Temporal Pattern in Tweeting Behavior for Persons' Identity Verification
暂无分享,去创建一个
[1] Marina L. Gavrilova,et al. Authorship recognition of tweets: A comparison between social behavior and linguistic profiles , 2017, 2017 IEEE International Conference on Systems, Man, and Cybernetics (SMC).
[2] Eugénio C. Oliveira,et al. 'twazn me!!! ;(' Automatic Authorship Analysis of Micro-Blogging Messages , 2011, NLDB.
[3] Julien Velcin,et al. Sentiment analysis on social media for stock movement prediction , 2015, Expert Syst. Appl..
[4] Maria Papadaki,et al. Active authentication for mobile devices utilising behaviour profiling , 2014, International Journal of Information Security.
[5] Marina L. Gavrilova,et al. A Concept of Social Behavioral Biometrics: Motivation, Current Developments, and Future Trends , 2014, 2014 International Conference on Cyberworlds.
[6] Mark Rahmes,et al. Matching social network biometrics using geo-analytical behavioral modeling , 2014, 2014 IEEE Symposium on Computational Intelligence and Data Mining (CIDM).
[7] Marina L. Gavrilova,et al. Social Behavioral Information Fusion in Multimodal Biometrics , 2018, IEEE Transactions on Systems, Man, and Cybernetics: Systems.
[8] Vitomir Struc,et al. The Complete Gabor-Fisher Classifier for Robust Face Recognition , 2010, EURASIP J. Adv. Signal Process..
[9] Marina L. Gavrilova,et al. Soft biometric: Give me your favorite images and i will tell your gender , 2016, 2016 IEEE 15th International Conference on Cognitive Informatics & Cognitive Computing (ICCI*CC).
[10] Claude Castelluccia,et al. Towards Web-Based Biometric Systems Using Personal Browsing Interests , 2013, 2013 International Conference on Availability, Reliability and Security.
[11] Nicu Sebe,et al. Faved! Biometrics: Tell Me Which Image You Like and I'll Tell You Who You Are , 2014, IEEE Transactions on Information Forensics and Security.
[12] P.Susan Lalitha Grace,et al. Active Authentication on Mobile Devices via Stylometry, Application Usage, Web Browsing, and GPS Location , 2017 .
[13] Rama Chellappa,et al. PATH: Person authentication using trace histories , 2016, 2016 IEEE 7th Annual Ubiquitous Computing, Electronics & Mobile Communication Conference (UEMCON).
[14] Athanasios Bamis,et al. A method for improving mobile authentication using human spatio-temporal behavior , 2013, 2013 IEEE Symposium on Computers and Communications (ISCC).
[15] Sharath Pankanti,et al. Biometric Recognition: Security and Privacy Concerns , 2003, IEEE Secur. Priv..
[16] Arun Ross,et al. An introduction to biometric recognition , 2004, IEEE Transactions on Circuits and Systems for Video Technology.
[17] Arun Ross,et al. Information fusion in biometrics , 2003, Pattern Recognit. Lett..
[18] Tempestt J. Neal,et al. Using associative classification to authenticate mobile device users , 2017, 2017 IEEE International Joint Conference on Biometrics (IJCB).
[19] Ji Xiang,et al. From Mini House Game to Hobby-Driven Behavioral Biometrics-Based Password , 2013, 2013 12th IEEE International Conference on Trust, Security and Privacy in Computing and Communications.
[20] Yuefeng Li,et al. The state-of-the-art in personalized recommender systems for social networking , 2012, Artificial Intelligence Review.
[21] Yu Zhang,et al. Identifying Key Users for Targeted Marketing by Mining Online Social Network , 2010, 2010 IEEE 24th International Conference on Advanced Information Networking and Applications Workshops.
[22] Marina L. Gavrilova,et al. User Recognition From Social Behavior in Computer-Mediated Social Context , 2017, IEEE Transactions on Human-Machine Systems.
[23] John W. Sheppard,et al. Comparing Frequency- and Style-Based Features for Twitter Author Identification , 2013, FLAIRS.
[24] Sushil Jajodia,et al. Profiling Online Social Behaviors for Compromised Account Detection , 2016, IEEE Transactions on Information Forensics and Security.