CN116028908A - Continuous identity authentication method and related device based on incremental learning and meta learning - Google Patents
Continuous identity authentication method and related device based on incremental learning and meta learning Download PDFInfo
- Publication number
- CN116028908A CN116028908A CN202310163032.2A CN202310163032A CN116028908A CN 116028908 A CN116028908 A CN 116028908A CN 202310163032 A CN202310163032 A CN 202310163032A CN 116028908 A CN116028908 A CN 116028908A
- Authority
- CN
- China
- Prior art keywords
- data
- learning
- model
- meta
- authentication
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
- 238000000034 method Methods 0.000 title claims abstract description 64
- 230000006399 behavior Effects 0.000 claims abstract description 10
- 238000012795 verification Methods 0.000 claims abstract description 7
- 238000012549 training Methods 0.000 claims description 23
- 238000003860 storage Methods 0.000 claims description 20
- 238000012360 testing method Methods 0.000 claims description 20
- 238000004590 computer program Methods 0.000 claims description 18
- 230000008569 process Effects 0.000 claims description 18
- 238000012545 processing Methods 0.000 claims description 10
- 238000001514 detection method Methods 0.000 claims description 7
- 230000008859 change Effects 0.000 claims description 5
- 101100455978 Arabidopsis thaliana MAM1 gene Proteins 0.000 claims description 4
- 238000013136 deep learning model Methods 0.000 claims description 3
- 239000006185 dispersion Substances 0.000 claims description 3
- 238000011156 evaluation Methods 0.000 claims description 3
- 238000007781 pre-processing Methods 0.000 claims description 3
- 238000000926 separation method Methods 0.000 claims description 2
- 230000000007 visual effect Effects 0.000 claims 3
- 230000007774 longterm Effects 0.000 abstract description 14
- 230000007246 mechanism Effects 0.000 abstract description 14
- 238000005516 engineering process Methods 0.000 abstract description 5
- 238000010586 diagram Methods 0.000 description 12
- 238000002474 experimental method Methods 0.000 description 6
- 230000006870 function Effects 0.000 description 6
- 238000013480 data collection Methods 0.000 description 2
- 230000007423 decrease Effects 0.000 description 2
- 238000013135 deep learning Methods 0.000 description 2
- 238000009826 distribution Methods 0.000 description 2
- 230000000694 effects Effects 0.000 description 2
- 238000000605 extraction Methods 0.000 description 2
- 230000006855 networking Effects 0.000 description 2
- 206010027336 Menstruation delayed Diseases 0.000 description 1
- 206010035148 Plague Diseases 0.000 description 1
- 241000607479 Yersinia pestis Species 0.000 description 1
- 238000003491 array Methods 0.000 description 1
- 230000003542 behavioural effect Effects 0.000 description 1
- 230000015556 catabolic process Effects 0.000 description 1
- 238000004891 communication Methods 0.000 description 1
- 238000007796 conventional method Methods 0.000 description 1
- 238000006731 degradation reaction Methods 0.000 description 1
- 238000011161 development Methods 0.000 description 1
- 230000036541 health Effects 0.000 description 1
- 238000004519 manufacturing process Methods 0.000 description 1
- 239000000463 material Substances 0.000 description 1
- 238000012986 modification Methods 0.000 description 1
- 230000004048 modification Effects 0.000 description 1
- 230000003287 optical effect Effects 0.000 description 1
- 230000002085 persistent effect Effects 0.000 description 1
- 238000011160 research Methods 0.000 description 1
- 230000009897 systematic effect Effects 0.000 description 1
- 230000002123 temporal effect Effects 0.000 description 1
- 238000012800 visualization Methods 0.000 description 1
Images
Classifications
-
- Y—GENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
- Y02—TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
- Y02D—CLIMATE CHANGE MITIGATION TECHNOLOGIES IN INFORMATION AND COMMUNICATION TECHNOLOGIES [ICT], I.E. INFORMATION AND COMMUNICATION TECHNOLOGIES AIMING AT THE REDUCTION OF THEIR OWN ENERGY USE
- Y02D30/00—Reducing energy consumption in communication networks
- Y02D30/70—Reducing energy consumption in communication networks in wireless communication networks
Landscapes
- Collating Specific Patterns (AREA)
Abstract
基于增量学习以及元学习的持续身份认证方法及相关装置,包括:将传感器数据进行可视化操作,判断传感器数据是否有漂移现象;构建包含离线注册阶段和在线认证阶段的基于元学习和增量学习的认证框架;根据离线注册获取每个传感器时间维度的特征以及他们不同维度之间的关联特征,根据在线认证阶段,从获取的数据中进行学习,并且进行在线的模型更新;对更新后的模型进行试验验证,得到模型能力。基于触屏行为的身份认证技术框架MetaAuth解决了长期触屏身份认证领域的难题,其次设计了基于元学习的在线更新机制AMUM用于长期持续进行身份认证这一场景下的增量学习问题,以便于提高模型的稳定性。
A continuous identity authentication method and related devices based on incremental learning and meta-learning, including: visualizing sensor data to determine whether there is drift in sensor data; constructing meta-learning and incremental learning based on offline registration phase and online authentication phase The authentication framework; according to the offline registration to obtain the characteristics of each sensor time dimension and the correlation characteristics between their different dimensions, according to the online authentication stage, learn from the acquired data, and update the online model; the updated model Experimental verification is carried out to obtain the model capability. The identity authentication technology framework MetaAuth based on touch screen behavior solves the problem in the field of long-term touch screen identity authentication. Secondly, an online update mechanism AMUM based on meta-learning is designed for incremental learning in the scenario of long-term continuous identity authentication, so that to improve the stability of the model.
Description
技术领域technical field
本发明涉及深度学习技术领域,具体涉及基于增量学习以及元学习的持续身份认证方法及相关装置。The invention relates to the technical field of deep learning, in particular to a continuous identity authentication method and related devices based on incremental learning and meta-learning.
背景技术Background technique
在当今社会中,手机以及平板电脑已经成为了社交,娱乐,通讯,电子商务最基本的工具,是当今社会中不可或缺的一部分。目前在全世界已经有83.72%的人拥有了智能手机,并且随着科技的不断发展智能手机的计算能力以及储存能力也在不断地被开发之中,使得越来越多的app被开发并且投入使用,例如有关于社交,网络购物,金融借贷类型等。根据统计显示,在16岁到64岁之间的互联网使用者中,将近有60%的人都进行过网上购物,目前每年的网购金额在3.8万亿左右,平均涨幅为18%,可以看出越来越多的支付行为在手机端得以进行。In today's society, mobile phones and tablet computers have become the most basic tools for social networking, entertainment, communication, and e-commerce, and are an indispensable part of today's society. At present, 83.72% of the people in the world have smart phones, and with the continuous development of technology, the computing power and storage capacity of smart phones are also being continuously developed, so that more and more apps are developed and invested Use, such as social networking, online shopping, types of financial loans, etc. According to statistics, nearly 60% of Internet users between the ages of 16 and 64 have done online shopping, and the current annual online shopping amount is about 3.8 trillion, with an average increase of 18%. It can be seen that More and more payment behaviors are carried out on mobile phones.
人们对于智能手机的高度依赖同时也导致了每个人在其智能手机中的隐私数据收到广泛的关注。个人的隐私数据包括了手机中的银行账户,健康,就业等以及和一些政府相关的机密数据,这些都被记录在了手机中。而在一般的情况下,这些数据都是受到保护的,只有用户自身可以获取到。然而经过数据表明,有将近三分之一的用户手机出现了被盗取的情况,而其中有十分之一的用户认为自己手机里的隐私遭到了不同程度的侵犯。所以通过各种原因导致的手机隐私泄露问题,成为了困扰所有用户以及各大手机制造厂商的一大难题。People's high reliance on smartphones has also led to widespread concern about everyone's private data in their smartphones. Personal privacy data includes bank accounts, health, employment, etc. in mobile phones, as well as confidential data related to some governments, which are all recorded in mobile phones. Under normal circumstances, these data are protected and only the user can obtain them. However, according to data, nearly one-third of users' mobile phones have been stolen, and one-tenth of them believe that the privacy of their mobile phones has been violated to varying degrees. Therefore, the leakage of mobile phone privacy caused by various reasons has become a major problem that plagues all users and major mobile phone manufacturers.
为了攻克这一难题,为了使得手机隐私问题得以解决,手机私密数据得以保护,已经进行了大量的身份认证问题。而手机身份认证问题主要指的是手机端通过较为较短的身份指示符对用户的身份进行验证。从而可以使得用户继续访问或者拒绝访问。而随着这么多年来的对问题的研究,主要有以下三种认证的方式:基于知识的认证方式,基于生物特征的身份认证方式和基于行为特征的身份认证方式;基于知识的认证方式是一种比较传统的方式,并且得到了广泛的认同,其中比较有代表性的是数字密码,图形解锁等一系列方式。因为这些方式较为简单,对学习的成本要求也比较低所以受到比较大的推广。而通过一些研究表明,如果是比较复杂的密码会大大增加用户的记忆成本,而如果选择一些比较简单的密码如“abc”或者“12345678”则安全性能会有所不足,而用户经常使用手机,他认可是利用屏幕中的污渍或者皮肤的油脂来进行破译,因此传统的方式存在着比较明显的隐患。In order to overcome this problem, in order to solve the mobile phone privacy problem and protect the private data of the mobile phone, a large number of identity authentication problems have been carried out. The mobile phone identity authentication problem mainly refers to that the mobile terminal verifies the identity of the user through a relatively short identity indicator. This allows the user to continue access or deny access. With so many years of research on the problem, there are mainly the following three authentication methods: knowledge-based authentication, biometric-based identity authentication, and behavior-based identity authentication; knowledge-based authentication is a It is a relatively traditional method, and has been widely recognized, among which a series of methods such as digital password and graphic unlocking are more representative. Because these methods are relatively simple and require relatively low learning costs, they have been widely promoted. Some studies have shown that if it is a relatively complex password, the memory cost of the user will be greatly increased, and if some relatively simple passwords such as "abc" or "12345678" are selected, the security performance will be insufficient, and users often use mobile phones. He admitted that the stains on the screen or the oil of the skin are used to decipher, so there are obvious hidden dangers in the traditional method.
发明内容Contents of the invention
本发明的目的在于提供基于增量学习以及元学习的持续身份认证方法及相关装置,以解决传统方式存在的安全性问题,以及记忆成本高的问题。The purpose of the present invention is to provide a continuous identity authentication method and related devices based on incremental learning and meta-learning, so as to solve the problems of security and high memory cost in traditional methods.
为实现上述目的,本发明采用以下技术方案:To achieve the above object, the present invention adopts the following technical solutions:
基于增量学习以及元学习的持续身份认证方法,包括:A continuous identity authentication method based on incremental learning and meta-learning, including:
收集手机在使用过程中的传感器数据,将传感器数据进行可视化操作,判断传感器数据是否有漂移现象;Collect the sensor data of the mobile phone during use, visualize the sensor data, and judge whether the sensor data has drift phenomenon;
出现漂移现象,则构建包含离线注册阶段和在线认证阶段的基于元学习和增量学习的认证框架MetaAuth;In the event of drift, construct MetaAuth, an authentication framework based on meta-learning and incremental learning that includes offline registration and online authentication stages;
建立元学习模型,根据离线注册获取每个传感器时间维度的特征以及他们不同维度之间的关联特征,根据在线认证阶段,从获取的数据中进行学习,并且进行在线的模型更新;Establish a meta-learning model, obtain the characteristics of each sensor's time dimension and the correlation characteristics between different dimensions according to offline registration, learn from the acquired data according to the online authentication stage, and perform online model update;
对更新后的模型进行试验验证,得到模型能力。The updated model is tested and verified to obtain the model capability.
进一步的,收集手机在使用过程中的传感器数据,将传感器数据进行可视化操作,判断传感器数据是否有漂移现象:Further, collect the sensor data of the mobile phone during use, visualize the sensor data, and judge whether the sensor data has drift phenomenon:
随机抽取某时段用户的手机使用时传感器数据,将该时段可分为前期,中期以及后期,然后对数据进行特征提取,在提取完特征以后,通过t-SNE方法在二维空间中将特征分别可视化出来,表示出用户之间的特征相似以及变化的情况,当用户之间特征数据发生改变,且距离越来越远,则出现漂移现象。Randomly extract the sensor data of the user's mobile phone during a certain period of time, and divide the period into early, middle and late periods, and then perform feature extraction on the data. After feature extraction, use the t-SNE method to separate the features in two-dimensional space It is visualized to show the similarities and changes in the characteristics between users. When the characteristic data between users changes and the distance is getting farther and farther away, drifting occurs.
进一步的,离线注册阶段:Further, the offline registration phase:
数据采集:通过选定用户触屏行为进行数据采集,当屏幕亮起的时候进行传感器采集的数据作为正样本,拿其他用户的数据作为训练的负样本;Data collection: collect data by selecting the user's touch screen behavior, when the screen lights up, the data collected by the sensor is used as a positive sample, and the data of other users is used as a negative sample for training;
数据预处理阶段:首先使用定长的滑动窗口将数据分为一系列会出现重复的时间段,将其作为认证的基本单元,然后将每一个时间段继续进行分割,分割为不相交的小时间段,称之为时间源,然后从时间源中提取局部的特征;Data preprocessing stage: First, use a fixed-length sliding window to divide the data into a series of repeated time periods, which are used as the basic unit of authentication, and then continue to divide each time period into disjoint small time periods segment, called the time source, and then extract local features from the time source;
持续采集器部分:建立双通道的深度学习模型2-GCTN模型,提取每个传感器时间维度的特征以及他们不同维度之间的关联特征。Continuous collector part: build a dual-channel deep learning model 2-GCTN model, extract the features of each sensor's time dimension and the correlation features between their different dimensions.
进一步的,在线认证阶段:Further, the online certification stage:
在此阶段使用改进的元学习方法AMUM进行在线的模型更新,包括两个部分分别组成:1.漂移检测器;2.改进的MAML更新策略;在检测的过程中,检测的时间窗口可以根据时间和数据的变化而进行更改,并且还会根据窗口内的预测结果输出出漂移信号,如果发现错线错误的概率超过了设定的阈值,即会给出发生漂移的判断。At this stage, the improved meta-learning method AMUM is used for online model update, which consists of two parts: 1. Drift detector; 2. Improved MAML update strategy; in the detection process, the detection time window can be based on time and data changes, and will also output a drift signal according to the prediction results in the window. If the probability of wrong line error exceeds the set threshold, it will give a judgment of drift.
进一步的,具体过程:Further, the specific process:
首先获取实验数据,包含来自加速度计、陀螺仪和磁力计的传感器三维数据;First obtain experimental data, including sensor three-dimensional data from accelerometers, gyroscopes and magnetometers;
设立评价指标:通过指标来衡量身份认证的场景下的准确性,指标包括:Set up evaluation indicators: Use indicators to measure the accuracy of identity authentication scenarios, including:
相等错误率:错误接受率等于错误拒绝率的值,通过改变预测分数的阈值可以影响相等错误率;Equal error rate: The false acceptance rate is equal to the value of the false rejection rate, and the equal error rate can be affected by changing the threshold of the prediction score;
错误接受率:定义为错误接受的非法样本数量与所有非法测试样本的数量;高的错误接受率表示入侵者样本的错误分离率较高;False acceptance rate: defined as the number of falsely accepted illegitimate samples compared to the number of all illegitimate test samples; a high false acceptance rate indicates a high rate of false separation of intruder samples;
错误拒绝率:定义为被错误拒绝的有效样本数与所有有效测试样本的数量;高的错误拒绝率表示对合法用户样本的识别较差;False rejection rate: defined as the number of valid samples falsely rejected versus all valid test samples; a high false rejection rate indicates poor recognition of legitimate user samples;
认证精度方差:表示长期不同时间段认证结果分散程度的方差度量;它由每次认证相等错误率与相等错误率平均值之差的平方的平均值计算得出;低的方差反映了认证模型的稳定预测能力;Certification accuracy variance: A variance measure that indicates the degree of dispersion of certification results over a long period of time; it is calculated from the average of the square of the difference between the equal error rate of each certification and the average of the equal error rate; the low variance reflects the authenticity of the certification model. Stable predictive ability;
内存使用:表示模型训练和更新所占用的内存大小;Memory usage: Indicates the memory size occupied by model training and updating;
时间消耗:表示模型训练和更新所花费的时间。Time Consumption: Indicates the time spent on model training and updating.
进一步的,试验验证:Further, experimental verification:
通过数据集中M个用户来评估认证框架2-GCTN,并对每位用户单独去训练模型和进行增量的测试,将每个用户他所对应的手机将本人设置为合法用户,而同时将其余的M-1个设置为非法用户;对于正样本的数据按照时间的顺序从每位用户中选择传感器的数据,并且将数据分割为20份,分别对应着20次的增量学习任务;负样本,在其余的的M-1名用户当中随机抽取;在训练过程中,将每一次的训练以及测试定义为一项任务,每次下一个周期的数据块首先会用于测试模型,然后再进行模型的训练以及更新。Evaluate the authentication framework 2-GCTN through the M users in the data set, and train the model and conduct incremental tests for each user individually, and set the mobile phone corresponding to each user as a legal user, while setting the rest M-1 are set as illegal users; for the positive sample data, select the sensor data from each user in the order of time, and divide the data into 20 parts, corresponding to 20 incremental learning tasks; negative samples, Randomly selected among the remaining M-1 users; in the training process, each training and test is defined as a task, and the data block of the next cycle will first be used to test the model, and then the model training and updating.
进一步的,具体步骤:Further, specific steps:
按照时间对所有处理的数据进行排序,并且分割为相同的数据块T;Sort all processed data according to time and divide them into the same data block T;
每个数据块都将是用户的正样本数据集,存在T-1个任务,每个任务包含两个时期的数据Di以及Di+1;Each data block will be the user's positive sample data set, there are T-1 tasks, and each task contains two periods of data D i and D i+1 ;
使用Di作为训练集更新模型,然后在使用Di+1测试其能力;Use D i as the training set to update the model, and then use D i+1 to test its ability;
对每一个用户重复上述步骤。Repeat the above steps for each user.
进一步的,一种基于增量学习以及元学习的持续身份认证系统,包括:Further, a continuous identity authentication system based on incremental learning and meta-learning, including:
数据处理判断模块,用于收集手机在使用过程中的传感器数据,将传感器数据进行可视化操作,判断传感器数据是否有漂移现象;The data processing and judging module is used to collect sensor data during the use of the mobile phone, visualize the sensor data, and judge whether the sensor data has drift phenomenon;
框架搭建模块,用于出现漂移现象,则构建包含离线注册阶段和在线认证阶段的基于元学习和增量学习的认证框架MetaAuth;The framework building module is used for the drift phenomenon, and then constructs MetaAuth, an authentication framework based on meta-learning and incremental learning, including offline registration phase and online authentication phase;
模型建立模块,用于建立元学习模型,根据离线注册获取每个传感器时间维度的特征以及他们不同维度之间的关联特征,根据在线认证阶段,从获取的数据中进行学习,并且进行在线的模型更新;The model building module is used to establish a meta-learning model, obtain the characteristics of each sensor time dimension and the correlation characteristics between different dimensions according to the offline registration, and learn from the obtained data according to the online certification stage, and perform an online model renew;
验证模块,用于对更新后的模型进行试验验证,得到模型能力。The verification module is used to test and verify the updated model to obtain the model capability.
进一步的,一种计算机设备,包括存储器、处理器以及存储在所述存储器中并可在所述处理器上运行的计算机程序,所述处理器执行所述计算机程序时实现基于增量学习以及元学习的持续身份认证方法的步骤。Further, a computer device includes a memory, a processor, and a computer program stored in the memory and operable on the processor. When the processor executes the computer program, incremental learning and meta-based Learn the steps of the persistent authentication method.
进一步的,一种计算机可读存储介质,所述计算机可读存储介质存储有计算机程序,所述计算机程序被处理器执行时实现基于增量学习以及元学习的持续身份认证方法的步骤。Further, a computer-readable storage medium stores a computer program, and when the computer program is executed by a processor, the steps of the continuous identity authentication method based on incremental learning and meta-learning are realized.
与现有技术相比,本发明有以下技术效果:Compared with the prior art, the present invention has the following technical effects:
本发明基于深度学习以及元学习,在采集的过程中并不添加任何额外的限制条件,从而充分的反应用户真实的手机使用情况。其次还设计了一种双通道的深度学习模型2-GCTN以便于利用多传感器之间的数据关联信息。该模型可以获取到不同维度之间的数据关联信息而且还可以显著的提高在多传感器数据下对用户行为的表征能力。在最后还提出了一种基于元学习技术的增量学习机制AMUM。该机制可以利用模型学习到的知识以及新数据进行实时的更新,充分体现了模型的有效性。基于触屏行为的身份认证技术框架MetaAuth解决了长期触屏身份认证领域的难题,其次设计了基于元学习的在线更新机制AMUM用于长期持续进行身份认证这一场景下的增量学习问题,以便于提高模型的稳定性。The present invention is based on deep learning and meta-learning, and does not add any additional restrictive conditions in the collection process, so as to fully reflect the real mobile phone usage of users. Secondly, a dual-channel deep learning model 2-GCTN is designed to facilitate the use of data association information between multiple sensors. This model can obtain data association information between different dimensions and can also significantly improve the ability to represent user behavior under multi-sensor data. Finally, an incremental learning mechanism AMUM based on meta-learning technology is proposed. This mechanism can use the knowledge learned by the model and new data to update in real time, which fully reflects the effectiveness of the model. The identity authentication technology framework MetaAuth based on touch screen behavior solves the problem in the field of long-term touch screen identity authentication. Secondly, an online update mechanism AMUM based on meta-learning is designed for incremental learning in the scenario of long-term continuous identity authentication, so that to improve the stability of the model.
附图说明Description of drawings
图1为本发明传感器数据的可视化示意图。Fig. 1 is a schematic diagram of visualization of sensor data in the present invention.
图2为本发明基于元学习和增量学习的认证框架示意图。Fig. 2 is a schematic diagram of an authentication framework based on meta-learning and incremental learning in the present invention.
图3为本发明长期的认证过程示意图。Fig. 3 is a schematic diagram of the long-term authentication process of the present invention.
图4为元学习机制对于模型进行长期认证的影响实验图。Figure 4 is an experimental diagram of the effect of the meta-learning mechanism on the long-term certification of the model.
图5为在MetaAuth中使用adaptive-MAML作为增量更新机制实验图。Figure 5 is an experimental diagram of using adaptive-MAML as an incremental update mechanism in MetaAuth.
图6为不同模型在使用传感器数据中身份认证的能力对比图。Figure 6 is a comparison chart of the capabilities of different models for identity authentication in sensor data.
具体实施方式Detailed ways
下面将详细描述本文的发明的实施方式以及实验步骤:The embodiment of the invention of this paper and the experimental steps will be described in detail below:
第一步:首先进行传感器数据的可视化,随机抽取了5位用户,对其在淘宝app中传感器数据的收集,总共时长分为2个月,还可以将两个月分为前期,中期以及后期。Step 1: Visualize the sensor data first, randomly select 5 users, and collect the sensor data in the Taobao app. The total duration is divided into 2 months, and the two months can also be divided into early, middle and late stages .
第二步:在提取完特征以后,通过(t-SNE)方法在二维空间中将特征分别可视化出来。可以表示出这5个用户他们之间的特征相似以及变化的情况。从图1中可以清晰的看出来:在前期的时候,3号4号以及5号他们的的特征数据是比较相似的,其中5号是离1号比较的远。而到了中期的时候保持原来的特征没有太多的变化,而是1号和4号的距离发生了改变,越来越远。而到了后期,3号4号5号他们的距离也变得越来越远。所以可以看出用户的行为数据一定会随着时间的推移而发生变化,即会出现漂移的现象。The second step: After the features are extracted, the features are visualized in two-dimensional space by the (t-SNE) method. It can show the similarities and changes in the characteristics of these five users. It can be clearly seen from Figure 1: In the early stage, the characteristic data of No. 3, No. 4 and No. 5 are relatively similar, and No. 5 is far from No. 1. In the mid-term, the original characteristics did not change much, but the distance between No. 1 and No. 4 changed and became farther and farther away. And in the later stage, the distance between No. 3, No. 4, No. 5 and them has become farther and farther. Therefore, it can be seen that the user's behavior data will definitely change over time, that is, there will be drift.
第三步:为了解决长期身份认证中的性能下降的问题,于是提出来基于元学习和增量学习的认证框架MetaAuth。整体的框架如图2所示,其中包含两个重要的组成部分非别为离线注册部分和在线认证部分。Step 3: In order to solve the problem of performance degradation in long-term identity authentication, an authentication framework MetaAuth based on meta-learning and incremental learning is proposed. The overall framework is shown in Figure 2, which includes two important components, namely the offline registration part and the online authentication part.
在离线注册阶段主要是分为三步:The offline registration stage is mainly divided into three steps:
1.数据采集阶段:主要的途径是通过触屏行为进行数据采集,只要当屏幕亮起的时候进行传感器采集的数据作为正样本,同时也拿其他用户的数据作为训练的负样本。1. Data collection stage: The main way is to collect data through touch screen behavior. As long as the screen is on, the data collected by the sensor is used as a positive sample, and the data of other users is also used as a negative sample for training.
2.数据预处理阶段:为了能够有效的提取出时序数据的特征,首先使用定长的滑动窗口将数据分为一系列会出现重复的时间段,将其作为认证的基本单元,然后将每一个时间段继续进行分割,分割为不相交的小时间段,称之为时间源,然后可以从时间源中提取局部的特征。2. Data preprocessing stage: In order to effectively extract the characteristics of time series data, first use a fixed-length sliding window to divide the data into a series of time periods that will appear repeatedly, and use it as the basic unit of authentication, and then divide each The time segment continues to be divided into disjoint small time segments, which are called time sources, and then local features can be extracted from the time sources.
3.持续采集器部分:需要能够对时序数据场景提供一些更为准确的表现。所以设计了全新的2-GCTN模型,可以提取每个传感器时间维度的特征以及他们不同维度之间的关联特征。3. Continuous collector part: It needs to be able to provide some more accurate representations of time series data scenarios. Therefore, a new 2-GCTN model is designed, which can extract the features of each sensor time dimension and the correlation features between their different dimensions.
而在在线认证阶段:此过程中,认证器可以不断地从新来的数据中进行学习,并且改进之前的方法进行在线的模型更新,可以使用ADWIN方法作为漂移检测器,来减少对手机端的资源消耗,来更好的更新模型。接下来会设计一个元学习模型,可以学习模型的初始化参数,还可以学习模型训练的学习率。And in the online authentication stage: In this process, the authenticator can continuously learn from the new data, and improve the previous method to update the online model. The ADWIN method can be used as a drift detector to reduce the resource consumption of the mobile terminal. , to better update the model. Next, a meta-learning model will be designed, which can learn the initialization parameters of the model and the learning rate of model training.
在此阶段使用改进的元学习方法AMUM进行在线的模型更新。它主要有两个部分分别组成:1.漂移检测器。2.改进的MAML更新策略。完全可以使用漂移检测技术来提高模型更新的效率以及他的合理性。In this stage, the improved meta-learning method AMUM is used for online model update. It mainly consists of two parts: 1. Drift detector. 2. Improved MAML update strategy. It is entirely possible to use drift detection technology to improve the efficiency of model updating and its rationality.
在检测的过程中,检测的时间窗口可以根据时间和数据的变化而进行更改,并且还会根据窗口内的预测结果输出出漂移信号,如果发现错线错误的概率超过了设定的阈值,即会给出发生漂移的判断。其次的MAML模型可以通过在任务学习中的不断优化基础模型的初始参数,从而将模型的效率提升上去。During the detection process, the detection time window can be changed according to the change of time and data, and the drift signal will be output according to the prediction results in the window. If the probability of wrong line error exceeds the set threshold, that is Will give the judgment of drift. The second MAML model can improve the efficiency of the model by continuously optimizing the initial parameters of the basic model in task learning.
具体实验过程:第一步:首先获取实验数据,主要是包含来自加速度计、陀螺仪和磁力计的传感器三维数据。Specific experimental process: Step 1: First obtain experimental data, mainly including three-dimensional sensor data from accelerometers, gyroscopes and magnetometers.
第二步:设立评价指标:可以通过以下指标来衡量身份认证的场景下的准确性,其中主要有:Step 2: Set up evaluation indicators: The accuracy of identity authentication scenarios can be measured through the following indicators, mainly including:
1.相等错误率(EER):错误接受率(FAR)等于错误拒绝率(FRR)的值,通过改变预测分数的阈值可以影响相等错误率。1. Equal Error Rate (EER): The false acceptance rate (FAR) is equal to the value of the false rejection rate (FRR). The equal error rate can be affected by changing the threshold of the prediction score.
2.错误接受率(FAR):定义为错误接受的非法样本数量与所有非法测试样本的数量。较高的FAR表示入侵者样本的错误分离率较高。2. False Acceptance Rate (FAR): Defined as the number of falsely accepted illegal samples and the number of all illegal test samples. A higher FAR indicates a higher rate of missegmentation of invader samples.
3.错误拒绝率(FRR):定义为被错误拒绝的有效样本数与所有有效测试样本的数量。较高的FRR表示对合法用户样本的识别较差。3. False Rejection Rate (FRR): Defined as the number of valid samples that are falsely rejected and the number of all valid test samples. Higher FRR indicates poorer recognition of legitimate user samples.
4.认证精度方差:表示长期不同时间段认证结果分散程度的方差度量。它由每次认证EER与EER平均值之差的平方的平均值计算得出。较低的方差反映了认证模型的稳定预测能力。4. Certification accuracy variance: A variance measure that indicates the degree of dispersion of certification results in different time periods over a long period of time. It is calculated as the average of the square of the difference between the EER for each certification and the average EER. The lower variance reflects the stable predictive power of the certified model.
5.内存使用:表示模型训练和更新所占用的内存大小。较低的内存使用量反映较少智能手机资源的消耗。5. Memory usage: Indicates the memory size occupied by model training and updating. Lower memory usage reflects less consumption of smartphone resources.
6.时间消耗:表示模型训练和更新所花费的时间。更少的训练时间意味着更快的模型更新速度。6. Time consumption: Indicates the time spent on model training and updating. Less training time means faster model updates.
第三步:进行试验。在实验中,通过数据集中40个用户来评估认证框架2-GCTN,并对每位用户单独去训练模型和进行增量的测试。将每个用户他所对应的手机将本人设置为合法用户,而同时将其余的39个人设置为非法用户。对于正样本的数据可以按照时间的顺序从每位用户中选择传感器的数据,并且将数据分割为20份,分别对应着20次的增量学习任务。至于负样本,在其余的的39名用户当中随机抽取。在训练过程中,可以将每一次的训练以及测试定义为一项任务。所以每次下一个周期的数据块首先会用于测试模型,然后再进行模型的训练以及更新。Step 3: Experiment. In the experiment, 40 users in the data set are used to evaluate the authentication framework 2-GCTN, and each user is individually trained and incrementally tested. Set each user's corresponding mobile phone as a legal user, and at the same time set the remaining 39 people as illegal users. For the data of the positive sample, the data of the sensor can be selected from each user in the order of time, and the data is divided into 20 parts, corresponding to 20 incremental learning tasks. As for the negative samples, they are randomly selected among the remaining 39 users. In the training process, each training and test can be defined as a task. Therefore, the data block of each next cycle will first be used to test the model, and then the model will be trained and updated.
具体步骤Specific steps
1.按照时间对所有处理的数据进行排序,并且分割为相同的数据块T。1. Sort all processed data according to time and divide them into the same data block T.
每个数据块都将是用户的正样本数据集。所以相应的,会存在T-1个任务,每个任务Taski包含两个时期的数据Di以及Di+1。Each data block will be a positive sample data set of users. So correspondingly, there will be T-1 tasks, and each task Taski contains two periods of data Di and Di+1.
2.使用Di作为训练集更新模型,然后在使用Di+1测试其能力。2. Use Di as the training set to update the model, and then use Di+1 to test its ability.
3.对每一个用户重复步骤1以及步骤2。3. Repeat steps 1 and 2 for each user.
在本实验中通过了系统的实验,对模型的能力,以及模型有效性还有长期的认证能力进行了分析。In this experiment, a systematic experiment was carried out to analyze the capability of the model, its validity and long-term authentication capability.
首先分析不同模型在用户长期使用的情况下,模型精度下降的问题。如图3所示在长期的认证过程中,使用了LSTM,SVM,one-SVM以及2-GCTN模型,这四种模型的准确性都有所下降。究其原因主要是因为环境复杂度的提升导致了用户使用手机的行为发生了改变,进而导致了数据的分布发生了变化。其次使用了时间特性的模型LSTM和2-GCTN最初具有较好的特性,但随着数据分布的变化,与剩余的模型相比准确度下降的比例较大。First, analyze the problem of model accuracy decline when different models are used by users for a long time. As shown in Figure 3, in the long-term certification process, LSTM, SVM, one-SVM and 2-GCTN models are used, and the accuracy of these four models has declined. The main reason is that the increase in the complexity of the environment leads to changes in the behavior of users using mobile phones, which in turn leads to changes in the distribution of data. Secondly, the models LSTM and 2-GCTN using temporal characteristics have better characteristics initially, but as the data distribution changes, the accuracy drops by a large proportion compared with the remaining models.
然后分析了元学习机制对于模型进行长期认证的影响。实验结果如图4所示Then the impact of the meta-learning mechanism on the long-term certification of the model is analyzed. The experimental results are shown in Figure 4
MetaAuth表示使用本文提出的AMUM机制进行的模型更新。从图中可以得出:当没有MetaAuth represents model updates using the AMUM mechanism proposed in this paper. It can be concluded from the figure that when there is no
Adaptive-MAML机制时,进行长期的持续认证模型的精度会降低,并且更新模型的时间会增长。因为元学习机制可以得到更好的初始化的参数,是模型更好的进行学习。所以可以看出改进了的元学习机制能够提高模型在长期进行身份认证的情况下的精准度以及模型效率。When the Adaptive-MAML mechanism is used, the accuracy of the long-term continuous authentication model will decrease, and the time to update the model will increase. Because the meta-learning mechanism can get better initialized parameters, it is better for the model to learn. Therefore, it can be seen that the improved meta-learning mechanism can improve the accuracy and model efficiency of the model in the case of long-term identity authentication.
紧接着讨论漂移检测机制AMUM的有效性。使用的新的增量更新机制AMUM主要方法是用ADWIN方法检测新批量数据的漂移情况,然后根据检测出来的结果选择模型的更新与否,这将会使得MetaAuth结构不仅能够以合理的频率去更新模型,而且变得更加的高效。使用传统的AMUM分别与2-GCTN组合使用来比较AMUM的模型能力。他们分别为Retrain-2-GCTN和MetaAuth。在MetaAuth中,使用adaptive-MAML作为增量更新机制,仅仅使用新的数据对模型进行更新。实验结果如图5所示。可以通过实验看出MetaAuth的EER非常的低,即具有较高的平均认证精度,所以模型的稳定性比较好。因为模型可以通过mata-leanring利用历史数据中的信息。可以让模型更好的学习用户的行为特征。其次还可以得到MetaAuth的更新时间是比较短的,料率方面也有不错的提升。所以可以得出结论,MetaAuth更实用与真实的手机场景。Then discuss the effectiveness of the drift detection mechanism AMUM. The main method of the new incremental update mechanism AMUM is to use the ADWIN method to detect the drift of the new batch of data, and then choose whether to update the model according to the detected results, which will not only make the MetaAuth structure update at a reasonable frequency model and become more efficient. The traditional AMUM is used in combination with 2-GCTN to compare the model capabilities of AMUM. They are Retrain-2-GCTN and MetaAuth respectively. In MetaAuth, using adaptive-MAML as an incremental update mechanism, only new data is used to update the model. The experimental results are shown in Figure 5. It can be seen through experiments that the EER of MetaAuth is very low, that is, it has a high average authentication accuracy, so the stability of the model is relatively good. Because the model can use the information in the historical data through the mata-leanring. It can make the model better learn the user's behavioral characteristics. Secondly, you can also get that the update time of MetaAuth is relatively short, and the material rate has also been improved. So it can be concluded that MetaAuth is more practical and real for mobile phone scenarios.
最后讨论长期的认证能力。在实验中对比了不同模型在使用传感器数据中身份认证的能力。如图6所示,与常规的方法相比,在长期进行增量更新的情况下,所提出的模型拥有更好的精度,即最小的EER,而同时MetaAuth也拥有最好的稳定性。其次还有通过内存使用的小提琴图,我么不难发现MetaAuth的内存使用也是最低的,这可以体现出认证的过程中资源的消耗是最少的。最后亦可以看出MetaAuth的训练时间也是所有模型中时间最短的,这可以体现出MetaAuth的实时性,是最适合真实场景的模型。Finally, long-term certification capabilities are discussed. In the experiment, the ability of different models to authenticate the identity in the use of sensor data is compared. As shown in Fig. 6, compared with conventional methods, the proposed model has better accuracy, i.e., the smallest EER, while MetaAuth also has the best stability in the case of long-term incremental updates. Secondly, there is also a violin diagram of memory usage. It is not difficult to find that the memory usage of MetaAuth is also the lowest, which can reflect that the resource consumption in the authentication process is the least. Finally, it can also be seen that the training time of MetaAuth is also the shortest among all models, which can reflect the real-time nature of MetaAuth and is the most suitable model for real scenarios.
本发明再一实施例中,提供一种基于增量学习以及元学习的持续身份认证系统,能够用于实现上述的一种基于增量学习以及元学习的持续身份认证方法,具体的,该系统包括:In yet another embodiment of the present invention, a continuous identity authentication system based on incremental learning and meta-learning is provided, which can be used to implement the above-mentioned continuous identity authentication method based on incremental learning and meta-learning. Specifically, the system include:
数据处理判断模块,用于收集手机在使用过程中的传感器数据,将传感器数据进行可视化操作,判断传感器数据是否有漂移现象;The data processing and judging module is used to collect sensor data during the use of the mobile phone, visualize the sensor data, and judge whether the sensor data has drift phenomenon;
框架搭建模块,用于出现漂移现象,则构建包含离线注册阶段和在线认证阶段的基于元学习和增量学习的认证框架MetaAuth;The framework building module is used for the drift phenomenon, and then constructs MetaAuth, an authentication framework based on meta-learning and incremental learning, including offline registration phase and online authentication phase;
模型建立模块,用于建立元学习模型,根据离线注册获取每个传感器时间维度的特征以及他们不同维度之间的关联特征,根据在线认证阶段,从获取的数据中进行学习,并且进行在线的模型更新;The model building module is used to establish a meta-learning model, obtain the characteristics of each sensor time dimension and the correlation characteristics between different dimensions according to the offline registration, and learn from the obtained data according to the online certification stage, and perform an online model renew;
验证模块,用于对更新后的模型进行试验验证,得到模型能力。The verification module is used to test and verify the updated model to obtain the model capability.
本发明实施例中对模块的划分是示意性的,仅仅为一种逻辑功能划分,实际实现时可以有另外的划分方式,另外,在本发明各个实施例中的各功能模块可以集成在一个处理器中,也可以是单独物理存在,也可以两个或两个以上模块集成在一个模块中。上述集成的模块既可以采用硬件的形式实现,也可以采用软件功能模块的形式实现。The division of modules in the embodiments of the present invention is schematic, and is only a logical function division. In actual implementation, there may be other division methods. In addition, each functional module in each embodiment of the present invention can be integrated into a processing In the controller, it can also be physically present separately, or two or more modules can be integrated into one module. The above-mentioned integrated modules can be implemented in the form of hardware or in the form of software function modules.
本发明再一个实施例中,提供了一种计算机设备,该计算机设备包括处理器以及存储器,所述存储器用于存储计算机程序,所述计算机程序包括程序指令,所述处理器用于执行所述计算机存储介质存储的程序指令。处理器可能是中央处理单元(CentralProcessing Unit,CPU),还可以是其他通用处理器、数字信号处理器(Digital SignalProcessor、DSP)、专用集成电路(Application Specific Integrated Circuit,ASIC)、现成可编程门阵列(Field-Programmable GateArray,FPGA)或者其他可编程逻辑器件、分立门或者晶体管逻辑器件、分立硬件组件等,其是终端的计算核心以及控制核心,其适于实现一条或一条以上指令,具体适于加载并执行计算机存储介质内一条或一条以上指令从而实现相应方法流程或相应功能;本发明实施例所述的处理器可以用于一种基于增量学习以及元学习的持续身份认证方法的操作。In yet another embodiment of the present invention, a computer device is provided, the computer device includes a processor and a memory, the memory is used to store a computer program, the computer program includes program instructions, and the processor is used to execute the computer The program instructions stored in the storage medium. The processor may be a central processing unit (Central Processing Unit, CPU), or other general-purpose processors, digital signal processors (Digital Signal Processor, DSP), application specific integrated circuits (Application Specific Integrated Circuit, ASIC), off-the-shelf programmable gate arrays (Field-Programmable GateArray, FPGA) or other programmable logic devices, discrete gate or transistor logic devices, discrete hardware components, etc., which are the computing core and control core of the terminal, and are suitable for implementing one or more instructions, specifically for Load and execute one or more instructions in the computer storage medium to realize the corresponding method flow or corresponding functions; the processor described in the embodiment of the present invention can be used for the operation of a continuous identity authentication method based on incremental learning and meta-learning.
本发明再一个实施例中,本发明还提供了一种存储介质,具体为计算机可读存储介质(Memory),所述计算机可读存储介质是计算机设备中的记忆设备,用于存放程序和数据。可以理解的是,此处的计算机可读存储介质既可以包括计算机设备中的内置存储介质,当然也可以包括计算机设备所支持的扩展存储介质。计算机可读存储介质提供存储空间,该存储空间存储了终端的操作系统。并且,在该存储空间中还存放了适于被处理器加载并执行的一条或一条以上的指令,这些指令可以是一个或一个以上的计算机程序(包括程序代码)。需要说明的是,此处的计算机可读存储介质可以是高速RAM存储器,也可以是非不稳定的存储器(non-volatile memory),例如至少一个磁盘存储器。可由处理器加载并执行计算机可读存储介质中存放的一条或一条以上指令,以实现上述实施例中有关一种基于增量学习以及元学习的持续身份认证方法的相应步骤。In yet another embodiment of the present invention, the present invention also provides a storage medium, specifically a computer-readable storage medium (Memory). The computer-readable storage medium is a memory device in a computer device for storing programs and data. . It can be understood that the computer-readable storage medium here may include a built-in storage medium in the computer device, and of course may also include an extended storage medium supported by the computer device. The computer-readable storage medium provides storage space, and the storage space stores the operating system of the terminal. Moreover, one or more instructions suitable for being loaded and executed by the processor are also stored in the storage space, and these instructions may be one or more computer programs (including program codes). It should be noted that the computer-readable storage medium here may be a high-speed RAM memory, or a non-volatile memory (non-volatile memory), such as at least one magnetic disk memory. One or more instructions stored in the computer-readable storage medium can be loaded and executed by the processor, so as to realize the corresponding steps in the above-mentioned embodiment about a continuous identity authentication method based on incremental learning and meta-learning.
本领域内的技术人员应明白,本发明的实施例可提供为方法、系统、或计算机程序产品。因此,本发明可采用完全硬件实施例、完全软件实施例、或结合软件和硬件方面的实施例的形式。而且,本发明可采用在一个或多个其中包含有计算机可用程序代码的计算机可用存储介质(包括但不限于磁盘存储器、CD-ROM、光学存储器等)上实施的计算机程序产品的形式。Those skilled in the art should understand that the embodiments of the present invention may be provided as methods, systems, or computer program products. Accordingly, the present invention can take the form of an entirely hardware embodiment, an entirely software embodiment, or an embodiment combining software and hardware aspects. Furthermore, the present invention may take the form of a computer program product embodied on one or more computer-usable storage media (including but not limited to disk storage, CD-ROM, optical storage, etc.) having computer-usable program code embodied therein.
本发明是参照根据本发明实施例的方法、设备(系统)、和计算机程序产品的流程图和/或方框图来描述的。应理解可由计算机程序指令实现流程图和/或方框图中的每一流程和/或方框、以及流程图和/或方框图中的流程和/或方框的结合。可提供这些计算机程序指令到通用计算机、专用计算机、嵌入式处理机或其他可编程数据处理设备的处理器以产生一个机器,使得通过计算机或其他可编程数据处理设备的处理器执行的指令产生用于实现在流程图一个流程或多个流程和/或方框图一个方框或多个方框中指定的功能的装置。The present invention is described with reference to flowchart illustrations and/or block diagrams of methods, apparatus (systems), and computer program products according to embodiments of the invention. It should be understood that each procedure and/or block in the flowchart and/or block diagram, and a combination of procedures and/or blocks in the flowchart and/or block diagram can be realized by computer program instructions. These computer program instructions may be provided to a general purpose computer, special purpose computer, embedded processor, or processor of other programmable data processing equipment to produce a machine such that the instructions executed by the processor of the computer or other programmable data processing equipment produce a An apparatus for realizing the functions specified in one or more procedures of the flowchart and/or one or more blocks of the block diagram.
这些计算机程序指令也可存储在能引导计算机或其他可编程数据处理设备以特定方式工作的计算机可读存储器中,使得存储在该计算机可读存储器中的指令产生包括指令装置的制造品,该指令装置实现在流程图一个流程或多个流程和/或方框图一个方框或多个方框中指定的功能。These computer program instructions may also be stored in a computer-readable memory capable of directing a computer or other programmable data processing apparatus to operate in a specific manner, such that the instructions stored in the computer-readable memory produce an article of manufacture comprising instruction means, the instructions The device realizes the function specified in one or more procedures of the flowchart and/or one or more blocks of the block diagram.
这些计算机程序指令也可装载到计算机或其他可编程数据处理设备上,使得在计算机或其他可编程设备上执行一系列操作步骤以产生计算机实现的处理,从而在计算机或其他可编程设备上执行的指令提供用于实现在流程图一个流程或多个流程和/或方框图一个方框或多个方框中指定的功能的步骤。These computer program instructions can also be loaded onto a computer or other programmable data processing device, causing a series of operational steps to be performed on the computer or other programmable device to produce a computer-implemented process, thereby The instructions provide steps for implementing the functions specified in the flow chart or blocks of the flowchart and/or the block or blocks of the block diagrams.
最后应当说明的是:以上实施例仅用以说明本发明的技术方案而非对其限制,尽管参照上述实施例对本发明进行了详细的说明,所属领域的普通技术人员应当理解:依然可以对本发明的具体实施方式进行修改或者等同替换,而未脱离本发明精神和范围的任何修改或者等同替换,其均应涵盖在本发明的权利要求保护范围之内。Finally, it should be noted that the above embodiments are only used to illustrate the technical solutions of the present invention and not to limit them. Although the present invention has been described in detail with reference to the above embodiments, those of ordinary skill in the art should understand that: the present invention can still be Any modifications or equivalent replacements that do not depart from the spirit and scope of the present invention shall fall within the protection scope of the claims of the present invention.
Claims (10)
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202310163032.2A CN116028908A (en) | 2023-02-23 | 2023-02-23 | Continuous identity authentication method and related device based on incremental learning and meta learning |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202310163032.2A CN116028908A (en) | 2023-02-23 | 2023-02-23 | Continuous identity authentication method and related device based on incremental learning and meta learning |
Publications (1)
Publication Number | Publication Date |
---|---|
CN116028908A true CN116028908A (en) | 2023-04-28 |
Family
ID=86072558
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202310163032.2A Pending CN116028908A (en) | 2023-02-23 | 2023-02-23 | Continuous identity authentication method and related device based on incremental learning and meta learning |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN116028908A (en) |
-
2023
- 2023-02-23 CN CN202310163032.2A patent/CN116028908A/en active Pending
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Warnecke et al. | Evaluating explanation methods for deep learning in security | |
CN109409896B (en) | Bank fraud recognition model training method, bank fraud recognition method and device | |
EP3651043A1 (en) | Url attack detection method and apparatus, and electronic device | |
US10467394B2 (en) | Pointing device biometrics for continuous user authentication | |
Traore et al. | Combining mouse and keystroke dynamics biometrics for risk-based authentication in web environments | |
KR101879416B1 (en) | Apparatus and method for detecting abnormal financial transaction | |
WO2017140222A1 (en) | Modelling method and device for machine learning model | |
WO2020199621A1 (en) | Knowledge graph-based fraud detection | |
CN110442712B (en) | Risk determination method, risk determination device, server and text examination system | |
CN107122669B (en) | Method and device for evaluating data leakage risk | |
TW201816678A (en) | Illegal transaction detection method and illegal transaction detection device | |
CN111275416B (en) | Digital currency abnormal transaction detection method, device, electronic equipment and medium | |
CN110414277B (en) | Gate-level hardware Trojan detection method based on multi-feature parameters | |
Shen et al. | Touch-interaction behavior for continuous user authentication on smartphones | |
CN109033772A (en) | A kind of input method and device of verification information | |
CN110084609B (en) | Transaction fraud behavior deep detection method based on characterization learning | |
CN112330355A (en) | Consumption ticket transaction data processing method, device, equipment and storage medium | |
CN111931047A (en) | Artificial intelligence-based black product account detection method and related device | |
CN107026731A (en) | A kind of method and device of subscriber authentication | |
CN112084505A (en) | Deep learning model malicious sample detection method, system, device and storage medium | |
CN112750038B (en) | Transaction risk determination method, device and server | |
CN107784411A (en) | The detection method and device of key variables in model | |
CN116028908A (en) | Continuous identity authentication method and related device based on incremental learning and meta learning | |
CN111159698B (en) | Terminal implicit identity authentication method based on Sudoku password | |
US20240422183A1 (en) | Detecting Fraudulent User Flows |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination |