Behavioral, Cognitive and Virtual Biometrics
暂无分享,去创建一个
[1] N. Stanietsky,et al. The interaction of TIGIT with PVR and PVRL2 inhibits human NK cell cytotoxicity , 2009, Proceedings of the National Academy of Sciences.
[2] Piotr Porwik,et al. BIOMETRIC RECOGNITION SYSTEM BASED ON THE MOTION OF THE HUMAN BODY GRAVITY CENTRE ANALYSIS , 2010 .
[3] S. K. Dahel,et al. Accuracy performance analysis of multimodal biometrics , 2003, IEEE Systems, Man and Cybernetics SocietyInformation Assurance Workshop, 2003..
[4] Neil J. Henderson,et al. Polymer thick-film sensors: possibilities for smartcard biometrics , 2001 .
[5] Tomohiro Yamamura,et al. A Driver Behavior Recognition Method Based on a Driver Model Framework , 2000 .
[6] Tom E. Bishop,et al. Blind Image Restoration Using a Block-Stationary Signal Model , 2006, 2006 IEEE International Conference on Acoustics Speech and Signal Processing Proceedings.
[7] Juergen Luettin,et al. Acoustic-labial speaker verification , 1997, Pattern Recognit. Lett..
[8] Juha Röning,et al. Methods for person identification on a pressure-sensitive floor: Experiments with multiple classifiers and reject option , 2008, Inf. Fusion.
[9] Juergen Luettin,et al. Speaker identification by lipreading , 1996, Proceeding of Fourth International Conference on Spoken Language Processing. ICSLP '96.
[10] Nasir D. Memon,et al. Authentication using graphical passwords: effects of tolerance and image choice , 2005, SOUPS '05.
[11] Réjean Plamondon,et al. Automatic signature verification and writer identification - the state of the art , 1989, Pattern Recognit..
[12] Sharath Pankanti,et al. Biometrics: Personal Identification in Networked Society , 2013 .
[13] Anil K. Jain,et al. Performance evaluation of fingerprint verification systems , 2006, IEEE Transactions on Pattern Analysis and Machine Intelligence.
[14] Roman V. Yampolskiy,et al. PARAMETERIZED GENERATION OF AVATAR FACE DATASET , 2008 .
[15] Larry Rudolph,et al. Passdoodles; a Lightweight Authentication Method , 2004 .
[16] Abdulmotaleb El-Saddik,et al. Haptic: the new biometrics-embedded media to recognizing and quantifying human patterns , 2005, MULTIMEDIA '05.
[17] Klaus Mueller,et al. Dynamic Approach for Face Recognition Using Digital Image Skin Correlation , 2005, AVBPA.
[18] Tom Hintz,et al. Facial behavior as behavior biometric? an empirical study , 2007, 2007 IEEE International Conference on Systems, Man and Cybernetics.
[19] Peter A. Dinda,et al. Power to the people: Leveraging human physiological traits to control microprocessor frequency , 2008, 2008 41st IEEE/ACM International Symposium on Microarchitecture.
[20] Martin R. Gibbs,et al. Mediating intimacy: designing technologies to support strong-tie relationships , 2005, CHI.
[21] Sharath Pankanti,et al. Biometrics: a grand challenge , 2004, ICPR 2004.
[22] Rolf Ingold,et al. Combined Handwriting and Speech Modalities for User Authentication , 2009, IEEE Transactions on Systems, Man, and Cybernetics - Part A: Systems and Humans.
[23] Venu Govindaraju,et al. Dissimilarity functions for behavior-based biometrics , 2007, SPIE Defense + Commercial Sensing.
[24] Carsten Maple,et al. Musipass: authenticating me softly with "my" song , 2009, NSPW '09.
[25] Shahram Latifi,et al. A Survey of Unimodal Biometric Methods , 2006, Security and Management.
[26] Moshe Koppel,et al. Authorship verification as a one-class classification problem , 2004, ICML.
[27] Michael Schatz,et al. Learning Program Behavior Profiles for Intrusion Detection , 1999, Workshop on Intrusion Detection and Network Monitoring.
[28] Kuldip K. Paliwal,et al. Information fusion for robust speaker verification , 2001, INTERSPEECH.
[29] David L. Dowe,et al. Inductive Inference of Chess Player Strategy , 2000, PRICAI.
[30] E. Delp,et al. Security, steganography, and watermarking of multimedia contents , 2004 .
[31] Mohammad Bagher Shamsollahi,et al. Person Identification by Using AR Model for EEG Signals , 2007 .
[32] Jan Ramon,et al. Opponent modeling by analysing play , 2002 .
[33] Venu Govindaraju,et al. Behavioural biometrics: a survey and classification , 2008, Int. J. Biom..
[34] José del R. Millán,et al. Person Authentication Using Brainwaves (EEG) and Maximum A Posteriori Model Adaptation , 2007, IEEE Transactions on Pattern Analysis and Machine Intelligence.
[35] Mark S. Nixon,et al. A floor sensor system for gait recognition , 2005, Fourth IEEE Workshop on Automatic Identification Advanced Technologies (AutoID'05).
[36] Adrian Stoica. Towards Recognition of Humans and their Behaviors from Space and Airborne Platforms: Extracting the Information in the Dynamics of Human Shadows , 2008, 2008 Bio-inspired, Learning and Intelligent Systems for Security.
[37] Roman V. Yampolskiy. Human Computer Interaction Based Intrusion Detection , 2007, Fourth International Conference on Information Technology (ITNG'07).
[38] Lucas Ballard,et al. Evaluating the Security of Handwriting Biometrics , 2006 .
[39] Jeha Ryu,et al. The User Identification System Using Walking Pattern over the ubiFloor , 2003 .
[40] Karen Renaud,et al. Quantifying the quality of web authentication mechanisms: a usability perspective , 2004 .
[41] Anil K. Jain,et al. Biometric cryptosystems: issues and challenges , 2004, Proceedings of the IEEE.
[42] Roland Auckenthaler,et al. Lip signatures for automatic person recognition , 1999, 1999 IEEE Third Workshop on Multimedia Signal Processing (Cat. No.99TH8451).
[43] Daniel P. Lopresti,et al. Biometric Authentication Revisited: Understanding the Impact of Wolves in Sheep's Clothing , 2006, USENIX Security Symposium.
[44] Stephanie Schuckers,et al. Spoofing and Anti-Spoofing Measures , 2002, Inf. Secur. Tech. Rep..
[45] Jin-Woo Jung,et al. Dynamic-footprint based person identification using mat-type pressure sensor , 2003, Proceedings of the 25th Annual International Conference of the IEEE Engineering in Medicine and Biology Society (IEEE Cat. No.03CH37439).
[46] Pieter H. Hartel,et al. Biometric verification based on grip-pattern recognition , 2004, IS&T/SPIE Electronic Imaging.
[47] Richard P. Ayers,et al. Picture Password: A Visual Login Technique for Mobile Devices , 2003 .
[48] Issa Traoré,et al. New Physiological Biometrics Based on Human Cognitive Factors , 2009, 2009 International Conference on Complex, Intelligent and Software Intensive Systems.
[49] Ron Henderson,et al. Cost-effective computer security: cognitive and associative passwords , 1996, Proceedings Sixth Australian Conference on Computer-Human Interaction.
[50] Neil M. White,et al. Sensing pressure for authentication , 2002 .
[51] Xiaofan Lin,et al. Phoneme-less hierarchical accent classification , 2004, Conference Record of the Thirty-Eighth Asilomar Conference on Signals, Systems and Computers, 2004..
[52] Mikael Lindvall. in Software Engineering , 2002 .
[53] Arun Ross,et al. An introduction to biometric recognition , 2004, IEEE Transactions on Circuits and Systems for Video Technology.
[54] Ryo Kurazume,et al. Person Identification using Shadow Analysis , 2010, BMVC.
[55] P. Bhattarakosol,et al. Authenticating User Using Keystroke Dynamics and Finger Pressure , 2009, 2009 6th IEEE Consumer Communications and Networking Conference.
[56] Arslan Brömme,et al. Using an Active Shape Structural Model for Biometric Sketch Recognition , 2003, DAGM-Symposium.
[57] Malcolm Crompton,et al. Biometrics and Privacy the End of the World as We Know it or the White Knight of Privacy? , 2004 .
[58] O. Aalen,et al. Understanding the shape of the hazard rate: A proce ss point of view , 2002 .
[59] Roman V. Yampolskiy,et al. Action-based user authentication , 2008, Int. J. Electron. Secur. Digit. Forensics.
[60] Tieniu Tan,et al. Biometric personal identification based on handwriting , 2000, Proceedings 15th International Conference on Pattern Recognition. ICPR-2000.
[61] Ioannis Pitas,et al. Recent advances in biometric person authentication , 2002, 2002 IEEE International Conference on Acoustics, Speech, and Signal Processing.
[62] Roy A. Maxion,et al. Masquerade detection using truncated command lines , 2002, Proceedings International Conference on Dependable Systems and Networks.
[63] David R. Bull,et al. Projective image restoration using sparsity regularization , 2013, 2013 IEEE International Conference on Image Processing.
[64] Sharath Pankanti,et al. Guide to Biometrics , 2003, Springer Professional Computing.
[65] Peter John Graham,et al. The new wave , 1968 .
[66] Dorothy E. Denning,et al. An Intrusion-Detection Model , 1987, IEEE Transactions on Software Engineering.
[67] Richard Youmaran,et al. Towards a Measure of Biometric Information , 2006, 2006 Canadian Conference on Electrical and Computer Engineering.
[68] Venu Govindaraju,et al. Accent classification in speech , 2005, Fourth IEEE Workshop on Automatic Identification Advanced Technologies (AutoID'05).
[69] Jiqing Zhang,et al. People Identification Using Floor Pressure Sensing and Analysis , 2010, IEEE Sensors Journal.
[70] Tracy L. Westeyn,et al. Recognizing song-based blink patterns: applications for restricted and universal access , 2004, Sixth IEEE International Conference on Automatic Face and Gesture Recognition, 2004. Proceedings..
[71] Hans van Halteren,et al. Linguistic Profiling for Authorship Recognition and Verification , 2004, ACL.
[72] Ana L. N. Fred,et al. An Identity Authentication System Based On Human Computer Interaction Behaviour , 2003, PRIS.
[73] Raymond N. J. Veldhuis,et al. Grip-Pattern Recognition for Smart Guns , 2003 .
[74] Peter L. Williams,et al. Gray's Anatomy: The Anatomical Basis of Medicine and Surgery , 1996 .
[75] Paul L. Rosin,et al. Assessing the Uniqueness and Permanence of Facial Actions for Use in Biometric Applications , 2010, IEEE Transactions on Systems, Man, and Cybernetics - Part A: Systems and Humans.
[76] A. Murat Tekalp,et al. Multimodal person recognition for human-vehicle interaction , 2006, IEEE Multimedia.
[77] Efstathios Stamatatos,et al. Source Code Authorship Analysis For Supporting the Cybercrime Investigation Process , 2010, Handbook of Research on Computational Forensics, Digital Crime, and Investigation.
[78] V. S. Nalwa. Automatic on-line signature verification , 1997 .
[79] Harold Joseph Highland,et al. 15th National Computer Security Conference , 1993 .
[80] I. Traore,et al. Anomaly intrusion detection based on biometrics , 2005, Proceedings from the Sixth Annual IEEE SMC Information Assurance Workshop.
[81] Efstathios Stamatatos,et al. Automatic Authorship Attribution , 1999, EACL.
[82] Arun Ross,et al. Score normalization in multimodal biometric systems , 2005, Pattern Recognit..
[83] A.K. Jain,et al. Webbiometrics: User Verification Via Web Interaction , 2007, 2007 Biometrics Symposium.
[84] Ralf Steinmetz,et al. Biometric applications based on handwriting , 2002, Proceedings. IEEE International Conference on Multimedia and Expo.
[85] S. Sridharan,et al. Gaze based user authentication for personal computer applications , 2004, Proceedings of 2004 International Symposium on Intelligent Multimedia, Video and Speech Processing, 2004..
[86] Alex Pentland,et al. Graphical models for driver behavior recognition in a SmartCar , 2000, Proceedings of the IEEE Intelligent Vehicles Symposium 2000 (Cat. No.00TH8511).
[87] Karen Renaud. Quantifying the quality of web authentication mechanisms , 2004 .
[88] Neill W Campbell,et al. ACM Multimedia 98 , 1998 .
[89] R.V. Yampolskiy. Indirect Human Computer Interaction-Based Biometrics for Intrusion Detection Systems , 2007, 2007 41st Annual IEEE International Carnahan Conference on Security Technology.
[90] A. Garg,et al. Profiling Users in GUI Based Systems for Masquerade Detection , 2006, 2006 IEEE Information Assurance Workshop.
[91] Anil K. Jain,et al. Soft Biometric Traits for Personal Recognition Systems , 2004, ICBA.
[92] Tom Fawcett,et al. Adaptive Fraud Detection , 1997, Data Mining and Knowledge Discovery.
[93] S. Cerutti,et al. Quantitative evaluation of distant student psychophysical responses during the e-learning processes , 2005, 2005 IEEE Engineering in Medicine and Biology 27th Annual Conference.
[94] Larry S. Davis,et al. Person identification using automatic height and stride estimation , 2002, Object recognition supported by user interaction for service robots.
[95] V N P Dao,et al. Profiling users in the UNIX os environment , 2000 .
[96] Gregory D. Abowd,et al. The smart floor: a mechanism for natural user identification and tracking , 2000, CHI Extended Abstracts.
[97] Adrian Perrig,et al. This copyright notice must be included in the reproduced paper. USENIX acknowledges all trademarks herein. Déjà Vu: A User Study Using Images for Authentication , 2000 .
[98] Issa Traoré,et al. Detecting Computer Intrusions Using Behavioral Biometrics , 2005, PST.
[99] Olga Papaemmanouil,et al. Dynamic Recommendations in Internet Retailing , 2001, ECIS.
[100] Richard A. Kemmerer,et al. State Transition Analysis: A Rule-Based Intrusion Detection Approach , 1995, IEEE Trans. Software Eng..
[101] Ana L. N. Fred,et al. A behavioral biometric system based on human-computer interaction , 2004, SPIE Defense + Commercial Sensing.
[102] Paola Britos,et al. Detecting Fraud in Mobile Telephony Using Neural Networks , 2005, IEA/AIE.
[103] Hsin-Min Wang,et al. Automatic singer recognition of popular music recordings via estimation and modeling of solo vocal signals , 2006, IEEE Transactions on Audio, Speech, and Language Processing.
[104] Eugene H. Spafford,et al. Software forensics: Can we track code to its authors? , 1993, Comput. Secur..
[105] Hong Kong. 2001 International Symposium on Intelligent Multimedia, Video and Speech Processing , 2001 .
[106] Akinori Ito,et al. Smile and laughter recognition using speech processing and face recognition from conversation video , 2005, 2005 International Conference on Cyberworlds (CW'05).
[107] A. El Saddik,et al. Automatic Identification of Participants in Haptic Systems , 2005, 2005 IEEE Instrumentationand Measurement Technology Conference Proceedings.
[108] Antonella De Angeli,et al. USABILITY AND USER AUTHENTICATION: PICTORIAL PASSWORDS VS. PIN , 2004 .
[109] Salvatore J. Stolfo,et al. Combining Behavior Models to Secure Email Systems , 2003 .
[110] Josef Kittler,et al. Audio- and Video-Based Biometric Person Authentication, 5th International Conference, AVBPA 2005, Hilton Rye Town, NY, USA, July 20-22, 2005, Proceedings , 2005, AVBPA.
[111] Marina L. Gavrilova,et al. Applying Biometric Principles to Avatar Recognition , 2010, 2010 International Conference on Cyberworlds.
[112] Mark E. Oxley,et al. Cohort selection and word grammar effects for speaker recognition , 1996, 1996 IEEE International Conference on Acoustics, Speech, and Signal Processing Conference Proceedings.
[113] Young-Bae Kim,et al. International Conference on Control, Automation and Systems , 2007 .
[114] Zygmunt Ciota. Speaker verification for multimedia application , 2004, 2004 IEEE International Conference on Systems, Man and Cybernetics (IEEE Cat. No.04CH37583).
[115] Venu Govindaraju,et al. Behavioral biometrics for verification and recognition of malicious software agents , 2008, SPIE Defense + Commercial Sensing.
[116] Gang Qian,et al. People Identification Using Gait Via Floor Pressure Sensing and Analysis , 2008, EuroSSC.
[117] Jr. J.P. Campbell,et al. Speaker recognition: a tutorial , 1997, Proc. IEEE.
[118] Hakan Erdogan,et al. Multi-modal Person Recognition for Vehicular Applications , 2005, Multiple Classifier Systems.
[119] A. Karr,et al. Computer Intrusion: Detecting Masquerades , 2001 .
[120] Alexey Tsymbal,et al. The problem of concept drift: definitions and related work , 2004 .
[121] Yongjian Fu,et al. A Framework for Personal Web Usage Mining , 2002, International Conference on Internet Computing.
[122] Rüdiger W. Brause,et al. Neural data mining for credit card fraud detection , 1999, Proceedings 11th International Conference on Tools with Artificial Intelligence.
[123] Wing Hong Lau,et al. Person authentication using ASM based lip shape and intensity information , 2004, 2004 International Conference on Image Processing, 2004. ICIP '04..
[124] M. Grgic,et al. A survey of biometric recognition methods , 2004, Proceedings. Elmar-2004. 46th International Symposium on Electronics in Marine.
[125] Venu Govindaraju,et al. Use of behavioral biometrics in intrusion detection and online gaming , 2006, SPIE Defense + Commercial Sensing.
[126] Francesco Beritelli,et al. Biometric Identification Based on Frequency Analysis of Cardiac Sounds , 2007, IEEE Transactions on Information Forensics and Security.
[127] Rama Chellappa,et al. Identification of humans using gait , 2004, IEEE Transactions on Image Processing.
[128] Julie Thorpe,et al. Pass-thoughts: authenticating with our minds , 2005, NSPW '05.
[129] Clinton Fookes,et al. A visual attention approach to personal identification , 2003 .
[130] Hamid Aghvami,et al. Dynamic QoS Aware Route Optimization for Networks with Mobility Agents , 2009, 2009 6th IEEE Consumer Communications and Networking Conference.
[131] Mark S. Nixon,et al. On gait as a biometric: Progress and prospects , 2004, 2004 12th European Signal Processing Conference.
[132] Weibo Gong,et al. Anomaly detection using call stack information , 2003, 2003 Symposium on Security and Privacy, 2003..
[133] Salvatore J. Stolfo,et al. A Behavior-Based Approach to Securing Email Systems , 2003, MMM-ACNS.
[134] Vinayak Ashok Bharadi. Biometric Authentication Systems , 2012 .
[135] Kimihiro Yamanaka,et al. A Biometric Identification Using the Motion of Fingers , 2009, 2009 International Conference on Biometrics and Kansei Engineering.
[136] Karen Renaud,et al. PASSWORD CUEING WITH CUE(INK)BLOTS 1 , 2008 .
[137] Susan Wiedenbeck,et al. Authentication Using Graphical Passwords: Basic Results , 2005 .
[138] Nasrullah Memon,et al. The Role of Service Oriented Architecture in Telemedicine Healthcare System , 2009, 2009 International Conference on Complex, Intelligent and Software Intensive Systems.
[139] Brian A. Jacob,et al. To Catch a Cheat. , 2004 .
[140] Kenneth Revett,et al. Behavioral Biometrics: A Remote Access Approach , 2008 .
[141] Carla E. Brodley,et al. User re-authentication via mouse movements , 2004, VizSEC/DMSEC '04.
[142] Craig A. N. Soules,et al. Storage-based Intrusion Detection: Watching Storage Activity for Suspicious Behavior , 2003, USENIX Security Symposium.
[143] Venu Govindaraju,et al. ER2: an intuitive similarity measure for on-line signature verification , 2004, IWFHR.
[144] Ivan Koychev,et al. Adaptation to Drifting User's Interests , 2000 .
[145] Sameer Singh. International Conference on Advances in Pattern Recognition , 1999, Springer London.
[146] Woontack Woo,et al. User Identification Using User's Walking Pattern over the ubiFloorII , 2005, CIS.
[147] Jude W. Shavlik,et al. Learning users' interests by unobtrusively observing their normal behavior , 2000, IUI '00.
[148] F. Livesey,et al. The ORL active floor [sensor system] , 1997, IEEE Wirel. Commun..
[149] Anil K. Jain,et al. On-line signature verification, , 2002, Pattern Recognit..
[150] Sridha Sridharan,et al. Person authentication using lip information , 1997, TENCON '97 Brisbane - Australia. Proceedings of IEEE TENCON '97. IEEE Region 10 Annual Conference. Speech and Image Technologies for Computing and Telecommunications (Cat. No.97CH36162).
[151] Michael J. Lyons,et al. Avatar creation using automatic face processing , 1998, MULTIMEDIA '98.
[152] Nalini K. Ratha,et al. Automated Biometrics , 2001, ICAPR.
[153] Abdulmotaleb El-Saddik,et al. Haptic-Based Biometrics: A Feasibility Study , 2006, 2006 14th Symposium on Haptic Interfaces for Virtual Environment and Teleoperator Systems.
[154] Julie Thorpe,et al. Towards secure design choices for implementing graphical passwords , 2004, 20th Annual Computer Security Applications Conference.
[155] Sargur N. Srihari,et al. Image Pattern Recognition - Synthesis and Analysis in Biometrics , 2007, Image Pattern Recognition.
[156] Nasir D. Memon,et al. PassPoints: Design and longitudinal evaluation of a graphical password system , 2005, Int. J. Hum. Comput. Stud..
[157] Hyeyoung Park,et al. A New Similarity Measure Based on Intraclass Statistics for Biometrie Systems , 2003 .
[158] Siwei Lyu,et al. A digital technique for art authentication , 2004, Proc. Natl. Acad. Sci. USA.
[159] Patrick Brézillon,et al. Lecture Notes in Artificial Intelligence , 1999 .
[160] A. Bromme. A classification of biometric signatures , 2003, 2003 International Conference on Multimedia and Expo. ICME '03. Proceedings (Cat. No.03TH8698).
[161] Daniel J. Ragsdale,et al. A hybrid approach to the profile creation and intrusion detection , 2001, Proceedings DARPA Information Survivability Conference and Exposition II. DISCEX'01.
[162] Omar Hamdy,et al. Cognitive-Based Biometrics System for Static User Authentication , 2009, 2009 Fourth International Conference on Internet Monitoring and Protection.
[163] Anil K. Jain,et al. Can soft biometric traits assist user recognition? , 2004, SPIE Defense + Commercial Sensing.
[164] Claudia Picardi,et al. User authentication through keystroke dynamics , 2002, TSEC.
[165] Arslan Brömme,et al. Multifactor Biometric Sketch Authentication , 2003, BIOSIG.
[166] Michael K. Reiter,et al. The Design and Analysis of Graphical Passwords , 1999, USENIX Security Symposium.
[167] Arun Ross,et al. Biometric Technology for Human Identification IV , 2007 .
[168] George M. Mohay,et al. Mining e-mail content for author identification forensics , 2001, SGMD.
[169] Salvatore J. Stolfo,et al. Detecting Malicious Software by Monitoring Anomalous Windows Registry Accesses , 2002, RAID.
[170] F. Livesey,et al. The ORL Acfive Floor , 1997 .