The rapid advancement of network technology has led to a surge in network security concerns. Detecting various intrusion behaviors promptly and precisely has become a critical issue that demands urgent attention in ne...
详细信息
This paper addresses the important need for security measures in the transmission of medical images to ensure the confidentiality of sensitive patient information. Leveraging a synergistic combination of advanced cryp...
详细信息
This study examines the prediction of diseases through the analysis of 1,200 symptom narratives across 24 different diseases. Employing Huggingface39;s 39;bert-base-cased39; transformer model, renowned for its a...
详细信息
Email spam has become a significant contemporary issue, mainly propelled by the rapid expansion of internet users. Correspondingly, the incidence of email spam is on the rise. These unsolicited communications serve as...
详细信息
The Unified Payment Interface (UPI) has revolutionized digital payments in India, providing a convenient and secure way for individuals to transfer funds. However, the increasing popularity of UPI has also attracted m...
详细信息
Federated learning enables collaboration among parties without the need for external data sharing, achieving knowledge sharing without data sharing. However, existing federated learning algorithms still encounter issu...
详细信息
In recent years, there has been a rapid growth in the utilization of electricity generated from renewable energy sources. Solar energy stands out as a promising solution to the need for a sustainable and easily access...
详细信息
With the acceleration of globalization, cross-language information processing technology is getting more and more attention. Among them, cross-lingual text sentiment analysis, as an important branch in the field of se...
详细信息
With the vigorous growth of big data technology and intelligent interaction technology, e-commerce has become a widely concerned focus of the public. In the field of e-commerce, how to accurately predict shopping beha...
详细信息
Due to keystroke dynamics39;s reliability and efficiency, it has been widely used in multi-factor authentication schemes by enterprises for robust user authentication, hence enhancing online service security. Theref...
详细信息
ISBN:
(纸本)9798350372977;9798350372984
Due to keystroke dynamics's reliability and efficiency, it has been widely used in multi-factor authentication schemes by enterprises for robust user authentication, hence enhancing online service security. Therefore, in this paper, we propose a novel methodology designed not only to enhance user authentication but also to detect imposter users who are trying to get unauthorized access. Our methodology uses transfer learning and conditional tabular generative adversarial networks (CTGAN)-based keystroke dynamics, and consists of a four-step process;mitigating outliers that hinder the model's performance through utilizing quantile transformation (QT), employing data augmentation through CTGAN, converting CSV data into 3D images, and concatenating features from three accurate transfer learning models (VGG16, ResNet50, and DenseNet121) followed by dense layers to detecting imposter users accurately and hence making precise decisions to enhance the user authentication process. We conducted extensive experiments to evaluate our methodology using the Carnegie Mellon University (CMU) keystroke dynamics benchmark dataset that contains real typing patterns, and the results demonstrate superior security performance and robustness using our methodology by achieving an accuracy of 99.99% and equal error rate (EER) of 1%, thereby, outperforming the state-of-the-art.
暂无评论