2019 IEEE International Conference on Consumer Electronics - Taiwan (ICCE-TW) 2019
DOI: 10.1109/icce-tw46550.2019.8991836
|View full text |Cite
|
Sign up to set email alerts
|

An Adaptive Authentication Based on Reinforcement Learning

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
6
0

Year Published

2020
2020
2023
2023

Publication Types

Select...
3
2
1

Relationship

0
6

Authors

Journals

citations
Cited by 6 publications
(6 citation statements)
references
References 1 publication
0
6
0
Order By: Relevance
“…A four-factor authentication method proposal was also found, the fourth factor being the location-based factor [40]. The appearance of dynamic authentication methods [41][42][43] was an interesting find, as these methods adapt to distinct contexts.…”
Section: Discussionmentioning
confidence: 99%
“…A four-factor authentication method proposal was also found, the fourth factor being the location-based factor [40]. The appearance of dynamic authentication methods [41][42][43] was an interesting find, as these methods adapt to distinct contexts.…”
Section: Discussionmentioning
confidence: 99%
“…RL models interact with the environment to exercise rewards and penalties and automatically determine the ideal behavior to maximize the defined performance metric. This reward feedback in the RL model can be used to find the best action for classification [80][81][82], feature selection [38], or any other required decision in the system. Cui et al [80] used RL to propose an adaptive authentication scheme.…”
Section: Reinforcement Learningmentioning
confidence: 99%
“…This reward feedback in the RL model can be used to find the best action for classification [80][81][82], feature selection [38], or any other required decision in the system. Cui et al [80] used RL to propose an adaptive authentication scheme. They developed a multi-factor authentication method that uses different combinations of authentication models proportionate to www.videleaf.com the level of authentication confidence requirements.…”
Section: Reinforcement Learningmentioning
confidence: 99%
“…RL models interact with the environment to exercise rewards and penalties and automatically determine the ideal behavior to maximize the defined performance metric. This reward feedback in the RL model can be used to find the best action for classification [ 80 , 81 , 82 ], feature selection [ 38 ], or any other required decision in the system. Cui et al [ 80 ] used RL to propose an adaptive authentication scheme.…”
Section: Machine Learning Models In Authentication Schemes Of Telehealthmentioning
confidence: 99%
“…This reward feedback in the RL model can be used to find the best action for classification [ 80 , 81 , 82 ], feature selection [ 38 ], or any other required decision in the system. Cui et al [ 80 ] used RL to propose an adaptive authentication scheme. They developed a multi-factor authentication method that uses different combinations of authentication models proportionate to the level of authentication confidence requirements.…”
Section: Machine Learning Models In Authentication Schemes Of Telehealthmentioning
confidence: 99%