2016 International Joint Conference on Neural Networks (IJCNN) 2016
DOI: 10.1109/ijcnn.2016.7727588
|View full text |Cite
|
Sign up to set email alerts
|

Gait fingerprinting-based user identification on smartphones

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
16
0

Year Published

2018
2018
2023
2023

Publication Types

Select...
3
3
1

Relationship

4
3

Authors

Journals

citations
Cited by 21 publications
(16 citation statements)
references
References 11 publications
0
16
0
Order By: Relevance
“…ese sensors support similar capabilities and applications of smartphones such as healthcare applications that require physical activity recognition (PAR). e accelerometer, linear accelerometer, magnetometer, and gyroscope sensors are ideal for PAR and gaitbased legitimate user identification over SPs [4][5][6][7]. is work will show that SWs are equally capable of performing PAR and gait-based legitimate user identification.…”
Section: Introductionmentioning
confidence: 94%
See 2 more Smart Citations
“…ese sensors support similar capabilities and applications of smartphones such as healthcare applications that require physical activity recognition (PAR). e accelerometer, linear accelerometer, magnetometer, and gyroscope sensors are ideal for PAR and gaitbased legitimate user identification over SPs [4][5][6][7]. is work will show that SWs are equally capable of performing PAR and gait-based legitimate user identification.…”
Section: Introductionmentioning
confidence: 94%
“…Besides, these several traditional legitimate user identification approaches have been proposed based on passwords such as secret information possession and physiological biometrics such as iris patterns and fingerprints. More recently, behavior-based legitimate user identification utilizes the distinct behavior of users such as gestures and gaits [5,7].…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…In recent years, several feature selection algorithms have been proposed, including the filter based approach, the wrapper method, the principal components analysis (PCA), the linear discriminant analysis (LDA) [33], KLDA a kernelized version of the LDA [35] and SWLDA a stepwise linear discriminant analysis method [4].…”
Section: Feature Selectionmentioning
confidence: 99%
“…In the literature hereby referred to, several solutions were proposed addressing implicit user identification without involving the user, such as keystroke-based user identification [54], touch screen biometrics [22,28], application set fingerprints [2], hybrid user identification methods-such as accelerometers and gyroscopes [6,14,52], and gait based user identification [4,43]. However, these solutions only discuss one aspect of user identification, either software or hardware.…”
Section: Introductionmentioning
confidence: 99%