2018 Second World Conference on Smart Trends in Systems, Security and Sustainability (WorldS4) 2018
DOI: 10.1109/worlds4.2018.8611589
|View full text |Cite
|
Sign up to set email alerts
|

Continuous User Authentication in Mobile Phone Browser Based on Gesture Characteristics

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
2
0

Year Published

2019
2019
2023
2023

Publication Types

Select...
3
1

Relationship

0
4

Authors

Journals

citations
Cited by 4 publications
(3 citation statements)
references
References 9 publications
0
2
0
Order By: Relevance
“…Clustering variants are also used: k-means [38,39,29,40,41], dbscan [23], c-means [42]. Support Vector Machines (SVM) are also used, sometimes as a single [43] or best classifier in the experiment [29,44] and sometimes to support a claim that another method performs better [45]. Bayesian approaches (Naive Bayes [46,47] Naive Bernoulli Bayes [2], Bayes net [8,48,42]) are also used very often, with the argument that they are simple and fast to train and still have a surprisingly good performance.…”
Section: Resultsmentioning
confidence: 99%
“…Clustering variants are also used: k-means [38,39,29,40,41], dbscan [23], c-means [42]. Support Vector Machines (SVM) are also used, sometimes as a single [43] or best classifier in the experiment [29,44] and sometimes to support a claim that another method performs better [45]. Bayesian approaches (Naive Bayes [46,47] Naive Bernoulli Bayes [2], Bayes net [8,48,42]) are also used very often, with the argument that they are simple and fast to train and still have a surprisingly good performance.…”
Section: Resultsmentioning
confidence: 99%
“…With various sensors built into smart mobile devices, such as touchscreens, accelerometers, and so forth, behavioral biometrics can be captured for continuous user authentication when people use or carry these devices. Luzbashev et al [16] proposed a method for smartphone user authentication via consecutive swipe gesture recognition, which depended essentially on the gesture trajectory and gesture dynamic generated from the touch screen. Dybczak et al [17] presented a smartphone continuous authentication system based on user hand movements utilizing inbuilt sensors such as the accelerometer and the gyroscope.…”
Section: Related Workmentioning
confidence: 99%
“…Human motion behavior characteristics can be applied in many fields, including gesture behavior [6], gait signal [7] [8] and keystroke dynamics [9] [10]. These behavior features can be used in identity authentication since they can represent the unique feature of each person.…”
Section: Behavior Feature Recognitionmentioning
confidence: 99%