[go: up one dir, main page]

Mao et al., 2022 - Google Patents

ACBM: attention-based CNN and Bi-LSTM model for continuous identity authentication

Mao et al., 2022

View PDF
Document ID
370880718931592017
Author
Mao R
Wang X
Ji H
Publication year
Publication venue
Journal of Physics: Conference Series

External Links

Snippet

With the evolution of network attack methods, implicit continuous identity authentication technology has attracted more and more attention. Among them, keystroke dynamics is widely used because it does not need the assistance of devices other than keyboards. In this …
Continue reading at iopscience.iop.org (PDF) (other versions)

Classifications

    • GPHYSICS
    • G10MUSICAL INSTRUMENTS; ACOUSTICS
    • G10LSPEECH ANALYSIS OR SYNTHESIS; SPEECH RECOGNITION; SPEECH OR VOICE PROCESSING; SPEECH OR AUDIO CODING OR DECODING
    • G10L15/00Speech recognition
    • G10L15/06Creation of reference templates; Training of speech recognition systems, e.g. adaptation to the characteristics of the speaker's voice
    • G10L15/065Adaptation
    • G10L15/07Adaptation to the speaker
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06KRECOGNITION OF DATA; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
    • G06K9/00Methods or arrangements for reading or recognising printed or written characters or for recognising patterns, e.g. fingerprints
    • G06K9/62Methods or arrangements for recognition using electronic means
    • G06K9/68Methods or arrangements for recognition using electronic means using sequential comparisons of the image signals with a plurality of references in which the sequence of the image signals or the references is relevant, e.g. addressable memory
    • G06K9/6807Dividing the references in groups prior to recognition, the recognition taking place in steps; Selecting relevant dictionaries
    • G06K9/6842Dividing the references in groups prior to recognition, the recognition taking place in steps; Selecting relevant dictionaries according to the linguistic properties, e.g. English, German
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06KRECOGNITION OF DATA; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
    • G06K9/00Methods or arrangements for reading or recognising printed or written characters or for recognising patterns, e.g. fingerprints
    • G06K9/62Methods or arrangements for recognition using electronic means
    • G06K9/6267Classification techniques
    • G06K9/6268Classification techniques relating to the classification paradigm, e.g. parametric or non-parametric approaches

Similar Documents

Publication Publication Date Title
Xiaofeng et al. Continuous authentication by free-text keystroke based on CNN plus RNN
Raul et al. A comprehensive review of keystroke dynamics-based authentication mechanism
Xu et al. A hierarchical intrusion detection model combining multiple deep learning models with attention mechanism
Karnan et al. Biometric personal authentication using keystroke dynamics: A review
Ali et al. Keystroke biometric user verification using Hidden Markov Model
US8843754B2 (en) Continuous user identification and situation analysis with identification of anonymous users through behaviormetrics
Wu et al. Cost-effective kernel ridge regression implementation for keystroke-based active authentication system
Fereidooni et al. Authentisense: A scalable behavioral biometrics authentication scheme using few-shot learning for mobile platforms
CN113691542A (en) Web attack detection method based on HTTP request text and related equipment
Tsimperidis et al. R 2 BN: An adaptive model for keystroke-dynamics-based educational level classification
CN110430183A (en) The MH-LSTM method for detecting abnormality of dialogue-based characteristic similarity
Ho et al. One-class naïve Bayes with duration feature ranking for accurate user authentication using keystroke dynamics
Tsai et al. Keyword-based approach for recognizing fraudulent messages by keystroke dynamics
Wang et al. User authentication method based on MKL for keystroke and mouse behavioral feature fusion
Raouf et al. Revolutionizing user authentication exploiting explainable AI and CTGAN-based keystroke dynamics
Kochegurova et al. Aspects of continuous user identification based on free texts and hidden monitoring
Mao et al. ACBM: attention-based CNN and Bi-LSTM model for continuous identity authentication
Budžys et al. Behavioral biometrics authentication in critical infrastructure using siamese neural networks
Deng et al. Keystroke dynamics user authentication using advanced machine learning methods
Udandarao et al. On the inference of soft biometrics from typing patterns collected in a multi-device environment
Jesmithaa et al. Detecting phishing attacks using Convolutional Neural Network and LSTM
Maheshwary et al. Mining keystroke timing pattern for user authentication
Mhenni et al. Keystroke dynamics classification based on lstm and blstm models
Pardeshi et al. Applying gini importance and RFE methods for feature selection in shallow learning models for implementing effective intrusion detection system
Sahu et al. A novel non-linear transformation based multi user identification algorithm for fixed text keystroke behavioral dynamics