DriverAuth: A risk-based multi-modal biometric-based driver authentication scheme for ride-sharing platforms
暂无分享,去创建一个
[1] Arun Ross,et al. Information fusion in biometrics , 2003, Pattern Recognit. Lett..
[2] Tao Feng,et al. Continuous mobile authentication using touchscreen gestures , 2012, 2012 IEEE Conference on Technologies for Homeland Security (HST).
[3] Winston Ma. China's Mobile Economy: Opportunities in the Largest and Fastest Information Consumption Boom , 2016 .
[4] Maximilian Krieg,et al. Liveness Detection in Biometrics , 2015, 2015 International Conference of the Biometrics Special Interest Group (BIOSIG).
[5] Duncan S. Wong,et al. Touch Gestures Based Biometric Authentication Scheme for Touchscreen Mobile Phones , 2012, Inscrypt.
[6] Dawn Xiaodong Song,et al. Touchalytics: On the Applicability of Touchscreen Input as a Behavioral Biometric for Continuous Authentication , 2012, IEEE Transactions on Information Forensics and Security.
[7] Yunmo Chung,et al. Integrated system of face recognition and sound localization for a smart door phone , 2013, IEEE Transactions on Consumer Electronics.
[8] Ian H. Witten,et al. Data mining: practical machine learning tools and techniques, 3rd Edition , 1999 .
[9] Tom Fawcett,et al. An introduction to ROC analysis , 2006, Pattern Recognit. Lett..
[10] Bruno Crispo,et al. DriverAuth: Behavioral biometric-based driver authentication mechanism for on-demand ride and ridesharing infrastructure , 2019, ICT Express.
[11] Arun Ross,et al. An introduction to biometrics , 2008, ICPR 2008.
[12] Vincenzo Piuri,et al. Biometric Recognition in Automated Border Control , 2016, ACM Comput. Surv..
[13] Noureddine Doghmane,et al. Face and Speech Based Multi-Modal Biometric Authentication , 2010 .
[14] Bruno Crispo,et al. DIALERAUTH: A Motion-assisted Touch-based Smartphone User Authentication Scheme , 2018, CODASPY.
[15] Matti Pietikäinen,et al. Bi-Modal Person Recognition on a Mobile Phone: Using Mobile Phone Data , 2012, 2012 IEEE International Conference on Multimedia and Expo Workshops.
[16] Wonjun Kim,et al. Face Liveness Detection From a Single Image via Diffusion Speed Model , 2015, IEEE Transactions on Image Processing.
[17] Roland Hu,et al. Augmenting remote multimodal person verification by embedding voice characteristics into face images , 2013, 2013 IEEE International Conference on Multimedia and Expo Workshops (ICMEW).
[18] Rama Chellappa,et al. Active user authentication for smartphones: A challenge data set and benchmark results , 2016, 2016 IEEE 8th International Conference on Biometrics Theory, Applications and Systems (BTAS).
[19] W. A. Shier,et al. Mass Evidence Accumulation and Traveler Risk Scoring Engine in e-Border Infrastructure , 2018, IEEE Transactions on Intelligent Transportation Systems.
[20] Gian Luca Marcialis,et al. Statistical Meta-Analysis of Presentation Attacks for Secure Multibiometric Systems , 2016, IEEE Transactions on Pattern Analysis and Machine Intelligence.
[21] Rama Chellappa,et al. Continuous User Authentication on Mobile Devices: Recent progress and remaining challenges , 2016, IEEE Signal Processing Magazine.
[22] Esa Rahtu,et al. BSIF: Binarized statistical image features , 2012, Proceedings of the 21st International Conference on Pattern Recognition (ICPR2012).
[23] Arun Ross,et al. An introduction to biometric recognition , 2004, IEEE Transactions on Circuits and Systems for Video Technology.
[24] Anil K. Jain,et al. Secure Face Unlock: Spoof Detection on Smartphones , 2016, IEEE Transactions on Information Forensics and Security.
[25] Bruno Crispo,et al. Demystifying Authentication Concepts in Smartphones: Ways and Types to Secure Access , 2018, Mob. Inf. Syst..
[26] Wael Jabbar Abed Al-Nidawi,et al. Review on National Electronic Identification System , 2015, 2015 4th International Conference on Advanced Computer Science Applications and Technologies (ACSAT).
[27] Frédéric Bimbot,et al. The BANCA Database and Experimental Protocol for Speaker Verification , 2002 .
[28] Brian E. Mennecke,et al. Tales From the Wheel: An IT-Fueled Ride as an UBER Driver , 2016, AMCIS.
[29] Bruno Crispo,et al. Mobile biometrics: Towards a comprehensive evaluation methodology , 2017, 2017 International Carnahan Conference on Security Technology (ICCST).
[30] Randal S. Olson,et al. Relief-Based Feature Selection: Introduction and Review , 2017, J. Biomed. Informatics.
[31] Shawn Eastwood,et al. Risk profiler in automated human authentication , 2014, 2014 IEEE Symposium on Computational Intelligence for Engineering Solutions (CIES).
[32] Lluís A. Belanche Muñoz,et al. Feature selection algorithms: a survey and experimental evaluation , 2002, 2002 IEEE International Conference on Data Mining, 2002. Proceedings..
[33] Bruno Crispo,et al. Multimodal smartphone user authentication using touchstroke, phone-movement and face patterns , 2017, 2017 IEEE Global Conference on Signal and Information Processing (GlobalSIP).
[34] Sharath Pankanti,et al. Multi-modal biometrics for mobile authentication , 2014, IEEE International Joint Conference on Biometrics.
[35] Jian Huang,et al. Penalized feature selection and classification in bioinformatics , 2008, Briefings Bioinform..
[36] George W. Quinn,et al. Face In Video Evaluation (FIVE) Face Recognition of Non-Cooperative Subjects , 2017 .
[37] Michael R. Lyu,et al. Towards Continuous and Passive Authentication via Touch Biometrics: An Experimental Study on Smartphones , 2014, SOUPS.
[38] Jie Yang,et al. Hearing Your Voice is Not Enough: An Articulatory Gesture Based Liveness Detection for Voice Authentication , 2017, CCS.
[39] Nasir D. Memon,et al. Multitouch Gesture-Based Authentication , 2014, IEEE Transactions on Information Forensics and Security.
[40] Bruno Crispo,et al. ITSME: Multi-modal and Unobtrusive Behavioural User Authentication for Smartphones , 2015, PASSWORDS.
[41] Gérard Chollet,et al. BIOMET: A Multimodal Person Authentication Database Including Face, Voice, Fingerprint, Hand and Signature Modalities , 2003, AVBPA.
[42] Mikhail I. Gofman,et al. Multimodal biometrics for enhanced mobile device security , 2016, Commun. ACM.
[43] L. Mezai,et al. Fusion of face and voice using the Dempster-Shafer Theory for person verification , 2011, International Workshop on Systems, Signal Processing and their Applications, WOSSPA.
[44] Dmitry O. Gorodnichy,et al. Biometric-Enabled Authentication Machines: A Survey of Open-Set Real-World Applications , 2016, IEEE Transactions on Human-Machine Systems.
[45] Jie Yang,et al. VoiceLive: A Phoneme Localization based Liveness Detection for Voice Authentication on Smartphones , 2016, CCS.
[46] Bruno Crispo,et al. Evaluation of Motion-based Touch-typing Biometrics in Online Financial Environments , 2017 .