Gait-Key
暂无分享,去创建一个
Neil W. Bergmann | Wen Hu | Girish Revadigar | Chitra Javali | Weitao Xu | Chengwen Luo | Wen Hu | Chengwen Luo | Weitao Xu | N. Bergmann | G. Revadigar | C. Javali
[1] Anil K. Jain,et al. Biometric Template Security , 2008, EURASIP J. Adv. Signal Process..
[2] Guang-Zhong Yang,et al. Source recovery for body sensor network , 2006, International Workshop on Wearable and Implantable Body Sensor Networks (BSN'06).
[3] Guang-Zhong Yang,et al. Detecting Walking Gait Impairment with an Ear-worn Sensor , 2009, 2009 Sixth International Workshop on Wearable and Implantable Body Sensor Networks.
[4] Zhong Ming,et al. Accuracy-aware wireless indoor localization: Feasibility and applications , 2016, J. Netw. Comput. Appl..
[5] Moustafa Youssef,et al. It's the Human that Matters: Accurate User Orientation Estimation for Mobile Computing Applications , 2014, MobiQuitous.
[6] G. Srivastava,et al. ICA-based procedures for removing ballistocardiogram artifacts from EEG data acquired in the MRI scanner , 2005, NeuroImage.
[7] J. Bibb Cain,et al. Error-Correction Coding for Digital Communications , 1981 .
[8] Bart De Schutter,et al. DAISY : A database for identification of systems , 1997 .
[9] Vince D. Calhoun,et al. A review of group ICA for fMRI data and ICA for joint inference of imaging, genetic, and ERP data , 2009, NeuroImage.
[10] Farinaz Koushanfar,et al. Heart-to-heart (H2H): authentication for implanted medical devices , 2013, CCS.
[11] Bernt Schiele,et al. Smart-Its Friends: A Technique for Users to Easily Establish Connections between Smart Artefacts , 2001, UbiComp.
[12] Ming Li,et al. ASK-BAN: authenticated secret key extraction utilizing channel characteristics for body area networks , 2013, WiSec '13.
[13] Aapo Hyvärinen,et al. Fast and robust fixed-point algorithms for independent component analysis , 1999, IEEE Trans. Neural Networks.
[14] Neil W. Bergmann,et al. Walkie-Talkie: Motion-Assisted Automatic Key Generation for Secure On-Body Device Communication , 2016, 2016 15th ACM/IEEE International Conference on Information Processing in Sensor Networks (IPSN).
[15] Zhen Ji,et al. Secure interoperation of identity managements among different circles of trust , 2011, Comput. Stand. Interfaces.
[16] Wade Trappe,et al. ProxiMate: proximity-based secure pairing using ambient wireless signals , 2011, MobiSys '11.
[17] René Mayrhofer,et al. Shake Well Before Use: Intuitive and Secure Pairing of Mobile Devices , 2009, IEEE Transactions on Mobile Computing.
[18] Elaine B. Barker,et al. A Statistical Test Suite for Random and Pseudorandom Number Generators for Cryptographic Applications , 2000 .
[19] MengChu Zhou,et al. An Effective Scheme for QoS Estimation via Alternating Direction Method-Based Matrix Factorization , 2019, IEEE Transactions on Services Computing.
[20] Wade Trappe,et al. Radio-telepathy: extracting a secret key from an unauthenticated wireless channel , 2008, MobiCom '08.
[21] Gilles Brassard,et al. Privacy Amplification by Public Discussion , 1988, SIAM J. Comput..
[22] Mario Huemer,et al. Key Generation Based on Acceleration Data of Shaking Processes , 2007, UbiComp.
[23] Blake Hannaford,et al. "Are You with Me?" - Using Accelerometers to Determine If Two Devices Are Carried by the Same Person , 2004, Pervasive.
[24] Mun Choon Chan,et al. Pallas: Self-Bootstrapping Fine-Grained Passive Indoor Localization Using WiFi Monitors , 2017, IEEE Transactions on Mobile Computing.
[25] E. Oja,et al. Independent Component Analysis , 2013 .
[26] Colleen Swanson,et al. SoK: Security and Privacy in Implantable Medical Devices and Body Area Networks , 2014, 2014 IEEE Symposium on Security and Privacy.
[27] Deokjai Choi,et al. Secure and Privacy Enhanced Gait Authentication on Smart Phone , 2014, TheScientificWorldJournal.
[28] Luis Hernández Encinas,et al. A crypto-biometric scheme based on iris-templates with fuzzy extractors , 2012, Inf. Sci..
[29] Quan Yuan,et al. A framework for protecting personal information and privacy , 2015, Secur. Commun. Networks.
[30] Emanuele Maiorana,et al. Biometric cryptosystem using function based on-line signature recognition , 2010, Expert Syst. Appl..
[31] Sanjay Jha,et al. Secure key generation and distribution protocol for wearable devices , 2016, 2016 IEEE International Conference on Pervasive Computing and Communication Workshops (PerCom Workshops).
[32] Neil W. Bergmann,et al. Sensor-Assisted Face Recognition System on Smart Glass via Multi-View Sparse Representation Classification , 2016, 2016 15th ACM/IEEE International Conference on Information Processing in Sensor Networks (IPSN).
[33] Martin Wattenberg,et al. A fuzzy commitment scheme , 1999, CCS '99.
[34] Arnaud Delorme,et al. EEGLAB: an open source toolbox for analysis of single-trial EEG dynamics including independent component analysis , 2004, Journal of Neuroscience Methods.
[35] Seungjin Choi,et al. Independent Component Analysis , 2009, Handbook of Natural Computing.
[36] Prasant Mohapatra,et al. Exploiting Multiple-Antenna Diversity for Shared Secret Key Generation in Wireless Networks , 2010, 2010 Proceedings IEEE INFOCOM.
[37] T. Sejnowski,et al. Human Brain Mapping 6:368–372(1998) � Independent Component Analysis of fMRI Data: Examining the Assumptions , 2022 .
[38] He Wang,et al. I am a smartphone and i can tell my user's walking direction , 2014, MobiSys.
[39] Whitfield Diffie,et al. New Directions in Cryptography , 1976, IEEE Trans. Inf. Theory.
[40] Sanjay Jha,et al. DLINK: Dual link based radio frequency fingerprinting for wearable devices , 2015, 2015 IEEE 40th Conference on Local Computer Networks (LCN).
[41] MingZhong,et al. Accuracy-aware wireless indoor localization , 2016 .
[42] Erkki Oja,et al. Independent Component Analysis Aapo Hyvärinen, Juha Karhunen, , 2004 .
[43] Ganesh R. Naik,et al. Using Blind Source Separation on accelerometry data to analyze and distinguish the toe walking gait from normal gait in ITW children , 2014, Biomed. Signal Process. Control..
[44] Mikkel N. Schmidt,et al. Single-channel speech separation using sparse non-negative matrix factorization , 2006, INTERSPEECH.
[45] Carlisle M. Adams,et al. You are the key: Generating cryptographic keys from voice biometrics , 2010, 2010 Eighth International Conference on Privacy, Security and Trust.
[46] Sanjay Jha,et al. Mobility Independent Secret Key Generation for Wearable Health-care Devices , 2015, BODYNETS.
[47] Ken Hinckley,et al. Synchronous gestures for multiple persons and computers , 2003, UIST '03.
[48] Peng Li,et al. An effective biometric cryptosystem combining fingerprints with error correction codes , 2012, Expert Syst. Appl..
[49] Ying Chen,et al. Speech Separation Based on Improved Fast ICA with Kurtosis Maximization of Wavelet Packet Coefficients , 2014, WorldCIST.
[50] Sanjay Jha,et al. SeAK: Secure Authentication and Key Generation Protocol Based on Dual Antennas for Wireless Body Area Networks , 2014, RFIDSec.
[51] Qian Zhang,et al. Secret from Muscle: Enabling Secure Pairing with Electromyography , 2016, SenSys.
[52] Mahbub Hassan,et al. KEH-Gait: Towards a Mobile Healthcare User Authentication System by Kinetic Energy Harvesting , 2017, NDSS.
[53] M. P. Murray. Gait as a total pattern of movement. , 1967, American journal of physical medicine.
[54] David Kotz,et al. Recognizing whether sensors are on the same body , 2011, Pervasive Mob. Comput..