4.5 Article

Continuous authentication through gait analysis on a wrist-worn device

Related references

Note: Only part of the references are listed.
Article Computer Science, Information Systems

A Usable and Robust Continuous Authentication Framework Using Wearables

Abbas Acar et al.

Summary: Continuous authentication, such as Wearable-Assisted Continuous Authentication (WACA), improves the reliability of user identity verification throughout a session, overcoming limitations of conventional one-time login systems. WACA utilizes sensor-based keystroke dynamics to transparently and periodically compare authentication data with the initial user profile, ensuring the current user is the same as the initially logged-in user. Empirical evaluation shows WACA's feasibility, low error rate, minimal computational overhead, and high accuracy in identifying insider threats and resisting powerful adversaries. The usability and efficiency of WACA propose potentially transformative implications in the authentication field.

IEEE TRANSACTIONS ON MOBILE COMPUTING (2021)

Article Computer Science, Information Systems

Gait-Watch: A Gait-based context-aware authentication system for smart watch via sparse coding

Weitao Xu et al.

AD HOC NETWORKS (2020)

Article Engineering, Biomedical

Method based on UWB for user identification during gait periods

Alessio Vecchio et al.

HEALTHCARE TECHNOLOGY LETTERS (2019)

Article Computer Science, Information Systems

Smartphone and Smartwatch-Based Biometrics Using Activities of Daily Living

Gary M. Weiss et al.

IEEE ACCESS (2019)

Article Computer Science, Information Systems

You Walk, We Authenticate: Lightweight Seamless Authentication Based on Gait in Wearable IoT Systems

Pratik Musale et al.

IEEE ACCESS (2019)

Article Computer Science, Hardware & Architecture

Continuous authentication of smartphone users based on activity pattern recognition using passive mobile sensing

Muhammad Ehatisham-ul-Haq et al.

JOURNAL OF NETWORK AND COMPUTER APPLICATIONS (2018)

Review Computer Science, Artificial Intelligence

There and back again: Outlier detection between statistical reasoning and data mining algorithms

Arthur Zimek et al.

WILEY INTERDISCIPLINARY REVIEWS-DATA MINING AND KNOWLEDGE DISCOVERY (2018)

Article Computer Science, Information Systems

Evaluation of user authentication methods in the gadget-free world

Kimmo Halunen et al.

PERVASIVE AND MOBILE COMPUTING (2017)

Article Computer Science, Information Systems

User Verification Leveraging Gait Recognition for Smartphone Enabled Mobile Healthcare Systems

Yanzhi Ren et al.

IEEE TRANSACTIONS ON MOBILE COMPUTING (2015)

Review Chemistry, Analytical

Inertial Sensor-Based Gait Recognition: A Review

Sebastijan Sprager et al.

SENSORS (2015)

Article Computer Science, Artificial Intelligence

The largest inertial sensor-based gait database and performance evaluation of gait-based personal authentication

Thanh Trung Ngo et al.

PATTERN RECOGNITION (2014)

Article Computer Science, Artificial Intelligence

A review of biometric technology along with trends and prospects

J. A. Unar et al.

PATTERN RECOGNITION (2014)

Article Computer Science, Artificial Intelligence

Improving the performance of fall detection systems through walk recognition

Guglielmo Cola et al.

JOURNAL OF AMBIENT INTELLIGENCE AND HUMANIZED COMPUTING (2014)

Proceedings Paper Engineering, Biomedical

Anti-Cheating: Detecting Self-Inflicted and Impersonator Cheaters for Remote Health Monitoring Systems with Wearable Sensors

Nabil Alshurafa et al.

2014 11TH INTERNATIONAL CONFERENCE ON WEARABLE AND IMPLANTABLE BODY SENSOR NETWORKS (BSN) (2014)

Proceedings Paper Computer Science, Artificial Intelligence

Context-Aware Active Authentication Using Smartphone Accelerometer Measurements

Abena Primo et al.

2014 IEEE CONFERENCE ON COMPUTER VISION AND PATTERN RECOGNITION WORKSHOPS (CVPRW) (2014)

Review Engineering, Biomedical

A review of wearable sensors and systems with application in rehabilitation

Shyamal Patel et al.

JOURNAL OF NEUROENGINEERING AND REHABILITATION (2012)

Article Computer Science, Information Systems

Isolation-Based Anomaly Detection

Fei Tony Liu et al.

ACM TRANSACTIONS ON KNOWLEDGE DISCOVERY FROM DATA (2012)

Article Computer Science, Artificial Intelligence

LIBSVM: A Library for Support Vector Machines

Chih-Chung Chang et al.

ACM TRANSACTIONS ON INTELLIGENT SYSTEMS AND TECHNOLOGY (2011)

Article Computer Science, Theory & Methods

Anomaly detection

Varun Chandola et al.

ACM COMPUTING SURVEYS (2009)

Article Engineering, Electrical & Electronic

Accelerometer-based gait recognition via voting by signature points

G. Pan et al.

ELECTRONICS LETTERS (2009)

Article Computer Science, Artificial Intelligence

An introduction to ROC analysis

Tom Fawcett

PATTERN RECOGNITION LETTERS (2006)

Article Biophysics

Estimation of gait cycle characteristics by trunk accelerometry

R Moe-Nilssen et al.

JOURNAL OF BIOMECHANICS (2004)

Article Computer Science, Artificial Intelligence

Benchmarking attribute selection techniques for discrete class data mining

MA Hall et al.

IEEE TRANSACTIONS ON KNOWLEDGE AND DATA ENGINEERING (2003)

Article Computer Science, Hardware & Architecture

Distance-based outliers: algorithms and applications

EM Knorr et al.

VLDB JOURNAL (2000)