2022
DOI: 10.1007/978-981-16-8862-1_25
|View full text |Cite
|
Sign up to set email alerts
|

Deep Learning-Based Implicit Continuous Authentication of Smartphone User

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1

Citation Types

0
0
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
1
1

Relationship

0
2

Authors

Journals

citations
Cited by 2 publications
(4 citation statements)
references
References 17 publications
0
0
0
Order By: Relevance
“…In response, [16] introduced an open-set authentication (OSA) strategy that allows for zero-shot inference, where the model can predict unseen data. Moreover, in [16], in a realization that the exploration of various deep learning architectures for mobile biometrics authentication has been limited to LSTM networks [6,7], Convolutional LSTM [8,14], Autoencoders [15], and Temporal Convolutional Networks (TCN) [9], the authors attempt their solution with Transformers [22,23]. Furthermore, an implicit-ensembled model named PIEformer is proposed, noted on the ensembled model's capability of exhibiting robustness in open set scenarios, mainly due to their enhanced generalization performance [39].…”
Section: Related Workmentioning
confidence: 99%
See 3 more Smart Citations
“…In response, [16] introduced an open-set authentication (OSA) strategy that allows for zero-shot inference, where the model can predict unseen data. Moreover, in [16], in a realization that the exploration of various deep learning architectures for mobile biometrics authentication has been limited to LSTM networks [6,7], Convolutional LSTM [8,14], Autoencoders [15], and Temporal Convolutional Networks (TCN) [9], the authors attempt their solution with Transformers [22,23]. Furthermore, an implicit-ensembled model named PIEformer is proposed, noted on the ensembled model's capability of exhibiting robustness in open set scenarios, mainly due to their enhanced generalization performance [39].…”
Section: Related Workmentioning
confidence: 99%
“…Behavioral biometrics facilitates a seamless and smooth authentication process in this regard. This body of literature involves keystrokes [4], gait features [5], and touchstroke dynamics [6]. However, behavioral biometrics inherently includes various characteristics within a single identity, varying on factors such as mood.…”
Section: Introductionmentioning
confidence: 99%
See 2 more Smart Citations