Machine learning algorithms for improving security on touch screen devices: a survey, challenges and new perspectives
暂无分享,去创建一个
Liyana Shuib | Haruna Chiroma | Lubna A. Gabralla | Abdulsalam Ya’u Gital | Auwal Ahmed Bello | Shafi’i M. Abdulhamid
[1] Blaine Nelson,et al. The security of machine learning , 2010, Machine Learning.
[2] Divya Tomar,et al. Twin Support Vector Machine: A review from 2007 to 2014 , 2015 .
[3] Lalu Banoth,et al. A Survey of Data Mining and Machine Learning Methods for Cyber Security Intrusion Detection , 2017 .
[4] Tao Feng,et al. Continuous Mobile Authentication Using Virtual Key Typing Biometrics , 2013, 2013 12th IEEE International Conference on Trust, Security and Privacy in Computing and Communications.
[5] Haruna Chiroma,et al. A Review of the Advances in Cyber Security Benchmark Datasets for Evaluating Data-Driven Based Intrusion Detection Systems , 2015, SCSE.
[6] Ulf-Dietrich Reips,et al. "Big Data" : big gaps of knowledge in the field of internet science , 2012 .
[7] Georgios Kambourakis,et al. Introducing touchstroke: keystroke-based authentication system for smartphones , 2016, Secur. Commun. Networks.
[8] Alex X. Liu,et al. Behavior Based Human Authentication on Touch Screen Devices Using Gestures and Signatures , 2017, IEEE Transactions on Mobile Computing.
[9] Zhi-Li Zhang,et al. Multi-touch Authentication Using Hand Geometry and Behavioral Information , 2017, 2017 IEEE Symposium on Security and Privacy (SP).
[10] Mehran Sahami,et al. Learning Limited Dependence Bayesian Classifiers , 1996, KDD.
[11] Dongsong Zhang,et al. Harmonized authentication based on ThumbStroke dynamics on touch screen mobile phones , 2016, Decis. Support Syst..
[12] Alessandro Neri,et al. User authentication using keystroke dynamics for cellular phones , 2009 .
[13] Tim Storer,et al. A framework for continuous, transparent mobile device authentication , 2013, Comput. Secur..
[14] Duncan S. Wong,et al. Design of touch dynamics based user authentication with an adaptive mechanism on mobile phones , 2014, SAC.
[15] Benjamin Edwards,et al. Detecting Backdoor Attacks on Deep Neural Networks by Activation Clustering , 2018, SafeAI@AAAI.
[16] Janne Lindqvist,et al. Engineering Gesture-Based Authentication Systems , 2014, IEEE Pervasive Computing.
[17] Mohamed A. Ismail,et al. Multi-level gene/MiRNA feature selection using deep belief nets and active learning , 2014, 2014 36th Annual International Conference of the IEEE Engineering in Medicine and Biology Society.
[18] Abdulmotaleb El-Saddik,et al. ECG Authentication for Mobile Devices , 2016, IEEE Transactions on Instrumentation and Measurement.
[19] Nir Friedman,et al. Bayesian Network Classifiers , 1997, Machine Learning.
[20] Dongsong Zhang,et al. Continuous User Authentication on Touch-Screen Mobile Phones: Toward More Secure and Usable M-Commerce , 2016, WEB.
[21] Nikolaos Pitropakis,et al. A taxonomy and survey of attacks against machine learning , 2019, Comput. Sci. Rev..
[22] Michael R. Lyu,et al. Towards Continuous and Passive Authentication via Touch Biometrics: An Experimental Study on Smartphones , 2014, SOUPS.
[23] Florian Alt,et al. Improving Accuracy, Applicability and Usability of Keystroke Biometrics on Mobile Touchscreen Devices , 2015, CHI.
[24] Ondrej Krejcar,et al. Pattern Password Authentication Based on Touching Location , 2015, IDEAL.
[25] Xin Su,et al. User biometric information‐based secure method for smart devices , 2018, Concurr. Comput. Pract. Exp..
[26] Nasir D. Memon,et al. DRAW-A-PIN: Authentication using finger-drawn PIN on touch devices , 2017, Comput. Secur..
[27] Marco Gruteser,et al. Capacitive Touch Communication: A Technique to Input Data through Devices' Touch Screen , 2014, IEEE Transactions on Mobile Computing.
[28] Christophe Rosenberger,et al. Biometric secret path for mobile user authentication: A preliminary study , 2013, 2013 World Congress on Computer and Information Technology (WCCIT).
[29] Roger Wattenhofer,et al. A personal touch: recognizing users based on touch screen behavior , 2012, PhoneSense '12.
[30] Simon Fong,et al. Accelerated Particle Swarm Optimization and Support Vector Machine for Business Optimization and Applications , 2011, NDT.
[31] Duncan S. Wong,et al. Touch Gestures Based Biometric Authentication Scheme for Touchscreen Mobile Phones , 2012, Inscrypt.
[32] Ioannis A. Kakadiaris,et al. Mobile User Authentication Using Statistical Touch Dynamics Images , 2014, IEEE Transactions on Information Forensics and Security.
[33] Feng Hao,et al. Stealing PINs via mobile sensors: actual risk versus user perception , 2016, International Journal of Information Security.
[34] Alex X. Liu,et al. Secure unlocking of mobile touch screen devices by simple gestures: you can see it but you can not do it , 2013, MobiCom.
[35] Bernhard Schölkopf,et al. A tutorial on support vector regression , 2004, Stat. Comput..
[36] Mahesh Pal,et al. Random forest classifier for remote sensing classification , 2005 .
[37] Eamonn J. Keogh,et al. Derivative Dynamic Time Warping , 2001, SDM.
[38] Erhan Guven,et al. A Survey of Data Mining and Machine Learning Methods for Cyber Security Intrusion Detection , 2016, IEEE Communications Surveys & Tutorials.
[39] Xiaojiang Chen,et al. Cracking Android Pattern Lock in Five Attempts , 2017, NDSS.
[40] Klaus H. Hinrichs,et al. An implicit author verification system for text messages based on gesture typing biometrics , 2014, CHI.
[41] Yuexuan An,et al. 孪生支持向量机综述 (Twin Support Vector Machine: A Review) , 2018, 计算机科学.
[42] Xiang-Yang Li,et al. SilentSense: silent user identification via touch and movement behavioral biometrics , 2013, MobiCom.
[43] Robert P. Sheridan,et al. Random Forest: A Classification and Regression Tool for Compound Classification and QSAR Modeling , 2003, J. Chem. Inf. Comput. Sci..
[44] Vivek Kanhangad,et al. Exploring orientation and accelerometer sensor data for personal authentication in smartphones using touchscreen gestures , 2015, Pattern Recognit. Lett..
[45] Victor Cheung,et al. Typhlex: Exploring Deformable Input for Blind Users Controlling a Mobile Screen Reader , 2017, IEEE Pervasive Computing.
[46] Riccardo Poli,et al. Particle swarm optimization , 1995, Swarm Intelligence.
[47] Tsai-Hua Kang,et al. Random graphic user password authentication scheme in mobile devices , 2017, 2017 International Conference on Applied System Innovation (ICASI).
[48] Rama Chellappa,et al. Face-based Active Authentication on mobile devices , 2015, 2015 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP).
[49] Abeer Alsadoon,et al. Designing Touch-Based Hybrid Authentication Method for Smartphones , 2015 .
[50] E.F. El-Saadany,et al. Disturbance classification utilizing dynamic time warping classifier , 2004, IEEE Transactions on Power Delivery.
[51] Md. Zakirul Alam Bhuiyan,et al. A Survey on Deep Learning in Big Data , 2017, 22017 IEEE International Conference on Computational Science and Engineering (CSE) and IEEE International Conference on Embedded and Ubiquitous Computing (EUC).
[52] Deron Liang,et al. A New Non-Intrusive Authentication Method Based on the Orientation Sensor for Smartphone Users , 2012, 2012 IEEE Sixth International Conference on Software Security and Reliability.
[53] Do Van Thanh,et al. Strengthening Mobile Network Security Using Machine Learning , 2016, MobiWIS.
[54] Nasir D. Memon,et al. An HMM-based behavior modeling approach for continuous mobile authentication , 2014, 2014 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP).
[55] Leif E. Peterson. K-nearest neighbor , 2009, Scholarpedia.
[56] Dong Xu,et al. A multimodal deep architecture for large-scale protein ubiquitylation site prediction , 2017, 2017 IEEE International Conference on Bioinformatics and Biomedicine (BIBM).
[57] Jay F. Nunamaker,et al. A Comparison of Classification Methods for Predicting Deception in Computer-Mediated Communication , 2004, J. Manag. Inf. Syst..
[58] Zhen Ling,et al. FingerAuth: 3D magnetic finger motion pattern based implicit authentication for mobile devices , 2020, Future Gener. Comput. Syst..
[59] Gilberto Berardinelli,et al. Achieving Ultra-Reliable Low-Latency Communications: Challenges and Envisioned System Enhancements , 2018, IEEE Network.
[60] Orcan Alpar. Intelligent biometric pattern password authentication systems for touchscreens , 2015, Expert Syst. Appl..
[61] Dawn Xiaodong Song,et al. Touchalytics: On the Applicability of Touchscreen Input as a Behavioral Biometric for Continuous Authentication , 2012, IEEE Transactions on Information Forensics and Security.
[62] Heinrich Hußmann,et al. Touch me once and i know it's you!: implicit authentication based on touch screen patterns , 2012, CHI.
[63] Heekuck Oh,et al. Neural Networks for Pattern Recognition , 1993, Adv. Comput..
[64] Marti A. Hearst. Trends & Controversies: Support Vector Machines , 1998, IEEE Intell. Syst..
[65] Yajin Zhou,et al. Hey, You, Get Off of My Market: Detecting Malicious Apps in Official and Alternative Android Markets , 2012, NDSS.
[66] Simone Sacchi,et al. Definitions of dataset in the scientific and technical literature , 2010, ASIST.
[67] Hongyuan Zha,et al. LatentGesture: active user authentication through background touch analysis , 2014, Chinese CHI '14.
[68] Yuji Watanabe,et al. Influence of Holding Smart Phone for Acceleration-Based Gait Authentication , 2014, 2014 Fifth International Conference on Emerging Security Technologies.
[69] MemonNasir,et al. DRAW-A-PIN , 2017 .
[70] Rama Chellappa,et al. Facial attributes for active authentication on mobile devices , 2017, Image Vis. Comput..
[71] Tao Feng,et al. Continuous mobile authentication using touchscreen gestures , 2012, 2012 IEEE Conference on Technologies for Homeland Security (HST).
[72] Qing Yang,et al. HMOG: New Behavioral Biometric Features for Continuous Authentication of Smartphone Users , 2015, IEEE Transactions on Information Forensics and Security.
[73] Vir V. Phoha,et al. Which verifiers work?: A benchmark evaluation of touch-based authentication algorithms , 2013, 2013 IEEE Sixth International Conference on Biometrics: Theory, Applications and Systems (BTAS).
[74] Xiaobo Zhang,et al. Short-term electric load forecasting based on singular spectrum analysis and support vector machine optimized by Cuckoo search algorithm , 2017 .
[75] Tao Feng,et al. TIPS: context-aware implicit user identification using touch screen in uncontrolled environments , 2014, HotMobile.
[76] Minglu Li,et al. Sensing Human-Screen Interaction for Energy-Efficient Frame Rate Adaptation on Smartphones , 2015, IEEE Transactions on Mobile Computing.
[77] Andreas Christmann,et al. Support vector machines , 2008, Data Mining and Knowledge Discovery Handbook.
[78] Michele Risi,et al. Visual Mobile Computing for Mobile End-Users , 2016, IEEE Transactions on Mobile Computing.
[79] Jonathan Loo,et al. Continuous authentication of smartphone users based on activity pattern recognition using passive mobile sensing , 2018, J. Netw. Comput. Appl..
[80] Debi Prosad Dogra,et al. A bio-signal based framework to secure mobile devices , 2017, J. Netw. Comput. Appl..
[81] Yu Wang,et al. TouchWB: Touch behavioral user authentication based on web browsing on smartphones , 2018, J. Netw. Comput. Appl..
[82] Bhiksha Raj,et al. A Survey: Time Travel in Deep Learning Space: An Introduction to Deep Learning Models and How Deep Learning Models Evolved from the Initial Ideas , 2015, ArXiv.
[83] Jaroslaw Sobieszczanski-Sobieski,et al. Particle swarm optimization , 2002 .
[84] Nathan Clarke,et al. Behaviour profiling for transparent authentication for mobile devices , 2011, ECIW 2011 2011.
[85] Usman Naeem,et al. The 8 th International Conference on Emerging Ubiquitous Systems and Pervasive Networks ( EUSPN 2017 ) Identifying Smartphone Users based on their Activity Patterns via Mobile Sensing , 2017 .
[86] Margit Antal,et al. Biometric Authentication Based on Touchscreen Swipe Patterns , 2016 .
[87] Yi Liang,et al. Deep Learning Based Inference of Private Information Using Embedded Sensors in Smart Devices , 2018, IEEE Network.
[88] Rui Zhang,et al. Your song your way: Rhythm-based two-factor authentication for multi-touch mobile devices , 2015, 2015 IEEE Conference on Computer Communications (INFOCOM).
[89] Emmanouil Panaousis,et al. Unsupervised Learning for Trustworthy IoT , 2018, 2018 IEEE International Conference on Fuzzy Systems (FUZZ-IEEE).
[90] Rama Chellappa,et al. Active user authentication for smartphones: A challenge data set and benchmark results , 2016, 2016 IEEE 8th International Conference on Biometrics Theory, Applications and Systems (BTAS).
[91] Dongsong Zhang,et al. ExtendedThumb: A Target Acquisition Approach for One-Handed Interaction With Touch-Screen Mobile Phones , 2015, IEEE Transactions on Human-Machine Systems.
[92] Jianping Gou,et al. A new distance-weighted k-nearest neighbor classifier , 2012 .