2015
DOI: 10.15579/gcsr.vol2.ch4
|View full text |Cite
|
Sign up to set email alerts
|

Keystroke Dynamics Advances for Mobile Devices Using Deep Neural Network

Abstract: Recent popularity in mobile devices has raised concerns on mobile technology security, as not only sensitive and private data are being stored on mobile devices, but also allowing remote access to other high value assets. This drives research efforts to new mobile technology security methods. Fortunately, new mobile devices are equipped with advanced sensor suite, enabling a multi-modal biometrics authentication solution, to include voice, face, gait, signature, and keystroke authentication, among others. Comp… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
17
0
2

Year Published

2015
2015
2024
2024

Publication Types

Select...
6
1
1

Relationship

0
8

Authors

Journals

citations
Cited by 16 publications
(19 citation statements)
references
References 26 publications
(28 reference statements)
0
17
0
2
Order By: Relevance
“…Similarly, it explores gated recurrent unit and bidirectional recurrent neural network (GRU-BRNN) to build the identification model while our work explored the dense neural network. Also, [39] the deep neural network is explored to develop an authentication scheme based on user keystroke dynamics on mobile phone. Furthermore, our work explored supervise learning dense neural network on 71 different features of keystroke dynamics to build an authentication model while [39] applied deep neural network unsupervised learning on timing, tapping and inertial attributes of keystroke dynamics to develop an authentication scheme.…”
Section: Astesj Issn: 2415-6698mentioning
confidence: 99%
“…Similarly, it explores gated recurrent unit and bidirectional recurrent neural network (GRU-BRNN) to build the identification model while our work explored the dense neural network. Also, [39] the deep neural network is explored to develop an authentication scheme based on user keystroke dynamics on mobile phone. Furthermore, our work explored supervise learning dense neural network on 71 different features of keystroke dynamics to build an authentication model while [39] applied deep neural network unsupervised learning on timing, tapping and inertial attributes of keystroke dynamics to develop an authentication scheme.…”
Section: Astesj Issn: 2415-6698mentioning
confidence: 99%
“…Deng and Zhong conducted a comparison between their work and the mobile keystroke biometric authentication model proposed by Ho . The authors compared deep neural network (DNN) to four classifiers, including Manhattan distance, random forest, Gaussian discriminant analysis, and SVM.…”
Section: Background and Related Workmentioning
confidence: 99%
“…This method adapts the model by retraining the statistical classification algorithm which generates a user model by extracting a set of statistics from the training examples. This algorithm computes some statistics from the training examples (mean, median and standard deviation) for dwell and flight values for specified phrase in whole database [8] [10]. These statistical values represent the user model.…”
Section: A Statistical Algorithmmentioning
confidence: 99%