Zobrazeno 1 - 10
of 22
pro vyhledávání: '"Hidehito Gomi"'
Publikováno v:
網際網路技術學刊. 22:1169-1181
We propose an effective classification algorithm for machine learning to achieve higher performance for multi-modal behavioral authentication systems. Our algorithm uses a multiclass classification scheme that has a smaller number of classes than the
Publikováno v:
Proceedings of the Twentieth ACM Conference on Embedded Networked Sensor Systems.
Publikováno v:
Lecture Notes in Computer Science ISBN: 9783031106835
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::5be5da8711772de5ae011188815bbd8c
https://doi.org/10.1007/978-3-031-10684-2_5
https://doi.org/10.1007/978-3-031-10684-2_5
Publikováno v:
2021 IEEE 21st International Conference on Software Quality, Reliability and Security Companion (QRS-C).
Autor:
Shuji Yamaguchi, Hidehito Gomi, Mhd Irvan, Ryosuke Kobayashi, Rie Shigetomi Yamaguchi, Tran Phuong Thao
Publikováno v:
AsiaJCIS
We propose an effective classification algorithm for machine learning to achieve higher performance for multi-modal behavioral authentication systems. Our algorithm uses a multiclass classification scheme that has a smaller number of classes than the
Publikováno v:
PerCom
People often turn off location logging when the batteries of their smartphones get low, to reduce the phone’s power consumption and prolong its operation. Here, we propose an innovative data sharing scheme called as the Parasitic Location Logging (
Autor:
Hidehito Gomi, Wataru Oogami
Publikováno v:
IEICE ESS Fundamentals Review. 12:115-125
Autor:
Hidehito Gomi
Publikováno v:
The Journal of The Institute of Image Information and Television Engineers. 70:481-484
Publikováno v:
UbiComp/ISWC Adjunct
Sensing our daily activities is essential for ubiquitous computing. Although smartphones and wearable devices can easily collect their owner's data, continuous sensing causes battery drain and consumes CPU power of those devices. This paper proposes
Publikováno v:
TrustCom/BigDataSE
This paper poses the question, "Is it possible to identify users with just a set of Web activity logs?" The answer is yes: we can provide a continuous authentication system that does not require explicit actions by the users while monitoring their in