2018 IEEE Conference of Russian Young Researchers in Electrical and Electronic Engineering (EIConRus) 2018
DOI: 10.1109/eiconrus.2018.8317378
|View full text |Cite
|
Sign up to set email alerts
|

User authentication via touch pattern recognition based on isolation forest

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
6
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
7
1

Relationship

0
8

Authors

Journals

citations
Cited by 14 publications
(6 citation statements)
references
References 6 publications
0
6
0
Order By: Relevance
“…That means, a good level of security against impostors. Our MLP achieved better FAR compared to: 3.1% with MLP in Buriro et al (2016), 7.5% with isolation forest in Filippov et al (2018) and 3.9% with HMM in Shen et al (2018). The HMM also achieved EER 4.71%, our approach achieved EER 1.9%.…”
Section: Discussionmentioning
confidence: 53%
See 2 more Smart Citations
“…That means, a good level of security against impostors. Our MLP achieved better FAR compared to: 3.1% with MLP in Buriro et al (2016), 7.5% with isolation forest in Filippov et al (2018) and 3.9% with HMM in Shen et al (2018). The HMM also achieved EER 4.71%, our approach achieved EER 1.9%.…”
Section: Discussionmentioning
confidence: 53%
“…As we can see in Table 2, the MLP classifierin Buriro et al (2016), the isolation forest in Filippov et al (2018) and the Hidden Markov Model (HMM) in Shen et al (2018) performed well, achieving 3.1%, 7.5% and 3.9% FAR, respectively. The HMM also achieve EER 4.71%.…”
Section: Related Workmentioning
confidence: 86%
See 1 more Smart Citation
“…1. (Filippov et al 2018) [38] extracted features of interaction with a device's touch screen for user authentication. Isolated forest technique is employed to fit the touch pattern recognition model; 2.…”
Section: Methodsmentioning
confidence: 99%
“…The intuition behind the behavioral approach is based on the distinctive user patterns commonly used in an authentication task. While users interact with their smartphones, the device implicitly captures their interaction with the device, including user touch patterns, environmental and sensory data [12], [13]. The collected user's behavioral data (biometrics) works without knowing or explicitly asking to enter specific data.…”
Section: ) Discontinuous Authentication Systemsmentioning
confidence: 99%