2021
DOI: 10.1016/j.patrec.2021.03.010
|View full text |Cite
|
Sign up to set email alerts
|

Using recurrent neural networks for continuous authentication through gait analysis

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
58
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
5
2

Relationship

0
7

Authors

Journals

citations
Cited by 50 publications
(58 citation statements)
references
References 10 publications
0
58
0
Order By: Relevance
“…The basic idea is to capture the three-dimensional time series using a triaxial accelerometer, and GDI is expressed as the cosine similarity of the motion measurement at time t with the lag time signal. Damaševicius et al [ 25 ] used random projections to reduce feature dimensionality to two, followed by computing the Jaccard distance between two probability distributed functions of the derived features for positive identification. Kašys et al [ 26 ] performed user identity verification using linear Support Vector Machine (SVM) classifier on his/her walking activity data captured by the mobile phone.…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…The basic idea is to capture the three-dimensional time series using a triaxial accelerometer, and GDI is expressed as the cosine similarity of the motion measurement at time t with the lag time signal. Damaševicius et al [ 25 ] used random projections to reduce feature dimensionality to two, followed by computing the Jaccard distance between two probability distributed functions of the derived features for positive identification. Kašys et al [ 26 ] performed user identity verification using linear Support Vector Machine (SVM) classifier on his/her walking activity data captured by the mobile phone.…”
Section: Related Workmentioning
confidence: 99%
“…This method is not appropriate for CNN because CNN is not good at processing one-dimensional signals. Giorgi et al [ 25 ] described a user authentication framework, exploiting inertial sensors and making use of Recurrent Neural Network for deep-learning based classification. However, the difference in results for known identities and unknown identities is quite significant.…”
Section: Related Workmentioning
confidence: 99%
“…One exception is the Human Activity Recognition using Smartphone (UCI-HAR) dataset [40], which is a collection devoted to activity recognition. The dataset has also been utilized for continuous authentication [24]. Another notable exception is the WISDM-HARB dataset, which gathers data on activity patterns to investigate activity identification and authentication using smartphone sensors.…”
Section: Data Acquisitionmentioning
confidence: 99%
“…This study used a data segmentation technique called an overlapping temporal window (OW), which generates data samples by applying a fixed-size window to the sensor data stream. The OW technique is the most often employed in sensor-based HAR and authentication research, with a 50% overlap rate [23,24]. Nevertheless, this sample generation is considerably unbalanced since D t and D t+1 share a percentage of the sensor data.…”
Section: Data Preprocessingmentioning
confidence: 99%
See 1 more Smart Citation