Adversarial Attacks on Remote User Authentication Using Behavioural Mouse Dynamics
暂无分享,去创建一个
[1] Chao Shen,et al. Continuous authentication for mouse dynamics: A pattern-growth approach , 2012, IEEE/IFIP International Conference on Dependable Systems and Networks (DSN 2012).
[2] Luca Antiga,et al. Automatic differentiation in PyTorch , 2017 .
[3] Fabian Monrose,et al. Keystroke dynamics as a biometric for authentication , 2000, Future Gener. Comput. Syst..
[4] Lior Rokach,et al. Generic Black-Box End-to-End Attack Against State of the Art API Call Based Malware Classifiers , 2017, RAID.
[5] Alexander Binder,et al. Layer-Wise Relevance Propagation for Neural Networks with Local Renormalization Layers , 2016, ICANN.
[6] Atul Prakash,et al. Robust Physical-World Attacks on Machine Learning Models , 2017, ArXiv.
[7] Jonathon Shlens,et al. Explaining and Harnessing Adversarial Examples , 2014, ICLR.
[8] Dawn Song,et al. Robust Physical-World Attacks on Deep Learning Models , 2017, 1707.08945.
[9] Gaël Varoquaux,et al. Scikit-learn: Machine Learning in Python , 2011, J. Mach. Learn. Res..
[10] F. Wilcoxon. Individual Comparisons by Ranking Methods , 1945 .
[11] Soumik Mondal,et al. A study on continuous authentication using a combination of keystroke and mouse biometrics , 2017, Neurocomputing.
[12] Alexander Binder,et al. On Pixel-Wise Explanations for Non-Linear Classifier Decisions by Layer-Wise Relevance Propagation , 2015, PloS one.
[13] Debnath Bhattacharyya,et al. Biometric Authentication: A Review , 2009 .
[14] David A. Wagner,et al. Towards Evaluating the Robustness of Neural Networks , 2016, 2017 IEEE Symposium on Security and Privacy (SP).
[15] Ana L. N. Fred,et al. A behavioral biometric system based on human-computer interaction , 2004, SPIE Defense + Commercial Sensing.
[16] Matthias Bethge,et al. Decision-Based Adversarial Attacks: Reliable Attacks Against Black-Box Machine Learning Models , 2017, ICLR.
[17] Alexander Binder,et al. Mouse Authentication Without the Temporal Aspect – What Does a 2D-CNN Learn? , 2018, 2018 IEEE Security and Privacy Workshops (SPW).
[18] Yigitcan Aksari,et al. Active authentication by mouse movements , 2009, 2009 24th International Symposium on Computer and Information Sciences.
[19] Soumik Mondal,et al. TWOS: A Dataset of Malicious Insider Threat Behavior Based on a Gamified Competition , 2017, J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl..
[20] Patrick Bours,et al. A Login System Using Mouse Dynamics , 2009, 2009 Fifth International Conference on Intelligent Information Hiding and Multimedia Signal Processing.
[21] Ronald J. Williams,et al. A Learning Algorithm for Continually Running Fully Recurrent Neural Networks , 1989, Neural Computation.
[22] Haining Wang,et al. An efficient user verification system via mouse movements , 2011, CCS '11.
[23] Ananthram Swami,et al. Practical Black-Box Attacks against Machine Learning , 2016, AsiaCCS.
[24] Mohammad S. Obaidat,et al. Biometric Authentication Using Mouse Gesture Dynamics , 2013, IEEE Systems Journal.
[25] Ahmed Awad E. Ahmed,et al. A New Biometric Technology Based on Mouse Dynamics , 2007, IEEE Transactions on Dependable and Secure Computing.
[26] Katarzyna Harezlak,et al. Fusion of eye movement and mouse dynamics for reliable behavioral biometrics , 2018, Pattern Analysis and Applications.
[27] Yuval Elovici,et al. Insight Into Insiders and IT , 2018, ACM Comput. Surv..
[28] Youtian Du,et al. User Authentication Through Mouse Dynamics , 2013, IEEE Transactions on Information Forensics and Security.
[29] Lior Rokach,et al. User identity verification via mouse dynamics , 2012, Inf. Sci..
[30] Joan Bruna,et al. Intriguing properties of neural networks , 2013, ICLR.
[31] Ananthram Swami,et al. The Limitations of Deep Learning in Adversarial Settings , 2015, 2016 IEEE European Symposium on Security and Privacy (EuroS&P).