Making the most of what you have! Profiling biometric authentication on mobile devices
暂无分享,去创建一个
[1] David J. Kriegman,et al. Eigenfaces vs. Fisherfaces: Recognition Using Class Specific Linear Projection , 1996, ECCV.
[2] Zhenyu Yang,et al. Modeling multimodal biometric modalities for continuous user authentication , 2016, 2016 IEEE International Conference on Systems, Man, and Cybernetics (SMC).
[3] Stan Davis,et al. Comparison of Parametric Representations for Monosyllabic Word Recognition in Continuously Spoken Se , 1980 .
[4] Mika Kuulusa,et al. Optimizing Mobile Software with Built-in Power Profiling , 2007 .
[5] Steven Furnell,et al. Flexible and Transparent User Authentication for Mobile Devices , 2009, SEC.
[6] Jie Liu,et al. SpeakerSense: Energy Efficient Unobtrusive Speaker Identification on Mobile Phones , 2011, Pervasive.
[7] Heng Tao Shen,et al. Principal Component Analysis , 2009, Encyclopedia of Biometrics.
[8] Matti Pietikäinen,et al. Face Description with Local Binary Patterns: Application to Face Recognition , 2006, IEEE Transactions on Pattern Analysis and Machine Intelligence.
[9] Deborah Estrin,et al. SystemSens: a tool for monitoring usage in smartphone research deployments , 2011, MobiArch '11.
[10] Matti Pietikäinen,et al. Bi-Modal Person Recognition on a Mobile Phone: Using Mobile Phone Data , 2012, 2012 IEEE International Conference on Multimedia and Expo Workshops.
[11] Rajesh Kumar,et al. Continuous authentication of smartphone users by fusing typing, swiping, and phone movement patterns , 2016, 2016 IEEE 8th International Conference on Biometrics Theory, Applications and Systems (BTAS).
[12] Rama Chellappa,et al. Continuous User Authentication on Mobile Devices: Recent progress and remaining challenges , 2016, IEEE Signal Processing Magazine.
[13] Jun Yang,et al. SenGuard: Passive user identification on smartphones using multiple sensors , 2011, 2011 IEEE 7th International Conference on Wireless and Mobile Computing, Networking and Communications (WiMob).
[14] Konrad Rieck,et al. Continuous Authentication on Mobile Devices by Analysis of Typing Motion Behavior , 2014, Sicherheit.
[15] Sharad Malik,et al. Power analysis of embedded software: a first step towards software power minimization , 1994, IEEE Trans. Very Large Scale Integr. Syst..
[16] Terence Sim,et al. Who wants Continuous Authentication on Mobile Devices? , 2018, 2018 IEEE 9th International Conference on Biometrics Theory, Applications and Systems (BTAS).
[17] Andrew Zisserman,et al. Deep Face Recognition , 2015, BMVC.
[18] Alastair R. Beresford,et al. Device Analyzer: Understanding Smartphone Usage , 2013, MobiQuitous.
[19] Christoph Busch,et al. Unobtrusive User-Authentication on Mobile Phones Using Biometric Gait Recognition , 2010, 2010 Sixth International Conference on Intelligent Information Hiding and Multimedia Signal Processing.
[20] Tao Feng,et al. Continuous mobile authentication using touchscreen gestures , 2012, 2012 IEEE Conference on Technologies for Homeland Security (HST).
[21] Gernot Heiser,et al. An Analysis of Power Consumption in a Smartphone , 2010, USENIX Annual Technical Conference.
[22] Rama Chellappa,et al. Attribute-based continuous user authentication on mobile devices , 2015, 2015 IEEE 7th International Conference on Biometrics Theory, Applications and Systems (BTAS).
[23] M. Picheny,et al. Comparison of Parametric Representation for Monosyllabic Word Recognition in Continuously Spoken Sentences , 2017 .
[24] Feng Qian,et al. Profiling resource usage for mobile applications: a cross-layer approach , 2011, MobiSys '11.
[25] Daniel Vogel,et al. Usability and Security Perceptions of Implicit Authentication: Convenient, Secure, Sometimes Annoying , 2015, SOUPS.
[26] Sandeep Kumar,et al. Continuous Verification Using Multimodal Biometrics , 2006, IEEE Transactions on Pattern Analysis and Machine Intelligence.
[27] Dawn Xiaodong Song,et al. Touchalytics: On the Applicability of Touchscreen Input as a Behavioral Biometric for Continuous Authentication , 2012, IEEE Transactions on Information Forensics and Security.
[28] Angelos Stavrou,et al. Pairing continuous authentication with proactive platform hardening , 2017, 2017 IEEE International Conference on Pervasive Computing and Communications Workshops (PerCom Workshops).
[29] Climent Nadeu,et al. Time and frequency filtering of filter-bank energies for robust HMM speech recognition , 2000, Speech Commun..
[30] D. O'Shaughnessy,et al. Linear predictive coding , 1988, IEEE Potentials.
[31] Attila Kertész-Farkas,et al. HuGaDB: Human Gait Database for Activity Recognition from Wearable Inertial Sensor Networks , 2017, AIST.