Skip to main content

Showing 1–9 of 9 results for author: Pryor, L

Searching in archive cs. Search in all archives.
.
  1. arXiv:2302.10280  [pdf

    cs.CV

    Deepfake Detection Analyzing Hybrid Dataset Utilizing CNN and SVM

    Authors: Jacob mallet, Laura Pryor, Rushit Dave, Mounika Vanamala

    Abstract: Social media is currently being used by many individuals online as a major source of information. However, not all information shared online is true, even photos and videos can be doctored. Deepfakes have recently risen with the rise of technological advancement and have allowed nefarious online users to replace one face with a computer generated face of anyone they would like, including important… ▽ More

    Submitted 26 January, 2023; originally announced February 2023.

  2. arXiv:2205.08371  [pdf

    cs.CR cs.AI cs.LG

    Evaluation of a User Authentication Schema Using Behavioral Biometrics and Machine Learning

    Authors: Laura Pryor, Jacob Mallet, Rushit Dave, Naeem Seliya, Mounika Vanamala, Evelyn Sowells Boone

    Abstract: The amount of secure data being stored on mobile devices has grown immensely in recent years. However, the security measures protecting this data have stayed static, with few improvements being done to the vulnerabilities of current authentication methods such as physiological biometrics or passwords. Instead of these methods, behavioral biometrics has recently been researched as a solution to the… ▽ More

    Submitted 7 May, 2022; originally announced May 2022.

  3. arXiv:2204.09088  [pdf

    cs.CR cs.AI

    Exploration of Machine Learning Classification Models Used for Behavioral Biometrics Authentication

    Authors: Sara Kokal, Laura Pryor, Rushit Dave

    Abstract: Mobile devices have been manufactured and enhanced at growing rates in the past decades. While this growth has significantly evolved the capability of these devices, their security has been falling behind. This contrast in development between capability and security of mobile devices is a significant problem with the sensitive information of the public at risk. Continuing the previous work in this… ▽ More

    Submitted 19 April, 2022; originally announced April 2022.

  4. arXiv:2201.08564  [pdf

    cs.CR cs.LG

    Hold On and Swipe: A Touch-Movement Based Continuous Authentication Schema based on Machine Learning

    Authors: Rushit Dave, Naeem Seliya, Laura Pryor, Mounika Vanamala, Evelyn Sowells, Jacob mallet

    Abstract: In recent years the amount of secure information being stored on mobile devices has grown exponentially. However, current security schemas for mobile devices such as physiological biometrics and passwords are not secure enough to protect this information. Behavioral biometrics have been heavily researched as a possible solution to this security deficiency for mobile devices. This study aims to con… ▽ More

    Submitted 21 January, 2022; originally announced January 2022.

  5. arXiv:2110.07826  [pdf

    cs.CR cs.AI

    Machine Learning Algorithms In User Authentication Schemes

    Authors: Laura Pryor, Dr. Rushit Dave, Dr. Naeem Seliya, Dr. Evelyn R Sowells Boone

    Abstract: In the past two decades, the number of mobile products being created by companies has grown exponentially. However, although these devices are constantly being upgraded with the newest features, the security measures used to protect these devices has stayed relatively the same over the past two decades. The vast difference in growth patterns between devices and their security is opening up the ris… ▽ More

    Submitted 14 October, 2021; originally announced October 2021.

  6. arXiv:1011.1021  [pdf

    cs.SE

    What's the point of documentation?

    Authors: Louise Pryor

    Abstract: We give a brief characterisation of the purposes and forms of documentation in and of spreadsheets.

    Submitted 3 November, 2010; originally announced November 2010.

    Comments: 4 Pages, 1 Colour Figure. Referenced by GJC in Nov 2010; ISBN:1-905617-08-9

    Journal ref: Proc. European Spreadsheet Risks Int. Grp. (EuSpRIG) 2006

  7. arXiv:0808.2045  [pdf

    cs.SE cs.HC

    Correctness is not enough

    Authors: Louise Pryor

    Abstract: The usual aim of spreadsheet audit is to verify correctness. There are two problems with this: first, it is often difficult to tell whether the spreadsheets in question are correct, and second, even if they are, they may still give the wrong results. These problems are explained in this paper, which presents the key criteria for judging a spreadsheet and discusses how those criteria can be achie… ▽ More

    Submitted 14 August, 2008; originally announced August 2008.

    Comments: 6 Pages, 1 Table, 2 Figures

    Journal ref: Proc. European Spreadsheet Risks Int. Grp. (EuSpRIG) 2003 117-122 ISBN 1 86166 199 1

  8. arXiv:0807.3187  [pdf

    cs.SE

    When, why and how to test spreadsheets

    Authors: Louise Pryor

    Abstract: Testing is a vital part of software development, and spreadsheets are like any other software in this respect. This paper discusses the testing of spreadsheets in the light of one practitioner's experience. It considers the concept of software testing and how it differs from reviewing, and describes when it might take place. Different types of testing are described, and some techniques for perfo… ▽ More

    Submitted 20 July, 2008; originally announced July 2008.

    Comments: 7 pages, 5 colour figures

    Journal ref: Proc. European Spreadsheet Risks Int. Grp. (EuSpRIG) 2004 145-151 ISBN 1 902724 94 1

  9. arXiv:cs/9605106  [pdf, ps

    cs.AI

    2Planning for Contingencies: A Decision-based Approach

    Authors: L. Pryor, G. Collins

    Abstract: A fundamental assumption made by classical AI planners is that there is no uncertainty in the world: the planner has full knowledge of the conditions under which the plan will be executed and the outcome of every action is fully predictable. These planners cannot therefore construct contingency plans, i.e., plans in which different actions are performed in different circumstances. In this paper… ▽ More

    Submitted 30 April, 1996; originally announced May 1996.

    Comments: See http://www.jair.org/ for any accompanying files

    Journal ref: Journal of Artificial Intelligence Research, Vol 4, (1996), 287-339