Trusted Worrier: A low-cost and high-accuracy user authentication system for firearm exploiting dynamic hand pressure biometrics
暂无分享,去创建一个
A. B. M. Alim Al Islam | Mohammad Ali | Md Tamzeed Islam | Bashima Islam | Md Shihabul Islam | Saiyma Sarmin | Kazi Hasan Zubaer | Asif Mohaisin Sadri
[1] Michal Daszykowski,et al. Revised DBSCAN algorithm to cluster data with dense adjacent clusters , 2013 .
[2] Anil K. Jain,et al. Biometrics of Next Generation: An Overview , 2010 .
[3] Peter Corcoran,et al. Iris authentication in handheld devices - considerations for constraint-free acquisition , 2015, IEEE Transactions on Consumer Electronics.
[4] Raymond N. J. Veldhuis,et al. Grip-pattern verification for a smart gun , 2008, J. Electronic Imaging.
[5] Rajeswari Mukesh,et al. A Biometric Approach for Continuous User Authentication by Fusing Hard and Soft Traits , 2014, Int. J. Netw. Secur..
[6] S. K. Basu,et al. Reliability Assessment Based on Design and Manufacturing Tolerances for Control Burst Mechanism of Small Arms , 1997 .
[7] Wouter Joosen,et al. SmartAuth: dynamic context fingerprinting for continuous user authentication , 2015, SAC.
[8] Subbarao Kambhampati,et al. What We Instagram: A First Analysis of Instagram Photo Content and User Types , 2014, ICWSM.
[9] Jie Yu. A nonlinear kernel Gaussian mixture model based inferential monitoring approach for fault detection and diagnosis of chemical processes , 2012 .
[10] Bill Jackson,et al. Complex zero-free regions at large |q| for multivariate Tutte polynomials (alias Potts-model partition functions) with general complex edge weights , 2008, J. Comb. Theory, Ser. B.
[11] Henrik Walter,et al. Prediction error as a linear function of reward probability is coded in human nucleus accumbens , 2006, NeuroImage.
[12] Trilok Chand Sharma,et al. WEKA Approach for Comparative Study of Classification Algorithm , 2013 .
[13] Hamidreza Jafarnejadsani,et al. Adaptive Control of a Variable-Speed Variable-Pitch Wind Turbine Using Radial-Basis Function Neural Network , 2013, IEEE Transactions on Control Systems Technology.
[14] Michael R. Lyu,et al. Towards Continuous and Passive Authentication via Touch Biometrics: An Experimental Study on Smartphones , 2014, SOUPS.
[16] Sk Hafizul Islam,et al. Cryptanalysis and improvement of a password-based user authentication scheme for the integrated EPR information system , 2015, J. King Saud Univ. Comput. Inf. Sci..
[17] Zong Chen. Handgrip Recognition , 2022 .
[18] Zhuo Yang,et al. MAC protocol identification using support vector machines for cognitive radio networks , 2014, IEEE Wireless Communications.
[19] Chien-Chung Shen,et al. Wireless-Delimited Secure Zones with Encrypted Attribute-Based Broadcast for Safe Firearms , 2014, ArXiv.
[20] Raymond N. J. Veldhuis,et al. Grip-Pattern Recognition for Smart Guns , 2003 .
[21] Steven Furnell,et al. Continuous user authentication using multi-modal biometrics , 2015, Comput. Secur..
[22] Markus Jakobsson,et al. Hand authentication on multi-touch tablets , 2014, HotMobile.
[23] Mary Hanson. Fingerprint-based Forensics Identify Argentina's Desaparecidos , 2000, IEEE Computer Graphics and Applications.
[24] Chun-Ta Li,et al. An efficient biometrics-based remote user authentication scheme using smart cards , 2010, J. Netw. Comput. Appl..