Reconstruction Attacks Against Mobile-Based Continuous Authentication Systems in the Cloud.

IEEE Transactions on Information Forensics and Security(2016)

Cited 72|Views20
No score
Abstract
Continuous authentication for mobile devices using behavioral biometrics is being suggested to complement initial authentication for securing mobile devices, and the cloud services accessed through them. This area has been studied over the past few years, and low error rates were achieved; however, it was based on training and testing using support vector machine (SVM) and other non-privacy-preser...
More
Translated text
Key words
Authentication,Image reconstruction,Support vector machines,Mobile handsets,Testing,Algorithm design and analysis,Biometrics (access control)
AI Read Science
Must-Reading Tree
Example
Generate MRT to find the research sequence of this paper
Chat Paper
Summary is being generated by the instructions you defined