Research Article
Leveraging Battery Usage from Mobile Devices for Active Authentication
Figure 2
Graphical representation of normalized battery histograms, (a) without Gaussian smoothing applied and (b and c) with Gaussian smoothing applied, with, respectively, and .
| (a) |
| (b) |
| (c) |