Title | ||
---|---|---|
Breathing-Based Authentication on Resource-Constrained IoT Devices using Recurrent Neural Networks. |
Abstract | ||
---|---|---|
Recurrent neural networks (RNNs) have shown promising results in audio and speech-processing applications. The increasing popularity of Internet of Things (IoT) devices makes a strong case for implementing RNN-based inferences for applications such as acoustics-based authentication and voice commands for smart homes. However, the feasibility and performance of these inferences on resource-constrai... |
Year | DOI | Venue |
---|---|---|
2018 | 10.1109/MC.2018.2381119 | Computer |
Keywords | Field | DocType |
Authentication,Performance evaluation,Hidden Markov models,Machine learning,Mel frequency cepstral coefficient,Recurrent neural networks | Mel-frequency cepstrum,Authentication,Computer security,Computer science,Wearable computer,Popularity,Computer network,Recurrent neural network,Artificial intelligence,Deep learning,Hidden Markov model,Voice command device | Journal |
Volume | Issue | ISSN |
51 | 5 | 0018-9162 |
Citations | PageRank | References |
2 | 0.39 | 0 |
Authors | ||
6 |
Name | Order | Citations | PageRank |
---|---|---|---|
Jagmohan Chauhan | 1 | 33 | 4.93 |
Suranga Seneviratne | 2 | 155 | 18.43 |
Yining Hu | 3 | 48 | 5.95 |
Archan Misra | 4 | 1688 | 149.25 |
Aruna Seneviratne | 5 | 1086 | 121.47 |
Youngki Lee | 6 | 832 | 70.33 |