2017
DOI: 10.1007/978-3-319-71273-4_19
|View full text |Cite
|
Sign up to set email alerts
|

Sequential Keystroke Behavioral Biometrics for Mobile User Identification via Multi-view Deep Learning

Abstract: Abstract. With the rapid growth in smartphone usage, more organizations begin to focus on providing better services for mobile users. User identification can help these organizations to identify their customers and then cater services that have been customized for them. Currently, the use of cookies is the most common form to identify users. However, cookies are not easily transportable (e.g., when a user uses a different login account, cookies do not follow the user). This limitation motivates the need to use… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
36
0
1

Year Published

2018
2018
2022
2022

Publication Types

Select...
5
2
2

Relationship

1
8

Authors

Journals

citations
Cited by 50 publications
(37 citation statements)
references
References 18 publications
(21 reference statements)
0
36
0
1
Order By: Relevance
“…Mengingat maraknya penipuan pada situs e-commerce yang dapat mengakibatkan kerugian finansial yang cukup besar, sebagai konsumen perlu adanya pengetahuan mengenai jenis penipuan yang umum terjadi dan metode pencegahan yang digunakan untuk mendeteksi penipuan agar terhindar dari berbagai kerugian. Beberapa penelitian sebelumnya hanya membahas tentang identifikasi dan metode pencegahan penipuan e-commerce ( Makarti, 2011;Chang & Chang, 2012;Syed & Shabbir, 2013;Valentin, 2013;Caldeira, Brandao, & Pereira, 2014;Leung, Lai, Chen, & Wan, 2014;Massa & Valverde, 2014;Hwang & Lai, 2015;JRana & Baria, 2015;Singh & Singh, 2015;Abdallah, Maarof, & Zainal, 2016;Beránek, Nýdl, & Remeš, 2016;Gerlach, Pavlovic, & Gerlach, 2016;Lima & Pereira, 2016;Yang et al, 2016;Ramadhan & Amelia, 2016;Sun et al, 2017;Prisha, Neo, Ong, & Teo, 2017;Raghava-Raju, 2017;Shaji & Panchal, 2017;Wiralestari, 2017;Renjith, 2018;Weng et al, 2018;Zhao et al, 2018;Zheng et al, 2018); Amasiatu Amiruddin et al, 2019;Carta et al, 2019;Raghavan & Gayar, 2019;Shah et al, 2019;Soomro et al, 2019. Sementara penelitian lainnya lebih fokus pada penipuan sistem pembayaran dan penipuan terkait dengan pelanggan (Keraf & Hidup, 2010;Rofiq & Mula, 2010;Raj & Portia, 2011;Hu, Liu, & Sambamurthy, 2011;…”
Section: Pendahuluanunclassified
“…Mengingat maraknya penipuan pada situs e-commerce yang dapat mengakibatkan kerugian finansial yang cukup besar, sebagai konsumen perlu adanya pengetahuan mengenai jenis penipuan yang umum terjadi dan metode pencegahan yang digunakan untuk mendeteksi penipuan agar terhindar dari berbagai kerugian. Beberapa penelitian sebelumnya hanya membahas tentang identifikasi dan metode pencegahan penipuan e-commerce ( Makarti, 2011;Chang & Chang, 2012;Syed & Shabbir, 2013;Valentin, 2013;Caldeira, Brandao, & Pereira, 2014;Leung, Lai, Chen, & Wan, 2014;Massa & Valverde, 2014;Hwang & Lai, 2015;JRana & Baria, 2015;Singh & Singh, 2015;Abdallah, Maarof, & Zainal, 2016;Beránek, Nýdl, & Remeš, 2016;Gerlach, Pavlovic, & Gerlach, 2016;Lima & Pereira, 2016;Yang et al, 2016;Ramadhan & Amelia, 2016;Sun et al, 2017;Prisha, Neo, Ong, & Teo, 2017;Raghava-Raju, 2017;Shaji & Panchal, 2017;Wiralestari, 2017;Renjith, 2018;Weng et al, 2018;Zhao et al, 2018;Zheng et al, 2018); Amasiatu Amiruddin et al, 2019;Carta et al, 2019;Raghavan & Gayar, 2019;Shah et al, 2019;Soomro et al, 2019. Sementara penelitian lainnya lebih fokus pada penipuan sistem pembayaran dan penipuan terkait dengan pelanggan (Keraf & Hidup, 2010;Rofiq & Mula, 2010;Raj & Portia, 2011;Hu, Liu, & Sambamurthy, 2011;…”
Section: Pendahuluanunclassified
“…Other datasets have also been experimented. DeepService [11] focuses on mobile-phone free-text authentication. Using a multi-class (one per user) and multi-view (alphabet data, other char data, accelerometer) deep learning model, it reaches 93% of identification accuracy in a closed-set scenario of 40 individuals.…”
Section: Related Workmentioning
confidence: 99%
“…The feasibility of such kind of architecture to improve the performance of static keystroke dynamics authentication sys-WIFS'2019, December, [9][10][11][12]2019, Delft, Netherlands. 978-1-7281-3217-4/19/$31.00 c 2019 IEEE.…”
Section: Introductionmentioning
confidence: 99%
“…Multi-view learning is a hot idea to think one object with different views [13], [23], [26], [27]. In this paper, we think the HIN with different views such as meta-paths and meta-graph, and fuse the different information for node embedding.…”
Section: Multi-view Learningmentioning
confidence: 99%