Continuous authentication using deep neural networks ensemble on keystroke dynamics
暂无分享,去创建一个
Lerina Aversano | Mario Luca Bernardi | Marta Cimitile | Riccardo Pecori | L. Aversano | M. Bernardi | Marta Cimitile | R. Pecori | Lerina Aversano
[1] Joan M. Aliprand. The Unicode Standard , 1996 .
[2] Thomas G. Dietterich. Ensemble Methods in Machine Learning , 2000, Multiple Classifier Systems.
[3] Claudia Picardi,et al. User authentication through keystroke dynamics , 2002, TSEC.
[4] Maria Papadaki,et al. Keystroke Analysis as a Method of Advanced User Authentication and Response , 2002, SEC.
[5] Shie Mannor,et al. The cross entropy method for classification , 2005, ICML.
[6] Chee Peng Lim,et al. Keystroke Patterns Classification Using the ARTMAP-FD Neural Network , 2007, Third International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2007).
[7] Radford M. Neal. Pattern Recognition and Machine Learning , 2007, Technometrics.
[8] Kenneth Revett,et al. On the Use of Rough Sets for User Authentication Via Keystroke Dynamics , 2007, EPIA Workshops.
[9] Roy A. Maxion,et al. Comparing anomaly-detection algorithms for keystroke dynamics , 2009, 2009 IEEE/IFIP International Conference on Dependable Systems & Networks.
[10] Roy A. Maxion,et al. Keystroke biometrics with number-pad input , 2010, 2010 IEEE/IFIP International Conference on Dependable Systems & Networks (DSN).
[11] Dong Yu,et al. Deep Learning and Its Applications to Signal and Information Processing [Exploratory DSP] , 2011, IEEE Signal Processing Magazine.
[12] Andrew Y. Ng,et al. Learning Feature Representations with K-Means , 2012, Neural Networks: Tricks of the Trade.
[13] Andrew Beng Jin Teoh,et al. A Survey of Keystroke Dynamics Biometrics , 2013, TheScientificWorldJournal.
[14] Geoffrey E. Hinton,et al. On the importance of initialization and momentum in deep learning , 2013, ICML.
[15] Konstantinos G. Margaritis,et al. Breaking Ties of Plurality Voting in Ensembles of Distributed Neural Network Classifiers Using Soft Max Accumulations , 2014, AIAI.
[16] Yejin Choi,et al. Keystroke Patterns as Prosody in Digital Writings: A Case Study with Deceptive Reviews and Essays , 2014, EMNLP.
[17] James T. Heaton,et al. Towards a practical silent speech recognition system , 2014, INTERSPEECH.
[18] Fabrizio Maria Maggi,et al. Using Discriminative Rule Mining to Discover Declarative Process Models with Non-atomic Activities , 2014, RuleML.
[19] Sergey Ioffe,et al. Batch Normalization: Accelerating Deep Network Training by Reducing Internal Covariate Shift , 2015, ICML.
[20] Akbar Siami Namin,et al. On Accuracy of Keystroke Authentications Based on Commonly Used English Words , 2015, 2015 International Conference of the Biometrics Special Interest Group (BIOSIG).
[21] Sungzoon Cho,et al. Keystroke dynamics-based user authentication using long and free text strings from various input devices , 2015, Inf. Sci..
[22] Issa Traoré,et al. Improving Performance and Usability in Mobile Keystroke Dynamic Biometric Authentication , 2016, 2016 IEEE Security and Privacy Workshops (SPW).
[23] Rafal Doroz,et al. Electronic Health Record Security Based on Ensemble Classification of Keystroke Dynamics , 2016, Appl. Artif. Intell..
[24] Antti Oulasvirta,et al. How We Type: Movement Strategies and Performance in Everyday Typing , 2016, CHI.
[25] Soohyung Kim,et al. Keystroke dynamics for authentication in smartphone , 2016, 2016 International Conference on Information and Communication Technology Convergence (ICTC).
[26] Vikram Pudi,et al. Mining Keystroke Timing Pattern for User Authentication , 2016, NFMCP@PKDD/ECML.
[27] Shambhu J. Upadhyaya,et al. Transfer learning in long-text keystroke dynamics , 2017, 2017 IEEE International Conference on Identity, Security and Behavior Analysis (ISBA).
[28] Shambhu J. Upadhyaya,et al. Sensitivity analysis in keystroke dynamics using convolutional neural networks , 2017, 2017 IEEE Workshop on Information Forensics and Security (WIFS).
[29] Orcan Alpar,et al. Frequency spectrograms for biometric keystroke authentication using neural network based classifier , 2017, Knowl. Based Syst..
[30] Sitalakshmi Venkatraman,et al. Use of Data Visualisation for Zero-Day Malware Detection , 2018, Secur. Commun. Networks.
[31] Hanry Ham,et al. Keystroke Dynamic Classification using Machine Learning for Password Authorization , 2018 .
[32] Per Ola Kristensson,et al. Observations on Typing from 136 Million Keystrokes , 2018, CHI 2018.
[33] Erik Hellström. Feature learning with deep neural networks for keystroke biometrics : A study of supervised pre-training and autoencoders , 2018 .
[34] Damon L. Woodard,et al. Deep Learning for Biometrics , 2018, ACM Comput. Surv..
[35] Mark J. van der Laan,et al. The relative performance of ensemble methods with deep convolutional neural networks for image classification , 2017, Journal of applied statistics.
[36] Fabio Martinelli,et al. Keystroke Analysis for User Identification using Deep Neural Networks , 2019, 2019 International Joint Conference on Neural Networks (IJCNN).
[37] Priya Chaliyath Venugopal,et al. APPLYING EMPIRICAL THRESHOLDING ALGORITHM FOR A KEYSTROKE DYNAMICS BASED AUTHENTICATION SYSTEM , 2019 .
[38] Orcan Alpar. TAPSTROKE: A novel intelligent authentication system using tap frequencies , 2019, Expert Syst. Appl..
[39] Chris Yakopcic,et al. A State-of-the-Art Survey on Deep Learning Theory and Architectures , 2019, Electronics.
[40] Pietro Liò,et al. Continuous authentication by free-text keystroke based on CNN and RNN , 2020, Comput. Secur..
[41] Chintan Patel,et al. An enhanced approach for three factor remote user authentication in multi - server environment , 2020, J. Intell. Fuzzy Syst..
[42] Qin Zheng,et al. IMCFN: Image-based malware classification using fine-tuned convolutional neural network architecture , 2020, Comput. Networks.
[43] Behnam Mohammadi-Ivatloo,et al. Long-Term Wind Power Forecasting Using Tree-Based Learning Algorithms , 2020, IEEE Access.
[44] Ji Sun Shin,et al. A New Feature Scoring Method in Keystroke Dynamics-Based User Authentications , 2020, IEEE Access.
[45] Quoc-Viet Pham,et al. A Multidirectional LSTM Model for Predicting the Stability of a Smart Grid , 2020, IEEE Access.
[46] Yang Yang,et al. SRI-XDFM: A Service Reliability Inference Method Based on Deep Neural Network , 2020, Intelligent Automation & Soft Computing.
[47] Xiaoyan Zhao,et al. Sound Source Localization Based on SRP-PHAT Spatial Spectrum and Deep Neural Network , 2020, Computers, Materials & Continua.
[48] Nak-Jun Sung,et al. Left Or Right Hand Classification From Fingerprint Images Using A Deep Neural Network , 2020 .
[49] Rafal Doroz,et al. Dynamic keystroke pattern analysis and classifiers with competence for user recognition , 2020, Appl. Soft Comput..
[50] Praveen Kumar Reddy Maddikunta,et al. An ensemble machine learning approach through effective feature extraction to classify fake news , 2021, Future Gener. Comput. Syst..