Impact of Loss Function Using M-LSTM Classifier for Sequence Data

Authors

  • Sahityabhilash K. Student, Department of Computer Science and Engineering, Sathyabama Institute of Science and Technology Author
  • Prayla Shyry S. Associate Professor, Department of Computer Science and Engineering, Sathyabama Institute of Science and Technology Author

DOI:

https://doi.org/10.61841/kbeqd452

Keywords:

Long Short-Term Memory (LSTM), Loss Function, Cross-Entropy, Hinge, Normalisation, Biometric, Key Stroke Dynamics (KSD)

Abstract

The increasing dependence on information systems has opened a lot of possibilities in solving real life problems and led to the increase of threat to privacy, integrity and authentication. Even though a lot of key based authentication systems are in use biometrics provide a better performance, apart from physiological biometrics like iris, thumb impression etc., For verifying a person, a behavioural biometric technique called Keystroke dynamics can be used. Biometric based user authentication is a sequence classification task. This study provides a comparison of different loss functions and their performance on keystroke dynamics data. This work uses Long Short-Term Memory (LSTM) representing Neural Network and we have taken 5 different loss functions for the study. 

Downloads

Download data is not yet available.

References

[1] S. Hochreiter and J. Schmidhuber. (1997). “Long Short-term Memory.” Neural computation. 9. 1735-80.

[2] Chen, Tianqi. Introduction to Boosted Trees. 2014. url:https://homes.cs.washington.edu/%7B~%

7Dtqchen/pdf/BoostedTree.pdf (visited on 02/02/2018).

[3] Chen, Tianqi and Guestrin, Carlos. “XGBoost: A Scalable Tree Boosting System”. In:CoRR abs/1603.0

(2016).

[4] DMLC, Distributed Machine Learning Community. XGBoost Documents. 2016. url:http://xgboost.

readthedocs.io/en/latest/ (visited on 04/26/2018).

[5] Malmström, Josef, and Hannes Lindström. "Typing Biometrics for User Authentication-a One-shot

Approach."

[6] Shankar, V., & Singh, K. (2019). An Intelligent Scheme for Continuous Authentication of Smartphone

Using Deep Auto Encoder and Softmax Regression Model Easy for User Brain. IEEE Access, 7, 48645-

48654.

[7] Pedregosa, Fabian, et al. "Scikit-learn: Machine learning in Python." Journal of machine learning research

12. Oct (2011): 2825-2830.

[8] Buja, Andreas, Werner Stuetzle, and Yi Shen. "Loss functions for binary class probability estimation and

classification: Structure and applications." Working draft, November 3 (2005).

[9] Deep Learning with Python, 2017 ISBN: 978-1-4842-2765-7 Nikhil Ketka.

[10] Kobojek, Paweł & Saeed, Khalid. (2016). Application of recurrent neural networks for user verification

based on keystroke dynamics. 2016. 80-90.

[11] Enyedi, Kinga & Kunkli, Roland. (2019). Type Vis: Visualization of Keystrokes and Typing Patterns based

on Time Series Analysis. 346-353. 10.5220/0007584103460353.

[12] Lima do Nascimento, Tuany Mariah, et al. "An investigation of genetic algorithm-based feature selection

techniques applied to keystroke dynamics biometrics." (2019): 1-4.

Downloads

Published

31.07.2020

How to Cite

K. , S., & S. , P. S. (2020). Impact of Loss Function Using M-LSTM Classifier for Sequence Data. International Journal of Psychosocial Rehabilitation, 24(5), 3487-3494. https://doi.org/10.61841/kbeqd452