperformance claim.

    Authors: Participants in the deception-oriented conditions were given instructions to paraphrase AI-generated text to simulate realistic student plagiarism but received no training or guidance on advanced evasion tactics such as forced pauses, burst pattern simulation, or typing aids. This reflects typical non-expert user behavior. We have revised the threat model section to explicitly describe the participant instructions and expanded the limitations discussion to note that more sophisticated adversarial training could further degrade performance, thereby providing a more balanced view of the practical outperformance results. revision: yes

Circularity Check

0 steps flagged

Minor self-citation of prior conference work that is not load-bearing for central empirical claims

full rationale

The paper frames itself as an empirical extension that collects fresh keystroke data from 90 new participants, adds an explicit paraphrasing condition, formalizes a threat model, and runs comparisons against text-only detectors and human evaluators. The abstract explicitly positions the prior conference work only as the source of the initial behavioral approach, with all performance claims and limitations derived from the new dataset and experiments rather than from any fitted parameters or equations carried over by construction. No self-definitional reductions, fitted-input predictions, or uniqueness theorems appear in the provided text, so the single self-citation remains non-load-bearing and the overall derivation chain stays self-contained against external benchmarks.

Axiom & Free-Parameter Ledger

0 free parameters · 1 axioms · 0 invented entities

The detection claim rests on the untested domain assumption that typing dynamics encode authorship signals robust to paraphrasing and deception; no free parameters or invented entities are described in the abstract.

axioms (1)
  • domain assumption Keystroke dynamics contain stable behavioral signatures that differ between original human writing and AI-assisted or paraphrased text.
    This premise underpins the entire detection approach and is invoked when claiming superior performance over text-only methods.

pith-pipeline@v0.9.0 · 5502 in / 1238 out tokens · 29636 ms · 2026-05-17T22:37:08.857040+00:00 · methodology

discussion (0)

Sign in with ORCID, Apple, or X to comment. Anyone can read and Pith papers without signing in.

Lean theorems connected to this paper

Citations machine-checked in the Pith Canon. Every link opens the source theorem in the public Lean library.

What do these tags mean?
matches
The paper's claim is directly supported by a theorem in the formal canon.
supports
The theorem supports part of the paper's argument, but the paper may add assumptions or extra steps.
extends
The paper goes beyond the formal theorem; the theorem is a base layer rather than the whole result.
uses
The paper appears to rely on the theorem as machinery.
contradicts
The paper's claim conflicts with a theorem or certificate in the canon.
unclear
Pith found a possible connection, but the passage is too broad, indirect, or ambiguous to say the theorem truly supports the claim.

Forward citations

Cited by 1 Pith paper

Reviewed papers in the Pith corpus that reference this work. Sorted by Pith novelty score.

  1. Detecting Cognitive Signatures in Typing Behavior for Non-Intrusive Authorship Verification

    cs.CR 2026-02 unverdicted novelty 6.0

    Cognitive Load Correlation from keystroke timings distinguishes genuine human composition from mechanical transcription with estimated 85-95% accuracy in a non-intrusive framework.

Reference graph

Works this paper leans on

89 extracted references · 89 canonical work pages · cited by 1 Pith paper · 5 internal anchors

  1. [1]

    The impact of chatgpt on higher education.Frontiers in Education, 2023

    Juan Dempere, Kennedy Modugu, Allam Hesham, and Lakshmana Kumar Ramasamy. The impact of chatgpt on higher education.Frontiers in Education, 2023

  2. [2]

    All that’s’ human’is not gold: Evaluating human evaluation of generated text.arXiv preprint arXiv:2107.00061, 2021

    Elizabeth Clark, Tal August, Sofia Serrano, Nikita Haduong, Suchin Gururangan, and Noah A Smith. All that’s’ human’is not gold: Evaluating human evaluation of generated text.arXiv preprint arXiv:2107.00061, 2021

  3. [3]

    Automatic detection of generated text is easiest when humans are fooled

    Daphne Ippolito, Daniel Duckworth, Chris Callison-Burch, and Douglas Eck. Automatic detection of generated text is easiest when humans are fooled. arXiv preprint arXiv:1911.00650, 2019

  4. [4]

    D. Roh, R. Kumar, and A. Ngo. Llm-assisted cheating detection in korean language via keystrokes. InIEEE IJCB, 2025. Paper, acceptance rate∼39%

  5. [5]

    Real or fake text?: Investigating human ability to detect boundaries between human-written and machine-generated text

    Liam Dugan, Daphne Ippolito, Arun Kirubarajan, Sherry Shi, and Chris Callison-Burch. Real or fake text?: Investigating human ability to detect boundaries between human-written and machine-generated text. InAAAI, 2023

  6. [6]

    Detection of ai-generated essays in writing assessments.Psychological Test and Assessment Modeling, 2023

    Duanli Yan, Michael Fauss, Jiangang Hao, and Wenju Cui. Detection of ai-generated essays in writing assessments.Psychological Test and Assessment Modeling, 2023

  7. [7]

    How well do llms imitate human writing style? InProceedings of the IEEE UEMCON, New York, NY, United States, 2025

    Rebira Jemma and Rajesh Kumar. How well do llms imitate human writing style? InProceedings of the IEEE UEMCON, New York, NY, United States, 2025

  8. [8]

    Tweepfake: About detecting deepfake tweets.Plos one, 2021

    Tiziano Fagni, Fabrizio Falchi, Margherita Gambini, Antonio Martella, and Maurizio Tesconi. Tweepfake: About detecting deepfake tweets.Plos one, 2021

  9. [9]

    Release Strategies and the Social Impacts of Language Models

    Irene Solaiman, Miles Brundage, Jack Clark, Amanda Askell, Ariel Herbert-Voss, Jeff Wu, Alec Radford, Gretchen Krueger, Jong Wook Kim, Sarah Kreps, et al. Release strategies and the social impacts of language models.arXiv preprint arXiv:1908.09203, 2019

  10. [10]

    Authorship attribution for neural text generation

    Adaku Uchendu, Thai Le, Kai Shu, and Dongwon Lee. Authorship attribution for neural text generation. In Proceedings of the 2020 conference on empirical methods in natural language processing (EMNLP), 2020

  11. [11]

    Defending against neural fake news.Advances in neural information processing systems, 2019

    Rowan Zellers, Ari Holtzman, Hannah Rashkin, Yonatan Bisk, Ali Farhadi, Franziska Roesner, and Yejin Choi. Defending against neural fake news.Advances in neural information processing systems, 2019

  12. [12]

    Feature-based detection of automated language models: tackling gpt-2, gpt-3 and grover.PeerJ Computer Science, 2021

    Leon Fr ¨ohling and Arkaitz Zubiaga. Feature-based detection of automated language models: tackling gpt-2, gpt-3 and grover.PeerJ Computer Science, 2021

  13. [13]

    GLTR: Statistical Detection and Visualization of Generated Text

    Sebastian Gehrmann, Hendrik Strobelt, and Alexander M Rush. Gltr: Statistical detection and visualization of generated text.arXiv preprint arXiv:1906.04043, 2019

  14. [14]

    Automatic essay scoring systems are both overstable and oversensitive: explaining why and proposing defenses.Dialogue & Discourse, 2023

    Yaman Kumar, Swapnil Parekh, Somesh Singh, Junyi Jessy Li, Rajiv Ratn Shah, and Changyou Chen. Automatic essay scoring systems are both overstable and oversensitive: explaining why and proposing defenses.Dialogue & Discourse, 2023

  15. [15]

    Minimal: Mining models for universal adversarial triggers

    Yaman Kumar Singla, Swapnil Parekh, Somesh Singh, Changyou Chen, Balaji Krishnamurthy, and Rajiv Ratn Shah. Minimal: Mining models for universal adversarial triggers. InProceedings of the AAAI Conference on Artificial Intelligence, 2022. 15

  16. [16]

    Detecting fake content with relative entropy scoring

    Thomas Lavergne, Tanguy Urvoy, and Franc ¸ois Yvon. Detecting fake content with relative entropy scoring. Pan, 2008

  17. [17]

    Zerogpt, Quillbot, GPTZero, and Writefull

    Zerogpt and Quillbot and GPTZero and Writefull. Zerogpt, Quillbot, GPTZero, and Writefull. Accessed via web, 2024. Zerogpt: https://www.zerogpt.com/, Quillbot: https://quillbot.com/, GPTZero: https:// gptzero.me/, Writefull: https://www.writefull.com/

  18. [18]

    Llm student sues jindal global law school over ai use in examination, 2024

    The Hindu Bureau. Llm student sues jindal global law school over ai use in examination, 2024

  19. [19]

    Professors cautious of tools to detect ai-generated writing, February 2024

    Lauren Coffey. Professors cautious of tools to detect ai-generated writing, February 2024

  20. [20]

    Turnitin admits there are some cases of higher false positives in ai writing detection tool, 2023

    Anna Merod. Turnitin admits there are some cases of higher false positives in ai writing detection tool, 2023

  21. [21]

    Jeffrey R. Young. What happened after this college student’s paper was falsely flagged for ai use after using grammarly, February 2024

  22. [22]

    Guidance on ai detection and why we’re disabling turnitin’s ai detector, August 2023

    Michael Coley. Guidance on ai detection and why we’re disabling turnitin’s ai detector, August 2023

  23. [23]

    Parents sue son’s high school history teacher over ai ‘cheating’ punishment, October 2024

    Kat Tenbarge. Parents sue son’s high school history teacher over ai ‘cheating’ punishment, October 2024

  24. [24]

    Keystroke Dynamics - Plurilock — plurilock.com

    Plurilock. Keystroke Dynamics - Plurilock — plurilock.com. https://plurilock.com/deep-dive/ keystroke-dynamics/, 2024. [Accessed 31-12-2024]

  25. [25]

    Augmented reality-based mimicry attacks on behaviour-based smartphone authentication

    Hassan Khan, Urs Hengartner, and Daniel Vogel. Augmented reality-based mimicry attacks on behaviour-based smartphone authentication. In Proceedings of the 16th Annual International Conference on Mobile Systems, Applications, and Services, 2018

  26. [26]

    Mimicry attacks on smartphone keystroke authentication.ACM Transactions on Privacy and Security, 2020

    Hassan Khan, Urs Hengartner, and Daniel Vogel. Mimicry attacks on smartphone keystroke authentication.ACM Transactions on Privacy and Security, 2020

  27. [27]

    Monaco, Ruben Vera-Rodriguez, and Julian Fierrez

    Alejandro Acien, Aythami Morales, John V . Monaco, Ruben Vera-Rodriguez, and Julian Fierrez. Typenet: Deep learning keystroke biometrics.IEEE TBIOM, 2022

  28. [28]

    Hayes and Linda Flower

    John R. Hayes and Linda Flower. Uncovering Cognitive Processes in Writing: An Introduction to protocol analysis.ERIC Clearinghouse, 1981

  29. [29]

    Pausing and planning: The tempo of written discourse production.Research in the Teaching of English, 1981

    Ann Matsuhashi. Pausing and planning: The tempo of written discourse production.Research in the Teaching of English, 1981

  30. [30]

    Pause time patterns in writing narrative and expository texts by children and adults

    Janet G Van Hell, Ludo Verhoeven, and Liesbeth M Van Beijsterveldt. Pause time patterns in writing narrative and expository texts by children and adults. Discourse Processes, 2008

  31. [31]

    Keystroke dynamics against academic dishonesty in the age of llms.IEEE IJCB, 2024

    Debnath Kundu, Atharva Mehta, Rajesh Kumar, Naman Lal, Avinash Anand, Apoorv Singh, and Rajiv Ratn Shah. Keystroke dynamics against academic dishonesty in the age of llms.IEEE IJCB, 2024

  32. [32]

    Keystroke patterns as prosody in digital writings: A case study with deceptive reviews and essays

    Ritwik Banerjee, Song Feng, Jun Seok Kang, and Yejin Choi. Keystroke patterns as prosody in digital writings: A case study with deceptive reviews and essays. In EMNLP, Doha, Qatar, 2014

  33. [33]

    Shared keystroke dataset for continuous authentication

    Yan Sun, Hayreddin Ceker, and Shambhu Upadhyaya. Shared keystroke dataset for continuous authentication. InWIFS, 2016

  34. [34]

    Detectgpt: Zero-shot machine-generated text detection using probability curvature

    Eric Mitchell, Yoonho Lee, Alexander Khazatsky, Christopher D Manning, and Chelsea Finn. Detectgpt: Zero-shot machine-generated text detection using probability curvature. InICML, 2023

  35. [35]

    Academic plagiarism detection: a systematic literature review.ACM Computing Surveys (CSUR), 2019

    Tom ´aˇs Folt `ynek, Norman Meuschke, and Bela Gipp. Academic plagiarism detection: a systematic literature review.ACM Computing Surveys (CSUR), 2019

  36. [36]

    A comprehensive review on fake news detection with deep learning.IEEE Access, 2021

    Muhammad Firoz Mridha, Ashfia Jannat Keya, Md Abdul Hamid, Muhammad Mostafa Monowar, and Md Saifur Rahman. A comprehensive review on fake news detection with deep learning.IEEE Access, 2021

  37. [37]

    Finding Deceptive Opinion Spam by Any Stretch of the Imagination

    Myle Ott, Yejin Choi, Claire Cardie, and Jeffrey T Hancock. Finding deceptive opinion spam by any stretch of the imagination.arXiv preprint arXiv:1107.4557, 2011

  38. [38]

    Survey of review spam detection using machine learning techniques.Journal of Big Data, 2015

    Michael Crawford, Taghi M Khoshgoftaar, Joseph D Prusa, Aaron N Richter, and Hamzah Al Najada. Survey of review spam detection using machine learning techniques.Journal of Big Data, 2015

  39. [39]

    Nguyen, Junichi Yamagishi, and Isao Echizen

    David Ifeoluwa Adelani, Haotian Mai, Fuming Fang, Huy H. Nguyen, Junichi Yamagishi, and Isao Echizen. Generating Sentiment-Preserving fake online reviews using neural language models and their human- and Machine-Based detection. 2020

  40. [40]

    Deepfake bot submissions to federal public comment websites cannot be distinguished from human submissions.Technology Science, 2019

    Max Weiss. Deepfake bot submissions to federal public comment websites cannot be distinguished from human submissions.Technology Science, 2019

  41. [41]

    The effect of wording on message propagation: Topic- and author-controlled natural experiments on Twitter

    Chenhao Tan, Lillian Lee, and Bo Pang. The effect of wording on message propagation: Topic- and author-controlled natural experiments on Twitter. Baltimore, Maryland, June 2014. ACL

  42. [42]

    What makes a photograph memorable?IEEE TP AMI, 2013

    Phillip Isola, Jianxiong Xiao, Devi Parikh, Antonio Torralba, and Aude Oliva. What makes a photograph memorable?IEEE TP AMI, 2013

  43. [43]

    Long-term ad memorability: Understanding & generating memorable ads.arXiv e-prints, 2023

    Harini SI, Somesh Singh, Yaman K Singla, Aanisha Bhattacharyya, Veeky Baths, Changyou Chen, Rajiv Ratn Shah, and Balaji Krishnamurthy. Long-term ad memorability: Understanding & generating memorable ads.arXiv e-prints, 2023

  44. [44]

    Measuring and improving persuasiveness of large language models.arXiv preprint arXiv:2410.02653, 2024

    Somesh Singh, Yaman K Singla, Harini SI, and Balaji Krishnamurthy. Measuring and improving persuasiveness of large language models.arXiv preprint arXiv:2410.02653, 2024

  45. [45]

    Expert political judgment

    Philip E Tetlock. Expert political judgment. InExpert Political Judgment. Princeton University Press, 2017

  46. [46]

    Natural language watermarking: Design, analysis, and a proof-of-concept implementation

    Mikhail J Atallah, Victor Raskin, Michael Crogan, Christian Hempelmann, Florian Kerschbaum, Dina Mohamed, and Sanket Naik. Natural language watermarking: Design, analysis, and a proof-of-concept implementation. InInformation Hiding: 4th International Workshop. Springer, 2001

  47. [47]

    A watermark for large language models

    John Kirchenbauer, Jonas Geiping, Yuxin Wen, Jonathan Katz, Ian Miers, and Tom Goldstein. A watermark for large language models. InICML, 2023

  48. [48]

    Detecting contract cheating using learning analytics.Journal of Learning Analytics, 2019

    Kelly Trezise, Tracii Ryan, Paula de Barba, and Gregor Kennedy. Detecting contract cheating using learning analytics.Journal of Learning Analytics, 2019

  49. [49]

    Contract cheat detection using biometric keystroke dynamics

    Nancy Agarwal, Nils Folvik Danielsen, Per Kristian Gravdal, and Patrick Bours. Contract cheat detection using biometric keystroke dynamics. In2022 20th International Conference on Emerging eLearning Technologies and Applications (ICETA), 2022

  50. [50]

    The generation of deceptive messages: Laying the groundwork for a viable theory 16 of interpersonal deception

    Steven A McCornack. The generation of deceptive messages: Laying the groundwork for a viable theory 16 of interpersonal deception. InMessage production. Routledge, 2013

  51. [51]

    Detecting deception by manipulating cognitive load.Trends in cognitive sciences, 2006

    Aldert Vrij, Ronald Fisher, Samantha Mann, and Sharon Leal. Detecting deception by manipulating cognitive load.Trends in cognitive sciences, 2006

  52. [52]

    Darwin, deception, and facial expression

    Paul Ekman. Darwin, deception, and facial expression. Annals of the new York Academy of sciences, 2003

  53. [53]

    Automated stress detection using keystroke and linguistic features: An exploratory study.International Journal of Human-Computer Studies, 2009

    Lisa M Vizer, Lina Zhou, and Andrew Sears. Automated stress detection using keystroke and linguistic features: An exploratory study.International Journal of Human-Computer Studies, 2009

  54. [54]

    Keystroke dynamics as signal for shallow syntactic parsing

    Barbara Plank. Keystroke dynamics as signal for shallow syntactic parsing.arXiv preprint arXiv:1610.03321, 2016

  55. [55]

    Teaching human behavior improves content understanding abilities of llms, 2024

    Somesh Singh, Harini S I, Yaman K Singla, Veeky Baths, Rajiv Ratn Shah, Changyou Chen, and Balaji Krishnamurthy. Teaching human behavior improves content understanding abilities of llms, 2024

  56. [56]

    Synthesizing human gaze feedback for improved nlp performance.arXiv preprint arXiv:2302.05721, 2023

    Varun Khurana, Yaman Kumar Singla, Nora Hollenstein, Rajesh Kumar, and Balaji Krishnamurthy. Synthesizing human gaze feedback for improved nlp performance.arXiv preprint arXiv:2302.05721, 2023

  57. [57]

    Improving natural language processing tasks with human gaze-guided neural attention.NIPS’20

    Ekta Sood, Simon Tannert, Philipp M ¨uller, and Andreas Bulling. Improving natural language processing tasks with human gaze-guided neural attention.NIPS’20

  58. [58]

    Behavior optimized image generation.arXiv preprint arXiv:2311.10995, 2023

    Varun Khurana, Yaman K Singla, Jayakumar Subramanian, Rajiv Ratn Shah, Changyou Chen, Zhiqiang Xu, and Balaji Krishnamurthy. Behavior optimized image generation.arXiv preprint arXiv:2311.10995, 2023

  59. [59]

    Learning to summarize with human feedback.NeurIPS, 2020

    Nisan Stiennon, Long Ouyang, Jeffrey Wu, Daniel Ziegler, Ryan Lowe, Chelsea Voss, Alec Radford, Dario Amodei, and Paul F Christiano. Learning to summarize with human feedback.NeurIPS, 2020

  60. [60]

    Human preference score: Better aligning text-to-image models with human preference

    Xiaoshi Wu, Keqiang Sun, Feng Zhu, Rui Zhao, and Hongsheng Li. Human preference score: Better aligning text-to-image models with human preference. InIEEE ICCV, 2023

  61. [61]

    Training a Helpful and Harmless Assistant with Reinforcement Learning from Human Feedback

    Yuntao Bai, Andy Jones, Kamal Ndousse, Amanda Askell, Anna Chen, Nova DasSarma, Dawn Drain, Stanislav Fort, Deep Ganguli, Tom Henighan, et al. Training a helpful and harmless assistant with reinforcement learning from human feedback.arXiv preprint arXiv:2204.05862, 2022

  62. [62]

    Training language models to follow instructions with human feedback.Neurips, 2022

    Long Ouyang, Jeffrey Wu, Xu Jiang, Diogo Almeida, Carroll Wainwright, Pamela Mishkin, Chong Zhang, Sandhini Agarwal, Katarina Slama, Alex Ray, et al. Training language models to follow instructions with human feedback.Neurips, 2022

  63. [63]

    Large content and behavior models to understand, simulate, and optimize content and behavior.arXiv preprint arXiv:2309.00359, 2023

    Ashmit Khandelwal, Aditya Agrawal, Aanisha Bhattacharyya, Yaman K Singla, Somesh Singh, Uttaran Bhattacharya, Ishita Dasgupta, Stefano Petrangeli, Rajiv Ratn Shah, Changyou Chen, et al. Large content and behavior models to understand, simulate, and optimize content and behavior.arXiv preprint arXiv:2309.00359, 2023

  64. [64]

    Socia: Training large language models to simulate social constructs and interventions

    Aanisha Bhattacharyya, Susmit Agrawal, Yaman Kumar Singla, SR Nikitha, Tarun Ram Menta, and Balaji Krishnamurthy. Socia: Training large language models to simulate social constructs and interventions

  65. [65]

    Keystroke logging in writing research: Observing writing processes with inputlog.German as a foreign language, 2009

    Luuk Van Waes, Mari ¨elle Leijten, and Daphne Van Weijen. Keystroke logging in writing research: Observing writing processes with inputlog.German as a foreign language, 2009

  66. [66]

    Examining pauses in writing: Theory, methods and empirical data

    ˚Asa Wengelin. Examining pauses in writing: Theory, methods and empirical data. InComputer key-stroke logging and writing. Brill, 2006

  67. [67]

    Keystroke analysis: Reflections on procedures and measures.Written Communication, 2012

    Veerle M Baaijen, David Galbraith, and Kees De Glopper. Keystroke analysis: Reflections on procedures and measures.Written Communication, 2012

  68. [68]

    Pattern Analysis and Recognition Corporation, 1977

    George E Forsen, Mark R Nelson, and Raymond J Staron.Personal attributes authentication techniques. Pattern Analysis and Recognition Corporation, 1977

  69. [69]

    Verifying identity via keystroke characterstics.International Journal of Man-Machine Studies, 1988

    John Leggett and Glen Williams. Verifying identity via keystroke characterstics.International Journal of Man-Machine Studies, 1988

  70. [70]

    D. H. Roh and R. Kumar. Active authentication via korean keystrokes under varying llm assistance and cognitive contexts. InICMLA, 2025

  71. [71]

    Anderson, David R

    Lorin W. Anderson, David R. Krathwohl, Peter W. Airasian, Kathleen A. Cruikshank, Richard E. Mayer, Paul R. Pintrich, James Raths, and Merlin C. Wittrock. A Taxonomy for Learning, Teaching, and Assessing: A Revision of Bloom’s Taxonomy of Educational Objectives. Addison Wesley Longman, Inc., New York, 2001

  72. [72]

    Bleha, C

    S. Bleha, C. Slivinsky, and B. Hussien. Computer-access security systems using keystroke dynamics.IEEE TP AMI, 1990

  73. [73]

    Authentication by keystroke timing: Some preliminary results.Rand Report, 1980

    S Press. Authentication by keystroke timing: Some preliminary results.Rand Report, 1980

  74. [74]

    Keystroke dynamics: Concepts, techniques, and applications.arXiv preprint arXiv:2303.04605, 2023

    Rashik Shadman, Ahmed Anu Wahab, Michael Manno, Matthew Lukaszewski, Daqing Hou, and Faraz Hussain. Keystroke dynamics: Concepts, techniques, and applications.arXiv preprint arXiv:2303.04605, 2023

  75. [75]

    Keystroke analysis of free text.ACM Trans

    Daniele Gunetti and Claudia Picardi. Keystroke analysis of free text.ACM Trans. Inf. Syst. Secur., 2005

  76. [76]

    Methods of identifying users based on text entered on keyboard.Patent Pending’ 10

    V Phoha and S Joshi. Methods of identifying users based on text entered on keyboard.Patent Pending’ 10

  77. [77]

    Banavar, Daqing Hou, and Stephanie Schuckers

    Blaine Ayotte, Mahesh K. Banavar, Daqing Hou, and Stephanie Schuckers. Fast and accurate continuous user authentication by fusion of instance-based, free-text keystroke dynamics. In A. Br ¨omme, C. Busch, A. Dantcheva, C. Rathgeb, and A. Uhl, editors,Proc. BIOSIG 2019 – Int. Conf. Biometrics Special Interest Group, Lecture Notes in Informatics (LNI), Bonn...

  78. [78]

    Fast free-text authentication via instance-based keystroke dynamics.IEEE TBIOM, 2020

    Blaine Ayotte, Mahesh Banavar, Daqing Hou, and Stephanie Schuckers. Fast free-text authentication via instance-based keystroke dynamics.IEEE TBIOM, 2020

  79. [79]

    When simple statistical algorithms outperform deep learning: A case of keystroke dynamics

    Ahmed Wahab and Daqing Hou. When simple statistical algorithms outperform deep learning: A case of keystroke dynamics. InICPRAM, 2023

  80. [80]

    Spotting fake profiles in social networks via keystroke dynamics

    Alvin Kuruvilla, Rojanaye Daley, and Rajesh Kumar. Spotting fake profiles in social networks via keystroke dynamics. InIEEE-CCNC, 2024

Showing first 80 references.