{"id":"https://openalex.org/W4366967629","doi":"https://doi.org/10.1145/3544793.3560356","title":"Practical Privacy-Preserving Behaviour-Based Authentication on the Edge","display_name":"Practical Privacy-Preserving Behaviour-Based Authentication on the Edge","publication_year":2022,"publication_date":"2022-09-11","ids":{"openalex":"https://openalex.org/W4366967629","doi":"https://doi.org/10.1145/3544793.3560356"},"language":"en","primary_location":{"id":"doi:10.1145/3544793.3560356","is_oa":true,"landing_page_url":"https://doi.org/10.1145/3544793.3560356","pdf_url":"https://dl.acm.org/doi/pdf/10.1145/3544793.3560356","source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 2022 ACM International Joint Conference on Pervasive and Ubiquitous Computing","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"gold","oa_url":"https://dl.acm.org/doi/pdf/10.1145/3544793.3560356","any_repository_has_fulltext":null},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5080995810","display_name":"Andra\u017e Kra\u0161ovec","orcid":"https://orcid.org/0009-0007-4077-0826"},"institutions":[{"id":"https://openalex.org/I153976015","display_name":"University of Ljubljana","ror":"https://ror.org/05njb9z20","country_code":"SI","type":"education","lineage":["https://openalex.org/I153976015"]},{"id":"https://openalex.org/I4210118689","display_name":"Joint Research Centre","ror":"https://ror.org/02qezmz13","country_code":"IT","type":"government","lineage":["https://openalex.org/I1320481043","https://openalex.org/I2800387288","https://openalex.org/I4210118689","https://openalex.org/I4210161702"]}],"countries":["IT","SI"],"is_corresponding":true,"raw_author_name":"Andra\u017e Kra\u0161ovec","raw_affiliation_strings":["Cyber &amp; Digital Citizens' Security, Joint Research Centre, Italy and Faculty of Computer and Information Science, University of Ljubljana, Slovenia"],"affiliations":[{"raw_affiliation_string":"Cyber &amp; Digital Citizens' Security, Joint Research Centre, Italy and Faculty of Computer and Information Science, University of Ljubljana, Slovenia","institution_ids":["https://openalex.org/I4210118689","https://openalex.org/I153976015"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5043398857","display_name":"Veljko Pejovi\u0107","orcid":"https://orcid.org/0000-0002-9009-0024"},"institutions":[{"id":"https://openalex.org/I153976015","display_name":"University of Ljubljana","ror":"https://ror.org/05njb9z20","country_code":"SI","type":"education","lineage":["https://openalex.org/I153976015"]}],"countries":["SI"],"is_corresponding":false,"raw_author_name":"Veljko Pejovic","raw_affiliation_strings":["University of Ljubljana, Slovenia"],"affiliations":[{"raw_affiliation_string":"University of Ljubljana, Slovenia","institution_ids":["https://openalex.org/I153976015"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5080995810"],"corresponding_institution_ids":["https://openalex.org/I153976015","https://openalex.org/I4210118689"],"apc_list":null,"apc_paid":null,"fwci":0.6063,"has_fulltext":false,"cited_by_count":2,"citation_normalized_percentile":{"value":0.76489626,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":90,"max":95},"biblio":{"volume":null,"issue":null,"first_page":"65","last_page":"66"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11800","display_name":"User Authentication and Security Systems","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11800","display_name":"User Authentication and Security Systems","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10764","display_name":"Privacy-Preserving Technologies in Data","score":0.9962999820709229,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11598","display_name":"Internet Traffic Analysis and Secure E-voting","score":0.9957000017166138,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8401415348052979},{"id":"https://openalex.org/keywords/cloud-computing","display_name":"Cloud computing","score":0.7380918860435486},{"id":"https://openalex.org/keywords/authentication","display_name":"Authentication (law)","score":0.6294336318969727},{"id":"https://openalex.org/keywords/edge-computing","display_name":"Edge computing","score":0.584778368473053},{"id":"https://openalex.org/keywords/biometrics","display_name":"Biometrics","score":0.57660973072052},{"id":"https://openalex.org/keywords/enhanced-data-rates-for-gsm-evolution","display_name":"Enhanced Data Rates for GSM Evolution","score":0.5758354067802429},{"id":"https://openalex.org/keywords/identification","display_name":"Identification (biology)","score":0.563213050365448},{"id":"https://openalex.org/keywords/inference","display_name":"Inference","score":0.5237027406692505},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.5136770606040955},{"id":"https://openalex.org/keywords/edge-device","display_name":"Edge device","score":0.5063759088516235},{"id":"https://openalex.org/keywords/information-privacy","display_name":"Information privacy","score":0.46906518936157227},{"id":"https://openalex.org/keywords/internet-of-things","display_name":"Internet of Things","score":0.4429800510406494},{"id":"https://openalex.org/keywords/human\u2013computer-interaction","display_name":"Human\u2013computer interaction","score":0.4031989574432373},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.2868320941925049}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8401415348052979},{"id":"https://openalex.org/C79974875","wikidata":"https://www.wikidata.org/wiki/Q483639","display_name":"Cloud computing","level":2,"score":0.7380918860435486},{"id":"https://openalex.org/C148417208","wikidata":"https://www.wikidata.org/wiki/Q4825882","display_name":"Authentication (law)","level":2,"score":0.6294336318969727},{"id":"https://openalex.org/C2778456923","wikidata":"https://www.wikidata.org/wiki/Q5337692","display_name":"Edge computing","level":3,"score":0.584778368473053},{"id":"https://openalex.org/C184297639","wikidata":"https://www.wikidata.org/wiki/Q177765","display_name":"Biometrics","level":2,"score":0.57660973072052},{"id":"https://openalex.org/C162307627","wikidata":"https://www.wikidata.org/wiki/Q204833","display_name":"Enhanced Data Rates for GSM Evolution","level":2,"score":0.5758354067802429},{"id":"https://openalex.org/C116834253","wikidata":"https://www.wikidata.org/wiki/Q2039217","display_name":"Identification (biology)","level":2,"score":0.563213050365448},{"id":"https://openalex.org/C2776214188","wikidata":"https://www.wikidata.org/wiki/Q408386","display_name":"Inference","level":2,"score":0.5237027406692505},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.5136770606040955},{"id":"https://openalex.org/C138236772","wikidata":"https://www.wikidata.org/wiki/Q25098575","display_name":"Edge device","level":3,"score":0.5063759088516235},{"id":"https://openalex.org/C123201435","wikidata":"https://www.wikidata.org/wiki/Q456632","display_name":"Information privacy","level":2,"score":0.46906518936157227},{"id":"https://openalex.org/C81860439","wikidata":"https://www.wikidata.org/wiki/Q251212","display_name":"Internet of Things","level":2,"score":0.4429800510406494},{"id":"https://openalex.org/C107457646","wikidata":"https://www.wikidata.org/wiki/Q207434","display_name":"Human\u2013computer interaction","level":1,"score":0.4031989574432373},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.2868320941925049},{"id":"https://openalex.org/C86803240","wikidata":"https://www.wikidata.org/wiki/Q420","display_name":"Biology","level":0,"score":0.0},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.0},{"id":"https://openalex.org/C59822182","wikidata":"https://www.wikidata.org/wiki/Q441","display_name":"Botany","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1145/3544793.3560356","is_oa":true,"landing_page_url":"https://doi.org/10.1145/3544793.3560356","pdf_url":"https://dl.acm.org/doi/pdf/10.1145/3544793.3560356","source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 2022 ACM International Joint Conference on Pervasive and Ubiquitous Computing","raw_type":"proceedings-article"}],"best_oa_location":{"id":"doi:10.1145/3544793.3560356","is_oa":true,"landing_page_url":"https://doi.org/10.1145/3544793.3560356","pdf_url":"https://dl.acm.org/doi/pdf/10.1145/3544793.3560356","source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 2022 ACM International Joint Conference on Pervasive and Ubiquitous Computing","raw_type":"proceedings-article"},"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":true},"content_urls":{"pdf":"https://content.openalex.org/works/W4366967629.pdf"},"referenced_works_count":5,"referenced_works":["https://openalex.org/W2978329087","https://openalex.org/W3004195290","https://openalex.org/W3036554922","https://openalex.org/W3117823201","https://openalex.org/W3121797687"],"related_works":["https://openalex.org/W3104966193","https://openalex.org/W2123843216","https://openalex.org/W4322761281","https://openalex.org/W4238233472","https://openalex.org/W4312996489","https://openalex.org/W3111395152","https://openalex.org/W4313526662","https://openalex.org/W3106131444","https://openalex.org/W3216099748","https://openalex.org/W4205963435"],"abstract_inverted_index":{"Sensing-enabled":[0],"Internet":[1],"of":[2,10,19,25,136],"Things":[3],"(IoT)":[4],"devices":[5,122],"provide":[6],"an":[7,67],"attractive":[8],"source":[9],"data":[11,36,49,87],"that":[12,34,83],"can":[13,72],"be":[14,51,73],"used":[15,52],"for":[16,55,61,105,145,161],"seamless":[17],"authentication":[18,169],"people":[20],"located":[21],"within":[22,66],"the":[23,35,48,77,80,91,124,137,157],"reach":[24],"these":[26,152],"sensors.":[27],"However,":[28],"current":[29],"behaviour-biometric":[30],"solutions":[31],"often":[32],"require":[33],"is":[37,88],"centrally":[38],"stored":[39],"and":[40,123,126,133],"processed.":[41],"This":[42],"may":[43,50],"pose":[44],"privacy":[45],"risks,":[46],"as":[47],"not":[53],"only":[54,84,154],"identifying":[56],"a":[57,63,96,117],"user,":[58],"but":[59],"also":[60],"inferring":[62],"user\u2019s":[64],"activities":[65],"IoT":[68],"environment.":[69],"The":[70],"risk":[71],"alleviated":[74],"by":[75],"shifting":[76],"processing":[78],"to":[79,90,113,131,170],"edge,":[81],"so":[82],"selected,":[85],"obfuscated":[86],"sent":[89],"cloud.":[92],"Previous":[93],"work":[94,110,163],"proposes":[95],"conceptually":[97],"elegant":[98],"privacy-preserving":[99,146],"distributed":[100,119,138,147,166],"deep":[101,148],"learning":[102,149],"inference":[103],"method":[104,118],"user":[106],"identification.":[107],"In":[108],"this":[109],"we":[111],"attempt":[112],"actually":[114],"implement":[115],"such":[116],"over":[120],"edge":[121],"cloud,":[125],"uncover":[127],"significant":[128],"challenges":[129],"related":[130],"hardware":[132],"system":[134],"limitations":[135],"setup.":[139],"We":[140],"then":[141],"propose":[142],"amelioration":[143],"strategies":[144,153],"training.":[150],"Nevertheless,":[151],"partly":[155],"address":[156],"identified":[158],"issues,":[159],"calling":[160],"further":[162],"in":[164],"bringing":[165],"sensor-based":[167],"behaviour":[168],"reality.":[171]},"counts_by_year":[{"year":2025,"cited_by_count":1},{"year":2024,"cited_by_count":1}],"updated_date":"2026-01-26T23:06:41.788003","created_date":"2025-10-10T00:00:00"}
