TY - GEN
T1 - An optimization neural network for smartphone data protection
AU - Hu, Wen Chen
AU - Zuo, Yanjun
AU - Kaabouch, Naima
AU - Chen, Lei
N1 - Since the launch of iPhones in 2007, smartphones become very popular these days. Because of their small sizes and high mobility, smartphones are easily los
PY - 2010
Y1 - 2010
N2 - Since the launch of iPhones in 2007, smartphones become very popular these days. Because of their small sizes and high mobility, smartphones are easily lost or stolen. When people lost their smartphones, they are worried the private data stored in the phones may be revealed to strangers. This research proposes a novel approach for mobile data protection. Mobile usage data is first collected and usage patterns are then discovered and saved. An optimization Hopfield neural network is proposed to match the usage data with the stored usage patterns. When an unusual usage pattern such as an unlawful user trying to access the mobile data is detected, the device will automatically lock itself down until a further action is taken. Experimental results show this method is effective and convenient for mobile data protection.
AB - Since the launch of iPhones in 2007, smartphones become very popular these days. Because of their small sizes and high mobility, smartphones are easily lost or stolen. When people lost their smartphones, they are worried the private data stored in the phones may be revealed to strangers. This research proposes a novel approach for mobile data protection. Mobile usage data is first collected and usage patterns are then discovered and saved. An optimization Hopfield neural network is proposed to match the usage data with the stored usage patterns. When an unusual usage pattern such as an unlawful user trying to access the mobile data is detected, the device will automatically lock itself down until a further action is taken. Experimental results show this method is effective and convenient for mobile data protection.
KW - Approximate string matching
KW - Hopfield neural network
KW - Smartphone security
KW - Smartphones
KW - Usage pattern discovery and identification
UR - https://www.scopus.com/pages/publications/78649278628
U2 - 10.1109/EIT.2010.5612088
DO - 10.1109/EIT.2010.5612088
M3 - Conference article
SN - 9781424468751
T3 - 2010 IEEE International Conference on Electro/Information Technology, EIT2010
BT - 2010 IEEE International Conference on Electro/Information Technology, EIT2010
T2 - 2010 IEEE International Conference on Electro/Information Technology, EIT2010
Y2 - 20 May 2010 through 22 May 2010
ER -