博碩士論文 105522601 完整後設資料紀錄

DC 欄位 語言
DC.contributor資訊工程學系zh_TW
DC.creator尤岱亞zh_TW
DC.creatorDyah Ayu Marhaeningtyas Galuh Wisnuen_US
dc.date.accessioned2018-7-26T07:39:07Z
dc.date.available2018-7-26T07:39:07Z
dc.date.issued2018
dc.identifier.urihttp://ir.lib.ncu.edu.tw:88/thesis/view_etd.asp?URN=105522601
dc.contributor.department資訊工程學系zh_TW
DC.description國立中央大學zh_TW
DC.descriptionNational Central Universityen_US
dc.description.abstract近年來,智慧型手機被世界上大多數人廣泛使用, 因此考慮智慧型手機的資訊安全已經成為不可或缺的一環, 一些非侵入式方法包括批量學習、主動學習法、和再訓練在對應使用著上已經有著些有趣的結果, 在一些特別的情況下,像是使用者沒有固定的使用習慣,我們發現根據使用者的新行為來更新模型的再訓練方法可以有效的處理這些資料, 然而,當處理較大的資料集時,則是需要相當高的計算成本跟較長的訓練時間, 另一方面,轉移學習方法的一部份即所謂的領域適應性可以有著相似的效能,但有著更高的效率, 我們對無固定操作習慣之使用者提供了基於領域適應性之非侵入式手機使用者識別機制, 此方法是將目標數據從從目標域映射到原始域,因此我們可以將原始模型應用於目標數據, 實驗結果表示,跟基本方法相比,我們所提出的方法準確性更高,訓練和測試的時間也更快, 根據我們提出的方法能有效且滿足使用者行為的任何條件。zh_TW
dc.description.abstractIn recent years, the smartphone is widely used by most people in the world. Thus, the smartphone security has become a necessity since smartphones have increased in popularity. Several implicit authentication approaches include batch learning, active learning, and retraining have shown interesting results to map the behavior of the user, especially unstable user. In the particular case for resolving unstable user, we found that retraining approaches which aim to retrain the classifier based on the new behavior of users showed the good ability to handle the data. Moreover, it requires high computational cost and takes a long training time if dealing with larger dataset. On the other hand, one of the parts of the transfer learning approach which is so-called domain adaptation may share a similar ability with better efficiency. This work presents implicit behavioral authentication for unstable smartphone user based on domain adaptation. The idea of this approach is to map the target data from the target domain to the original domain thus we can apply the original model to the target data. The experimental result shows that the proposed method is better in term of EER compared to the basic approach and faster in term of training time than the retraining approach. However, the effectiveness yet satisfactory performances are letting this approach capable of handling any condition of user behavior data.en_US
DC.subject隱式認證zh_TW
DC.subject用戶認證zh_TW
DC.subject轉移學習zh_TW
DC.subject域適應zh_TW
DC.subjectsupport vector machinezh_TW
DC.subjectimplicit authenticationen_US
DC.subjectuser authenticationen_US
DC.subjecttransfer learningen_US
DC.subjectdomain adaptationen_US
DC.subjectsupport vector machineen_US
DC.title基於領域適應性之非侵入式手機使用者識別機制針對無固定操作習慣之使用者zh_TW
dc.language.isozh-TWzh-TW
DC.titleImplicit Behavioral Authentication for Unstable Smartphones User based on Domain Adaptationen_US
DC.type博碩士論文zh_TW
DC.typethesisen_US
DC.publisherNational Central Universityen_US

若有論文相關問題,請聯絡國立中央大學圖書館推廣服務組 TEL:(03)422-7151轉57407,或E-mail聯絡  - 隱私權政策聲明