SWIPEGAN: Swiping Data Augmentation Using Generative Adversarial Networks for Smartphone User Authentication
暂无分享,去创建一个
[1] Antonio Torralba,et al. Generating Videos with Scene Dynamics , 2016, NIPS.
[2] Mauro Conti,et al. Mind how you answer me!: transparently authenticating the user of a smartphone when answering or placing a call , 2011, ASIACCS '11.
[3] Qing Yang,et al. HMOG: New Behavioral Biometric Features for Continuous Authentication of Smartphone Users , 2015, IEEE Transactions on Information Forensics and Security.
[4] Muhammad Sharif,et al. A Survey of Password Attacks and Comparative Analysis on Methods for Secure Authentication , 2012 .
[5] Bruno Crispo,et al. Hold and Sign: A Novel Behavioral Biometrics for Smartphone User Authentication , 2016, 2016 IEEE Security and Privacy Workshops (SPW).
[6] Yoshua Bengio,et al. Generative Adversarial Nets , 2014, NIPS.
[7] Ali Borji,et al. Pros and Cons of GAN Evaluation Measures , 2018, Comput. Vis. Image Underst..
[8] Sandeep Gupta,et al. A chimerical dataset combining physiological and behavioral biometric traits for reliable user authentication on smart devices and ecosystems , 2020, Data in brief.
[9] Bruno Crispo,et al. DriverAuth: A risk-based multi-modal biometric-based driver authentication scheme for ride-sharing platforms , 2019, Comput. Secur..
[10] Florian Alt,et al. Improving Accuracy, Applicability and Usability of Keystroke Biometrics on Mobile Touchscreen Devices , 2015, CHI.
[11] Dhruv Batra,et al. LR-GAN: Layered Recursive Generative Adversarial Networks for Image Generation , 2016, ICLR.
[12] Heinrich Hußmann,et al. I Feel Like I'm Taking Selfies All Day!: Towards Understanding Biometric Authentication on Smartphones , 2015, CHI.
[13] Zahid Akhtar Shabbeer Ahmad Momin. Security of multimodal biometric systems against spoof attacks , 2012 .
[14] Nasir D. Memon,et al. Finger-drawn pin authentication on touch devices , 2014, 2014 IEEE International Conference on Image Processing (ICIP).
[15] Youtian Du,et al. User Authentication Through Mouse Dynamics , 2013, IEEE Transactions on Information Forensics and Security.
[16] Steven Furnell,et al. Surveying the Development of Biometric User Authentication on Mobile Phones , 2015, IEEE Communications Surveys & Tutorials.
[17] Nasir D. Memon,et al. Multitouch Gesture-Based Authentication , 2014, IEEE Transactions on Information Forensics and Security.
[18] Claudia Picardi,et al. User authentication through keystroke dynamics , 2002, TSEC.
[19] John V. Monaco,et al. Spoofing key-press latencies with a generative keystroke dynamics model , 2015, 2015 IEEE 7th International Conference on Biometrics Theory, Applications and Systems (BTAS).
[20] Alexander Binder,et al. Mouse Authentication Without the Temporal Aspect – What Does a 2D-CNN Learn? , 2018, 2018 IEEE Security and Privacy Workshops (SPW).
[21] Mauro Conti,et al. AnswerAuth: A bimodal behavioral biometric-based user authentication scheme for smartphones , 2019, J. Inf. Secur. Appl..
[22] Lantao Yu,et al. SeqGAN: Sequence Generative Adversarial Nets with Policy Gradient , 2016, AAAI.
[23] Heinrich Hußmann,et al. Touch me once and i know it's you!: implicit authentication based on touch screen patterns , 2012, CHI.
[24] Attaullah Buriro. Behavioral Biometrics for Smartphone User Authentication , 2017 .
[25] John C.-I. Chuang,et al. Faking it, Making it: Fooling and Improving Brain-Based Authentication with Generative Adversarial Networks , 2018, 2018 IEEE 9th International Conference on Biometrics Theory, Applications and Systems (BTAS).
[26] Kemal Davaslioglu,et al. Generative Adversarial Learning for Spectrum Sensing , 2018, 2018 IEEE International Conference on Communications (ICC).
[27] Alan Ritter,et al. Adversarial Learning for Neural Dialogue Generation , 2017, EMNLP.
[28] Kemal Davaslioglu,et al. Generative Adversarial Network in the Air: Deep Adversarial Learning for Wireless Signal Spoofing , 2020, IEEE Transactions on Cognitive Communications and Networking.
[29] Germain Forestier,et al. Data augmentation using synthetic data for time series classification with deep residual networks , 2018, ArXiv.