IEEE INFOCOM 2016 - The 35th Annual IEEE International Conference on Computer Communications 2016
DOI: 10.1109/infocom.2016.7524367
|View full text |Cite
|
Sign up to set email alerts
|

EyeVeri: A secure and usable approach for smartphone user authentication

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
40
0

Year Published

2016
2016
2023
2023

Publication Types

Select...
5
4

Relationship

1
8

Authors

Journals

citations
Cited by 58 publications
(43 citation statements)
references
References 23 publications
0
40
0
Order By: Relevance
“…(3) The paper had to propose an authentication scheme. Specifically, the paper had to use machine learning to label [12], [33], [41], [42] IMWUT/UbiComp [11], [20], [25], [35], [48] INFOCOM [8], [36], [45], [51], [53] MobiCom [15], [32] MobiSys [7], [31] NDSS [5], [17], [49], [50] Pattern Recognition [2], [9], [18], [24], [38], [40], [54]…”
Section: Review Of Recent Authentication Systemsmentioning
confidence: 99%
“…(3) The paper had to propose an authentication scheme. Specifically, the paper had to use machine learning to label [12], [33], [41], [42] IMWUT/UbiComp [11], [20], [25], [35], [48] INFOCOM [8], [36], [45], [51], [53] MobiCom [15], [32] MobiSys [7], [31] NDSS [5], [17], [49], [50] Pattern Recognition [2], [9], [18], [24], [38], [40], [54]…”
Section: Review Of Recent Authentication Systemsmentioning
confidence: 99%
“…• Once an accepting sample via the feature vector API has been found, it may be possible to obtain an input that results in this sample (after feature extraction), as demonstrated by Garcia et al with the training of an autoencoder for both feature extraction and the regeneration of the input image [23]. • In this work, we have focused on authentication as a binary classification problem, largely because of its widespread use in biometric authentication [8], [9], [10], [11], [12], [13], [14], [15], [16], [26]. However, authentication has also been framed as a one-class classification problem [56], [26] or as multi-class classification [26], e.g., in a discrimination model, as noted earlier.…”
Section: Discussionmentioning
confidence: 99%
“…The target user's data for training is obtained during the registration or enrollment phase. For the negative class, the usual process is to use the data of a subset of other users enrolled in the system [27], [8], [7], [9], [10], [11], [12], [13], [14], [15], [16]. Following best machine learning practice, the data (from both classes) is split into a training and test set.…”
Section: A Biometric Authentication Systemsmentioning
confidence: 99%
“…The inherence factor relies on biometric data, such as fingerprints, user behavior (e.g., behavior on a touchscreen [10] or eye-gaze behavior [33]) and face detection [15]. While biometric authentication can be easy and fast to use, it is accompanied with a number of problems.…”
Section: Inherence Factormentioning
confidence: 99%