博碩士論文 105522601 詳細資訊




以作者查詢圖書館館藏 以作者查詢臺灣博碩士 以作者查詢全國書目 勘誤回報 、線上人數:25 、訪客IP:18.118.195.162
姓名 尤岱亞(Dyah Ayu Marhaeningtyas Galuh Wisnu)  查詢紙本館藏   畢業系所 資訊工程學系
論文名稱 基於領域適應性之非侵入式手機使用者識別機制針對無固定操作習慣之使用者
(Implicit Behavioral Authentication for Unstable Smartphones User based on Domain Adaptation)
相關論文
★ 應用卷積神經網路於航攝影像做基於坵塊的水稻判釋之研究★ 採迴歸樹進行規則探勘以有效同時降低多種紡織瑕疵
★ 導體滲鍍瑕疵; 利用同欣電子提供之少量樣本資料獲得生產線中最關鍵工作站★ 一種新的基於高斯混合模型之行為塑模方法用於智慧型手錶之駕駛者識別
★ 基於高斯混合模型之行為塑模方法應用於智慧型手錶之開放集駕駛者身分識別研究★ 使用WGAN-GP合成基於智慧手錶的現實安全與不安全的駕駛行為
★ 基於領域適應及Empirical Kernel Map處理行為改變的智慧型手機非侵入式身份識別系統
檔案 [Endnote RIS 格式]    [Bibtex 格式]    [相關文章]   [文章引用]   [完整記錄]   [館藏目錄]   [檢視]  [下載]
  1. 本電子論文使用權限為同意立即開放。
  2. 已達開放權限電子全文僅授權使用者為學術研究之目的,進行個人非營利性質之檢索、閱讀、列印。
  3. 請遵守中華民國著作權法之相關規定,切勿任意重製、散佈、改作、轉貼、播送,以免觸法。

摘要(中) 近年來,智慧型手機被世界上大多數人廣泛使用, 因此考慮智慧型手機的資訊安全已經成為不可或缺的一環, 一些非侵入式方法包括批量學習、主動學習法、和再訓練在對應使用著上已經有著些有趣的結果, 在一些特別的情況下,像是使用者沒有固定的使用習慣,我們發現根據使用者的新行為來更新模型的再訓練方法可以有效的處理這些資料, 然而,當處理較大的資料集時,則是需要相當高的計算成本跟較長的訓練時間, 另一方面,轉移學習方法的一部份即所謂的領域適應性可以有著相似的效能,但有著更高的效率, 我們對無固定操作習慣之使用者提供了基於領域適應性之非侵入式手機使用者識別機制, 此方法是將目標數據從從目標域映射到原始域,因此我們可以將原始模型應用於目標數據, 實驗結果表示,跟基本方法相比,我們所提出的方法準確性更高,訓練和測試的時間也更快, 根據我們提出的方法能有效且滿足使用者行為的任何條件。
摘要(英) In recent years, the smartphone is widely used by most people in the world. Thus, the smartphone security has become a necessity since smartphones have increased in popularity. Several implicit authentication approaches include batch learning, active learning, and retraining have shown interesting results to map the behavior of the user, especially unstable user. In the particular case for resolving unstable user, we found that retraining approaches which aim to retrain the classifier based on the new behavior of users showed the good ability to handle the data. Moreover, it requires high computational cost and takes a long training time if dealing with larger dataset. On the other hand, one of the parts of the transfer learning approach which is so-called domain adaptation may share a similar ability with better efficiency. This work presents implicit behavioral authentication for unstable smartphone user based on domain adaptation. The idea of this approach is to map the target data from the target domain to the original domain thus we can apply the original model to the target data. The experimental result shows that the proposed method is better in term of EER compared to the basic approach and faster in term of training time than the retraining approach. However, the effectiveness yet satisfactory performances are letting this approach capable of handling any condition of user behavior data.
關鍵字(中) ★ 隱式認證
★ 用戶認證
★ 轉移學習
★ 域適應
★ support vector machine
關鍵字(英) ★ implicit authentication
★ user authentication
★ transfer learning
★ domain adaptation
★ support vector machine
論文目次 摘要 i
ABSTRACT ii
Acknowledgment iii
TABLE OF CONTENTS iv
LIST OF FIGURES vi
LIST OF TABLES viii
CHAPTER 1 INTRODUCTION 1
1.1. Background 1
1.2. Motivation 3
1.3. Research Objective 4
1.4. Limitations of the Study 4
1.5. Thesis Structure 5
CHAPTER 2 LITERATURE REVIEW 6
2.1. Authentication 6
2.2. Support Vector Machine 9
2.2.1. Online Support Vector Machine 10
2.3. Retraining Strategy 11
2.4. Transfer Learning 11
2.4.1. Domain Adaptation 14
CHAPTER 3 RESEARCH METHOD 16
3.1. Experimental Method 16
3.2. Data Collection 22
3.2.1. Touch Feature Set 22
CHAPTER 4 EXPERIMENTAL PROCESS AND RESULT ANALYSIS 25
4.1. Experiment Setup 25
4.2. Experiment Result 26
4.2.1. EER Comparison 26
4.2.2. Training Time Comparison 31
CHAPTER 5 CONCLUSION 36
5.1. Conclusion 36
5.2. Future Works 37
BIBLIOGRAPHY 38
參考文獻 [1] M. Tolentino, “iPhone Users Prefer Convenience Over Security?: Here’s Three Ways to Get Smart on Safety - SiliconANGLE,” 2013. [Online]. Available: https://siliconangle.com/blog/2013/04/18/iphone-users-prefer-convenience-over-security-heres-3-ways-to-get-smart-on-safety/. [Accessed: 25-Jun-2018].
[2] O. Mazhelis, J. Markkula, and J. Veijalainen, “An integrated identity verification system for mobile terminals,” Inf. Manag. Comput. Secur., vol. 13, pp. 367–378, 2005.
[3] McAfee, “More Than 30% of People Don’t Password Protect Their Mobile Devices | McAfee Blogs,” 2013. [Online]. Available: https://securingtomorrow.mcafee.com/consumer/identity-protection/unprotected-mobile-devices/. [Accessed: 04-Jul-2018].
[4] C. C. Lin, C. C. Chang, D. Liang, and C. H. Yang, “A new non-intrusive authentication method based on the orientation sensor for smartphone users,” Proc. 2012 IEEE 6th Int. Conf. Softw. Secur. Reliab. SERE 2012, pp. 245–252, 2012.
[5] C. C. Lin, C. C. Chang, and D. Liang, “A new non-intrusive authentication approach for data protection based on mouse dynamics,” Proc. - 2012 Int. Symp. Biometrics Secur. Technol. ISBAST 2012, pp. 9–14, 2012.
[6] C. C. Lin, C. C. Chang, and D. Liang, “A novel non-intrusive user authentication method based on touchscreen of smartphones,” Proc. - 2013 Int. Symp. Biometrics Secur. Technol. ISBAST 2013, pp. 212–216, 2013.
[7] C. Lin, C. Chang, and D. Liang, “Nonintrusive Authentication of Smartphone Users by Using Behavioral Biometrics Based on the Orientation Sensor and Touchscreen.”
[8] S. Ben-David and J. Blitzer, “Analysis of representations for domain adaptation,” Adv. Neural Inf. Process. Syst., vol. 19, pp. 137–144, 2007.
[9] S. J. Pan, I. W. Tsang, J. T. Kwok, and Q. Yang, “Domain adaptation via transfer component analysis,” IEEE Trans. Neural Networks, vol. 22, no. 2, pp. 199–210, 2011.
[10] L. Lamport, “Password authentication with insecure communication,” Commun. ACM, vol. 24, no. 11, pp. 770–772, 1981.
[11] N. Harini and T. R. Padmanabhan, “2CAuth: A new two factor authentication scheme using QR-code,” Int. J. Eng. Technol., vol. 5, no. 2, pp. 1087–1094, 2013.
[12] D. Dasgupta, A. Roy, and A. Nag, “Toward the design of adaptive selection strategies for multi-factor authentication,” Comput. Secur., vol. 63, no. September 2017, pp. 85–116, 2016.
[13] J. Bonneau, C. Herley, P. C. van Oorschot, and F. Stajano, “Passwords and the evolution of imperfect authentication,” Commun. ACM, vol. 58, no. 7, pp. 78–87, 2015.
[14] R. Amin, T. Gaber, G. Eltaweel, and A. E. Hassanien, “Bio-inspiring Cyber Security and Cloud Services: Trends and Innovations,” vol. 70, no. February, 2014.
[15] M. Pusara and C. E. Brodley, “User re-authentication via mouse movements,” Proc. 2004 ACM Work. Vis. data Min. Comput. Secur. - VizSEC/DMSEC ’04, p. 1, 2004.
[16] C. Cortes and V. Vapnik, “Support-Vector Networks,” Mach. Learn., vol. 20, no. 3, pp. 273–297, 1995.
[17] T. Joachims et al., “Introduction to Support Vector Machines,” Svm, pp. 1–15, 2002.
[18] X. Zhou, X. Zhang, and B. Wang, Online Support Vector Machine: A Survey. 2016.
[19] T. Kudo and Y. Matsumoto, “Chunking with Support Vector Machines,” Second Meet. North Am. Chapter Assoc. Comput. Linguist. Lang. Technol. 2001 - NAACL ’01, vol. 816, pp. 1–8, 2001.
[20] F. Cai and V. Cherkassky, “Generalized SMO Algorithm for SVM-Based which is the subject of this brief, falls into the last cate- Multitask Learning,” IEEE Trans. Neural Networks, vol. 23, no. 5, pp. 821–827, 2012.
[21] P.-H. Chen, R.-E. Fan, and C.-J. Lin, “A study on SMO-type decomposition methods for support vector machines.,” IEEE Trans. Neural Netw., vol. 17, no. 4, pp. 893–908, 2006.
[22] S. K. Shevade, S. S. Keerthi, C. Bhattacharyya, and K. R. K. Murthy, “Improvements to the SMO algorithm for SVM regression,” IEEE Trans. Neural Networks, vol. 11, no. 5, pp. 1188–1193, 2000.
[23] A. Bordes, L. Bottou, and P. Gallinari, “SGD-QN: Careful Quasi-Newton Stochastic Gradient Descent,” J. Mach. Learn. Res., vol. 10, pp. 1737–1754, 2009.
[24] R. Singh, M. Vatsa, A. Ross, and A. Noore, “Biometric Classifier Update using Online Learning?: A Case Study in Near Infrared Face Verification,” Science (80-. )., no. January 2010, pp. 1–21, 2010.
[25] S. A. Putri, D. Liang, and C. Chang, “Nonintrusive Behavioral Biometric Authentication on Smartphones: An Online Learning Approach,” 2017.
[26] J. Blitzer, R. McDonald, and F. Pereira, “Domain adaptation with structural correspondence learning,” Proc. 2006 Conf. Empir. Methods Nat. Lang. Process. - EMNLP ’06, p. 120, 2006.
[27] F. Zhuang, X. Cheng, P. Luo, S. J. Pan, and Q. He, “Supervised Representation Learning?: Transfer Learning with Deep Autoencoders,” Ijcai, no. Ijcai, pp. 4119–4125, 2015.
[28] M. Mahmud, “Universal Transfer Learning,” pp. 135–149, 2008.
[29] Qiang Yang, “a Survey on Transfer Learning,” vol. 1, no. 10, pp. 1–15, 2010.
[30] I. K. Putri, S. H. Pramono, Rahmadwati, C. Chang, and D. Liang, “Optimized Active Learning to Collect User’s Behavior for Training Model Based on Non-intrusive Smartphone Authentication,” 2016.
指導教授 梁德容 張欽圳(Deron Liang Chin-Chun Chang) 審核日期 2018-7-26
推文 facebook   plurk   twitter   funp   google   live   udn   HD   myshare   reddit   netvibes   friend   youpush   delicious   baidu   
網路書籤 Google bookmarks   del.icio.us   hemidemi   myshare   

若有論文相關問題,請聯絡國立中央大學圖書館推廣服務組 TEL:(03)422-7151轉57407,或E-mail聯絡  - 隱私權政策聲明