I'm so sorry for my poor English. I have to write an English abstract for my thesis and I feel lost. Could you check and correct this abstract for my thesis?;( There is considerable interest in eye-tracking technology because it provides strong tools for (2024)

Question

Updated on

ci11y

26 Jan 2020

  • Japanese
  • English (US)

Question about English (US)

Answers

I'm so sorry for my poor English. I have to write an English abstract for my thesis and I feel lost. Could you check and correct this abstract for my thesis?;( There is considerable interest in eye-tracking technology because it provides strong tools for many industries such as marketing, virtual reality (VR), or augmented reality (AR). Whereas, the security risks of eye-tracking technology have not been discussed enough. It needs simulated attacks and pointed out security defects before causing real damage in the industry. There is previous research that points out pattern-locks on smartphones can be mimicked by analyzing the points of the gaze because the victim’s eye would follow his/her finger movements on the touchscreen of mobile devices. Though the attack models cannot be used for personnel identification number (PIN) because of the differences in trajectory. Patten-lock consists of lines, but PIN consists of sets of points. To deal with it, we propose new attack models that groups point-of-gaze instead of extracting lines. In addition to clustering, we rank PIN candidates with the cumulative distance which enables detailed classification. With experiments to infer PIN processing point-of-gaze, the leakage risk of PINs from eye-tracking devices. (2)

When you "disagree" with an answer

The owner of it will not be notified.Only the user who asked this question will see who disagreed with this answer.

OK

Read more comments

  • English (US)

Here are my corrections! Let me know if you have any questions or want me to explain!There is considerable interest in eye-tracking technology because it provides strong tools for many industries such as marketing, virtual reality (VR), and augmented reality (AR). However, the security risks of eye-tracking technology have not been discussed enough. Simulated attacks should be performed in order to identify security defects before the technology causes real damage in the industry. Previous research points out that pattern-locks on smartphones can be mimicked by analyzing the points of the gaze, because the victim’s eye would follows his/her finger movements on the touchscreen of mobile devices. However, the attack models cannot be used for personnel identification number (PIN) because of the differences in trajectory. Pattern-locks consist of lines, but PINs consist of sets of points. In response to this, we propose new attack models that group points-of-gaze instead of extracting lines. [In addition to clustering, we rank PIN candidates with the cumulative distance, which enables detailed classification.] This sentence seems a bit strange, but I don't understand enough about the process to know what to say. If you can explain more I can try to help![With experiments to infer PIN processing point-of-gaze, the leakage risk of PINs from eye-tracking devices.] I do not understand this sentence. Are you saying that because of these experiments, there is now less risk that eye-tracking devices will allow PIN numbers to be stolen? From what I gather, your team is doing experiments from the perspective of a hacker to determine how passwords can be stolen so that measures can be put in place to prevent this. Is that right?

Here are my corrections! Let me know if you have any questions or want me to explain!

There is considerable interest in eye-tracking technology because it provides strong tools for many industries such as marketing, virtual reality (VR), and augmented reality (AR). However, the security risks of eye-tracking technology have not been discussed enough. Simulated attacks should be performed in order to identify security defects before the technology causes real damage in the industry. Previous research points out that pattern-locks on smartphones can be mimicked by analyzing the points of the gaze, because the victim’s eye would follows his/her finger movements on the touchscreen of mobile devices. However, the attack models cannot be used for personnel identification number (PIN) because of the differences in trajectory. Pattern-locks consist of lines, but PINs consist of sets of points. In response to this, we propose new attack models that group points-of-gaze instead of extracting lines.

[In addition to clustering, we rank PIN candidates with the cumulative distance, which enables detailed classification.] This sentence seems a bit strange, but I don't understand enough about the process to know what to say. If you can explain more I can try to help!

[With experiments to infer PIN processing point-of-gaze, the leakage risk of PINs from eye-tracking devices.] I do not understand this sentence. Are you saying that because of these experiments, there is now less risk that eye-tracking devices will allow PIN numbers to be stolen? From what I gather, your team is doing experiments from the perspective of a hacker to determine how passwords can be stolen so that measures can be put in place to prevent this. Is that right?

Highly-rated answerer

I'm so sorry for my poor English. I have to write an English abstract for my thesis and I feel lost. Could you check and correct this abstract for my thesis?;( There is considerable interest in eye-tracking technology because it provides strong tools for many industries such as marketing, virtual reality (VR), or augmented reality (AR). Whereas, the security risks of eye-tracking technology have not been discussed enough. It needs simulated attacks and pointed out security defects before causing real damage in the industry. There is previous research that points out pattern-locks on smartphones can be mimicked by analyzing the points of the gaze because the victim’s eye would follow his/her finger movements on the touchscreen of mobile devices. Though the attack models cannot be used for personnel identification number (PIN) because of the differences in trajectory. Patten-lock consists of lines, but PIN consists of sets of points. To deal with it, we propose new attack models that groups point-of-gaze instead of extracting lines. In addition to clustering, we rank PIN candidates with the cumulative distance which enables detailed classification. With experiments to infer PIN processing point-of-gaze, the leakage risk of PINs from eye-tracking devices. (4)

Was this answer helpful?

ci11y

26 Jan 2020

  • Japanese

Thank you very much for your correction(T-T)

> [In addition to clustering, we rank PIN candidates with the cumulative distance, which enables detailed classification.]

One gaze trajectory have many PIN candidates. In order to find a plausible? candidate, we sort candidates by [cumulative distance] between a gaze trajectory and a PIN candidate.

I hope this make sense...

> From what I gather, your team is doing experiments from the perspective of a hacker to determine how passwords can be stolen so that measures can be put in place to prevent this. Is that right?
Yes! That's right. We are on the side of hackers now, but we will try to discover how to prevent PIN leakage later.

0likes

[News] Hey you! The one learning a language!Do you know how to improve your language skills❓ All you have to do is have your writing corrected by a native speaker!With HiNative, you can have your writing corrected by native speakers for free ✍️✨.Sign up

I'm so sorry for my poor English. I have to write an English abstract for my thesis and I feel lost. Could you check and correct this abstract for my thesis?;( There is considerable interest in eye-tracking technology because it provides strong tools for many industries such as marketing, virtual reality (VR), or augmented reality (AR). Whereas, the security risks of eye-tracking technology have not been discussed enough. It needs simulated attacks and pointed out security defects before causing real damage in the industry. There is previous research that points out pattern-locks on smartphones can be mimicked by analyzing the points of the gaze because the victim’s eye would follow his/her finger movements on the touchscreen of mobile devices. Though the attack models cannot be used for personnel identification number (PIN) because of the differences in trajectory. Patten-lock consists of lines, but PIN consists of sets of points. To deal with it, we propose new attack models that groups point-of-gaze instead of extracting lines. In addition to clustering, we rank PIN candidates with the cumulative distance which enables detailed classification. With experiments to infer PIN processing point-of-gaze, the leakage risk of PINs from eye-tracking devices. (12)

Related questions

  • Can you correct me, please?The internet and the devices which we have access to are changing in...
  • Hi guys, can you please help me correct this text? Thank you2. Recent actual text 2.2.Is it...
  • Hi guys, can you please help me correct this text? Thank you2. Recent actual text 2.2.Is it...

Similar questions

  • Who can help correct a thesis? Paid labour
  • [Abstract]This thesis starts from the research on the possibilities of moving image designs on ...
  • When I want to write a thesis in English, should I segment Preamble and Introduction? If so, what...

Recommended Questions

  • Show more
  • I found the following sentence(1). Does it mean almost the same as (2)? I was wondering why then ...
  • He's kind of a stay-at-home guy.
  • stuffyto air out (проветрить?)"The basem*nt was so stuffy that we had to air it out for a f...
  • Which is correct?Get somewhere where you can talk.Get somewhere you can talk.
  • ・Where do you work at?Does the sentence above ask about the place or company's name?

Topic Questions

  • Show more
  • Hey guys! I have a question.Who do you think ate the honey soup?Doesn’t this sentence make an...
  • I am really having troubles at financial problems at this time.Can you please tell me if my sen...
  • I've watched this line from the TV show 'Atlanta'.WILL: Do you listen to much U.K. rap?Al: ...
  • According to the passage, why is the statement below correct? The last sentence in the passage sa...
  • Does this sound natural?Everytime I open up the app, some ads pop up, which is really annoying.

Newest Questions

  • Show more
  • tại sao tiếng anh lại quan trọng ?Thêm : cho tui xin câu trl lun nhen :)))
  • Are these interchangeable?It's halfway done.We're halfway done.We're halfway there.
  • https://youtu.be/8bHHvzMyoPU?si=_lQwQ0xl4DdYB0yT5:12What does "Beg your pardon" mean in this ...
  • Hey guys! I have a question.Who do you think ate the honey soup?Doesn’t this sentence make an...
  • A: Your boxes are ready to be picked up from the warehouse.B: Thanks, I'll ______ them this afte...

Previous question/ Next question

  • How do you say this in English (US)? "repaso general" For example, when in a school the teacher d...
  • How do you say this in Japanese? What is the correct reading for 一国家

I'm so sorry for my poor English. I have to write an English abstract for my thesis and I feel lost. Could you check and correct this abstract for my thesis?;( There is considerable interest in eye-tracking technology because it provides strong tools for many industries such as marketing, virtual reality (VR), or augmented reality (AR). Whereas, the security risks of eye-tracking technology have not been discussed enough. It needs simulated attacks and pointed out security defects before causing real damage in the industry. There is previous research that points out pattern-locks on smartphones can be mimicked by analyzing the points of the gaze because the victim’s eye would follow his/her finger movements on the touchscreen of mobile devices. Though the attack models cannot be used for personnel identification number (PIN) because of the differences in trajectory. Patten-lock consists of lines, but PIN consists of sets of points. To deal with it, we propose new attack models that groups point-of-gaze instead of extracting lines. In addition to clustering, we rank PIN candidates with the cumulative distance which enables detailed classification. With experiments to infer PIN processing point-of-gaze, the leakage risk of PINs from eye-tracking devices. (13)What’s this symbol?

The Language Level symbol shows a user's proficiency in the languages they're interested in. Setting your Language Level helps other users provide you with answers that aren't too complex or too simple.

  • Beginner

    Has difficulty understanding even short answers in this language.

  • Beginner-Intermediate

    Can ask simple questions and can understand simple answers.

  • Intermediate

    Can ask all types of general questions and can understand longer answers.

  • Advanced

    Can understand long, complex answers.

I'm so sorry for my poor English. I have to write an English abstract for my thesis and I feel lost. Could you check and correct this abstract for my thesis?;( There is considerable interest in eye-tracking technology because it provides strong tools for many industries such as marketing, virtual reality (VR), or augmented reality (AR). Whereas, the security risks of eye-tracking technology have not been discussed enough. It needs simulated attacks and pointed out security defects before causing real damage in the industry. There is previous research that points out pattern-locks on smartphones can be mimicked by analyzing the points of the gaze because the victim’s eye would follow his/her finger movements on the touchscreen of mobile devices. Though the attack models cannot be used for personnel identification number (PIN) because of the differences in trajectory. Patten-lock consists of lines, but PIN consists of sets of points. To deal with it, we propose new attack models that groups point-of-gaze instead of extracting lines. In addition to clustering, we rank PIN candidates with the cumulative distance which enables detailed classification. With experiments to infer PIN processing point-of-gaze, the leakage risk of PINs from eye-tracking devices. (14)

Sign up for premium, and you can play other user's audio/video answers.

Learn about premium features

What are gifts?

Show your appreciation in a way that likes and stamps can't.

By sending a gift to someone, they will be more likely to answer your questions again!

I'm so sorry for my poor English. I have to write an English abstract for my thesis and I feel lost. Could you check and correct this abstract for my thesis?;( There is considerable interest in eye-tracking technology because it provides strong tools for many industries such as marketing, virtual reality (VR), or augmented reality (AR). Whereas, the security risks of eye-tracking technology have not been discussed enough. It needs simulated attacks and pointed out security defects before causing real damage in the industry. There is previous research that points out pattern-locks on smartphones can be mimicked by analyzing the points of the gaze because the victim’s eye would follow his/her finger movements on the touchscreen of mobile devices. Though the attack models cannot be used for personnel identification number (PIN) because of the differences in trajectory. Patten-lock consists of lines, but PIN consists of sets of points. To deal with it, we propose new attack models that groups point-of-gaze instead of extracting lines. In addition to clustering, we rank PIN candidates with the cumulative distance which enables detailed classification. With experiments to infer PIN processing point-of-gaze, the leakage risk of PINs from eye-tracking devices. (15)

If you post a question after sending a gift to someone, your question will be displayed in a special section on that person’s feed.

I'm so sorry for my poor English. I have to write an English abstract for my thesis and I feel lost. Could you check and correct this abstract for my thesis?;( There is considerable interest in eye-tracking technology because it provides strong tools for  (2024)

References

Top Articles
Latest Posts
Article information

Author: Roderick King

Last Updated:

Views: 5891

Rating: 4 / 5 (51 voted)

Reviews: 90% of readers found this page helpful

Author information

Name: Roderick King

Birthday: 1997-10-09

Address: 3782 Madge Knoll, East Dudley, MA 63913

Phone: +2521695290067

Job: Customer Sales Coordinator

Hobby: Gunsmithing, Embroidery, Parkour, Kitesurfing, Rock climbing, Sand art, Beekeeping

Introduction: My name is Roderick King, I am a cute, splendid, excited, perfect, gentle, funny, vivacious person who loves writing and wants to share my knowledge and understanding with you.