暂无分享,去创建一个
Zhen Ling | Xinwen Fu | Benyuan Liu | Wei Zhao | Qinggang Yue | Benyuan Liu | Zhen Ling | Xinwen Fu | Wei Zhao | Qinggang Yue
[1] Michael Backes,et al. 2008 IEEE Symposium on Security and Privacy Compromising Reflections –or– How to Read LCD Monitors Around the Corner , 2022 .
[2] Ying Zhu,et al. Graphical passwords: a survey , 2005, 21st Annual Computer Security Applications Conference (ACSAC'05).
[3] Daniel J. Wigdor,et al. Direct-touch vs. mouse input for tabletop displays , 2007, CHI.
[4] Andrew Zisserman,et al. Multiple View Geometry in Computer Vision (2nd ed) , 2003 .
[5] John F. Canny,et al. A Computational Approach to Edge Detection , 1986, IEEE Transactions on Pattern Analysis and Machine Intelligence.
[6] Adrian Kaehler,et al. Learning opencv, 1st edition , 2008 .
[7] Zdenek Kalal,et al. Tracking-Learning-Detection , 2012, IEEE Transactions on Pattern Analysis and Machine Intelligence.
[8] Yongdae Kim,et al. Timing attacks on PIN input devices , 2010, CCS '10.
[9] Yang Zhang,et al. Fingerprint attack against touch-enabled devices , 2012, SPSM '12.
[10] Zhi Xu,et al. TapLogger: inferring user inputs on smartphone touchscreens using on-board motion sensors , 2012, WISEC '12.
[11] Carlo Tomasi,et al. Good features to track , 1994, 1994 Proceedings of IEEE Conference on Computer Vision and Pattern Recognition.
[12] Patrick Baudisch,et al. Precise selection techniques for multi-touch screens , 2006, CHI.
[13] Duke Lee,et al. The State of the Touch‐Screen Panel Market in 2011 , 2011 .
[14] Patrick Traynor,et al. (sp)iPhone: decoding vibrations from nearby keyboards using mobile phone accelerometers , 2011, CCS '11.
[15] B. Ripley,et al. Robust Statistics , 2018, Encyclopedia of Mathematical Geosciences.
[16] J.-Y. Bouguet,et al. Pyramidal implementation of the lucas kanade feature tracker , 1999 .
[17] David G. Lowe,et al. Fast Approximate Nearest Neighbors with Automatic Algorithm Configuration , 2009, VISAPP.
[18] Xiang Cao,et al. Detecting and leveraging finger orientation for interaction with direct-touch surfaces , 2009, UIST '09.
[19] G LoweDavid,et al. Distinctive Image Features from Scale-Invariant Keypoints , 2004 .
[20] Jiri Matas,et al. Robust Detection of Lines Using the Progressive Probabilistic Hough Transform , 2000, Comput. Vis. Image Underst..
[21] Nasir D. Memon,et al. Biometric-rich gestures: a novel approach to authentication on multi-touch devices , 2012, CHI.
[22] Martin Welk,et al. Tempest in a Teapot: Compromising Reflections Revisited , 2009, 2009 30th IEEE Symposium on Security and Privacy.
[23] Hao Chen,et al. TouchLogger: Inferring Keystrokes on Touch Screen from Smartphone Motion , 2011, HotSec.
[24] Adam J. Aviv,et al. Smudge Attacks on Smartphone Touch Screens , 2010, WOOT.
[25] Robert H. Deng,et al. Designing leakage-resilient password entry on touchscreen mobile devices , 2013, ASIA CCS '13.
[26] Albrecht Schmidt,et al. Increasing the security of gaze-based cued-recall graphical passwords using saliency masks , 2012, CHI.
[27] Robert Biddle,et al. Graphical passwords: Learning from the first twelve years , 2012, CSUR.
[28] Bogdan Hoanca,et al. incidence of , 2021 .
[29] Giovanni Vigna,et al. ClearShot: Eavesdropping on Keyboard Input from Video , 2008, 2008 IEEE Symposium on Security and Privacy (sp 2008).
[30] Luc Van Gool,et al. Speeded-Up Robust Features (SURF) , 2008, Comput. Vis. Image Underst..
[31] Stefan Savage,et al. Heat of the Moment: Characterizing the Efficacy of Thermal Camera-Based Attacks , 2011, WOOT.
[32] Richard Szeliski,et al. Computer Vision - Algorithms and Applications , 2011, Texts in Computer Science.
[33] Jan-Michael Frahm,et al. Seeing double: reconstructing obscured typed input from repeated compromising reflections , 2013, CCS.
[34] Bernhard P. Wrobel,et al. Multiple View Geometry in Computer Vision , 2001 .
[35] Feng Wang,et al. Empirical evaluation for finger input properties in multi-touch interaction , 2009, CHI.
[36] Giacomo Boracchi,et al. A fast eavesdropping attack against touchscreens , 2011, 2011 7th International Conference on Information Assurance and Security (IAS).
[37] Patrick Olivier,et al. Multi-touch authentication on tabletops , 2010, CHI.
[38] Iksu Kim. Keypad against brute force attacks on smartphones , 2012, IET Inf. Secur..
[39] Jan-Michael Frahm,et al. iSpy: automatic reconstruction of typed input from compromising reflections , 2011, CCS '11.