A Machine Learning-Based User Authentication Model Using Mobile App Data
暂无分享,去创建一个
[1] Mehmet Fatih Amasyali,et al. Classifier Ensembles with the Extended Space Forest , 2014, IEEE Transactions on Knowledge and Data Engineering.
[2] Steven P. Weber,et al. Active Authentication on Mobile Devices via Stylometry, Application Usage, Web Browsing, and GPS Location , 2017, IEEE Systems Journal.
[3] Bruno Crispo,et al. Hold and Sign: A Novel Behavioral Biometrics for Smartphone User Authentication , 2016, 2016 IEEE Security and Privacy Workshops (SPW).
[4] Steven Furnell,et al. A Novel Behaviour Profiling Approach to Continuous Authentication for Mobile Applications , 2019, ICISSP.
[5] Eyal de Lara,et al. Ensemble: cooperative proximity-based authentication , 2010, MobiSys '10.
[6] Maria Papadaki,et al. Active authentication for mobile devices utilising behaviour profiling , 2014, International Journal of Information Security.
[7] Rama Chellappa,et al. Continuous Authentication of Smartphones Based on Application Usage , 2018, IEEE Transactions on Biometrics, Behavior, and Identity Science.
[8] Soumya Singh,et al. Advancement of recommender system based on clickstream data using gradient boosting and random forest classifiers , 2017, 2017 8th International Conference on Computing, Communication and Networking Technologies (ICCCNT).
[9] Longbing Cao,et al. Coupled K-Nearest Centroid Classification for Non-iid Data , 2014, Trans. Comput. Collect. Intell..
[10] Chi-Woong Mun,et al. Comparison of k-nearest neighbor, quadratic discriminant and linear discriminant analysis in classification of electromyogram signals based on the wrist-motion directions , 2011 .
[11] Qusay H. Mahmoud,et al. Design and Implementation of a Contextual-Based Continuous Authentication Framework for Smart Homes , 2019, Applied System Innovation.
[12] Nathan Clarke,et al. Behaviour profiling for transparent authentication for mobile devices , 2011, ECIW 2011 2011.
[13] Lei Yang,et al. Accurate online power estimation and automatic battery behavior based power model generation for smartphones , 2010, 2010 IEEE/ACM/IFIP International Conference on Hardware/Software Codesign and System Synthesis (CODES+ISSS).
[14] Tempestt J. Neal,et al. Using associative classification to authenticate mobile device users , 2017, 2017 IEEE International Joint Conference on Biometrics (IJCB).
[15] Qusay H. Mahmoud,et al. A Behavior Profiling Model for User Authentication in IoT Networks based on App Usage Patterns , 2018, IECON 2018 - 44th Annual Conference of the IEEE Industrial Electronics Society.
[16] Sattar Hashemi,et al. To Combat Multi-Class Imbalanced Problems by Means of Over-Sampling Techniques , 2016, IEEE Transactions on Knowledge and Data Engineering.
[17] Maria Papadaki,et al. Evaluation of anomaly-based IDS for mobile devices using machine learning classifiers , 2012, Secur. Commun. Networks.
[18] Qusay H. Mahmoud,et al. A User Authentication Model for IoT Networks Based on App Traffic Patterns , 2018, 2018 IEEE 9th Annual Information Technology, Electronics and Mobile Communication Conference (IEMCON).
[19] Markus Jakobsson,et al. Implicit Authentication through Learning User Behavior , 2010, ISC.
[20] Terry Windeatt,et al. Accuracy/Diversity and Ensemble MLP Classifier Design , 2006, IEEE Transactions on Neural Networks.
[21] Akebo Yamakami,et al. Compression-based spam filter , 2016, Secur. Commun. Networks.
[22] Yoshinobu Tamura,et al. OSS Project Stability Assessment Support Tool Considering EVM Based on Wiener Process Models , 2019, Applied System Innovation.
[23] Chelsea Dobbins,et al. Lesson Learned from Collecting Quantified Self Information via Mobile and Wearable Devices , 2015, J. Sens. Actuator Networks.