2020
DOI: 10.1109/tmc.2019.2892440
|View full text |Cite
|
Sign up to set email alerts
|

RiskCog: Unobtrusive Real-Time User Authentication on Mobile Devices in the Wild

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
2

Citation Types

0
32
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
7
2

Relationship

3
6

Authors

Journals

citations
Cited by 54 publications
(50 citation statements)
references
References 40 publications
0
32
0
Order By: Relevance
“…The Fisher score is one of the most popular algorithms for ranking the priority of features [27,28]. As a supervised algorithm, the Fisher score ranks extracted features by the Fisher criterion.…”
Section: Permutation Entropymentioning
confidence: 99%
“…The Fisher score is one of the most popular algorithms for ranking the priority of features [27,28]. As a supervised algorithm, the Fisher score ranks extracted features by the Fisher criterion.…”
Section: Permutation Entropymentioning
confidence: 99%
“…The permutation entropy is utilized to recognize the health status of rotation machines [36]. By counting the ordinal patterns, the temporal information of the monitored object is recognized by the permutation entropy.…”
Section: Permutation Entropymentioning
confidence: 99%
“…Although these two commonly used methods (knowledge-based authentication and static biometric-based authentication) have been in full swing for decades, there are a series of deficiencies in usability, security, and effectiveness. Therefore, in recent years, using motion sensors such as acceleration sensors, gyro sensors, and gravity sensors as data sources, a method of authentication based on the user’s dynamic behavior, has been proposed by many researchers (e.g., gait authentication [ 14 , 15 , 16 , 17 , 18 , 19 , 20 , 21 , 22 , 23 , 24 , 25 , 26 , 27 , 28 , 29 , 30 , 31 ], user’s usage behavior authentication [ 32 , 33 , 34 , 35 , 36 , 37 , 38 ], and daily life behavior authentication [ 39 , 40 , 41 , 42 , 43 , 44 , 45 , 46 , 47 , 48 , 49 , 50 , 51 ]). These methods have better user experience and stronger privacy protection capabilities, laying the foundation for the development of the third phase of mobile user authentication.…”
Section: Introductionmentioning
confidence: 99%
“…There is no need to consider the impact of noise, but once deployed into the real-world, the availability is poor. Existing work based on large-scale real data [ 32 ] only filters the data lying on flat surfaces, but in the actual environment, there are many data unrelated to authentication, such as sensor signal discontinuities, mutation, etc., so the de-noising ability is limited. Previous work [ 52 ] has envisaged the use of recursive mode decomposition methods, such as empirical mode decomposition (EMD) [ 53 ] to de-noise, which adopts an adaptive method—through recursive steps the same decomposition method successively separates different modal components in the target signal.…”
Section: Introductionmentioning
confidence: 99%