Discriminative Power of Typing Features on Desktops, Tablets, and Phones for User Identification
暂无分享,去创建一个
[1] Dae-Ki Kang,et al. Mini-batch bagging and attribute ranking for accurate user authentication in keystroke dynamics , 2017, Pattern Recognit..
[2] Yao Liu,et al. No Training Hurdles: Fast Training-Agnostic Attacks to Infer Your Typing , 2018, CCS.
[3] Minglu Li,et al. KeyLiSterber: Inferring Keystrokes on QWERTY Keyboard of Touch Screen through Acoustic Signals , 2019, IEEE INFOCOM 2019 - IEEE Conference on Computer Communications.
[4] Alexey E. Sulavko,et al. Users' identification through keystroke dynamics based on vibration parameters and keyboard pressure , 2017, 2017 Dynamics of Systems, Mechanisms and Machines (Dynamics).
[5] John Zulueta,et al. 481. Predicting Mood Disturbance Severity in Bipolar Subjects with Mobile Phone Keystroke Dynamics and Metadata , 2017, Biological Psychiatry.
[6] E. Kabir,et al. A new distance measure for free text keystroke authentication , 2009, 2009 14th International CSI Computer Conference.
[7] M. Grgic,et al. A survey of biometric recognition methods , 2004, Proceedings. Elmar-2004. 46th International Symposium on Electronics in Marine.
[8] Wahyudi,et al. Intelligent keystroke pressure-based typing biometrics authentication system using radial basis function network , 2009, 2009 5th International Colloquium on Signal Processing & Its Applications.
[9] Vir V. Phoha,et al. Snoop-Forge-Replay Attacks on Continuous Verification With Keystrokes , 2013, IEEE Transactions on Information Forensics and Security.
[10] Stephanie Schuckers,et al. Effects of text filtering on authentication performance of keystroke biometrics , 2016, 2016 IEEE International Workshop on Information Forensics and Security (WIFS).
[11] Meikang Qiu,et al. Keystroke Biometric Systems for User Authentication , 2017, J. Signal Process. Syst..
[12] Deian Stefan,et al. Keystroke-dynamics authentication against synthetic forgeries , 2010, 6th International Conference on Collaborative Computing: Networking, Applications and Worksharing (CollaborateCom 2010).
[13] Vir V. Phoha,et al. Stealing Passwords by Observing Hands Movement , 2019, IEEE Transactions on Information Forensics and Security.
[14] Juan E. Tapiador,et al. A Survey of Wearable Biometric Recognition Systems , 2016, ACM Comput. Surv..
[15] Yan Lindsay Sun,et al. Anatomy of secondary features in keystroke dynamics - achieving more with less , 2017, 2017 IEEE International Conference on Identity, Security and Behavior Analysis (ISBA).
[16] Sungzoon Cho,et al. Keystroke dynamics-based authentication for mobile devices , 2009, Comput. Secur..
[17] Wei Wang,et al. Keystroke Recognition Using WiFi Signals , 2015, MobiCom.
[18] Avar Pentel. Predicting User Age by Keystroke Dynamics , 2018, CSOS.
[19] Jonathan Voris,et al. Touchscreen Biometrics Across Multiple Devices , 2017, SOUPS.
[20] Giancarlo Ruffo,et al. Dealing with Different Languages and Old Profiles in Keystroke Analysis of Free Text , 2005, AI*IA.
[21] Igor Bilogrevic,et al. Side-Channel Inference Attacks on Mobile Keypads Using Smartwatches , 2017, IEEE Transactions on Mobile Computing.
[22] David Guy Brizan,et al. Utilizing overt and latent linguistic structure to improve keystroke-based authentication , 2017, Image Vis. Comput..
[23] George D. C. Cavalcanti,et al. An approach to feature selection for keystroke dynamics systems based on PSO and feature weighting , 2007, 2007 IEEE Congress on Evolutionary Computation.
[24] Ana Carolina Lorena,et al. A systematic review on keystroke dynamics , 2013, Journal of the Brazilian Computer Society.
[25] Mauro Conti,et al. Covert lie detection using keyboard dynamics , 2018, Scientific Reports.
[26] Yong Sheng,et al. A parallel decision tree-based method for user authentication based on keystroke patterns , 2005, IEEE Transactions on Systems, Man, and Cybernetics, Part B (Cybernetics).
[27] Xiangyang Li,et al. ViViSnoop: Someone is snooping your typing without seeing it! , 2017, 2017 IEEE Conference on Communications and Network Security (CNS).
[28] Yunhao Liu,et al. Context-free Attacks Using Keyboard Acoustic Emanations , 2014, CCS.
[29] David Umphress,et al. Identity Verification Through Keyboard Characteristics , 1985, Int. J. Man Mach. Stud..
[30] Jie Yang,et al. Snooping Keystrokes with mm-level Audio Ranging on a Single Phone , 2015, MobiCom.
[31] Nitesh V. Chawla,et al. SMOTE: Synthetic Minority Over-sampling Technique , 2002, J. Artif. Intell. Res..
[32] Gopal K. Gupta,et al. Identity authentication based on keystroke latencies , 1990, Commun. ACM.
[33] Daniel Vogel,et al. Augmented Reality-based Mimicry Attacks on Behaviour-Based Smartphone Authentication , 2018, MobiSys.
[34] Terence Sim,et al. Are Digraphs Good for Free-Text Keystroke Dynamics? , 2007, 2007 IEEE Conference on Computer Vision and Pattern Recognition.
[35] Gary M. Weiss,et al. Smartwatch-based transcription biometrics , 2017, 2017 IEEE 8th Annual Ubiquitous Computing, Electronics and Mobile Communication Conference (UEMCON).
[36] Orcan Alpar,et al. Frequency spectrograms for biometric keystroke authentication using neural network based classifier , 2017, Knowl. Based Syst..
[37] Asok Ray,et al. On the discriminability of keystroke feature vectors used in fixed text keystroke authentication , 2011, Pattern Recognit. Lett..
[38] Steven Furnell,et al. Authenticating mobile phone users using keystroke analysis , 2006, International Journal of Information Security.
[39] Terence Sim,et al. Keystroke Dynamics in a General Setting , 2007, ICB.
[40] Rakesh Agrawal,et al. Keyboard acoustic emanations , 2004, IEEE Symposium on Security and Privacy, 2004. Proceedings. 2004.
[41] Kenneth Revett,et al. Enhancing Login Security Through the Use of Keystroke Input Dynamics , 2006, ICB.
[42] Weng Kin Lai,et al. User identification of numerical keypad typing patterns with subtractive clustering fuzzy inference , 2017, 2017 IEEE 15th Student Conference on Research and Development (SCOReD).
[43] Soumik Mondal,et al. A study on continuous authentication using a combination of keystroke and mouse biometrics , 2017, Neurocomputing.
[44] Stephanie Schuckers,et al. A practical evaluation of free-text keystroke dynamics , 2017, 2017 IEEE International Conference on Identity, Security and Behavior Analysis (ISBA).
[45] Kevin Warwick,et al. Non-conventional keystroke dynamics for user authentication , 2017, Pattern Recognit. Lett..
[46] Vir V. Phoha,et al. Examining a Large Keystroke Biometrics Dataset for Statistical-Attack Openings , 2013, TSEC.
[47] Issa Traoré,et al. Biometric Recognition Based on Free-Text Keystroke Dynamics , 2014, IEEE Transactions on Cybernetics.
[48] Claudia Picardi,et al. Keystroke analysis of free text , 2005, TSEC.
[49] Zhong Lin Wang,et al. Keystroke dynamics enabled authentication and identification using triboelectric nanogenerator array , 2018 .
[50] Andrew Beng Jin Teoh,et al. A Survey of Keystroke Dynamics Biometrics , 2013, TheScientificWorldJournal.
[51] Alexandros Karakos,et al. Keystroke dynamics features for gender recognition , 2018, Digit. Investig..
[52] Vir V. Phoha,et al. Utilizing linguistically enhanced keystroke dynamics to predict typist cognition and demographics , 2015, Int. J. Hum. Comput. Stud..
[53] Fabian Monrose,et al. Authentication via keystroke dynamics , 1997, CCS '97.
[54] Mohammad S. Obaidat,et al. Verification of computer users using keystroke dynamics , 1997, IEEE Trans. Syst. Man Cybern. Part B.
[55] Rytis Maskeliunas,et al. Recognition of human daytime fatigue using keystroke data , 2018, ANT/SEIT.
[56] Soumik Mondal,et al. Person Identification by Keystroke Dynamics Using Pairwise User Coupling , 2017, IEEE Transactions on Information Forensics and Security.
[57] Tao Li,et al. EyeTell: Video-Assisted Touchscreen Keystroke Inference from Eye Movements , 2018, 2018 IEEE Symposium on Security and Privacy (SP).