2018
DOI: 10.1109/jiot.2018.2797896
|View full text |Cite
|
Sign up to set email alerts
|

Recognition of Human Computer Operations Based on Keystroke Sensing by Smartphone Microphone

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
5
0

Year Published

2018
2018
2023
2023

Publication Types

Select...
9

Relationship

1
8

Authors

Journals

citations
Cited by 17 publications
(5 citation statements)
references
References 34 publications
0
5
0
Order By: Relevance
“…The security and privacy of data captured by sensors [ 103 , 104 ], the durability of power supplies (batteries) [ 91 , 105 ], the resilience of communications [ 105 , 106 ], and the intrusiveness of sensors [ 103 , 107 ], among other NFRs, must be considered at each stage of an IoTS development. Therefore, for example, there are research lines on different methods, protocols, and guidelines to guarantee data security and privacy [ 30 , 108 , 109 , 110 ], low energy consumption [ 110 , 111 , 112 , 113 ], or to integrate sensors with different levels of intrusiveness [ 114 , 115 ], among others.…”
Section: Methodologies Designed For the Development Of Iotssmentioning
confidence: 99%
“…The security and privacy of data captured by sensors [ 103 , 104 ], the durability of power supplies (batteries) [ 91 , 105 ], the resilience of communications [ 105 , 106 ], and the intrusiveness of sensors [ 103 , 107 ], among other NFRs, must be considered at each stage of an IoTS development. Therefore, for example, there are research lines on different methods, protocols, and guidelines to guarantee data security and privacy [ 30 , 108 , 109 , 110 ], low energy consumption [ 110 , 111 , 112 , 113 ], or to integrate sensors with different levels of intrusiveness [ 114 , 115 ], among others.…”
Section: Methodologies Designed For the Development Of Iotssmentioning
confidence: 99%
“…This type of data gathering and use entails surveillance risks. Information flowing into AI systems may be used to improve an organisation's aggregate performance and individual workers' performance by monitoring specific behaviours, ranging from toilet breaks to typing speeds (Gartner, 2019;Scassa, 2021;Yu et al, 2018). With the use of wearables, intended or incidental surveillance may not end at the factory gate or the office door.…”
Section: Development (Outcome Training)mentioning
confidence: 99%
“…The following are the research areas where researchers are interested -(a) Improving accuracy through techniques such as feature fusion [99], [100], score fusion [101], [102], feature selection [103], [104], anomaly detection [105], [106], and others. (b) Domain adaptation for cross-device validation [107], [108], (c) Real-world dataset collected using IoTenabled device with typing patterns [109], some times data are being collected in different positions [110] through a variety of applications like arithmetic games [111], e-wallet [112], video clips for emotional changing [113], (d) Usability control specifically in active authentication where data are being captured continuously [114], to balance the device and application levels security, (e) Computation and energy consumption specifically in the area of a smartphone where battery power is limited [110], (f) Design some useful intelligent applications including auto-profiling user [40], disease prediction [32], age-restricted security control, genderspecific advertisement, password recovery mechanism [115]. For beginners, these provide a clear understanding of how to identify the main area of KD-based research.…”
Section: G Increasing Research Trend (Contribution To Ob2)mentioning
confidence: 99%
“…Tree based classifiers: After SVM, the most widely used classifiers are Random Forest (RF) [168], [177], [178], [184], [186], [288], [291]. However, Decision Tree (DT) [182], [204], [292], J48 [114], [293], XGBoost [25], [27], [195], [294], [295], AdaBoost [111] have been also identified in KD domain. Most of these tree-based classifiers are time-inefficient, but their performance in accuracy is impressive.…”
Section: ) Binary Classificationsmentioning
confidence: 99%