2022 Asia Conference on Algorithms, Computing and Machine Learning (CACML) 2022
DOI: 10.1109/cacml55074.2022.00081
|View full text |Cite
|
Sign up to set email alerts
|

Hold On and Swipe: A Touch-Movement Based Continuous Authentication Schema based on Machine Learning

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
2
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
6
2
1

Relationship

0
9

Authors

Journals

citations
Cited by 15 publications
(6 citation statements)
references
References 23 publications
0
2
0
Order By: Relevance
“…Finally, with K-nearest-neighbors, he found that the speed of the algorithm is amazingly fast and easy to implement. However as other research corroborates, it is sensitive to irrelevant features and can be computationally expensive [16]. The information in the paper was particularly useful in our research due to providing information on what algorithms would be best when running these machine learning processes after we used topic modeling on our code.…”
Section: Literature Reviewmentioning
confidence: 82%
“…Finally, with K-nearest-neighbors, he found that the speed of the algorithm is amazingly fast and easy to implement. However as other research corroborates, it is sensitive to irrelevant features and can be computationally expensive [16]. The information in the paper was particularly useful in our research due to providing information on what algorithms would be best when running these machine learning processes after we used topic modeling on our code.…”
Section: Literature Reviewmentioning
confidence: 82%
“…This lack of cybersecurity professionals is not limited to the government [16]. Additionally, automated systems such as authentication using machine learning are not enough to make up for this discrepancy [17], [18], [19]. Thus, considering the evident lack of cybersecurity professionals, it would be prudent for individuals to learn to protect themselves.…”
Section: Literature Reviewmentioning
confidence: 99%
“…Fortunately, many forgery detection methods have been proposed recently and most of them usually devise the forgery detection task as a true-false binary classification problem. The detection problem for DeepFake is usually modelled as an image-level classification problem, which is focused on discovering pattern differences between real and fake images [5][6][7][8]. While these methods achieve promising results in terms of detection accuracy, they are susceptible to adversarial examples.…”
Section: Introductionmentioning
confidence: 99%