Access the full text.
Sign up today, get DeepDyve free for 14 days.
Huangang Wang, Lin Zhang, Yingchao Xiao, Wenli Xu (2012)
An Approach to Choosing Gaussian Kernel Parameter for One-Class SVMs via Tightness Detecting2012 4th International Conference on Intelligent Human-Machine Systems and Cybernetics, 2
Chih-Chung Chang, Chih-Jen Lin (2011)
LIBSVM: A library for support vector machinesACM Trans. Intell. Syst. Technol., 2
Chih-Wei Hsu, Chih-Chung Chang, Chih-Jen Lin (2008)
A Practical Guide to Support Vector Classication
F. Friedrichs, C. Igel (2005)
Evolutionary tuning of multiple SVM parameters
Enzhe Yu, Sungzoon Cho (2003)
Novelty Detection Approach for Keystroke Dynamics Identity Verification
B. Scholkopf, John Platt, J. Shawe-Taylor, Alex Smola, R. Williamson (2001)
Estimating the Support of a High-Dimensional DistributionNeural Computation, 13
Yingchao Xiao, Huangang Wang, Lin Zhang, Wenli Xu (2014)
Two methods of selecting Gaussian kernel parameters for one-class SVM and their application to fault detectionKnowl. Based Syst., 59
Pin Teh, A. Teoh, Shigang Yue (2013)
A Survey of Keystroke Dynamics BiometricsThe Scientific World Journal, 2013
F. Monrose, A. Rubin (2000)
Keystroke dynamics as a biometric for authenticationFuture Gener. Comput. Syst., 16
J. Robinson, Vicky Liang, J. Chambers, C. MacKenzie (1998)
Computer user verification using login string keystroke dynamicsIEEE Trans. Syst. Man Cybern. Part A, 28
Chuan Chang, T. Eude, L. Carbajal (2016)
Biometric Authentication by Keystroke Dynamics for Remote Evaluation with One-Class Classification
P. Pisani, Ana Lorena (2013)
A systematic review on keystroke dynamicsJournal of the Brazilian Computer Society, 19
Jinghua Li, Congying Zhang, Zhenning Li (2009)
Battlefield Target Identification Based on Improved Grid-Search SVM Classifier2009 International Conference on Computational Intelligence and Software Engineering
(2018)
One-class SVM for biometric authentication by keystroke dynamics for remote evaluation
Yingpeng Sang, Hong Shen, P. Fan (2004)
Novel Impostors Detection in Keystroke Dynamics by Support Vector Machine
R. Joyce, G. Gupta (1990)
Identity authentication based on keystroke latenciesCommunications of the ACM, 33
M. Karnan, M. Akila, N. Krishnaraj (2011)
Biometric personal authentication using keystroke dynamics: A reviewAppl. Soft Comput., 11
Salil Banerjee, D. Woodard (2012)
Biometric Authentication and Identification using Keystroke Dynamics: A Survey, 7
S. Bleha, C. Slivinsky, B. Hussien (1990)
Computer-Access Security Systems Using Keystroke DynamicsIEEE Trans. Pattern Anal. Mach. Intell., 12
Y Sang, H Shen, P Fan (2005)
In: Parallel and Distributed Computing: Applications and Technologies
Remote skills assessment in distance education needs individual identification in distinguishing between candidates and impostors. Keystroke dynamics is a behavioral biometrics which can be used to identify them. To expect lower error rate, behaviors should be as natural and consistent as possible. The unique identifier assigned to students at their registration seems appropriate but the classification method applied for this case of anomaly detection must be robust even with a lower signature number. In this paper, we first explain how we construct our own dataset. Three methods of selecting Gaussian kernel parameters for one‐class support vector machine are subsequently studied regarding the targeted application constraints. The results show that an indirect method as distance to farthest neighbor cannot be used because some signature features have multimodal and dispersed distributions. A method is then proposed based on the selection of the parameters via detecting the "tightness" of the decision boundaries and uses a greedy search. Its performances are compared to those of a grid search method using LibSVM. The results show that the proposed method is more robust when the signatures number decreases and better and more stable in detecting impostors.
Computational Intelligence – Wiley
Published: Jan 1, 2018
Keywords: ; ; ; ;
Read and print from thousands of top scholarly journals.
Already have an account? Log in
Bookmark this article. You can see your Bookmarks on your DeepDyve Library.
To save an article, log in first, or sign up for a DeepDyve account if you don’t already have one.
Copy and paste the desired citation format or use the link below to download a file formatted for EndNote
Access the full text.
Sign up today, get DeepDyve free for 14 days.
All DeepDyve websites use cookies to improve your online experience. They were placed on your computer when you launched this website. You can change your cookie settings through your browser.