과제정보
This work was supported in by the ICT R&D program of MSIP/IITP (2020-0-00121, development of data improvement and dataset correction technology based on data quality assessment) and (2019-0-00074, developing system software technologies for emerging new memory that adaptively learn workload characteristics).
참고문헌
- T. Li, M. Zhang, H. Cao, Y. Li, S. Tarkoma, and P. Hui, "What apps did you use? understanding the long-term evolution of mobile app usage," Proceedings of the World Wide Web Conference, pp 66-76, 2020. DOI: https://doi.org/10.1145/3366423.3380095
- D. Kim, S. Lee, and H. Bahn, "An adaptive location detection scheme for energy-efficiency of smartphones," Pervasive and Mobile Computing, vol. 31, pp. 67-78, 2016. DOI: https://doi.org/10.1016/j.pmcj.2016.04.012
- E. Lee and H. Bahn, "Electricity usage scheduling in smart building environments using smart devices," The Scientific World Journal, vol. 2013, Article 468097, pp. 1-11, 2013. DOI: https://doi.org/10.1155/2013/468097
- T. Kim, H. Bahn, and K. Koh, "Popularity-aware interval caching for multimedia streaming servers," Electronics Letters, vol. 39, no. 21, pp. 1555-1557, 2003. DOI: https://doi.org/10.1049/el:20030965
- R. Ikeda, K. Hakka, and B. Shizuki, "Hover-based reachability technique for executing single-touch gesture on smartphone," in Proc. Asian CHI Symposium, pp. 9-15, 2021. DOI: https://doi.org/10.1145/3429360.3468171
- A. Acien, A. Morales, and R. Vera-Rodriguez, "Smartphone sensors for modeling human-computer interaction: General outlook and research datasets for user authentication," in Proc. 44th IEEE COMPSAC Conf., 2020. DOI: https://doi.org/10.1109/COMPSAC48688.2020.00-81
- A. Suharsono and D. Liang, "Hand stability based features for touch behavior smartphone authentication," in Proc. 3rd IEEE Conf. Knowledge Innovation and Invention, 2020. DOI: https://doi.org/10.1109/ICKII50300.2020.9318982
- D. Kim, E. Lee, S. Ahn, H. Bahn, "Improving the storage performance of smartphones through journaling in nonvolatile memory," IEEE Trans. Consumer Electronics, vol. 59, no. 3, pp. 556-561, 2013. DOI: https://doi.org/10.1109/TCE.2013.6626238
- J. Park, H. Lee, S. Hyun, K. Koh, H. Bahn, "A cost-aware page replacement algorithm for NAND flash based mobile embedded systems," in Proc. the seventh ACM international conference on Embedded software (EMSOFT), 2009. DOI: https://doi.org/10.1145/1629335.1629377
- O. Kwon, H. Bahn, and K. Koh, "Popularity and prefix aware interval caching for multimedia streaming servers," in Proc. 8th IEEE International Conference on Computer and Information Technology, pp. 555-560, 2008. DOI: https://doi.org/10.1109/CIT.2008.4594735
- C. Shen, Y. Zhang, X. Guan and R. A. Maxion, "Performance analysis of touch-interaction behavior for active smartphone authentication," IEEE Trans. Information Forensics and Security, vol. 11, no. 3, pp. 498-513, 2016. DOI: http://doi.org/10.1109/TIFS.2015.2503258
- A. Luca, A. Hang, F. Brudy, C. Lindner, and H. Hussmann, "Touch me once and I know it's you!: implicit authentication based on touch screen patterns," in Proc. ACM SIGCHI Conf. on Human Factors in Computing Systems, pp. 987-996, 2012. DOI: http://doi.org/10.1145/2207676.2208544
- J. Fierrez, A. Pozo, M. Martinez-Diaz, J. Galbally and A. Morales, "Benchmarking touchscreen biometrics for mobile authentication," IEEE Trans. Information Forensics and Security, vol. 13, no. 11, pp. 2720-2733, 2018. DOI: http://doi.org/10.1109/TIFS.2018.2833042.
- N. Sae-Bae, K. Ahmed, K. Isbister and N. Memon, "Biometric-rich gestures: A novel approach to authentication on multi-touch devices," in Proc. ACM SIGCHI Conf. on Human Factors in Computing Systems, pp. 977-986, 2012. DOI: http://doi.org/10.1145/2207676.2208543
- M. Frank, R. Biedert, E. Ma, I. Martinovic and D. Song, "Touchalytics: On the applicability of touchscreen input as a behavioral biometric for continuous authentication," IEEE Trans. Information Forensics Security, vol. 8, no. 1, pp. 136-148, 2013. DOI: http://doi.org/10.1109/TIFS.2012.2225048
- R. Murmuria, A. Stavrou, D. Barbara and D. Fleck, "Continuous authentication on mobile devices using power consumption touch gestures and physical movement of users," in Proc. Int. Workshop Recent Advances in Intrusion Detection, pp. 405-424, 2015. DOI: http://doi.org/10.1007/978-3-319-26362-5_19
- P. Perera and V. M. Patel, "Efficient and low latency detection of intruders in mobile active authentication," IEEE Trans. Information Forensics Security, vol. 13, no. 6, pp. 1392-1405, 2018. DOI: http://doi.org/10.1109/TIFS.2017.2787995