2022
DOI: 10.1109/tmc.2020.3012491
|View full text |Cite
|
Sign up to set email alerts
|

EspialCog: General, Efficient and Robust Mobile User Implicit Authentication in Noisy Environment

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
2

Citation Types

0
28
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
4
1
1

Relationship

1
5

Authors

Journals

citations
Cited by 9 publications
(28 citation statements)
references
References 39 publications
0
28
0
Order By: Relevance
“…Different authentication mechanisms can be applied in online learning environments including (1) knowledge based (what a user knows), (2) possession based (what a user has) and (3) biometrics based (what a user is) [3]. Knowledge based authentication using usernames and passwords (also known as password-based) is the most widely applied authentication method, but passwords can potentially be vulnerable and stolen, leading to a failure to authenticate the genuine learner [8][9][10]. The prime example where this is of concern involves academic integrityconsider that learner A (who is the genuine enrolled student) provides their authentication credentials to person B (an imposter), who then completes some or all of the learning activities and assessments required instead of learner A.…”
Section: Introductionmentioning
confidence: 99%
“…Different authentication mechanisms can be applied in online learning environments including (1) knowledge based (what a user knows), (2) possession based (what a user has) and (3) biometrics based (what a user is) [3]. Knowledge based authentication using usernames and passwords (also known as password-based) is the most widely applied authentication method, but passwords can potentially be vulnerable and stolen, leading to a failure to authenticate the genuine learner [8][9][10]. The prime example where this is of concern involves academic integrityconsider that learner A (who is the genuine enrolled student) provides their authentication credentials to person B (an imposter), who then completes some or all of the learning activities and assessments required instead of learner A.…”
Section: Introductionmentioning
confidence: 99%
“…The deep metric learning model in [6] is implemented with the deep learning framework Keras, and the two-stream deep learning model in [21] is implemented with the PyTorch framework. [47], Li et al [22], Wang et al [39], and Shen et al [32]. Table 4 lists the sensors, classifiers, training data, experimental result, and time overhead of each representative work.…”
Section: Comparison With Representative Continuous Authentication Met...mentioning
confidence: 99%
“…Experimental results shown that the proposed authentication method can achieve an mean EER of 5.14% with approximately 3s authentication time. Zhu et al [47] applied an optimized LSTM architecture to learn the behavioral patterns from three built-in sensors. Besides, they evaluated the performance of the proposed continuous authentication method on a large-scale real-world noisy dataset.…”
Section: Comparison With Representative Continuous Authentication Met...mentioning
confidence: 99%
See 2 more Smart Citations