2021
DOI: 10.1109/tmc.2021.3106256
|View full text |Cite
|
Sign up to set email alerts
|

Lightweight and Secure Face-based Active Authentication for Mobile Users

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
3
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
4
1
1

Relationship

0
6

Authors

Journals

citations
Cited by 7 publications
(3 citation statements)
references
References 40 publications
0
3
0
Order By: Relevance
“…• Training the entire model: In this approach, the entire pre-trained model is used as a starting point, and all the parameters of the model are fine-tuned for the new task. This is suitable when the new task is similar to the original task for which the pretrained model was trained [92].…”
Section: Practical Perspective and Fine-tuning Of Transfer Learning T...mentioning
confidence: 99%
See 1 more Smart Citation
“…• Training the entire model: In this approach, the entire pre-trained model is used as a starting point, and all the parameters of the model are fine-tuned for the new task. This is suitable when the new task is similar to the original task for which the pretrained model was trained [92].…”
Section: Practical Perspective and Fine-tuning Of Transfer Learning T...mentioning
confidence: 99%
“…From a practical point of view, transfer learning techniques for image classification problems are mainly based on the size and similarity of the dataset. The strategies are summarized into four categories as follows [92] A learning model that is subject to supervision, either for classification or regression problems, must learn from training data to produce accurate predictions. Unfortunately, the problem arises that whenever we make an effort to train a complicated model with an insufficient amount of data for training purposes, overfitting occurs [114].…”
mentioning
confidence: 99%
“…This paper proposes a lightweight and secure authentication protocol for mobile networks that uses EAP-TLS and ECDSA. The protocol is designed to provide e cient and secure authentication while minimizing the computational overhead and reducing the communication overhead [13].This paper proposes a lightweight authentication protocol for global mobility networks that uses EAP-TLS and ECDSA. The protocol is designed to provide e cient and secure authentication while ensuring privacy and con dentiality [14].…”
Section: Introductionmentioning
confidence: 99%