Research Article

Who Is Using the Phone? Representation-Learning-Based Continuous Authentication on Smartphones

Table 4

Comparison of authentication accuracy of machine learning algorithms with single MCBG.

AlgorithmKFG (%)IFG (%)SFG (%)

Support vector machine84.7266.3246.99
Logistic regression85.6966.0995.22
Naïve Bayes85.5164.2262.37
C4.5 decision tree89.5163.3086.69
Gradient boosting decision tree92.7069.2993.97
Convolutional neural networks93.9292.9595.43