Enhancing user identification through batch averaging of independent window subsequences using smartphone and wearable data

IF 5.4 2区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Computers & Security Pub Date : 2025-03-01 Epub Date: 2024-12-12 DOI:10.1016/j.cose.2024.104265
Rouhollah Ahmadian , Mehdi Ghatee , Johan Wahlström
{"title":"Enhancing user identification through batch averaging of independent window subsequences using smartphone and wearable data","authors":"Rouhollah Ahmadian ,&nbsp;Mehdi Ghatee ,&nbsp;Johan Wahlström","doi":"10.1016/j.cose.2024.104265","DOIUrl":null,"url":null,"abstract":"<div><div>Throughout daily life, individuals partake in various activities such as walking, sitting, and drinking, often in a random manner. These physical activities generally exhibit similar patterns across different people, posing a challenge for identifying users using smartphone and wearable data. To tackle this issue, we have developed a new model called Batch Averaging Probabilities (BAP). Our approach involves segmenting input sequences into separate windows, independently classifying each segment, and then averaging the probabilistic predictions to make the final decision. The BAP method introduces the concept of primary patterns, which are the smallest meaningful sequences. It effectively deals with the random order of primary patterns within mixed patterns. Our work includes theoretical evidence supporting the BAP method, showcasing its ability to minimize prediction variance and enhance model accuracy. Additionally, the model’s training algorithm employs a unique approach. Model selection and regularization are based on the averaged loss of segments, reducing overfitting and improving performance without the complexity associated with using an ensemble of neural network models. We evaluated the effectiveness of our proposed method using accelerometer and gyroscope data from diverse user activity datasets including UIFW, WISM, HOP, CLD, RSSI, DI, DB2 and HAR, demonstrating significant performance improvements over state-of-the-art models. Specifically, our approach outperforms DB2 by 1.08%, HAR by 7.67%, and DI by 14.76% in terms of accuracy.</div></div>","PeriodicalId":51004,"journal":{"name":"Computers & Security","volume":"150 ","pages":"Article 104265"},"PeriodicalIF":5.4000,"publicationDate":"2025-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Computers & Security","FirstCategoryId":"94","ListUrlMain":"https://www.sciencedirect.com/science/article/pii/S0167404824005716","RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"2024/12/12 0:00:00","PubModel":"Epub","JCR":"Q1","JCRName":"COMPUTER SCIENCE, INFORMATION SYSTEMS","Score":null,"Total":0}
引用次数: 0

Abstract

Throughout daily life, individuals partake in various activities such as walking, sitting, and drinking, often in a random manner. These physical activities generally exhibit similar patterns across different people, posing a challenge for identifying users using smartphone and wearable data. To tackle this issue, we have developed a new model called Batch Averaging Probabilities (BAP). Our approach involves segmenting input sequences into separate windows, independently classifying each segment, and then averaging the probabilistic predictions to make the final decision. The BAP method introduces the concept of primary patterns, which are the smallest meaningful sequences. It effectively deals with the random order of primary patterns within mixed patterns. Our work includes theoretical evidence supporting the BAP method, showcasing its ability to minimize prediction variance and enhance model accuracy. Additionally, the model’s training algorithm employs a unique approach. Model selection and regularization are based on the averaged loss of segments, reducing overfitting and improving performance without the complexity associated with using an ensemble of neural network models. We evaluated the effectiveness of our proposed method using accelerometer and gyroscope data from diverse user activity datasets including UIFW, WISM, HOP, CLD, RSSI, DI, DB2 and HAR, demonstrating significant performance improvements over state-of-the-art models. Specifically, our approach outperforms DB2 by 1.08%, HAR by 7.67%, and DI by 14.76% in terms of accuracy.

Abstract Image

查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
通过使用智能手机和可穿戴数据对独立窗口子序列进行批量平均来增强用户识别
在日常生活中,人们经常以随机的方式参与各种活动,如走路、坐着和喝酒。这些身体活动通常在不同的人身上表现出相似的模式,这给使用智能手机和可穿戴数据识别用户带来了挑战。为了解决这个问题,我们开发了一个新的模型,称为批平均概率(BAP)。我们的方法包括将输入序列分割到单独的窗口,独立地对每个部分进行分类,然后平均概率预测以做出最终决定。BAP方法引入了主模式的概念,即最小的有意义序列。它有效地处理了混合模式中主模式的随机顺序。我们的工作包括支持BAP方法的理论证据,展示了其最小化预测方差和提高模型准确性的能力。此外,该模型的训练算法采用了独特的方法。模型选择和正则化基于段的平均损失,减少了过拟合,提高了性能,而没有使用神经网络模型集合的复杂性。我们使用来自不同用户活动数据集(包括UIFW, WISM, HOP, CLD, RSSI, DI, DB2和HAR)的加速度计和陀螺仪数据评估了我们提出的方法的有效性,证明了比最先进模型的显着性能改进。具体来说,我们的方法在准确性方面比DB2高1.08%,比HAR高7.67%,比DI高14.76%。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 去求助
来源期刊
Computers & Security
Computers & Security 工程技术-计算机:信息系统
CiteScore
12.40
自引率
7.10%
发文量
365
审稿时长
10.7 months
期刊介绍: Computers & Security is the most respected technical journal in the IT security field. With its high-profile editorial board and informative regular features and columns, the journal is essential reading for IT security professionals around the world. Computers & Security provides you with a unique blend of leading edge research and sound practical management advice. It is aimed at the professional involved with computer security, audit, control and data integrity in all sectors - industry, commerce and academia. Recognized worldwide as THE primary source of reference for applied research and technical expertise it is your first step to fully secure systems.
期刊最新文献
RanDS: A large-Scale open dataset of raw binaries and extracted features for ransomware research Unifying mixed boolean-arithmetic obfuscation by architectural and anti-generalization hardening Bridging industrial control systems design and testing through threat modeling-driven penetration testing - a microgrid case study The FABRICS framework: A Bayesian approach to financial quantification of cyber risk Reliable location selection and hierarchical interleaved bloom filter based iris template protection
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1