AuthConFormer: Sensor-based Continuous Authentication of Smartphone Users Using A Convolutional Transformer
暂无分享,去创建一个
[1] D. He,et al. Quantum2FA: Efficient Quantum-Resistant Two-Factor Authentication Scheme for Mobile Devices , 2023, IEEE Transactions on Dependable and Secure Computing.
[2] Gang Zhou,et al. CNN-Based Continuous Authentication on Smartphones With Conditional Wasserstein Generative Adversarial Network , 2022, IEEE Internet of Things Journal.
[3] Gang Zhou,et al. DeFFusion: CNN-based Continuous Authentication Using Deep Feature Fusion , 2021, ACM Trans. Sens. Networks.
[4] Tao Mei,et al. Contextual Transformer Networks for Visual Recognition , 2021, IEEE Transactions on Pattern Analysis and Machine Intelligence.
[5] Shiwei Zhang,et al. End-to-End Temporal Action Detection With Transformer , 2021, IEEE Transactions on Image Processing.
[6] Quoc V. Le,et al. CoAtNet: Marrying Convolution and Attention for All Data Sizes , 2021, NeurIPS.
[7] Xiuchao Sui,et al. Medical Image Segmentation using Squeeze-and-Expansion Transformers , 2021, IJCAI.
[8] Xuan-Son Vu,et al. Modular Graph Transformer Networks for Multi-Label Image Classification , 2021, AAAI.
[9] José María de Fuentes,et al. SmartCAMPP - Smartphone-based continuous authentication leveraging motion sensors with privacy preservation , 2021, Pattern Recognit. Lett..
[10] N. Codella,et al. CvT: Introducing Convolutions to Vision Transformers , 2021, 2021 IEEE/CVF International Conference on Computer Vision (ICCV).
[11] Fabio Martinelli,et al. Using recurrent neural networks for continuous authentication through gait analysis , 2021, Pattern Recognit. Lett..
[12] Yifan Jiang,et al. TransGAN: Two Pure Transformers Can Make One Strong GAN, and That Can Scale Up , 2021, NeurIPS.
[13] Sotirios P. Chatzis,et al. Behavioral biometrics & continuous user authentication on mobile devices: A survey , 2021, Inf. Fusion.
[14] Bin Li,et al. Deformable DETR: Deformable Transformers for End-to-End Object Detection , 2020, ICLR.
[15] Yantao Li,et al. SCANet , 2020, ACM Trans. Sens. Networks.
[16] Lu Liu,et al. A Universal Representation Transformer Layer for Few-Shot Image Classification , 2020, ICLR.
[17] David Mohaisen,et al. AUToSen: Deep-Learning-Based Implicit Continuous Authentication Using Smartphone Sensors , 2020, IEEE Internet of Things Journal.
[18] Jun Wang,et al. A Framework for Behavioral Biometric Authentication Using Deep Metric Learning on Mobile Devices , 2020, IEEE Transactions on Mobile Computing.
[19] Nicolas Usunier,et al. End-to-End Object Detection with Transformers , 2020, ECCV.
[20] Pedro Miguel S'anchez S'anchez,et al. AuthCODE: A Privacy-preserving and Multi-device Continuous Authentication Architecture based on Machine and Deep Learning , 2020, Comput. Secur..
[21] Kaiming He,et al. Designing Network Design Spaces , 2020, 2020 IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR).
[22] F. Schwenker,et al. StrokeCoder: Path-Based Image Generation from Single Examples using Transformers , 2020, ArXiv.
[23] Yantao Li,et al. Using Feature Fusion Strategies in Continuous Authentication on Smartphones , 2020, IEEE Internet Computing.
[24] Ahmed A. Abusnaina,et al. Sensor-Based Continuous Authentication of Smartphones’ Users Using Behavioral Biometrics: A Contemporary Survey , 2020, IEEE Internet of Things Journal.
[25] Shiqi Yu,et al. A comprehensive study on gait biometrics using a joint CNN-based method , 2019, Pattern Recognit..
[26] Yongjun Chen,et al. Dense Transformer Networks for Brain Electron Microscopy Image Segmentation , 2019, IJCAI.
[27] Ashish Vaswani,et al. Stand-Alone Self-Attention in Vision Models , 2019, NeurIPS.
[28] Quoc V. Le,et al. EfficientNet: Rethinking Model Scaling for Convolutional Neural Networks , 2019, ICML.
[29] Quoc V. Le,et al. Searching for MobileNetV3 , 2019, 2019 IEEE/CVF International Conference on Computer Vision (ICCV).
[30] Kyriakos C. Chatzidimitriou,et al. BrainRun: A Behavioral Biometrics Dataset towards Continuous Implicit Authentication , 2019, Data.
[31] Ben Glocker,et al. TeTrIS: Template Transformer Networks for Image Segmentation With Shape Priors , 2019, IEEE Transactions on Medical Imaging.
[32] Gang Zhou,et al. Using Data Augmentation in Continuous Authentication on Smartphones , 2019, IEEE Internet of Things Journal.
[33] Bo Chen,et al. MnasNet: Platform-Aware Neural Architecture Search for Mobile , 2018, 2019 IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR).
[34] Xiangyu Zhang,et al. ShuffleNet V2: Practical Guidelines for Efficient CNN Architecture Design , 2018, ECCV.
[35] Ping Wang,et al. Two Birds with One Stone: Two-Factor Authentication with Security Beyond Conventional Bound , 2018, IEEE Transactions on Dependable and Secure Computing.
[36] Yu Guan,et al. Mobile Based Continuous Authentication Using Deep Features , 2018, EMDL@MobiSys.
[37] Julian Fierrez,et al. Benchmarking Touchscreen Biometrics for Mobile Authentication , 2018, IEEE Transactions on Information Forensics and Security.
[38] Mark Sandler,et al. MobileNetV2: Inverted Residuals and Linear Bottlenecks , 2018, 2018 IEEE/CVF Conference on Computer Vision and Pattern Recognition.
[39] Koosha Sadeghi,et al. Geometrical Analysis of Machine Learning Security in Biometric Authentication Systems , 2017, 2017 16th IEEE International Conference on Machine Learning and Applications (ICMLA).
[40] Frank Hutter,et al. Decoupled Weight Decay Regularization , 2017, ICLR.
[41] Ping Wang,et al. Zipf’s Law in Passwords , 2017, IEEE Transactions on Information Forensics and Security.
[42] Lukasz Kaiser,et al. Attention is All you Need , 2017, NIPS.
[43] Ping Wang,et al. Understanding Human-Chosen PINs: Characteristics, Distribution and Security , 2017, AsiaCCS.
[44] Jun Ho Huh,et al. Boosting the Guessing Attack Performance on Android Lock Patterns with Smudge Attacks , 2017, AsiaCCS.
[45] Bruno Crispo,et al. Please hold on: Unobtrusive user authentication using smartphone's built-in sensors , 2017, 2017 IEEE International Conference on Identity, Security and Behavior Analysis (ISBA).
[46] Samrat Mondal,et al. SPOSS: Secure Pin-Based-Authentication Obviating Shoulder Surfing , 2016, ICISS.
[47] Zhuowen Tu,et al. Aggregated Residual Transformations for Deep Neural Networks , 2016, 2017 IEEE Conference on Computer Vision and Pattern Recognition (CVPR).
[48] Ping Wang,et al. Targeted Online Password Guessing: An Underestimated Threat , 2016, CCS.
[49] Jugal K. Kalita,et al. Authentication of Smartphone Users Using Behavioral Biometrics , 2016, IEEE Communications Surveys & Tutorials.
[50] Jian Sun,et al. Deep Residual Learning for Image Recognition , 2015, 2016 IEEE Conference on Computer Vision and Pattern Recognition (CVPR).
[51] Nasir D. Memon,et al. An HMM-based multi-sensor approach for continuous mobile authentication , 2015, MILCOM 2015 - 2015 IEEE Military Communications Conference.
[52] Yuan Feng,et al. Waving Authentication: Your Smartphone Authenticate You on Motion Gesture , 2015, CHI Extended Abstracts.
[53] Matjaz B. Juric,et al. An Efficient HOS-Based Gait Authentication of Accelerometer Data , 2015, IEEE Transactions on Information Forensics and Security.
[54] Qing Yang,et al. HMOG: New Behavioral Biometric Features for Continuous Authentication of Smartphone Users , 2015, IEEE Transactions on Information Forensics and Security.
[55] Muhammad Khurram Khan,et al. Cryptanalysis and improvement of ‘a robust smart‐card‐based remote user password authentication scheme’ , 2014, Int. J. Commun. Syst..
[56] Janne Lindqvist,et al. Engineering Gesture-Based Authentication Systems , 2014, IEEE Pervasive Computing.
[57] Lih-Chyau Wuu,et al. Robust smart‐card‐based remote user password authentication scheme , 2014, Int. J. Commun. Syst..
[58] Jia-Lun Tsai,et al. Novel Anonymous Authentication Scheme Using Smart Cards , 2013, IEEE Transactions on Industrial Informatics.
[59] Michael Weber,et al. Password entry usability and shoulder surfing susceptibility on different smartphone platforms , 2012, MUM.
[60] Dawn Xiaodong Song,et al. Touchalytics: On the Applicability of Touchscreen Input as a Behavioral Biometric for Continuous Authentication , 2012, IEEE Transactions on Information Forensics and Security.
[61] Peng Wu,et al. Secure password-based remote user authentication scheme with non-tamper resistant smart cards , 2012, IACR Cryptol. ePrint Arch..
[62] Frank Stajano,et al. The Quest to Replace Passwords: A Framework for Comparative Evaluation of Web Authentication Schemes , 2012, 2012 IEEE Symposium on Security and Privacy.
[63] Daniel P. Lopresti,et al. Secure speech biometric templates for user authentication , 2012, IET Biom..
[64] Pong C. Yuen,et al. Binary Discriminant Analysis for Generating Binary Face Template , 2012, IEEE Transactions on Information Forensics and Security.
[65] Jun Han,et al. ACCessory: password inference using accelerometers on smartphones , 2012, HotMobile '12.
[66] Cees Snoek,et al. TubeR: Tube-Transformer for Action Detection , 2021, ArXiv.
[67] Dan Tao,et al. Context-Aware Implicit Authentication of Smartphone Users Based on Multi-Sensor Behavior , 2019, IEEE Access.
[68] Vivek Jain,et al. K-means++ vs. Behavioral Biometrics: One Loop to Rule Them All , 2018, NDSS.
[69] Yufei Chen,et al. Performance Analysis of Multi-Motion Sensor Behavior for Active Smartphone Authentication , 2018, IEEE Transactions on Information Forensics and Security.
[70] Ebad Ahmadzadeh,et al. Authentication on the Go: Assessing the Effect of Movement on Mobile Device Keystroke Dynamics , 2017, SOUPS.
[71] John V. Monaco,et al. Passcode Keystroke Biometric Performance on Smartphone Touchscreens is Superior to that on Hardware Keyboards , 2014 .