Matthew E. Phillips

Learn More
Finding the balance between security, privacy, and usability for mobile authentication has been an active area of research for the past several years. Many researchers have taken advantage of the availability of multiple sensors on mobile devices and have used these data to train classifiers to authenticate users. For example, implicit authentication(More)
The Wisconsin Card Sorting Test (WCST) evaluates a subject's ability to shift to a new pattern of behavior in response to the presentation of unexpected negative feedback. The present study introduces a novel version of the traditional WCST by integrating a probabilistic component into its traditional rule shifting to add uncertainty to the task, as well as(More)
The thalamus is a critical brain structure involved in gating and regulating the flow of sensory and cortical information. The reticular nucleus of the thalamus (TRN) sends inhibitory projections to the thalamic relay nuclei instead of projecting to the cortex as the other thalamic nuclei do. These inhibitory projections endow the TRN with the functionality(More)
Skill acquisition requires distributed learning both within (online) and across (offline) days to consolidate experiences into newly learned abilities. In particular, piloting an aircraft requires skills developed from extensive training and practice. Here, we tested the hypothesis that transcranial direct current stimulation (tDCS) can modulate neuronal(More)
The blood-oxygen-level-dependent (BOLD) signal measured in functional magnetic resonance imaging (fMRI) experiments is generally regarded as sluggish and poorly suited for probing neural function at the rapid timescales involved in sentence comprehension. However, recent studies have shown the value of acquiring data with very short repetition times (TRs),(More)
With increased rates of smartphone theft over the past decade, mobile authentication systems that operate on a continual basis are a necessity to meet increasing demands for user privacy, device usage, and authentication accuracy. Rather than forcing end users to continually self-authenticate via password pins or through other means on a time-interval basis(More)
  • 1