Weakly supervised machine learning

Z Ren, S Wang, Y Zhang - CAAI Transactions on Intelligence …, 2023 - Wiley Online Library
Supervised learning aims to build a function or model that seeks as many mappings as
possible between the training data and outputs, where each training data will predict as a …

Multi-factor authentication: A survey

A Ometov, S Bezzateev, N Mäkitalo, S Andreev… - Cryptography, 2018 - mdpi.com
Today, digitalization decisively penetrates all the sides of the modern society. One of the key
enablers to maintain this process secure is authentication. It covers many different areas of a …

50 years of biometric research: Accomplishments, challenges, and opportunities

AK Jain, K Nandakumar, A Ross - Pattern recognition letters, 2016 - Elsevier
Biometric recognition refers to the automated recognition of individuals based on their
biological and behavioral characteristics such as fingerprint, face, iris, and voice. The first …

Security and accuracy of fingerprint-based biometrics: A review

W Yang, S Wang, J Hu, G Zheng, C Valli - Symmetry, 2019 - mdpi.com
Biometric systems are increasingly replacing traditional password-and token-based
authentication systems. Security and recognition accuracy are the two most important …

Cancelable biometrics: A review

VM Patel, NK Ratha… - IEEE signal processing …, 2015 - ieeexplore.ieee.org
Recent years have seen an exponential growth in the use of various biometric technologies
for trusted automatic recognition of humans. With the rapid adaptation of biometric systems …

Image quality assessment for fake biometric detection: Application to iris, fingerprint, and face recognition

J Galbally, S Marcel, J Fierrez - IEEE transactions on image …, 2013 - ieeexplore.ieee.org
To ensure the actual presence of a real legitimate trait in contrast to a fake self-manufactured
synthetic or reconstructed sample is a significant problem in biometric authentication, which …

Biometric antispoofing methods: A survey in face recognition

J Galbally, S Marcel, J Fierrez - Ieee Access, 2014 - ieeexplore.ieee.org
In recent decades, we have witnessed the evolution of biometric technology from the first
pioneering works in face and voice recognition to the current state of development wherein a …

Performance comparison of intrusion detection systems and application of machine learning to Snort system

SAR Shah, B Issac - Future Generation Computer Systems, 2018 - Elsevier
This study investigates the performance of two open source intrusion detection systems
(IDSs) namely Snort and Suricata for accurately detecting the malicious traffic on computer …

Biometrics: Trust, but verify

AK Jain, D Deb, JJ Engelsma - IEEE Transactions on …, 2021 - ieeexplore.ieee.org
Over the past two decades, biometric recognition has exploded into a plethora of different
applications around the globe. This proliferation can be attributed to the high levels of …

An overview of information-theoretic security and privacy: Metrics, limits and applications

M Bloch, O Günlü, A Yener, F Oggier… - IEEE Journal on …, 2021 - ieeexplore.ieee.org
This tutorial reviews fundamental contributions to information security. An integrative
viewpoint is taken that explains the security metrics, including secrecy, privacy, and others …