Android pattern lock is one of the most popular unlocking mechanisms on the Android platform. In order to enhance the security of Android's unlocking functionality, a number of researchers have tried to combine to...
详细信息
ISBN:
(纸本)9798350381993;9798350382006
Android pattern lock is one of the most popular unlocking mechanisms on the Android platform. In order to enhance the security of Android's unlocking functionality, a number of researchers have tried to combine touch biometrics with the pattern lock. Several studies have reported adequate-even excellent-authentication results, but, unlike fingerprintand face recognition-based authentication, no biometrics-enabled pattern lock exists in the Android marketplace. Furthermore, most studies of biometrics-enabled pattern locks were conducted in controlled lab environments. As such, in this work, our goal is to investigate and validate the performance of touch behavior-enabled Android pattern locks in a more practical scenario, in which users have to download the application and learn to use it by themselves (as was often the case during the pandemic). During the course of our investigation, we collected substantial data, namely, the properties provided by the Android API for motion events, as well as measurements that could be extracted from the devices' sensors. Our investigation found that touch-enabled Android pattern locks could achieve an average equal error ratio of 23.5% for user authentication-without changing the process from the user's perspective. Next, we modified the user experience such that each user would train the authenticator with different fingers, similar to fingerprint-based authentication. With this modification, an average equal error ratio of 13.5% was achieved.
The proceedings contain 63 papers. The topics discussed include: younger face recognition by learning perceptual flows;lightweight facial expression recognition based on multi-scale dense convolutional neural network;...
ISBN:
(纸本)9781450390439
The proceedings contain 63 papers. The topics discussed include: younger face recognition by learning perceptual flows;lightweight facial expression recognition based on multi-scale dense convolutional neural network;imperceptible adversarial attack with entropy feature and segmentation-based constraint;brain connectivity feature mining of post-encephalitis epilepsy;unsupervised de-redundancy and multi-step fusion for continuous Chinese sign language recognition;multi-level relational knowledge distillation for low resolution image recognition;and a survey of person re-identification based on deep learning.
Music, as a form of art characterized by its complexity and diversity, holds significant cultural and emotional value for humanity. Piano music, being a prominent representative, demands efficient and precise recognit...
详细信息
The occurrence of privacy breaches through screen peeping has highlighted the increasing importance of anti-peeping screen algorithms. In the traditional YOLOv7 algorithm, it may not accurately detect faces when indiv...
详细信息
This research paper presents a brief review of ten popular unsupervised algorithms widely utilized in patternrecognition publications. The algorithms are assessed based on their popularity, strengths, limitations, an...
详细信息
ISBN:
(纸本)9798350372977;9798350372984
This research paper presents a brief review of ten popular unsupervised algorithms widely utilized in patternrecognition publications. The algorithms are assessed based on their popularity, strengths, limitations, and resource requirements. Considering these factors, we propose two most-preferred algorithms suitable for adoption in IDS (Intrusion Detection Systems) to address the problems associated with Zero Day exploits or attacks. Our review of the surveyed algorithms facilitated the recommendation of specific algorithms that can enhance IDS capabilities in detecting and mitigating Zero-Day attacks and anomalous intrusion attempts. These algorithms leverage unsupervised learning techniques to overcome the limitations of traditional signature-based approaches. By incorporating these algorithms, IDS can better handle sophisticated and evolving attacks that often evade detection. In conclusion, this research provides valuable insights into the strengths, limitations, and resource requirements of popular unsupervised algorithms used in patternrecognition. It highlights the potential of adopting these algorithms in IDS systems to bolster their ability to detect and respond to Zero-Day attacks. By recommending the integration of these algorithms, we contribute to the development of intelligent IDS solutions that can adapt to dynamic threat landscapes.
Clustering is widely used technique to find hidden, meaningful patterns in the given dataset, called as clusters. It is grouping of data into groups of similar objects. The objective is that the objects within a group...
详细信息
patternrecognition is crucial across diverse domains, including retrieval of information, data mining, and bioinformatics. Numerous algorithms exist for string matching, and finite state machines (FSM) provide a robu...
详细信息
Conventional neuromorphic computing faces the foreseeable limit of computational and power resources that can be mitigated by using spintronic-based devices. In this digest, we propose a 4-bit (16-state) skyrmion-base...
详细信息
ISBN:
(纸本)9798350362213;9798350362220
Conventional neuromorphic computing faces the foreseeable limit of computational and power resources that can be mitigated by using spintronic-based devices. In this digest, we propose a 4-bit (16-state) skyrmion-based synaptic device for application in Convolutional Neural Network(CNN) consuming 0.971 fJ energy per weight update. Our proposed device offers compactness and scalability to higher bits. The skyrmionic synapse device is simulated using a micromagnetic simulation package(OOMMF) integrated with a software-based ReLU Max Pooled function to implement CNN for neuromorphic computing applications. We attained an accuracy of 98.15% for patternrecognition on the MNIST handwritten data set.
The growing need for accurate facial recognition in low-light conditions continues to challenge existing technological frameworks. This research investigates the integration of Local Binary patterns (LBP) with transfe...
详细信息
ISBN:
(纸本)9798350354744;9798350354737
The growing need for accurate facial recognition in low-light conditions continues to challenge existing technological frameworks. This research investigates the integration of Local Binary patterns (LBP) with transfer learning to enhance face recognition capabilities under sub-optimal lighting. By applying LBP as a preprocessing step, we utilize its robustness against lighting variations, which is crucial for environments such as poorly lit rooms. The study utilizes the Extended Yale B dataset. The dataset contains images of subjects under different and severe light conditions. Among the deep learning models tested, which include VGG16, ResNet50, DenseNet121, and InceptionV3, the VGG16 model demonstrated the best performance with validation accuracy of 98.37% and testing accuracy of 99.25%. This indicates significant potential for the integrated approach in practical applications.
We propose a visual-linguistic representation learning approach within a self-supervised learning framework by introducing a new operation, loss, and data augmentation strategy. First, we generate diverse features for...
详细信息
ISBN:
(纸本)9798350301298
We propose a visual-linguistic representation learning approach within a self-supervised learning framework by introducing a new operation, loss, and data augmentation strategy. First, we generate diverse features for the image-text matching (ITM) task via soft-masking the regions in an image, which are most relevant to a certain word in the corresponding caption, instead of completely removing them. Since our framework relies only on image-caption pairs with no fine-grained annotations, we identify the relevant regions to each word by computing the word-conditional visual attention using multi-modal encoder. Second, we encourage the model to focus more on hard but diverse examples by proposing a focal loss for the image-text contrastive learning (ITC) objective, which alleviates the inherent limitations of overfitting and bias issues. Last, we perform multi-modal data augmentations for self-supervised learning via mining various examples by masking texts and rendering distortions on images. We show that the combination of these three innovations is effective for learning a pretrained model, leading to outstanding performance on multiple vision-language downstream tasks.
暂无评论