Reconstruction Attacks Against Mobile-Based Continuous Authentication Systems in the Cloud | IEEE Journals & Magazine | IEEE Xplore