2015 International Conference on Biometrics (ICB) 2015
DOI: 10.1109/icb.2015.7139046
|View full text |Cite
|
Sign up to set email alerts
|

Touch-interaction behavior for continuous user authentication on smartphones

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
6
0
1

Year Published

2016
2016
2023
2023

Publication Types

Select...
6
2

Relationship

0
8

Authors

Journals

citations
Cited by 19 publications
(7 citation statements)
references
References 16 publications
0
6
0
1
Order By: Relevance
“…(Draffin et al, 2014) 13 6000 touch events Yes NN 86 * (Meng et al, 2013) 20 10 min touch events Yes NN 2.92 (Xu et al, 2014) 32 5 min touch events No SVM <10 (Feng et al, 2013) 40 14-53 Characters No DT 1 (Y. 50 120 touch events Yes NN 2.46 (Shen et al, 2015) 51 800 touch events Yes SVM <8 (Serwadda et al, 2013) 190 80 touch events No PM ~13.8 (Gascon et al, 2014) 315 160 Characters No SVM 1^, 8 # * Accuracy; ^F AR; # FRR…”
Section: Dynamic Modementioning
confidence: 99%
“…(Draffin et al, 2014) 13 6000 touch events Yes NN 86 * (Meng et al, 2013) 20 10 min touch events Yes NN 2.92 (Xu et al, 2014) 32 5 min touch events No SVM <10 (Feng et al, 2013) 40 14-53 Characters No DT 1 (Y. 50 120 touch events Yes NN 2.46 (Shen et al, 2015) 51 800 touch events Yes SVM <8 (Serwadda et al, 2013) 190 80 touch events No PM ~13.8 (Gascon et al, 2014) 315 160 Characters No SVM 1^, 8 # * Accuracy; ^F AR; # FRR…”
Section: Dynamic Modementioning
confidence: 99%
“…Mobile device platform information, specially touch, is also used to some extent, e.g. [164], [178] or [44]. However, the use of body-related data, biosignals in particular, is experiencing a significant growth and in the last 3 years, in which 6 approaches have been proposed [194]…”
Section: Manuscript Submitted To Acmmentioning
confidence: 99%
“…This may allow for some useful counteraction, such as raising an alarm, blocking malicious content, or simply switching to higher protection thresholds and more verbose logs. For examples and surveys of applications, see [11][12][13][14][15][16][17][18].…”
Section: Definition and Frameworkmentioning
confidence: 99%
“…Applications of keyed learning fall within the scope of exploratory adversarial learning [2]. This context is generally appropriate for anomaly detection, which comprises several application domains, including intrusion detection [3,5,6,14,25,33,34], attack and malware analysis [7,16,[35][36][37], defacement response [8,17,38,39], Web promotional infection detection [40], and biometric and continuous user authentication [11,18].…”
Section: Applicationsmentioning
confidence: 99%