To augment or not to augment? Data augmentation in user identification
based on motion sensors
- URL: http://arxiv.org/abs/2009.00300v1
- Date: Tue, 1 Sep 2020 09:11:12 GMT
- Title: To augment or not to augment? Data augmentation in user identification
based on motion sensors
- Authors: Cezara Benegui and Radu Tudor Ionescu
- Abstract summary: In this paper, we study several data augmentation techniques in the quest of finding useful augmentation methods for motion sensor data.
We find that data augmentation is not very helpful, most likely because the signal patterns useful to discriminate users are too sensitive to the transformations brought by certain data augmentation techniques.
- Score: 24.182791316595576
- License: http://arxiv.org/licenses/nonexclusive-distrib/1.0/
- Abstract: Nowadays, commonly-used authentication systems for mobile device users, e.g.
password checking, face recognition or fingerprint scanning, are susceptible to
various kinds of attacks. In order to prevent some of the possible attacks,
these explicit authentication systems can be enhanced by considering a
two-factor authentication scheme, in which the second factor is an implicit
authentication system based on analyzing motion sensor data captured by
accelerometers or gyroscopes. In order to avoid any additional burdens to the
user, the registration process of the implicit authentication system must be
performed quickly, i.e. the number of data samples collected from the user is
typically small. In the context of designing a machine learning model for
implicit user authentication based on motion signals, data augmentation can
play an important role. In this paper, we study several data augmentation
techniques in the quest of finding useful augmentation methods for motion
sensor data. We propose a set of four research questions related to data
augmentation in the context of few-shot user identification based on motion
sensor signals. We conduct experiments on a benchmark data set, using two deep
learning architectures, convolutional neural networks and Long Short-Term
Memory networks, showing which and when data augmentation methods bring
accuracy improvements. Interestingly, we find that data augmentation is not
very helpful, most likely because the signal patterns useful to discriminate
users are too sensitive to the transformations brought by certain data
augmentation techniques. This result is somewhat contradictory to the common
belief that data augmentation is expected to increase the accuracy of machine
learning models.
Related papers
- Effect of Data Degradation on Motion Re-Identification [16.062009131216467]
We study the effect of signal degradation on identifiability, specifically through added noise, reduced framerate, reduced precision, and reduced dimensionality of the data.
Our experiment shows that state-of-the-art identification attacks still achieve near-perfect accuracy for each of these degradations.
arXiv Detail & Related papers (2024-07-25T20:23:32Z) - Agile gesture recognition for capacitive sensing devices: adapting
on-the-job [55.40855017016652]
We demonstrate a hand gesture recognition system that uses signals from capacitive sensors embedded into the etee hand controller.
The controller generates real-time signals from each of the wearer five fingers.
We use a machine learning technique to analyse the time series signals and identify three features that can represent 5 fingers within 500 ms.
arXiv Detail & Related papers (2023-05-12T17:24:02Z) - mPSAuth: Privacy-Preserving and Scalable Authentication for Mobile Web
Applications [0.0]
mPSAuth is an approach for continuously tracking various data sources reflecting user behavior and estimating the likelihood of the current user being legitimate.
We show that mPSAuth can provide high accuracy with low encryption and communication overhead, while the effort for the inference is increased to a tolerable extent.
arXiv Detail & Related papers (2022-10-07T12:49:34Z) - Deep-Learning-Based Device Fingerprinting for Increased LoRa-IoT
Security: Sensitivity to Network Deployment Changes [10.698553177585973]
We study and analyze the sensitivity of LoRa RF fingerprinting to various network setting changes.
We propose a new fingerprinting technique that exploits out-of-band distortion information to increase the fingerprinting accuracy.
Our results show that fingerprinting does relatively well when the learning models are trained and tested under the same settings.
arXiv Detail & Related papers (2022-08-31T16:53:05Z) - Mobile Behavioral Biometrics for Passive Authentication [65.94403066225384]
This work carries out a comparative analysis of unimodal and multimodal behavioral biometric traits.
Experiments are performed over HuMIdb, one of the largest and most comprehensive freely available mobile user interaction databases.
In our experiments, the most discriminative background sensor is the magnetometer, whereas among touch tasks the best results are achieved with keystroke.
arXiv Detail & Related papers (2022-03-14T17:05:59Z) - Bayesian Imitation Learning for End-to-End Mobile Manipulation [80.47771322489422]
Augmenting policies with additional sensor inputs, such as RGB + depth cameras, is a straightforward approach to improving robot perception capabilities.
We show that using the Variational Information Bottleneck to regularize convolutional neural networks improves generalization to held-out domains.
We demonstrate that our method is able to help close the sim-to-real gap and successfully fuse RGB and depth modalities.
arXiv Detail & Related papers (2022-02-15T17:38:30Z) - Robust and Transferable Anomaly Detection in Log Data using Pre-Trained
Language Models [59.04636530383049]
Anomalies or failures in large computer systems, such as the cloud, have an impact on a large number of users.
We propose a framework for anomaly detection in log data, as a major troubleshooting source of system information.
arXiv Detail & Related papers (2021-02-23T09:17:05Z) - Adversarial Attacks on Deep Learning Systems for User Identification
based on Motion Sensors [24.182791316595576]
This study focuses on deep learning methods for explicit authentication based on motion sensor signals.
In this scenario, attackers could craft adversarial examples with the aim of gaining unauthorized access.
To our knowledge, this is the first study that aims at quantifying the impact of adversarial attacks on machine learning models.
arXiv Detail & Related papers (2020-09-02T14:35:05Z) - Semantics-aware Adaptive Knowledge Distillation for Sensor-to-Vision
Action Recognition [131.6328804788164]
We propose a framework, named Semantics-aware Adaptive Knowledge Distillation Networks (SAKDN), to enhance action recognition in vision-sensor modality (videos)
The SAKDN uses multiple wearable-sensors as teacher modalities and uses RGB videos as student modality.
arXiv Detail & Related papers (2020-09-01T03:38:31Z) - Vision Meets Wireless Positioning: Effective Person Re-identification
with Recurrent Context Propagation [120.18969251405485]
Existing person re-identification methods rely on the visual sensor to capture the pedestrians.
Mobile phone can be sensed by WiFi and cellular networks in the form of a wireless positioning signal.
We propose a novel recurrent context propagation module that enables information to propagate between visual data and wireless positioning data.
arXiv Detail & Related papers (2020-08-10T14:19:15Z) - End-to-end User Recognition using Touchscreen Biometrics [11.394909061094463]
The goal was to create an end-to-end system that can transparently identify users using raw data from mobile devices.
In the proposed system data from the touchscreen goes directly to the input of a deep neural network, which is able to decide on the identity of the user.
arXiv Detail & Related papers (2020-06-09T16:38:09Z)
This list is automatically generated from the titles and abstracts of the papers in this site.
This site does not guarantee the quality of this site (including all information) and is not responsible for any consequences.