博碩士論文 102522113 詳細資訊




以作者查詢圖書館館藏 以作者查詢臺灣博碩士 以作者查詢全國書目 勘誤回報 、線上人數:138 、訪客IP:3.138.124.40
姓名 陳懿婷(Yi-Ting Chen)  查詢紙本館藏   畢業系所 資訊工程學系
論文名稱 基於非侵入式手機使用者識別機制即時檢測使用者操作行為收集其建模資料的方法
(Using Active Learning to Collect User’s Behavior for Training Model. Base on Non-intrusive Smartphone Authentication)
相關論文
★ 基於最大期望算法之分析陶瓷基板機器暗裂破片率★ 基於時間序列預測的機器良率預測
★ 基於OpenPose特徵的行人分心偵測★ 建構深度學習CNN模型以正確分類傳統AOI模型之偵測結果
★ 一種結合循序向後選擇法與回歸樹分析的瑕疵肇因關鍵因子擷取方法與系統-以紡織製程為例★ 融合生成對抗網路及領域知識的分層式影像擴增
★ 針織布異常偵測方法研究★ 基於工廠生產資料的異常機器維修預測
★ 萃取駕駛人在不同環境之駕駛行為方法★ 基於刮痕瑕疵資料擴增的分割拼接影像生成
★ 應用卷積神經網路於航攝影像做基於坵塊的水稻判釋之研究★ 採迴歸樹進行規則探勘以有效同時降低多種紡織瑕疵
★ 應用增量式學習於多種農作物判釋之研究★ 應用自動化測試於異質環境機器學習管道之 MLOps 系統
★ 農業影像二元分類:坵塊分離的檢測★ 應用遷移學習於胚布瑕疵檢測
檔案 [Endnote RIS 格式]    [Bibtex 格式]    [相關文章]   [文章引用]   [完整記錄]   [館藏目錄]   [檢視]  [下載]
  1. 本電子論文使用權限為同意立即開放。
  2. 已達開放權限電子全文僅授權使用者為學術研究之目的,進行個人非營利性質之檢索、閱讀、列印。
  3. 請遵守中華民國著作權法之相關規定,切勿任意重製、散佈、改作、轉貼、播送,以免觸法。

摘要(中) 隨著科技進步,智慧型手機可以經由網路連結,達到收發電子信箱、線上交易(網路銀行、電子商務)、社群軟體等功能,無形中使智慧型手機內部資料成為有心人士覬覦的目標。
目前智慧型手機識別機制有侵入式與非侵入式兩種。傳統的驗證機制(密碼鎖、圖形鎖)屬於侵入式識別機制(一次驗證)。非侵入式識別機制則不需要驗證介面,而是從背景收集使用者行為進行驗證。
目前文獻上已有提出非侵入式識別機制數種研究,但皆未考慮訓練樣本選擇與數目,在實際應用上若不考慮此點將耗費使用者許多時間在提供訓練樣本上。
本研究提出即時檢測收集方法利用主動學習搭配支持向量機選擇訓練樣本,在識別效果接受範圍內以少量的訓練樣本建構非侵入式識別機制。
首先本研究提出兩階段資料收集方法,第一階段偵測個人所需的行為樣本情境,第二階段則針對第一階段所分析出的情境加以收集訓練樣本並建模。最後將本論文提出的即時檢測收集方法與批次性方法比較,實驗結果則有一半以上使用者能透過本方法在識別效果不受影響下大幅減少訓練樣本。
摘要(英) In order to protect the data within the smartphone, intrusive and non-intrusive user authentication mechanisms were developed. Traditional authentication mechanisms like number lock and pattern lock are intrusive user authentication mechanism. Non-intrusive user authentication mechanism doesn’t require any user interface, but collect user’s behavior in the background and authenticate it.
Several non-intrusive authentication mechanisms were proposed, but all of them don’t care about the selection of training samples. Actually user to provide the training samples can be very time-consuming.
This study proposes a method to collect real-time detection with the use of active learning support vector machine choose training samples to identify the effect of the acceptable range in a small amount of training samples construction of non-invasive identification mechanism.
First, for this study, we propose two stages collection methodology of behavior.
The first stage of the collection is to detect which behavior scenario need.
The second stage of the collection is to for the first phase of the analysis of the situation and to collect training data modeling.
Finally, this study presents a method to collect real-time detection (active learning) compared with batch learning, results are more than half of users to significantly reduce the training sample to achieve a good recognition results through this method.
關鍵字(中) ★ 非侵入式識別機制
★ 使用者識別
★ 主動學習
★ 支持向量機
關鍵字(英) ★ non-intrusive authentication mechanism
★ user authentication
★ active learning
★ support vector machine
論文目次 中文摘要 i
Abstract ii
一、緒論 1
1.1. 研究背景 1
1.2. 研究動機 4
1.3. 研究目的 4
1.4. 論文架構 4
二、文獻探討 5
2.1. 重新驗證機制(Re-Authentication) 5
2.2. 使用者驗證系統 6
2.2.1. Dynamics-based 6
2.2.2. Histogram-based 7
2.3. 主動學習(Active Learning) 8
三、研究方法 12
3.1. 階段性收集 13
3.2. 訓練模型 14
3.3. 模型分析-找出最佳樣本情境 14
3.4. 判定停止收集方式 15
四、實驗流程與結果分析 16
4.1. 資料收集環境 16
4.2. 本研究方法與批次性實驗差異 19
4.3. 本研究方法實驗結果與分析 22
4.3.1. 實驗一結果與分析 22
4.3.2. 實驗二結果與分析 23
五、結論與未來展望 28
5.1. 結論 28
5.2. 未來展望 30
參考文獻 31
附錄一 33
附錄二 34

參考文獻 [1] I. M. google. (2013). Our Mobile Planet. Available: http://think.withgoogle.com/mobileplanet/zh-tw/
[2] Gartner. (2014). Gartner Says Worldwide Traditional PC, Tablet, Ultramobile and Mobile Phone Shipments to Grow 4.2 Percent in 2014. Available: http://www.gartner.com/newsroom/id/2791017
[3] What do you use your smartphone for? Available: http://www.mobilefun.co.uk/blog/2012/07/what-do-you-use-your-smartphone-for/
[4] (2015). Consumers and Mobile Financial Services. Available: http://www.federalreserve.gov/econresdata/consumers-and-mobile-financial-services-report-201503.pdf
[5] J. J. Yan, A. F. Blackwell, R. J. Anderson, and A. Grant, "Password Memorability and Security: Empirical Results," IEEE Security & privacy, vol. 2, pp. 25-31, 2004.
[6] D. Weinshall and S. Kirkpatrick, "Passwords you′ll never forget, but can′t recall," in CHI′04 extended abstracts on Human factors in computing systems, 2004, pp. 1399-1402.
[7] C.-C. Lin, D. Liang, and C.-C. Chang, "A new non-intrusive authentication method based on the orientation sensor for smartphone users," in 2012 IEEE 6th International Conference on Software Security and Reliability (SERE), 2012, pp.3270-3274
[8] 許振揚, "非侵入式多模組之手機使用者識別機制:基於動態方法," 國立中央大學, 碩士論文, 2012.
[9] C.-C. Lin, D. Liang, and C.-C. Chang, "A Novel Non-intrusive User Authentication Method Based on Touchscreen of Smartphones," to appear in Journal of Internet Technology, vol. 16, p. 1-10, 2015.
[10] 周彥竹, "整體學習之非侵入式手機使用者識別機制," 國立中央大學, 碩士論文, 2014.
[11] M. Pusara and C. E. Brodley, "User re-authentication via mouse movements," in Proceedings of the 2004 ACM workshop on Visualization and data mining for computer security, 2004, pp. 1-8.
[12] C.-C. Lin, D. Liang, and C.-C. Chang, "A Preliminary Study on Non-Intrusive User Authentication Method Using Smartphone Sensors," Applied Mechanics and Materials, vols 284-287, pp. 3270-3274, 2013.

[13] A. A. E. Ahmed and I. Traore, "A new biometric technology based on mouse dynamics," Dependable and Secure Computing, IEEE Transactions on, vol. 4, pp. 165-179, 2007.
[14] C.-C. Lin, C.-C. Chang, and D. Liang, "A Novel Non-intrusive User Authentication Method Based on Touchscreen of Smartphones," in Biometrics and Security Technologies (ISBAST), 2013 International Symposium on, 2013, pp. 212-216.
[15] Settles, B., 2009, “Active learning literature survey”, Computer Sciences Technical Report 1648, University of Wisconsin-Madison.
[16] Angluin, D., 1988, “Queries and concept learning”, Machine Learning, pp.319-342.
[17] Cohn, D., Atlas, L., Ladner, R., 1994, “Improving generalization with active learning”, Machine Learning, pp.201-221.
[18] Lewis, D., Catlett., 994, “Heterogeneous uncertainty sampling for supervised learning”, Machine Learning: Proceedings of the Eleventh International Conference, Morgan Kaufmann Publishers, San Francisco, CA, pp. 148–156.
[19] Tong S, Koller D. Support vector machine active learning with applications to text classification [C] //Proc of ICMI 2000. San Francisco: Morgan Kaufmann, 2000: 999-1066.
[20] Seung, H. S., Opper, M., Sompolinsky, H., 1992, “Query by committee”,
COLT ′92 Proceedings of the fifth annual workshop on Computational
learning, pp.287-294.
[21] Martin, A. F. et al., "The DET Curve in Assessment of Detection Task Performance", Proc. Eurospeech ′97, Rhodes, Greece, September 1997, Vol. 4, pp. 1899–1903.
[22] C.-C. C. a. C.-J. Lin. LIBSVM -- A Library for Support Vector Machines. Available: http://www.csie.ntu.edu.tw/~cjlin/libsvm/
[23] M. Böhmer, B. Hecht, J. Schöning, A. Krüger, and G. Bauer, "Falling asleep with Angry Birds, Facebook and Kindle: a large scale study on mobile application usage," in Proceedings of the 13th International Conference on Human Computer Interaction with Mobile Devices and Services, 2011, pp. 47-56.
指導教授 梁德容 審核日期 2015-7-21
推文 facebook   plurk   twitter   funp   google   live   udn   HD   myshare   reddit   netvibes   friend   youpush   delicious   baidu   
網路書籤 Google bookmarks   del.icio.us   hemidemi   myshare   

若有論文相關問題,請聯絡國立中央大學圖書館推廣服務組 TEL:(03)422-7151轉57407,或E-mail聯絡  - 隱私權政策聲明