2022
DOI: 10.48550/arxiv.2212.13075
|View full text |Cite
Preprint
|
Sign up to set email alerts
|

TypeFormer: Transformers for Mobile Keystroke Biometrics

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
11
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
3

Relationship

0
3

Authors

Journals

citations
Cited by 3 publications
(11 citation statements)
references
References 0 publications
0
11
0
Order By: Relevance
“…In Table 1, some of the most important public keystroke dynamics databases are reported in chronological order. Although the literature on keystroke biometrics is extensive, to the best of our knowledge, except very few cases [11], [16], previous systems have mostly been only evaluated with up to several hundred subjects not representing well the recent challenges that massive usage applications can face. In addition, most research works are mainly focused only on desktop and fixedtext scenarios.…”
Section: B Limitations Of Existing Evaluation Methodologiesmentioning
confidence: 99%
See 3 more Smart Citations
“…In Table 1, some of the most important public keystroke dynamics databases are reported in chronological order. Although the literature on keystroke biometrics is extensive, to the best of our knowledge, except very few cases [11], [16], previous systems have mostly been only evaluated with up to several hundred subjects not representing well the recent challenges that massive usage applications can face. In addition, most research works are mainly focused only on desktop and fixedtext scenarios.…”
Section: B Limitations Of Existing Evaluation Methodologiesmentioning
confidence: 99%
“…To create the framework, we consider two of the largest public databases of keystroke dynamics up to date, the Aalto Desktop [25] and Mobile [26] Keystroke Databases, extracting datasets that guarantee a minimum amount of data per subject, age and gender annotations, absence of corrupted data, and that avoid too unbalanced subject distributions with respect to the considered demographic attributes. • We illustrate the main aspects of the proposed framework by considering two recent state-of-the-art keystroke biometric systems, TypeNet [11], and Type-Former [16], [43]. To this end, we propose a thorough analysis considering four different sets of features (Sec.…”
Section: Contributionsmentioning
confidence: 99%
See 2 more Smart Citations
“…Mao, Wang, and Ji [46] combined keystroke content with keystroke time as the feature vector using a CNN to process the feature vectors and then input the normalized vector into the bi-LSTM network for training; they then tested this approach on an open data set and achieved an FRR, FAR, and EER of 3.09%, 3.03%, and 4.23%, respectively. Stragapede, Delgado-Santos, Tolosana, Vega-Rodriguez, Guest, and Morales [47] took into account the emotional and physical state of the authenticator and proposed a novel transformer architecture to model free-text KD performed on mobile devices using a publicly available Aalto mobile keystroke database, and they achieved experimental results that outperformed the current state-of-the-art systems, with an EER of 3.25% from only five enrollment sessions of 50 keystrokes each.…”
Section: Behavioral Authentication Using MLmentioning
confidence: 99%