AuthConFormer: Sensor-based Continuous Authentication of Smartphone Users Using A Convolutional Transformer

[1]  D. He,et al.  Quantum2FA: Efficient Quantum-Resistant Two-Factor Authentication Scheme for Mobile Devices , 2023, IEEE Transactions on Dependable and Secure Computing.

[2]  Gang Zhou,et al.  CNN-Based Continuous Authentication on Smartphones With Conditional Wasserstein Generative Adversarial Network , 2022, IEEE Internet of Things Journal.

[3]  Gang Zhou,et al.  DeFFusion: CNN-based Continuous Authentication Using Deep Feature Fusion , 2021, ACM Trans. Sens. Networks.

[4]  Tao Mei,et al.  Contextual Transformer Networks for Visual Recognition , 2021, IEEE Transactions on Pattern Analysis and Machine Intelligence.

[5]  Shiwei Zhang,et al.  End-to-End Temporal Action Detection With Transformer , 2021, IEEE Transactions on Image Processing.

[6]  Quoc V. Le,et al.  CoAtNet: Marrying Convolution and Attention for All Data Sizes , 2021, NeurIPS.

[7]  Xiuchao Sui,et al.  Medical Image Segmentation using Squeeze-and-Expansion Transformers , 2021, IJCAI.

[8]  Xuan-Son Vu,et al.  Modular Graph Transformer Networks for Multi-Label Image Classification , 2021, AAAI.

[9]  José María de Fuentes,et al.  SmartCAMPP - Smartphone-based continuous authentication leveraging motion sensors with privacy preservation , 2021, Pattern Recognit. Lett..

[10]  N. Codella,et al.  CvT: Introducing Convolutions to Vision Transformers , 2021, 2021 IEEE/CVF International Conference on Computer Vision (ICCV).

[11]  Fabio Martinelli,et al.  Using recurrent neural networks for continuous authentication through gait analysis , 2021, Pattern Recognit. Lett..

[12]  Yifan Jiang,et al.  TransGAN: Two Pure Transformers Can Make One Strong GAN, and That Can Scale Up , 2021, NeurIPS.

[13]  Sotirios P. Chatzis,et al.  Behavioral biometrics & continuous user authentication on mobile devices: A survey , 2021, Inf. Fusion.

[14]  Bin Li,et al.  Deformable DETR: Deformable Transformers for End-to-End Object Detection , 2020, ICLR.

[15]  Yantao Li,et al.  SCANet , 2020, ACM Trans. Sens. Networks.

[16]  Lu Liu,et al.  A Universal Representation Transformer Layer for Few-Shot Image Classification , 2020, ICLR.

[17]  David Mohaisen,et al.  AUToSen: Deep-Learning-Based Implicit Continuous Authentication Using Smartphone Sensors , 2020, IEEE Internet of Things Journal.

[18]  Jun Wang,et al.  A Framework for Behavioral Biometric Authentication Using Deep Metric Learning on Mobile Devices , 2020, IEEE Transactions on Mobile Computing.

[19]  Nicolas Usunier,et al.  End-to-End Object Detection with Transformers , 2020, ECCV.

[20]  Pedro Miguel S'anchez S'anchez,et al.  AuthCODE: A Privacy-preserving and Multi-device Continuous Authentication Architecture based on Machine and Deep Learning , 2020, Comput. Secur..

[21]  Kaiming He,et al.  Designing Network Design Spaces , 2020, 2020 IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR).

[22]  F. Schwenker,et al.  StrokeCoder: Path-Based Image Generation from Single Examples using Transformers , 2020, ArXiv.

[23]  Yantao Li,et al.  Using Feature Fusion Strategies in Continuous Authentication on Smartphones , 2020, IEEE Internet Computing.

[24]  Ahmed A. Abusnaina,et al.  Sensor-Based Continuous Authentication of Smartphones’ Users Using Behavioral Biometrics: A Contemporary Survey , 2020, IEEE Internet of Things Journal.

[25]  Shiqi Yu,et al.  A comprehensive study on gait biometrics using a joint CNN-based method , 2019, Pattern Recognit..

[26]  Yongjun Chen,et al.  Dense Transformer Networks for Brain Electron Microscopy Image Segmentation , 2019, IJCAI.

[27]  Ashish Vaswani,et al.  Stand-Alone Self-Attention in Vision Models , 2019, NeurIPS.

[28]  Quoc V. Le,et al.  EfficientNet: Rethinking Model Scaling for Convolutional Neural Networks , 2019, ICML.

[29]  Quoc V. Le,et al.  Searching for MobileNetV3 , 2019, 2019 IEEE/CVF International Conference on Computer Vision (ICCV).

[30]  Kyriakos C. Chatzidimitriou,et al.  BrainRun: A Behavioral Biometrics Dataset towards Continuous Implicit Authentication , 2019, Data.

[31]  Ben Glocker,et al.  TeTrIS: Template Transformer Networks for Image Segmentation With Shape Priors , 2019, IEEE Transactions on Medical Imaging.

[32]  Gang Zhou,et al.  Using Data Augmentation in Continuous Authentication on Smartphones , 2019, IEEE Internet of Things Journal.

[33]  Bo Chen,et al.  MnasNet: Platform-Aware Neural Architecture Search for Mobile , 2018, 2019 IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR).

[34]  Xiangyu Zhang,et al.  ShuffleNet V2: Practical Guidelines for Efficient CNN Architecture Design , 2018, ECCV.

[35]  Ping Wang,et al.  Two Birds with One Stone: Two-Factor Authentication with Security Beyond Conventional Bound , 2018, IEEE Transactions on Dependable and Secure Computing.

[36]  Yu Guan,et al.  Mobile Based Continuous Authentication Using Deep Features , 2018, EMDL@MobiSys.

[37]  Julian Fierrez,et al.  Benchmarking Touchscreen Biometrics for Mobile Authentication , 2018, IEEE Transactions on Information Forensics and Security.

[38]  Mark Sandler,et al.  MobileNetV2: Inverted Residuals and Linear Bottlenecks , 2018, 2018 IEEE/CVF Conference on Computer Vision and Pattern Recognition.

[39]  Koosha Sadeghi,et al.  Geometrical Analysis of Machine Learning Security in Biometric Authentication Systems , 2017, 2017 16th IEEE International Conference on Machine Learning and Applications (ICMLA).

[40]  Frank Hutter,et al.  Decoupled Weight Decay Regularization , 2017, ICLR.

[41]  Ping Wang,et al.  Zipf’s Law in Passwords , 2017, IEEE Transactions on Information Forensics and Security.

[42]  Lukasz Kaiser,et al.  Attention is All you Need , 2017, NIPS.

[43]  Ping Wang,et al.  Understanding Human-Chosen PINs: Characteristics, Distribution and Security , 2017, AsiaCCS.

[44]  Jun Ho Huh,et al.  Boosting the Guessing Attack Performance on Android Lock Patterns with Smudge Attacks , 2017, AsiaCCS.

[45]  Bruno Crispo,et al.  Please hold on: Unobtrusive user authentication using smartphone's built-in sensors , 2017, 2017 IEEE International Conference on Identity, Security and Behavior Analysis (ISBA).

[46]  Samrat Mondal,et al.  SPOSS: Secure Pin-Based-Authentication Obviating Shoulder Surfing , 2016, ICISS.

[47]  Zhuowen Tu,et al.  Aggregated Residual Transformations for Deep Neural Networks , 2016, 2017 IEEE Conference on Computer Vision and Pattern Recognition (CVPR).

[48]  Ping Wang,et al.  Targeted Online Password Guessing: An Underestimated Threat , 2016, CCS.

[49]  Jugal K. Kalita,et al.  Authentication of Smartphone Users Using Behavioral Biometrics , 2016, IEEE Communications Surveys & Tutorials.

[50]  Jian Sun,et al.  Deep Residual Learning for Image Recognition , 2015, 2016 IEEE Conference on Computer Vision and Pattern Recognition (CVPR).

[51]  Nasir D. Memon,et al.  An HMM-based multi-sensor approach for continuous mobile authentication , 2015, MILCOM 2015 - 2015 IEEE Military Communications Conference.

[52]  Yuan Feng,et al.  Waving Authentication: Your Smartphone Authenticate You on Motion Gesture , 2015, CHI Extended Abstracts.

[53]  Matjaz B. Juric,et al.  An Efficient HOS-Based Gait Authentication of Accelerometer Data , 2015, IEEE Transactions on Information Forensics and Security.

[54]  Qing Yang,et al.  HMOG: New Behavioral Biometric Features for Continuous Authentication of Smartphone Users , 2015, IEEE Transactions on Information Forensics and Security.

[55]  Muhammad Khurram Khan,et al.  Cryptanalysis and improvement of ‘a robust smart‐card‐based remote user password authentication scheme’ , 2014, Int. J. Commun. Syst..

[56]  Janne Lindqvist,et al.  Engineering Gesture-Based Authentication Systems , 2014, IEEE Pervasive Computing.

[57]  Lih-Chyau Wuu,et al.  Robust smart‐card‐based remote user password authentication scheme , 2014, Int. J. Commun. Syst..

[58]  Jia-Lun Tsai,et al.  Novel Anonymous Authentication Scheme Using Smart Cards , 2013, IEEE Transactions on Industrial Informatics.

[59]  Michael Weber,et al.  Password entry usability and shoulder surfing susceptibility on different smartphone platforms , 2012, MUM.

[60]  Dawn Xiaodong Song,et al.  Touchalytics: On the Applicability of Touchscreen Input as a Behavioral Biometric for Continuous Authentication , 2012, IEEE Transactions on Information Forensics and Security.

[61]  Peng Wu,et al.  Secure password-based remote user authentication scheme with non-tamper resistant smart cards , 2012, IACR Cryptol. ePrint Arch..

[62]  Frank Stajano,et al.  The Quest to Replace Passwords: A Framework for Comparative Evaluation of Web Authentication Schemes , 2012, 2012 IEEE Symposium on Security and Privacy.

[63]  Daniel P. Lopresti,et al.  Secure speech biometric templates for user authentication , 2012, IET Biom..

[64]  Pong C. Yuen,et al.  Binary Discriminant Analysis for Generating Binary Face Template , 2012, IEEE Transactions on Information Forensics and Security.

[65]  Jun Han,et al.  ACCessory: password inference using accelerometers on smartphones , 2012, HotMobile '12.

[66]  Cees Snoek,et al.  TubeR: Tube-Transformer for Action Detection , 2021, ArXiv.

[67]  Dan Tao,et al.  Context-Aware Implicit Authentication of Smartphone Users Based on Multi-Sensor Behavior , 2019, IEEE Access.

[68]  Vivek Jain,et al.  K-means++ vs. Behavioral Biometrics: One Loop to Rule Them All , 2018, NDSS.

[69]  Yufei Chen,et al.  Performance Analysis of Multi-Motion Sensor Behavior for Active Smartphone Authentication , 2018, IEEE Transactions on Information Forensics and Security.

[70]  Ebad Ahmadzadeh,et al.  Authentication on the Go: Assessing the Effect of Movement on Mobile Device Keystroke Dynamics , 2017, SOUPS.

[71]  John V. Monaco,et al.  Passcode Keystroke Biometric Performance on Smartphone Touchscreens is Superior to that on Hardware Keyboards , 2014 .