A data reduction scheme for active authentication of legitimate smartphone owner using informative apps ranking.
Abdulaziz AlzubaidiSwarup RoyJugal KalitaPublished in: Digit. Commun. Networks (2019)
Keyphrases
- data reduction
- data compression
- mobile applications
- preprocessing
- classification rules
- instance selection
- classification accuracy
- data mining
- authentication protocol
- high dimensionality
- data analysis
- knowledge discovery
- rough set theory
- singular value decomposition
- clustering algorithm
- feature selection
- android platform
- representative subset
- data points
- support vector machine
- mobile devices
- bayesian networks
- databases
- user authentication