2,287 research outputs found
Recommended from our members
Comparing and Contrasting Knowledge on Mules and Hinnies as a Tool to Comprehend Their Behavior and Improve Their Welfare.
Mules and hinnies are the hybrids between donkeys (Equus asinus) and horses (Equus caballus). For centuries, mankind has used them for agrarian purposes, the military, or recreation. Contrasting literature with behavioral observations, we seek a better behavioral understanding andthus comprehensive solutions for their welfare enhancement. Over the past 6 years, we have assessed physical and behavioral welfare in over 900 mules by surveying owners from Egypt, Peru, Portugal, Spain, Mexico, and the U.S. These mules participated in shows, brick kiln work, cart-pulling, packing, tourism, and cattle herding. Observations are discussed alongside facts from the literature. Unfortunately, their behavior has been misunderstood by many, and harsh treatment and equipment has been used to control them. Few studies have attempted to define or use learning theory to understand how and why mules and hinnies behave as they do. Hence, understanding their health considerations, natural behavior, and training theory is crucial for those who work with them.Solutions to welfare improvement partially lie in an individual's ability to handle mules and hinnies from birth, and to proceed slowly through training. Conclusively, this review sets forth a clearer understanding of these hybrids' behaviors and promotes positive handling, allowing their access to more routine healthcare and ultimately, a higher welfare standard
Privacy-Protecting Techniques for Behavioral Data: A Survey
Our behavior (the way we talk, walk, or think) is unique and can be used as a biometric trait. It also correlates with sensitive attributes like emotions. Hence, techniques to protect individuals privacy against unwanted inferences are required. To consolidate knowledge in this area, we systematically reviewed applicable anonymization techniques. We taxonomize and compare existing solutions regarding privacy goals, conceptual operation, advantages, and limitations. Our analysis shows that some behavioral traits (e.g., voice) have received much attention, while others (e.g., eye-gaze, brainwaves) are mostly neglected. We also find that the evaluation methodology of behavioral anonymization techniques can be further improved
PsyMo: A Dataset for Estimating Self-Reported Psychological Traits from Gait
Psychological trait estimation from external factors such as movement and
appearance is a challenging and long-standing problem in psychology, and is
principally based on the psychological theory of embodiment. To date, attempts
to tackle this problem have utilized private small-scale datasets with
intrusive body-attached sensors. Potential applications of an automated system
for psychological trait estimation include estimation of occupational fatigue
and psychology, and marketing and advertisement. In this work, we propose PsyMo
(Psychological traits from Motion), a novel, multi-purpose and multi-modal
dataset for exploring psychological cues manifested in walking patterns. We
gathered walking sequences from 312 subjects in 7 different walking variations
and 6 camera angles. In conjunction with walking sequences, participants filled
in 6 psychological questionnaires, totalling 17 psychometric attributes related
to personality, self-esteem, fatigue, aggressiveness and mental health. We
propose two evaluation protocols for psychological trait estimation. Alongside
the estimation of self-reported psychological traits from gait, the dataset can
be used as a drop-in replacement to benchmark methods for gait recognition. We
anonymize all cues related to the identity of the subjects and publicly release
only silhouettes, 2D / 3D human skeletons and 3D SMPL human meshes
Continuous and transparent multimodal authentication: reviewing the state of the art
Individuals, businesses and governments undertake an ever-growing range of activities online and via various Internet-enabled digital devices. Unfortunately, these activities, services, information and devices are the targets of cybercrimes. Verifying the user legitimacy to use/access a digital device or service has become of the utmost importance. Authentication is the frontline countermeasure of ensuring only the authorized user is granted access; however, it has historically suffered from a range of issues related to the security and usability of the approaches. They are also still mostly functioning at the point of entry and those performing sort of re-authentication executing it in an intrusive manner. Thus, it is apparent that a more innovative, convenient and secure user authentication solution is vital. This paper reviews the authentication methods along with the current use of authentication technologies, aiming at developing a current state-of-the-art and identifying the open problems to be tackled and available solutions to be adopted. It also investigates whether these authentication technologies have the capability to fill the gap between high security and user satisfaction. This is followed by a literature review of the existing research on continuous and transparent multimodal authentication. It concludes that providing users with adequate protection and convenience requires innovative robust authentication mechanisms to be utilized in a universal level. Ultimately, a potential federated biometric authentication solution is presented; however it needs to be developed and extensively evaluated, thus operating in a transparent, continuous and user-friendly manner
On the Inference of Soft Biometrics from Typing Patterns Collected in a Multi-device Environment
In this paper, we study the inference of gender, major/minor (computer
science, non-computer science), typing style, age, and height from the typing
patterns collected from 117 individuals in a multi-device environment. The
inference of the first three identifiers was considered as classification
tasks, while the rest as regression tasks. For classification tasks, we
benchmark the performance of six classical machine learning (ML) and four deep
learning (DL) classifiers. On the other hand, for regression tasks, we
evaluated three ML and four DL-based regressors. The overall experiment
consisted of two text-entry (free and fixed) and four device (Desktop, Tablet,
Phone, and Combined) configurations. The best arrangements achieved accuracies
of 96.15%, 93.02%, and 87.80% for typing style, gender, and major/minor,
respectively, and mean absolute errors of 1.77 years and 2.65 inches for age
and height, respectively. The results are promising considering the variety of
application scenarios that we have listed in this work.Comment: The first two authors contributed equally. The code is available upon
request. Please contact the last autho
Adversarial Activity Detection and Prediction Using Behavioral Biometrics
Behavioral biometrics can be used in different security applications like authentication, identification, etc. One of the trending applications is predicting future activities of people and guessing whether they will engage in malicious activities in the future. In this research, we study the possibility of predicting future activities and propose novel methods for near-future activity prediction.
First, we study gait signals captured using smartphone accelerometer sensor and build a model to predict a future gait signal. Activity recognition using body movements captured from mobile phone sensors has been a major point of interest in recent research. Data that is being continuously read from mobile sensors can be used to recognize user activity. We propose a model for predicting human body movements based on the previous activity that has been read from sensors and continuously updating our prediction as new data becomes available. Our results show that our model can predict the future movement signal with a high accuracy that can contribute to several applications in the area.
Second, we study keystroke acoustics and build a model for predicting future activities of the users by recording their keystrokes audio. Using keystroke acoustics to predict typed text has significant advantages, such as being recorded covertly from a distance and requiring no physical access to the computer system. Recently, some studies have been done on keystroke acoustics, however, to the best of our knowledge none have used them to predict adversarial activities. On a dataset of two million keystrokes consisting of seven adversarial and one benign activity, we use a signal processing approach to extract keystrokes from the audio and a clustering method to recover the typed letters followed by a text recovery module to regenerate the typed words. Furthermore, we use a neural network model to classify the benign and adversarial activities and achieve significant results: (1) we extract individual keystroke sounds from the raw audio with 91% accuracy and recover words from audio recordings in a noisy environment with 71% average top-10 accuracy. (2) We classify adversarial activities with 93% to 98% average accuracy under different operating scenarios.
Third, we study the correlation between the personality traits of users with their keystroke and mouse dynamics. Even with the availability of multiple interfaces, such as voice, touch, etc., keyboard and mouse remain the primary interfaces to a computer. Any insights on the relation between keyboard and mouse dynamics with the personality type of the users can provide foundations for various applications, such as advertisement, social media, etc. We use a dataset of keystroke and mouse dynamics collected from 104 users together with their responses to two personality tests to analyze how their interaction with the computer relates to their personality. Our findings show that there are considerable trends and patterns in keystroke and mouse dynamics that are correlated with each personality type
Conceivable security risks and authentication techniques for smart devices
With the rapidly escalating use of smart devices and fraudulent transaction of users’ data from their devices, efficient and reliable techniques for authentication of the smart devices have become an obligatory issue. This paper reviews the security risks for mobile devices and studies several authentication techniques available for smart devices. The results from field studies enable a comparative evaluation of user-preferred authentication mechanisms and their opinions about reliability, biometric authentication and visual authentication techniques
- …