2016 International Conference on Electrical, Electronics, and Optimization Techniques (ICEEOT) 2016
DOI: 10.1109/iceeot.2016.7755395
|View full text |Cite
|
Sign up to set email alerts
|

EEG-based assessment of image sequence-based user authentication in computer network security

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2017
2017
2024
2024

Publication Types

Select...
4
2

Relationship

1
5

Authors

Journals

citations
Cited by 6 publications
(2 citation statements)
references
References 17 publications
0
2
0
Order By: Relevance
“…From this analysis we may conclude that the employment of AI algorithms contributes significantly to the observed high-accuracy rates for the EEG-based User Authentication task when utilizing Mental-Activity Protocols (Figure 8). However, in some cases researchers have reported lower accuracy [11,16] which nonetheless might also be accredited to the EEG-device setup characteristics.…”
Section: Mental Activity Protocolsmentioning
confidence: 99%
“…From this analysis we may conclude that the employment of AI algorithms contributes significantly to the observed high-accuracy rates for the EEG-based User Authentication task when utilizing Mental-Activity Protocols (Figure 8). However, in some cases researchers have reported lower accuracy [11,16] which nonetheless might also be accredited to the EEG-device setup characteristics.…”
Section: Mental Activity Protocolsmentioning
confidence: 99%
“…As a preliminary assessment [24], to evaluate user brain activity behavior behind the proposed system, EEG data was collected from 4 healthy volunteers of mean age 23 after an informed consent and prior ethical clearance from institutional committee. A commercial EEG headset [25] with14+2 channel electrodes was employed and experiments were conducted in a noise free environment.…”
Section: Narrative Construction Based Taskmentioning
confidence: 99%