2020
DOI: 10.1109/jiot.2020.3004077
|View full text |Cite
|
Sign up to set email alerts
|

Behavioral Biometrics for Continuous Authentication in the Internet-of-Things Era: An Artificial Intelligence Perspective

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
44
0

Year Published

2021
2021
2023
2023

Publication Types

Select...
5
4

Relationship

0
9

Authors

Journals

citations
Cited by 131 publications
(44 citation statements)
references
References 153 publications
0
44
0
Order By: Relevance
“…[11]Thus the model finds in challenging to regress or classify BAC using the extracted features. [40] Our approach differs from prior work in the fact that we do not use any manually engineered features. We propose two deep learning algorithms to find the Blood alcohol concentration from just the raw signal without any need for feature extraction and compare the performance of our models with the current feature-based techniques.…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…[11]Thus the model finds in challenging to regress or classify BAC using the extracted features. [40] Our approach differs from prior work in the fact that we do not use any manually engineered features. We propose two deep learning algorithms to find the Blood alcohol concentration from just the raw signal without any need for feature extraction and compare the performance of our models with the current feature-based techniques.…”
Section: Related Workmentioning
confidence: 99%
“…Given below in table 9 are the features used to train the machine learning models,which prior work on smartphone intoxication estimation had found to perform well [7] [11] [40] The list of features contains both walk level and segment level features. A single walk contains a continuous stream of data for a duration of approximately 30 seconds.…”
Section: Appendixmentioning
confidence: 99%
“…For instance, background noise can affect speechbased authentication, the presence of dirt on fingers can affect fingerprint-based authentication, and poor lighting can affect facial recognition-based authentication. Still, a combined approach can balance the performance loss due to one affected biometric [42]. However, most of these existing multimodal authentications are not adoptable to wearable due to various limitations, as discussed in the previous section (Section I-B1).…”
Section: ) Multi-modal Biometric Authenticationmentioning
confidence: 99%
“…Preventing malicious operation of SHS devices requires a robust security scheme. In this perspective, three types of conventional security mechanisms have gained a particular attention viz., signature-based intrusion detection systems (IDSs) [6,7], user authentication [8,9], and access control models [10][11][12]. Unfortunately, these approaches suffer from several limitations.…”
Section: Introductionmentioning
confidence: 99%