Romain Giot

ORCID: 0000-0002-0638-7504
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • User Authentication and Security Systems
  • Biometric Identification and Security
  • Data Visualization and Analytics
  • Anomaly Detection Techniques and Applications
  • Explainable Artificial Intelligence (XAI)
  • Advanced Malware Detection Techniques
  • Advanced Steganography and Watermarking Techniques
  • Data Management and Algorithms
  • Visual Attention and Saliency Detection
  • Face recognition and analysis
  • Graph Theory and Algorithms
  • Computer Graphics and Visualization Techniques
  • Advanced Neural Network Applications
  • Neural Networks and Applications
  • Advanced Neuroimaging Techniques and Applications
  • Interactive and Immersive Displays
  • Hand Gesture Recognition Systems
  • Handwritten Text Recognition Techniques
  • Face and Expression Recognition
  • Machine Learning and Data Classification
  • Adversarial Robustness in Machine Learning
  • Image and Video Quality Assessment
  • Advanced MRI Techniques and Applications
  • Digital Communication and Language
  • Video Analysis and Summarization

Centre National de la Recherche Scientifique
2011-2024

Institut Polytechnique de Bordeaux
2014-2024

Laboratoire Bordelais de Recherche en Informatique
2015-2024

Université de Bordeaux
2015-2024

Institut national de recherche en informatique et en automatique
2022-2023

GREYC
2009-2013

Orange (France)
2013

École Nationale Supérieure d'Ingénieurs de Caen
2012

Université de Caen Normandie
2009-2012

Even if the market penetration rate of biometric technologies is still far below its potential, many systems are used in our daily real-life. One main reasons to low proliferation lack a generic and complete approach that quantifies performance taking into account individuals' perception among process. Among all existing modalities, authentication based on keystroke dynamics particularly interesting. Many researchers proposed last decades some algorithms increase efficiency this approach....

10.1109/btas.2009.5339051 preprint EN 2009-09-01

Abstract The use and creation of machine‐learning‐based solutions to solve problems or reduce their computational costs are becoming increasingly widespread in many domains. Deep Learning plays a large part this growth. However, it has drawbacks such as lack explainability behaving black‐box model. During the last few years, Visual Analytics provided several proposals cope with these drawbacks, supporting emerging eXplainable field. This survey aims (i) systematically report contributions...

10.1111/cgf.14733 article EN cc-by-nc Computer Graphics Forum 2023-02-01

Keystroke dynamics biometric systems have been studied for more than twenty years. They are very well perceived by users, they may be one of the cheapest system (as no specific material is required) even if not commonly spread and used. We propose in this paper a new method based on SVM learning satisfying operational conditions (no 5 captures enrollment step). In proposed method, users authenticated thanks to keystroke passphrase (that can chosen administrator). use GREYC benchmark that...

10.1109/btas.2009.5339028 preprint EN 2009-09-01

Most keystroke dynamics studies have been evaluated using a specific kind of dataset in which users type an imposed login and password. Moreover, these are optimistics since most them use different acquisition protocols, private datasets, controlled environment, etc. In order to enhance the accuracy dynamics' performance, main contribution this paper is twofold. First, we provide new typed both chosen pairs logins passwords. addition, samples collected web-based uncontrolled environment (OS,...

10.1109/iih-msp.2012.10 preprint EN 2012-07-01

Bike sharing systems are present in several modern cities. They provide citizens with an alternative and ecological mode of transportation, allowing them to avoid the use personal car all problems associated it big cities (i.e., traffic jam, roads reserved for public transport, ...). However, they also suffer from other due their success: some stations can be full or empty impossibility drop off take a bike). Thus, predict such system interesting user order help him/her plan his/her reduce...

10.1109/civts.2014.7009473 preprint EN 2014-12-01

Keystroke dynamics allows to authenticate individuals through their way of typing on a computer keyboard. In this study, we are interested in static shared secret keystroke (all the users type same password). We present new soft biometrics information which can be extracted from patterns: gender user. This is first our knowledge, experimenting such kind field dynamics. method for recognition with more than 91% accuracy, tested dataset, and show improvement authentication using pattern score...

10.1504/ijitm.2012.044062 article EN International Journal of Information Technology and Management 2011-12-03

Biometric authentication methods are being increasingly used for many types of applications. Since such necessitate humans to interact with a device, effective implementation requires consideration the perceptions and responses end users. Towards this goal, we present in paper modality-independent evaluation methodology study users' acceptance satisfaction biometric systems. It is based on use questionnaire some data mining tools analysis. We have applied it two systems developed our...

10.1109/ccst.2010.5678678 preprint EN 2010-10-01

We present in this paper a study on the ability and benefits of using keystroke dynamics authentication method for collaborative systems. Authentication is challenging issue order to guarantee security use systems during access control step. Many solutions exist state art such as one time passwords or smart-cards focus biometric based that do not necessitate any additional sensor. Keystroke an interesting solution it uses only keyboard invisible users. methods have been published field. make...

10.1109/cts.2009.5067478 preprint EN 2009-01-01

Generally, fraud risk implies any intentional deception made for financial gain. In this paper, we consider in the field of services which support transactions with electronic money. Specifically, apply a tool predictive security analysis at runtime observes process behavior respect to within money transfer service and tries match it expected given by model. We analyze deviations from specification anomalies that indicate possible misuse related laundering activities. evaluate applicability...

10.1109/ares.2013.87 preprint EN 2013-09-01

We propose in this paper a low cost multimodal biometric system combining keystroke dynamics and 2D face recognition. The objective of the proposed is to be used while keeping mind: good performances, acceptability, espect privacy. Different fusion methods have been (min, max, mul, svm, weighted sum configured with genetic algorithms, and, programming) on scores three algorithms two recognition ones. This improves rate comparison each individual method. On chimeric database composed 100...

10.1109/icpr.2010.282 preprint EN 2010-08-01

Keystroke dynamics is a behavioral biometrics showing degradation of performance when used over time. This due to the fact that user improves his/her way typing while using system, therefore test samples may be different from initial template computed at an earlier stage. One bypass this problem use update mechanisms. We propose in work, new semi-supervised mechanisms, inspired known supervised ones. These schemes rely on choice two thresholds (an acceptance threshold and threshold) which...

10.1109/cibim.2011.5949216 preprint EN 2011-04-01

Current machine learning and deep approaches are cutting-edge methods for solving classification tasks. Comparing the performances of models has become a prominent task since outbreak these techniques. The performance such is measured by ratio between correctly predicted samples others. most widely used visualization to represent this information Confusion matrix. Yet, if technique suited apprehend one model performances, very few works use representation compare models. In that paper, we...

10.1109/iv56949.2022.00025 article EN 2020 24th International Conference Information Visualisation (IV) 2022-07-01

The world is facing a new era in which social media communication plays fundamental role people's lives. Along with proven benefits, several collateral drawbacks have risen, one being the widespread of false information malicious intents, oftentimes using anonymous or identities. Fighting this problem challenging, especially when considering nature text messages involved on platforms: sea small and myriad users. Attributing authorship such an ambitious endeavor; nevertheless, it way to fight...

10.1109/tcss.2021.3123895 article EN IEEE Transactions on Computational Social Systems 2021-11-09

10.1016/j.eswa.2011.08.066 article EN Expert Systems with Applications 2011-08-27

Semi-supervised template update systems allow to automatically take into account the intra-class variability of biometric data over time. Such can be inefficient by including too many impostor's samples or skipping genuine's samples. In first case, reference drifts from real and attracts more often impostors. second does not evolve quickly enough also progressively data. We propose a hybrid system using several sub-references in order increase performance self-update reducing previously...

10.1109/btas.2012.6374539 preprint EN 2012-09-01

This paper presents a modality-independent evaluation methodology to study users’ acceptance and satisfaction of biometric systems. It uses survey questionnaire for data collection, some data-mining tools their analysis. We have applied it on two systems developed in our research laboratory. The results from this show the necessity taking point view when designing evaluating A panel 100 volunteers was more satisfied keystroke system than face one. Users surprisingly considered that its...

10.1504/ijbm.2012.047644 article EN International Journal of Biometrics 2012-01-01
Coming Soon ...