User-Device Authentication in Mobile Banking using APHEN for Paratuck2 Tensor Decomposition

被引:1
|
作者
Charlier, Jeremy [1 ]
Falk, Eric [1 ]
State, Radu [1 ]
Hilger, Jean [2 ]
机构
[1] Univ Luxembourg, Esch Sur Alzette, Luxembourg
[2] BCEE, Luxembourg, Luxembourg
关键词
Tensor decomposition; Paratuck2; Neural networks; Recommender engines; Authentication; FAMILY;
D O I
10.1109/ICDMW.2018.00130
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The new financial European regulations such as PSD2 are changing the retail banking services. Noticeably, the monitoring of the personal expenses is now opened to other institutions than retail banks. Nonetheless, the retail banks are looking to leverage the user-device authentication on the mobile banking applications to enhance the personal financial advertisement. To address the profiling of the authentication, we rely on tensor decompositions, a higher dimensional analogue of matrix decompositions. We use Paratuck2, which expresses a tensor as a multiplication of matrices and diagonal tensors, because of the imbalance between the number of users and devices. We highlight why Paratuck2 is more appropriate in this case than the popular CP tensor decomposition, which decomposes a tensor as a sum of rank-one tensors. However, the computation of Paratuck2 is computational intensive. We propose a new APproximate HEssian-based Newton resolution algorithm, APHEN, capable of solving Paratuck2 more accurately and faster than the other popular approaches based on alternating least square or gradient descent. The results of Paratuck2 are used for the predictions of users' authentication with neural networks. We apply our method for the concrete case of targeting clients for financial advertising campaigns based on the authentication events generated by mobile banking applications.
引用
收藏
页码:886 / 894
页数:9
相关论文
共 10 条
  • [1] Voice Based User-Device Physical Unclonable Functions for Mobile Device Authentication
    Guo, Yunxi
    Tyagi, Akhilesh
    2016 IEEE COMPUTER SOCIETY ANNUAL SYMPOSIUM ON VLSI (ISVLSI), 2016, : 512 - 517
  • [2] Voice-Based User-Device Physical Unclonable Functions for Mobile Device Authentication
    Yunxi Guo
    Akhilesh Tyagi
    Journal of Hardware and Systems Security, 2017, 1 (1) : 18 - 37
  • [3] Non-Negative Paratuck2 Tensor Decomposition Combined to LSTM Network For Smart Contracts Profiling
    Charlier, Jeremy
    State, Radu
    Hilger, Jean
    2018 IEEE INTERNATIONAL CONFERENCE ON BIG DATA AND SMART COMPUTING (BIGCOMP), 2018, : 74 - 81
  • [4] Channel estimation for multi-input multi-output relay systems using the PARATUCK2 tensor model
    Du, Jianhe
    Yuan, Chaowei
    Tian, Pei
    Lin, Heyun
    IET COMMUNICATIONS, 2016, 10 (09) : 995 - 1002
  • [5] Towards Device-to-User Authentication: Protecting Against Phishing Hardware by Ensuring Mobile Device Authenticity using Vibration Patterns
    Findling, Rainhard Dieter
    Mayrhofer, Rene
    PROCEEDINGS OF THE 14TH INTERNATIONAL CONFERENCE ON MOBILE AND UBIQUITOUS MULTIMEDIA (MUM 2015), 2015, : 131 - 135
  • [6] A New Dynamic ID-Based User Authentication Scheme Using Mobile Device: Cryptanalysis, the Principles and Design
    Li, Xiong
    Liao, Junguo
    Kumari, Saru
    Liang, Wei
    Wu, Fan
    Khan, Muhammad Khurram
    WIRELESS PERSONAL COMMUNICATIONS, 2015, 85 (01) : 263 - 288
  • [7] A New Dynamic ID-Based User Authentication Scheme Using Mobile Device: Cryptanalysis, the Principles and Design
    Xiong Li
    Junguo Liao
    Saru Kumari
    Wei Liang
    Fan Wu
    Muhammad Khurram Khan
    Wireless Personal Communications, 2015, 85 : 263 - 288
  • [8] User Authentication using Combination of Behavioral Biometrics over the Touchpad acting like Touch screen of Mobile Device
    Saevanee, Hataichanok
    Hatarakosol, Pattarasince
    ICCEE 2008: PROCEEDINGS OF THE 2008 INTERNATIONAL CONFERENCE ON COMPUTER AND ELECTRICAL ENGINEERING, 2008, : 82 - 86
  • [9] A study of privacy problem solving using device and user authentication for M2M environments
    Kim, Jin-Mook
    Jeong, Hwa-Young
    Hong, Bong-Hwa
    SECURITY AND COMMUNICATION NETWORKS, 2014, 7 (10) : 1528 - 1535
  • [10] A proposal of user authentication and a content distribution mechanism using P2P connection over a mobile ad hoc network
    Oguchi, M
    Nakatsuka, Y
    Tomizawa, C
    PROCEEDINGS OF THE IASTED INTERNATIONAL CONFERENCE COMMUNICATION SYSTEMS AND NETWORKS, 2004, : 65 - 69