Journal ArticleDOI
Behavioral Biometrics for Continuous Authentication in the Internet-of-Things Era: An Artificial Intelligence Perspective
Reads0
Chats0
TLDR
The nature of CA in IoT applications is outlined, the key behavioral signals are highlighted, the extant solutions from an AI perspective are summarized, and the challenges and promising future directions to guide the next generation of AI-based CA research are discussed.Abstract:
In the Internet-of-Things (IoT) era, user authentication is essential to ensure the security of connected devices and the customization of passive services However, conventional knowledge-based and physiological biometric-based authentication systems (eg, password, face recognition, and fingerprints) are susceptible to shoulder surfing attacks, smudge attacks, and heat attacks The powerful sensing capabilities of IoT devices, including smartphones, wearables, robots, and autonomous vehicles enable continuous authentication (CA) based on behavioral biometrics The artificial intelligence (AI) approaches hold significant promise in sifting through large volumes of heterogeneous biometrics data to offer unprecedented user authentication and user identification capabilities In this survey article, we outline the nature of CA in IoT applications, highlight the key behavioral signals, and summarize the extant solutions from an AI perspective Based on our systematic and comprehensive analysis, we discuss the challenges and promising future directions to guide the next generation of AI-based CA researchread more
Citations
More filters
Journal ArticleDOI
DAKOTA: Sensor and Touch Screen-Based Continuous Authentication on a Mobile Banking Application
Ozlem Durmaz Incel,Secil Gunay,Yasemin Akan,Yunus Barlas,Okan Engin Basar,Gülfem Isiklar Alptekin,Mustafa Isbilen +6 more
TL;DR: In this paper, the authors investigated whether it is possible to continuously authenticate users via behavioral biometrics with a certain performance on a mobile banking application, and they developed a continuous authentication scheme, named DAKOTA, on top of this application.
Journal ArticleDOI
Trailblazing the Artificial Intelligence for Cybersecurity Discipline: A Multi-Disciplinary Research Roadmap
TL;DR: An overview of prevailing cybersecurity data, a multi-disciplinary AI for Cybersecurity roadmap that centers on major themes such as cybersecurity applications and data, advanced AI methodologies for cybersecurity, and AI-enabled decision making are offered.
Journal ArticleDOI
HIAuth: A Hierarchical Implicit Authentication System for IoT Wearables Using Multiple Biometrics
TL;DR: In this paper, a hierarchical implicit authentication (HIAuth) system was proposed for wearables that utilizes the heart rate, gait, and breathing audio signals based on their availability to authenticate a user.
Journal ArticleDOI
Nutrition and Functional Foods for Healthy Aging
TL;DR: Most popular website for free eBooks.com, you have the option to browse by most popular titles, recent reviews, authors, titles, genres, languages and more.
Journal ArticleDOI
Exploring touch-based behavioral authentication on smartphone email applications in IoT-enabled smart cities
TL;DR: Zhang et al. as mentioned in this paper performed a study to investigate users' touch behavior within Email applications on smartphones, with Email being one of the most important and widely used means in connecting with others.
References
More filters
Journal ArticleDOI
Generative Adversarial Nets
Ian Goodfellow,Jean Pouget-Abadie,Mehdi Mirza,Bing Xu,David Warde-Farley,Sherjil Ozair,Aaron Courville,Yoshua Bengio +7 more
TL;DR: A new framework for estimating generative models via an adversarial process, in which two models are simultaneously train: a generative model G that captures the data distribution and a discriminative model D that estimates the probability that a sample came from the training data rather than G.
Journal ArticleDOI
A Survey on Transfer Learning
Sinno Jialin Pan,Qiang Yang +1 more
TL;DR: The relationship between transfer learning and other related machine learning techniques such as domain adaptation, multitask learning and sample selection bias, as well as covariate shift are discussed.
Proceedings ArticleDOI
ShuffleNet: An Extremely Efficient Convolutional Neural Network for Mobile Devices
TL;DR: ShuffleNet as discussed by the authors utilizes two new operations, pointwise group convolution and channel shuffle, to greatly reduce computation cost while maintaining accuracy, and achieves an actual speedup over AlexNet while maintaining comparable accuracy.
Proceedings Article
Learning both weights and connections for efficient neural networks
TL;DR: In this paper, the authors proposed a method to reduce the storage and computation required by neural networks by an order of magnitude without affecting their accuracy by learning only the important connections using a three-step method.
Posted Content
On the difficulty of training Recurrent Neural Networks
TL;DR: This paper proposes a gradient norm clipping strategy to deal with exploding gradients and a soft constraint for the vanishing gradients problem and validates empirically the hypothesis and proposed solutions.