Skip to content
@UW-CIA

Continuous and Implicit Authentication @ UWATERLOO

The way you handle your devices is your next-gen password.
  • 2 followers
  • Cheriton School of Computer Science - University of Waterloo

Popular repositories

  1. Extensive_Evaluations Extensive_Evaluations Public

    Experiments evaluating 10+ ml models in anomaly detection cases for continuous and implicit authentication using the HMOG data set.

    Jupyter Notebook 1 1

  2. Mobile_Data_Acquisition Mobile_Data_Acquisition Public

    Data collection and real-time streaming application for Android and IOS systems using MIT App Inventor.

    TeX 1

  3. Models_at_edge Models_at_edge Public

    Running VAEs on mobile and IOT devices using TFLite.

    Jupyter Notebook 1

Repositories

Showing 3 of 3 repositories
  • Extensive_Evaluations Public

    Experiments evaluating 10+ ml models in anomaly detection cases for continuous and implicit authentication using the HMOG data set.

    Jupyter Notebook 1 1 0 0 Updated Jun 16, 2021
  • Mobile_Data_Acquisition Public

    Data collection and real-time streaming application for Android and IOS systems using MIT App Inventor.

    TeX 1 0 0 0 Updated Jun 16, 2021
  • Models_at_edge Public

    Running VAEs on mobile and IOT devices using TFLite.

    Jupyter Notebook 1 0 0 0 Updated Jun 16, 2021

Top languages

Loading…

Most used topics

Loading…