Proceedings of the Third International Workshop on Sensing Applications on Mobile Phones 2012
DOI: 10.1145/2389148.2389149
|View full text |Cite
|
Sign up to set email alerts
|

A personal touch

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
11
0

Year Published

2014
2014
2021
2021

Publication Types

Select...
5
1

Relationship

0
6

Authors

Journals

citations
Cited by 36 publications
(11 citation statements)
references
References 24 publications
0
11
0
Order By: Relevance
“…Decision Making: Decision making is an operation carried out to determine if the touch dynamics data submitted by a user is indeed originated from the target user. This decision is made by comparing the similarity or dissimilarity score generated from a machine learning technique against a predefined threshold (Bo et al, 2014;Kolly et al, 2012). Before the final decision is made, a fusion approach may be applied to combine either the information from multiple features (Buschek et al, 2015;Jeanjaitrong and Bhattarakosol, 2013) or to combine the matching scores from different machine learning techniques (Samura et al, 2014), to increase accuracy performance.…”
Section: Fig 3 a Touch Dynamics Authentication Frameworkmentioning
confidence: 99%
See 4 more Smart Citations
“…Decision Making: Decision making is an operation carried out to determine if the touch dynamics data submitted by a user is indeed originated from the target user. This decision is made by comparing the similarity or dissimilarity score generated from a machine learning technique against a predefined threshold (Bo et al, 2014;Kolly et al, 2012). Before the final decision is made, a fusion approach may be applied to combine either the information from multiple features (Buschek et al, 2015;Jeanjaitrong and Bhattarakosol, 2013) or to combine the matching scores from different machine learning techniques (Samura et al, 2014), to increase accuracy performance.…”
Section: Fig 3 a Touch Dynamics Authentication Frameworkmentioning
confidence: 99%
“…Data acquisition may be conducted under two settings, (i) supervision with a stringent protocol or (ii) unmonitored without any restrictions. The papers by (Alotaibi et al, 2014;Johansen, 2012;Kolly et al, 2012;Samura et al, 2014) reported experiments that were carried out without any specific restrictions. A majority of experiments (89%) reported in literature were actually carried out under supervised and controlled environments.…”
Section: Fig 8 the Numbers Of Publications On Reporting The Degree mentioning
confidence: 99%
See 3 more Smart Citations