Your search

In authors or contributors
  • Adult content on the Internet may be accessed by children with only a few keystrokes. While separate child-safe accounts may be established, a better approach could be incorporating automatic age estimation capability into the browser. We envision a safer browsing experience by implementing child-safe browsers combined with Internet content rating similar to the film industry. Before such a browser is created it was necessary to test the age estimation module to see whether acceptable error rates are possible. We created an Android application for collecting biometric touch data, specifically tapping data. We arranged with an elementary school, a middle school, a high school, and a university and collected samples from 262 user sessions (ages 5 to 61). From the tapping data, feature vectors were constructed, which were used to train and test 14 regressors and classifiers. Results for regression show the best mean absolute errors of 3.451 and 3.027 years, respectively, for phones and tablets. Results for classification show the best accuracies of 73.63% and 82.28%, respectively, for phones and tablets. These results demonstrate that age estimation, and hence, a child-safe browser, is feasible, and is a worthwhile objective. © 2020 IEEE.

  • The Internet contains large amounts of adult content. With only a few taps, or mis-taps, an under-aged user can be exposed to age-inappropriate content. Currently, this can be avoided by creating age-restricted profiles or restricting users to child-friendly applications (apps). However, these existing measures are time-consuming, laborious, and require a higher level of technical literacy than many parents can afford. We believe a better solution is to use a browser or an app that automatically detects the user's age then applies any appropriate content filters. For such a browser/app to be developed, we must learn that age estimation can indeed be performed with an acceptable rate of error. To that end, we created an Android app that collects biometric touchscreen data from elementary school, middle school, high school, and university students. Touch samples were collected from participants aged 5 to 61 on both smartphones and tablets. We focused exclusively on zoom-in and zoom-out touchscreen data samples. We made this decision because we found the zoom gesture to be rich with data and highly used among the most popular applications. Furthermore, we identify a niche within the current research landscape: no other machine learning experiments have leveraged the benefits of the zoom gesture for age estimation. We collected a total of 41,911 zoom data samples. From each zoom sample, 90 features were extracted. Those features were then used to train and test on six regressors and six classifiers to build a method that can accurately estimate the user's age from their touchscreen behavior. The regressors performed with the best mean absolute errors (MAEs) of 2.27 and 2.54 years for smartphones and tablets, respectively. The classifiers performed with the best accuracies of 90% and 91% for smartphones and tablets, respectively. Given these results, it is our belief that not only is touch-based age estimation viable, but developing a child-safe browser or a parental control app with this underlying technology is a worthwhile endeavor. © 2022 Elsevier Ltd

  • E-commerce giants like Amazon rely on consumer reviews to allow buyers to inform other potential buyers about a product’s pros and cons. While these reviews can be useful, they are less so when the number of reviews is large; no consumer can be expected to read hundreds or thousands of reviews in order to gain better understanding about a product. In an effort to provide an aggregate representation of reviews, Amazon offers an average user rating represented by a 1- to 5-star score. This score only represents how reviewers feel about a product without providing insight into why they feel that way. In this work, we propose an AI technique that generates an easy-to-read, concise summary of a product based on its reviews. It provides an overview of the different aspects reviewers emphasize in their reviews and, crucially, how they feel about those aspects. Our methodology generates a list of the topics most-mentioned by reviewers, conveys reviewer sentiment for each topic and calculates an overall summary score that reflects reviewers’ overall sentiment about the product. These sentiment scores adapt the same 1- to 5-star scoring scale in order to remain familiar to Amazon users. © 2022, The Author(s), under exclusive licence to Springer Science+Business Media, LLC, part of Springer Nature.

  • The internet has changed the way that many people access written works. Books and articles, of various lengths, in several formats can be bought and accessed online, both legally and illegally. Texts in even shorter form are originating through forums, SMS, blogs, emails, and social media. Automating the process of determining the authorship of posted texts would help combat online piracy of copyrighted text and plagiarism. In addition, authorship identification could help detect fraudulent email messages from dangerous sources and combat cyberattacks by identifying authentic sources. We experiment with several machine learning algorithms on a limited set of public domain literature to identify the most efficient method of authorship identification using the least amount of samples. Different sized data sets are created by 5 predefined rounds of random sampling of 1500 word blocks on a total of 28 text books from a corpus of 7 authors. Traditional methods of authorship identification, such as Naive Bayes, Artificial Neural Network, and Support Vector Machine are implemented in addition to using a modern Deep Learning Neural Network for classification. Thirteen stylometric features are extracted ranging from character based, word based, and syntactic features. Our model consistently showed that Support Vector Machine out performs other classification methods. © 2020

  • A multi-stage biometric verification system serially activates its verifiers and improves performance-cost trade-off by allowing users to submit a subset of the available biometrics. In the heart of a verifier in multi-stage systems lies the concept of ‘reject option’ where a reject region is used to identify a bad quality test sample. If the match-score falls inside the reject region, no binary (genuine/impostor) decision is made in the current stage and the verifier in the next stage is activated. Recent studies have demonstrated a significant promise of the ‘symmetric rejection method’ in choosing a suitable reject region for multi-stage verification systems. In this paper, we delve into the symmetric rejection method to gain more insights into its error reduction capabilities. Specifically, we develop a theory which mathematically proves that the symmetric rejection method reduces the false accept rate and false reject rate. Then, we empirically validate our theory. Results show that the symmetric rejection method significantly reduces the error rates, both the false accept rate and false reject rate. © 2022, The Author(s), under exclusive licence to Springer-Verlag London Ltd., part of Springer Nature.

  • Fingerprinting-based indoor positioning systems require a significant amount of time to set up due to the need for prior, offline signal map creation. We propose a mobile phone-based indoor positioning system that can be set up in a short amount of time in any environment with existing Wi-Fi infrastructure. We introduce interpolation into a fingerprinting-based system to reduce the number of reference points needed, leading to a reduction in signal map creation time. The proposed interpolation method is used in conjunction with a particle filter algorithm to provide an accuracy level comparable to the state-of-the-art. We created signal maps at three separate locations using a 100%, 50%, 20%, and 10% scan coverage in order to evaluate the effectiveness of our interpolation on the localization error on a lower scan percentage. We evaluated our signal maps before and after interpolation using 16 tests which included both motion and stationary tests, as well as tests taken 2 and 3 weeks after the initial data gathering. We show that our interpolation method is able to reduce the effects of a dimensional mismatch between signal map reference point vectors and a test sample vector, as well as reduce the effects of signal map aging. © 2023, The Author(s), under exclusive licence to Springer Science+Business Media, LLC, part of Springer Nature.

  • The cyber-behavioral biometric modalities such as keystroke dynamics, mouse dynamics, and touch screen dynamics have come under attacks of different forms in recent days. To address these attacks and other security issues, we present a novel concept of using smartwatch sensor data to continuously verify users in cyberspace and show its potential to be a new standalone cyber-behavioral biometric modality. For our experiments, smartwatch gyroscope and accelerometer data collected from 49 subjects while typing in desktop computer have been considered. We implemented six pattern matching classifiers to compare each verification attempt against the user profile. Experimental results comprising of 282, 240 classification attempts show significantly high True Positive (TP) rates and extremely low False Positive (FP) rates with the highest achieved TP rate of 87.2% and lowest FP rate of 0.2%. With this level of accuracy and natural resiliency to attacks comes with physical biometric property as such in hand movement, we opine that smartwatch movement dynamics, besides being a new biometric trait, can be a solution to the security loopholes in existing cyber-behavioral biometric modalities for continuous verification. © 2020 IEEE.

  • Traditional keyboards remain the input device of choice for typing-heavy environments. When attached to sensitive data, security is a major concern. To continuously authenticate users in these environments, use of keystroke dynamics can be a preferred choice. An integral part of user enrollment in a keystroke based continuous authentication system is the writing instruction (prompt) given to the users, to use as a basis for their improvised writing. There are many prompts possible, and they directly impact the performance of authentication systems. Hence, prompts should be designed carefully, and with purpose. In this paper, we bridge the gap between cognitive psychology and computer science and attempt to influence the mental state of the users to acquire a better authentication performance. We compare two kinds of writing prompts, creative and factual, for generating reference samples. In addition, we perform two robustness tests: robustness to dissimilar writing style (e.g., creative reference and factual test) and robustness to surface (e.g., hard surface reference and soft surface test). We collect data from thirty participants in four weekly sessions. We experiment with three features: key interval, key press, and key hold latencies. We use Relative (R) measure to generate the match score between the reference and test samples. Results show that creative writing consistently performs better than the factual one. Both writing prompts perform well with dissimilar style in testing, i.e., continuous authentication is found robust to writing style. Also, we find that the surface (hard or soft) used in testing need not match that used for the reference, thus continuous authentication is also surface robust. © 2020 IEEE.

Last update from database: 3/13/26, 4:15 PM (UTC)

Explore

Resource type

Resource language