Home > Academic Announcements > (Jun. 14) Implicit Authentication based on User Behavior

(Jun. 14) Implicit Authentication based on User Behavior

Last updated :2019-06-10

Topic: Implicit Authentication based on User Behavior
Speaker: Dr. Jinyuan Sun
(University of Tennessee)
Host: Professor CHEN Xu
Time: 10:30-11:30, Friday, June 14, 2019
Venue: A201, School of Data and Computer Science, Guangzhou East Campus, SYSU

Abstract:
Authentication, if designed properly, prevents many notorious attacks such as identity theft and is the cornerstone of a secure cyberspace. The most widely used authentication method is still password-based using human-memorizable passwords which are trivial to attack despite their quality. Besides, it quickly becomes frustrating and overwhelming to people as more and more applications and services are designed with username and password. The fourth-factor authentication, i.e., based on what you do, is a form of implicit authentication that does not require explicit user action. It is the least explored authentication technique but is receiving more attention from the research community and industry due to the convenience, user-friendliness, lower cost, and better security it offers for practical deployment. In this seminar, we will cover the research done at the University of Tennessee along this line.

About the speaker:
Dr. Jinyuan Sun received the B.Sc. degree in computer information systems from Beijing Information Technology Institute, China, in 2003, the MASc degree in computer networks from Ryerson University, Canada, in 2005, and the Ph.D. degree in electrical and computer engineering from the University of Florida, in 2010. She was a Network Test Developer at RuggedCom Inc., Ontario, Canada, 2005-2006. She was an assistant professor in the Department of Electrical Engineering and Computer Science at the University of Tennessee, Knoxville 2010-2016. She has been an associate professor since 2016. Her current research interests include security and privacy related to IoT, the power grid, mobile systems, and computer networks.