Learning-Aided User Identification Using Smartphone Sensors for Smart Homes
暂无分享,去创建一个
Ning Zhang | Zhiguang Qin | Kim-Kwang Raymond Choo | Kuan Zhang | Dajiang Chen | Zhen Qin | Lingzhou Hu | K. Choo | Z. Qin | Dajiang Chen | Zhen Qin | Ning Zhang | Kuan Zhang | Lingzhou Hu
[1] Sergey Ioffe,et al. Batch Normalization: Accelerating Deep Network Training by Reducing Internal Covariate Shift , 2015, ICML.
[2] Luo Haiyong,et al. An hidden Markov model based complex walking pattern recognition algorithm , 2016, 2016 Fourth International Conference on Ubiquitous Positioning, Indoor Navigation and Location Based Services (UPINLBS).
[3] Georgios Kambourakis,et al. Introducing touchstroke: keystroke-based authentication system for smartphones , 2016, Secur. Commun. Networks.
[4] Fabio Roli,et al. F-measure optimisation in multi-label classifiers , 2012, Proceedings of the 21st International Conference on Pattern Recognition (ICPR2012).
[5] Nitesh Saxena,et al. Wave-to-Access: Protecting Sensitive Mobile Device Services via a Hand Waving Gesture , 2013, CANS.
[6] Jimmy Ba,et al. Adam: A Method for Stochastic Optimization , 2014, ICLR.
[7] Nitish Srivastava,et al. Dropout: a simple way to prevent neural networks from overfitting , 2014, J. Mach. Learn. Res..
[8] Noufal Kunnathu. Biometric User Authentication on Smartphone Accelerometer Sensor Data , 2022 .
[9] F. Girosi,et al. Nonlinear prediction of chaotic time series using support vector machines , 1997, Neural Networks for Signal Processing VII. Proceedings of the 1997 IEEE Signal Processing Society Workshop.
[10] Sen M. Kuo,et al. Fast Fourier Transform and Its Applications , 2002 .
[11] Lei Yang,et al. Unlocking Smart Phone through Handwaving Biometrics , 2015, IEEE Transactions on Mobile Computing.
[12] Lin Zhong,et al. User evaluation of lightweight user authentication with a single tri-axis accelerometer , 2009, Mobile HCI.
[13] Alex X. Liu,et al. Secure unlocking of mobile touch screen devices by simple gestures: you can see it but you can not do it , 2013, MobiCom.
[14] Dana Kulic,et al. Exercise motion classification from large-scale wearable sensor data using convolutional neural networks , 2017, 2017 IEEE/RSJ International Conference on Intelligent Robots and Systems (IROS).
[15] Xiang-Yang Li,et al. SilentSense: silent user identification via touch and movement behavioral biometrics , 2013, MobiCom.
[16] Shan Chang,et al. ShakeIn: Secure User Authentication of Smartphones with Single-Handed Shakes , 2017, IEEE Transactions on Mobile Computing.
[17] Tom M Mitchell,et al. Mining Our Reality , 2009, Science.
[18] Martín Abadi,et al. TensorFlow: Large-Scale Machine Learning on Heterogeneous Distributed Systems , 2016, ArXiv.
[19] Xiaohong Guan,et al. Performance Analysis of Motion-Sensor Behavior for User Authentication on Smartphones , 2016, Sensors.
[20] Xiao Wang,et al. SenSec: Mobile security through passive sensing , 2013, 2013 International Conference on Computing, Networking and Communications (ICNC).
[21] Gary M. Weiss,et al. Cell phone-based biometric identification , 2010, 2010 Fourth IEEE International Conference on Biometrics: Theory, Applications and Systems (BTAS).
[22] Mikkel Baun Kjærgaard,et al. Smart Devices are Different: Assessing and MitigatingMobile Sensing Heterogeneities for Activity Recognition , 2015, SenSys.
[23] Jürgen Schmidhuber,et al. A Clockwork RNN , 2014, ICML.
[24] Ruby B. Lee,et al. Multi-sensor authentication to improve smartphone security , 2015, 2015 International Conference on Information Systems Security and Privacy (ICISSP).
[25] Mauro Conti,et al. Mind how you answer me!: transparently authenticating the user of a smartphone when answering or placing a call , 2011, ASIACCS '11.
[26] Hiroshi Inamura,et al. Screen Unlocking Method using Behavioral Characteristics when Taking Mobile Phone from Pocket , 2016, MoMM.
[27] Florian Alt,et al. Improving Accuracy, Applicability and Usability of Keystroke Biometrics on Mobile Touchscreen Devices , 2015, CHI.
[28] Yoshua Bengio,et al. Deep Sparse Rectifier Neural Networks , 2011, AISTATS.
[29] Charles C. Tappert,et al. A Behavioral Biometrics User Authentication Study Using Motion Data from Android Smartphones , 2016, 2016 European Intelligence and Security Informatics Conference (EISIC).
[30] Cuong Pham,et al. SigVer3D: Accelerometer Based Verification of 3-D Signatures on Mobile Devices , 2014, KSE.
[31] Nitish Srivastava,et al. Improving neural networks by preventing co-adaptation of feature detectors , 2012, ArXiv.
[32] Prakash Ishwar,et al. Two-Stream CNNs for Gesture-Based Verification and Identification: Learning User Style , 2016, CVPR 2016.
[33] Ye Xu-zhen. Fast Fourier transform and its applications , 2004 .