Authentication by Mapping Keystrokes to Music: The Melody of Typing
暂无分享,去创建一个
Zhanpeng Jin | S. S. Iyengar | Juha Roning | Tirthankar Paul | Vir V. Phoha | Amith K. Belman | Li Wang | Paweł Śniatała | Seppo Vainio | Zhanpeng Jin | V. Phoha | S. Iyengar | J. Roning | P. Sniatala | S. Vainio | Tirthankar Paul | Li Wang
[1] Peter B. L. Meijer,et al. An experimental system for auditory image representations , 1992, IEEE Transactions on Biomedical Engineering.
[2] Fabian Monrose,et al. Keystroke dynamics as a biometric for authentication , 2000, Future Gener. Comput. Syst..
[3] Dimitris I. Rigas,et al. Utilising audio-visual stimuli in interactive information systems: a two domain investigation on auditory metaphors , 2002, Proceedings. International Conference on Information Technology: Coding and Computing.
[4] Dinesh Kant Kumar,et al. Auditory eyes: Representing visual information in sound and tactile cues , 2005, 2005 13th European Signal Processing Conference.
[5] Feng Zhou,et al. Keyboard acoustic emanations revisited , 2005, CCS '05.
[6] Kirsi Helkala,et al. Biometric Gait Authentication Using Accelerometer Sensor , 2006, J. Comput..
[7] Einar Snekkenes,et al. Gait Authentication and Identification Using Wearable Accelerometer Sensor , 2007, 2007 IEEE Workshop on Automatic Identification Advanced Technologies.
[8] Wei Jia,et al. Survey of Gait Recognition , 2009, ICIC.
[9] Asok Ray,et al. On the discriminability of keystroke feature vectors used in fixed text keystroke authentication , 2011, Pattern Recognit. Lett..
[10] Tao Feng,et al. Continuous mobile authentication using touchscreen gestures , 2012, 2012 IEEE Conference on Technologies for Homeland Security (HST).
[11] Eugene Mikyung Kim. Harmonograph: A visual representation of sound , 2012, 2012 International Symposium on Intelligent Signal Processing and Communications Systems.
[12] Arun Ross,et al. Biometric authentication via keystroke sound , 2013, 2013 International Conference on Biometrics (ICB).
[13] Vir V. Phoha,et al. Scan-Based Evaluation of Continuous Keystroke Authentication Systems , 2013, IT Professional.
[14] Vir V. Phoha,et al. Which verifiers work?: A benchmark evaluation of touch-based authentication algorithms , 2013, 2013 IEEE Sixth International Conference on Biometrics: Theory, Applications and Systems (BTAS).
[15] Bogdan Cristian Florea. MIDI-based controller of electrical drives , 2014, Proceedings of the 2014 6th International Conference on Electronics, Computers and Artificial Intelligence (ECAI).
[16] Yunhao Liu,et al. Context-free Attacks Using Keyboard Acoustic Emanations , 2014, CCS.
[17] Mengjun Xie,et al. MotionAuth: Motion-based authentication for wrist worn smart devices , 2015, 2015 IEEE International Conference on Pervasive Computing and Communication Workshops (PerCom Workshops).
[18] Arun Ross,et al. Investigating the Discriminative Power of Keystroke Sound , 2015, IEEE Transactions on Information Forensics and Security.
[19] Jie Yang,et al. Snooping Keystrokes with mm-level Audio Ranging on a Single Phone , 2015, MobiCom.
[20] Soumik Mondal,et al. Swipe gesture based Continuous Authentication for mobile devices , 2015, 2015 International Conference on Biometrics (ICB).
[21] Yang Gao,et al. Enhanced free-text keystroke continuous authentication based on dynamics of wrist motion , 2017, 2017 IEEE Workshop on Information Forensics and Security (WIFS).
[22] Juha Röning,et al. Towards Personalised, DNA Signature Derived Music via the Short Tandem Repeats (STR) , 2018, Advances in Intelligent Systems and Computing.