Mao et al., 2022 - Google Patents
ACBM: attention-based CNN and Bi-LSTM model for continuous identity authenticationMao et al., 2022
View PDF- Document ID
- 370880718931592017
- Author
- Mao R
- Wang X
- Ji H
- Publication year
- Publication venue
- Journal of Physics: Conference Series
External Links
Snippet
With the evolution of network attack methods, implicit continuous identity authentication technology has attracted more and more attention. Among them, keystroke dynamics is widely used because it does not need the assistance of devices other than keyboards. In this …
- 230000001537 neural 0 abstract description 10
Classifications
-
- G—PHYSICS
- G10—MUSICAL INSTRUMENTS; ACOUSTICS
- G10L—SPEECH ANALYSIS OR SYNTHESIS; SPEECH RECOGNITION; SPEECH OR VOICE PROCESSING; SPEECH OR AUDIO CODING OR DECODING
- G10L15/00—Speech recognition
- G10L15/06—Creation of reference templates; Training of speech recognition systems, e.g. adaptation to the characteristics of the speaker's voice
- G10L15/065—Adaptation
- G10L15/07—Adaptation to the speaker
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06K—RECOGNITION OF DATA; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
- G06K9/00—Methods or arrangements for reading or recognising printed or written characters or for recognising patterns, e.g. fingerprints
- G06K9/62—Methods or arrangements for recognition using electronic means
- G06K9/68—Methods or arrangements for recognition using electronic means using sequential comparisons of the image signals with a plurality of references in which the sequence of the image signals or the references is relevant, e.g. addressable memory
- G06K9/6807—Dividing the references in groups prior to recognition, the recognition taking place in steps; Selecting relevant dictionaries
- G06K9/6842—Dividing the references in groups prior to recognition, the recognition taking place in steps; Selecting relevant dictionaries according to the linguistic properties, e.g. English, German
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06K—RECOGNITION OF DATA; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
- G06K9/00—Methods or arrangements for reading or recognising printed or written characters or for recognising patterns, e.g. fingerprints
- G06K9/62—Methods or arrangements for recognition using electronic means
- G06K9/6267—Classification techniques
- G06K9/6268—Classification techniques relating to the classification paradigm, e.g. parametric or non-parametric approaches
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| Xiaofeng et al. | Continuous authentication by free-text keystroke based on CNN plus RNN | |
| Raul et al. | A comprehensive review of keystroke dynamics-based authentication mechanism | |
| Xu et al. | A hierarchical intrusion detection model combining multiple deep learning models with attention mechanism | |
| Karnan et al. | Biometric personal authentication using keystroke dynamics: A review | |
| Ali et al. | Keystroke biometric user verification using Hidden Markov Model | |
| US8843754B2 (en) | Continuous user identification and situation analysis with identification of anonymous users through behaviormetrics | |
| Wu et al. | Cost-effective kernel ridge regression implementation for keystroke-based active authentication system | |
| Fereidooni et al. | Authentisense: A scalable behavioral biometrics authentication scheme using few-shot learning for mobile platforms | |
| CN113691542A (en) | Web attack detection method based on HTTP request text and related equipment | |
| Tsimperidis et al. | R 2 BN: An adaptive model for keystroke-dynamics-based educational level classification | |
| CN110430183A (en) | The MH-LSTM method for detecting abnormality of dialogue-based characteristic similarity | |
| Ho et al. | One-class naïve Bayes with duration feature ranking for accurate user authentication using keystroke dynamics | |
| Tsai et al. | Keyword-based approach for recognizing fraudulent messages by keystroke dynamics | |
| Wang et al. | User authentication method based on MKL for keystroke and mouse behavioral feature fusion | |
| Raouf et al. | Revolutionizing user authentication exploiting explainable AI and CTGAN-based keystroke dynamics | |
| Kochegurova et al. | Aspects of continuous user identification based on free texts and hidden monitoring | |
| Mao et al. | ACBM: attention-based CNN and Bi-LSTM model for continuous identity authentication | |
| Budžys et al. | Behavioral biometrics authentication in critical infrastructure using siamese neural networks | |
| Deng et al. | Keystroke dynamics user authentication using advanced machine learning methods | |
| Udandarao et al. | On the inference of soft biometrics from typing patterns collected in a multi-device environment | |
| Jesmithaa et al. | Detecting phishing attacks using Convolutional Neural Network and LSTM | |
| Maheshwary et al. | Mining keystroke timing pattern for user authentication | |
| Mhenni et al. | Keystroke dynamics classification based on lstm and blstm models | |
| Pardeshi et al. | Applying gini importance and RFE methods for feature selection in shallow learning models for implementing effective intrusion detection system | |
| Sahu et al. | A novel non-linear transformation based multi user identification algorithm for fixed text keystroke behavioral dynamics |