Publications
Detailed Information
A hybrid novelty score and its use in keystroke dynamics-based user authentication
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Kang, Pilsung | - |
dc.contributor.author | Cho, Sungzoon | - |
dc.date.accessioned | 2012-03-05T02:31:56Z | - |
dc.date.available | 2012-03-05T02:31:56Z | - |
dc.date.issued | 2009-11-01 | - |
dc.identifier.citation | PATTERN RECOGNITION; Vol.42 11; 3115-3127 | - |
dc.identifier.issn | 0031-3203 | - |
dc.identifier.uri | https://hdl.handle.net/10371/75357 | - |
dc.description.abstract | The purpose of novelty detection is to detect (novel) patterns that are not generated by the identical distribution of the normal class. A distance-based novelty detector classifies a new data pattern as "novel" if its distance from "normal" patterns is large. It is intuitive, easy to implement, and fits naturally With incremental learning. Its performance is limited, however, because it relies only on distance. In this paper, we propose considering topological relations as well. We compare our proposed method with 13 other novelty detectors based on 21 benchmark data sets from two sources. We then apply our method to a real-world application in which incremental learning is necessary: keystroke dynamics-based user authentication. The experimental results are promising. Not only does our method improve the performance of distance-based novelty detectors, but it also outperforms the other non-distance-based algorithms. Our method also allows efficient model updates. (C) 2009 Elsevier Ltd. All rights reserved. | - |
dc.language.iso | en | - |
dc.publisher | ELSEVIER SCI LTD | - |
dc.subject | Novelty detection | - |
dc.subject | Incremental learning | - |
dc.subject | Keystroke dynamics-based user authentication | - |
dc.subject | Nearest-neighbor learning | - |
dc.subject | Topological relation | - |
dc.title | A hybrid novelty score and its use in keystroke dynamics-based user authentication | - |
dc.type | Article | - |
dc.contributor.AlternativeAuthor | 강필성 | - |
dc.contributor.AlternativeAuthor | 조성준 | - |
dc.identifier.doi | 10.1016/j.patcog.2009.04.009 | - |
dc.citation.journaltitle | PATTERN RECOGNITION | - |
dc.description.citedreference | Juszczak P, 2009, NEUROCOMPUTING, V72, P1859, DOI 10.1016/j.neucom.2008.05.003 | - |
dc.description.citedreference | Kang P, 2008, PATTERN RECOGN, V41, P3507, DOI 10.1016/j.patcog.2008.04.009 | - |
dc.description.citedreference | Kang P, 2008, COMPUT SECUR, V27, P3, DOI 10.1016/j.cose.2008.02.001 | - |
dc.description.citedreference | Lee HJ, 2008, ARTIF INTELL MED, V42, P199, DOI 10.1016/j.artmed.2007.11.001 | - |
dc.description.citedreference | Lee HJ, 2007, COMPUT SECUR, V26, P300, DOI 10.1016/j.cose.2006.11.006 | - |
dc.description.citedreference | Harmeling S, 2006, NEUROCOMPUTING, V69, P1608, DOI 10.1016/j.neucom.2005.05.015 | - |
dc.description.citedreference | Cherry GA, 2006, IEEE T SEMICONDUCT M, V19, P159, DOI 10.1109/TSM.2006.873524 | - |
dc.description.citedreference | Nanni L, 2006, NEUROCOMPUTING, V69, P869, DOI 10.1016/j.neucom.2005.06.007 | - |
dc.description.citedreference | Yu EZ, 2006, EXPERT SYST APPL, V30, P352, DOI 10.1016/j.eswa.2005.07.026 | - |
dc.description.citedreference | BOUTSINAS B, 2006, PATTERN RECOGN, V16, P143, DOI 10.1134/S1054661806020015 | - |
dc.description.citedreference | Clarke NL, 2005, COMPUT SECUR, V24, P519, DOI 10.1016/j.cose.2005.08.003 | - |
dc.description.citedreference | Barreto GA, 2005, IEEE T NEURAL NETWOR, V16, P1064, DOI 10.1109/TNN.2005.853416 | - |
dc.description.citedreference | Araujo LCF, 2005, IEEE T SIGNAL PROCES, V53, P851, DOI 10.1109/TSP.2004.839903 | - |
dc.description.citedreference | Angiulli F, 2005, IEEE T KNOWL DATA EN, V17, P203, DOI 10.1109/TKDE.2005.31 | - |
dc.description.citedreference | SARMIENTO T, 2005, P 2005 IEEE SEMI ADV, P139 | - |
dc.description.citedreference | FURNELL S, 2005, COMPUT FRAUD SEC AUG, P9 | - |
dc.description.citedreference | Yan J, 2004, IEEE SECUR PRIV, V2, P25, DOI 10.1109/MSP.2004.81 | - |
dc.description.citedreference | Peacock A, 2004, IEEE SECUR PRIV, V2, P40, DOI 10.1109/MSP.2004.89 | - |
dc.description.citedreference | PRABHAKAR S, 2003, IEEE SECUR PRIV, V1, P33, DOI 10.1109/MSECP.2003.1193209 | - |
dc.description.citedreference | JOLLIFFE I, 2003, PRINCIPLE COMPONENT | - |
dc.description.citedreference | Yegnanarayana B, 2002, NEURAL NETWORKS, V15, P459, DOI 10.1016/S0893-6080(02)00019-9 | - |
dc.description.citedreference | MONROSE F, 2002, INT J INFORMATION SE, V1, P69, DOI 10.1007/s102070100006 | - |
dc.description.citedreference | Scholkopf B, 2001, NEURAL COMPUT, V13, P1443 | - |
dc.description.citedreference | Ratsch G, 2001, MACH LEARN, V42, P287 | - |
dc.description.citedreference | TAX D, 2001, THESIS DELFT U TECHN | - |
dc.description.citedreference | Pizzi NJ, 2001, ARTIF INTELL MED, V21, P263 | - |
dc.description.citedreference | Guha S, 2000, INFORM SYST, V25, P345 | - |
dc.description.citedreference | Knorr EM, 2000, VLDB J, V8, P237 | - |
dc.description.citedreference | Monrose F, 2000, FUTURE GENER COMP SY, V16, P351 | - |
dc.description.citedreference | MCLACHLAN G, 2000, FINITE MIXTURE MODEL | - |
dc.description.citedreference | DUDA RO, 2000, PATTERN CLASSIFICATI | - |
dc.description.citedreference | RAMASWAMY S, 2000, P INT C MAN DAT SIGM | - |
dc.description.citedreference | KARYPIS G, 1999, IEEE COMPUT, V32, P68, DOI DOI 10.1109/2.781637 | - |
dc.description.citedreference | JAIN AK, 1999, BIOMETRICS PERSONAL | - |
dc.description.citedreference | Scholkopf B, 1998, NEURAL COMPUT, V10, P1299 | - |
dc.description.citedreference | GUHA S, 1998, P ACM SIGMOD INT C M, P73 | - |
dc.description.citedreference | PLATT JC, 1998, ADV KERNEL METHODS S, P41 | - |
dc.description.citedreference | YPMA A, 1998, P INT C ART NEUR NET | - |
dc.description.citedreference | OSUNA E, 1997, P 1997 IEEE WORKSH N, P276 | - |
dc.description.citedreference | BURGE P, 1997, P AI APPR FRAUD DET, P9 | - |
dc.description.citedreference | POLEMI D, 1997, BIOMETRIC TECHNIQUES | - |
dc.description.citedreference | ZHANG T, 1996, P 1996 ACM SIGMOD IN, P103, DOI DOI 10.1145/235968.233324 | - |
dc.description.citedreference | BISHOP CM, 1995, NEURAL NETWORK PATTE | - |
dc.description.citedreference | BARNETT V, 1994, OUTLIERS STAT DATA | - |
dc.description.citedreference | VAPNIK VN, 1982, ESTIMATION DEPENDENC | - |
dc.description.citedreference | HAWKINS DM, 1980, IDENTIFICATION OUTLI | - |
dc.description.tc | 0 | - |
dc.identifier.wosid | 000268453800064 | - |
- Appears in Collections:
- Files in This Item:
- There are no files associated with this item.
Item View & Download Count
Items in S-Space are protected by copyright, with all rights reserved, unless otherwise indicated.