2020
DOI: 10.3390/s20143876
|View full text |Cite
|
Sign up to set email alerts
|

A Hybrid Deep Learning System for Real-World Mobile User Authentication Using Motion Sensors

Abstract: With the popularity of smartphones and the development of hardware, mobile devices are widely used by people. To ensure availability and security, how to protect private data in mobile devices without disturbing users has become a key issue. Mobile user authentication methods based on motion sensors have been proposed by many works, but the existing methods have a series of problems such as poor de-noising ability, insufficient availability, and low coverage of feature extraction. Based on the shortcomings of … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
33
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
6
2
1

Relationship

0
9

Authors

Journals

citations
Cited by 20 publications
(33 citation statements)
references
References 56 publications
0
33
0
Order By: Relevance
“…The original data set for this experiment included 910 values; the unbalanced data were processed with the SMOTE algorithm [ 34 ], and the overall number of values increased to 1527. The data were randomly assigned to the training set and the test set at a ratio of 8:2 [ 35 ]. The training set was used to train the SVM model, and the test set was used for verification.…”
Section: Resultsmentioning
confidence: 99%
“…The original data set for this experiment included 910 values; the unbalanced data were processed with the SMOTE algorithm [ 34 ], and the overall number of values increased to 1527. The data were randomly assigned to the training set and the test set at a ratio of 8:2 [ 35 ]. The training set was used to train the SVM model, and the test set was used for verification.…”
Section: Resultsmentioning
confidence: 99%
“…A total of 15 studies related to privacy and security corresponding to APC, PPS, and MDPS sub-research themes mainly used the user interaction data (i.e., type/target of interaction, UI changed) [56,55,50,49,51,131,132,57,133,60,59,134,58,135,136]. By contrast, surveyed studies belong to ASS (i.e., Authentication System/Scheme) sub-research themes used the context and system sensing data along with user interaction data for the research related to the user authentication system and scheme to understand the current device hold situation and daily habits of the user or to develop a motion sensor-based authentication system [52,53,54,128,129,130].…”
Section: Privacy and Security (Ps) Research Themesmentioning
confidence: 99%
“…Deep learning is a particularly popular research method nowadays. It can learn the internal laws and representation levels of sample data through multi-layer neural networks, and it has been widely used in many fields in recent years [ 38 , 39 , 40 , 41 , 42 , 43 ]. At the same time, neural networks are also considered as a useful method for unsteady aerodynamic modeling.…”
Section: Artificial Neural Network Modelsmentioning
confidence: 99%