2021 International Conference on Electrical, Computer and Energy Technologies (ICECET) 2021
DOI: 10.1109/icecet52533.2021.9698440
|View full text |Cite
|
Sign up to set email alerts
|

Machine Learning Algorithms In User Authentication Schemes

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
5
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
4
3
1

Relationship

0
8

Authors

Journals

citations
Cited by 15 publications
(5 citation statements)
references
References 23 publications
0
5
0
Order By: Relevance
“…Moreover, Shahbazi et al [94] used DRL in the context of blockchain to authenticate IoT devices in smart environment gateway, such as smart healthcare. Clustering [71,72,73,74] Behavioral Biometrics [78] Classification [80,81,82] k-NN [4,57] PCA [75,76] Outlier Detection [79] Feature Selection [38] RF [4,58,59,60,61,62,63,64] SVD [77] -Adaptive Authentication [80] SVM [4,65,66,67,68] --CAN [81,82]…”
Section: Deep Reinforcement Learningmentioning
confidence: 99%
See 1 more Smart Citation
“…Moreover, Shahbazi et al [94] used DRL in the context of blockchain to authenticate IoT devices in smart environment gateway, such as smart healthcare. Clustering [71,72,73,74] Behavioral Biometrics [78] Classification [80,81,82] k-NN [4,57] PCA [75,76] Outlier Detection [79] Feature Selection [38] RF [4,58,59,60,61,62,63,64] SVD [77] -Adaptive Authentication [80] SVM [4,65,66,67,68] --CAN [81,82]…”
Section: Deep Reinforcement Learningmentioning
confidence: 99%
“…Authentication provides access control for systems by controlling whether a user's credentials align with the available records on the server. Traditional security controls rely on static authentication methods [4], such as passwords, login patterns, or personal www.videleaf.com identification numbers (PINs). Besides the simplicity and accessibility of these methods, they are vulnerable to impersonation [5].…”
Section: Introductionmentioning
confidence: 99%
“…NaĂŻve Bayes (NB) [ 52 ], k-Nearest Neighbor (k-NN) [ 52 ], random forest (RF) [ 53 ], and support vector machine (SVM) [ 52 ] are popular supervised ML methods that have been widely used in the literature to address authentication problems [ 4 ].…”
Section: Machine Learning Models In Authentication Schemes Of Telehealthmentioning
confidence: 99%
“…Authentication provides access control for systems by controlling whether a user’s credentials align with the available records on the server. Traditional security controls rely on static authentication methods [ 4 ], such as passwords, login patterns, or personal identification numbers (PINs). Besides the simplicity and accessibility of these methods, they are vulnerable to impersonation [ 5 ].…”
Section: Introductionmentioning
confidence: 99%
“…The significant disparity in growth trajectories observed between devices and their corresponding security measures increasingly exposes a heightened vulnerability, wherein an expanding number of devices are susceptible to infiltration by malicious actors. Building upon prior research in the domain, Pryor et al [5] investigated several ML methods employed in user authentication systems that incorporate touch dynamics and device mobility. The objective of this paper was to provide a complete examination of the present applications of various ML algorithms commonly employed in user authentication systems that incorporate touch dynamics and device movement.…”
Section: Introductionmentioning
confidence: 99%