Identification of trusted interactive behavior based on mouse behavior considering web User's emotions
暂无分享,去创建一个
Shiquan Xiong | Biao Wang | Shuping Yi | Qian Yi | Shu-ping Yi | Qian Yi | Shiquan Xiong | Biao Wang
[1] K. Vohs,et al. How Emotion Shapes Behavior: Feedback, Anticipation, and Reflection, Rather Than Direct Causation , 2007, Personality and social psychology review : an official journal of the Society for Personality and Social Psychology, Inc.
[2] Karl H.E. Kroemer,et al. Wrist Posture during Computer Mouse Usage , 1995 .
[3] Stephanie M. Merritt. Affective Processes in Human–Automation Interactions , 2011, Hum. Factors.
[4] Daniel Capaldo Amaral,et al. Automatic digital mood boards to connect users and designers with kansei engineering , 2019, International Journal of Industrial Ergonomics.
[5] David Zhang,et al. Optimal subset-division based discrimination and its kernelization for face and palmprint recognition , 2012, Pattern Recognit..
[6] Malek Ben Salem,et al. Active authentication using file system decoys and user behavior modeling: results of a large scale study , 2019, Comput. Secur..
[7] D. Rempel,et al. Effects of computer mouse design and task on carpal tunnel pressure. , 1999, Ergonomics.
[8] Zhang Huanguo,et al. Development of trusted computing research , 2008, Wuhan University Journal of Natural Sciences.
[9] Mike Thelwall,et al. Negative emotions boost user activity at BBC forum , 2010, 1011.5459.
[10] S. Sutton. Predicting and Explaining Intentions and Behavior: How Well Are We Doing? , 1998 .
[11] A.K. Jain,et al. Webbiometrics: User Verification Via Web Interaction , 2007, 2007 Biometrics Symposium.
[12] Merlin Teodosia Suarez,et al. Recognizing Student Emotions using Brainwaves and Mouse Behavior Data , 2013, Int. J. Distance Educ. Technol..
[13] Ajit Varki,et al. Human uniqueness: genome interactions with environment, behaviour and culture , 2008, Nature Reviews Genetics.
[14] Baoyi Wang,et al. A privacy protection scheme for smart meter that can verify terminal’s trustworthiness , 2019, International Journal of Electrical Power & Energy Systems.
[15] Rosemary R. Seva,et al. The influence of cellular phone attributes on users' affective experiences: a cultural comparison. , 2009 .
[16] Rakesh Pandey,et al. Assessing emotional processing difficulties in normotensive individuals with high and isolated blood pressure elevations , 2019, International journal of psychology : Journal international de psychologie.
[17] Michael Franz,et al. Semantic remote attestation: a virtual machine directed approach to trusted computing , 2004 .
[18] Leo Breiman,et al. Random Forests , 2001, Machine Learning.
[19] Russell Beale,et al. Affect and Emotion in Human-Computer Interaction, From Theory to Applications , 2008, Affect and Emotion in Human-Computer Interaction.
[20] Jonathan Klein,et al. Frustrating the user on purpose: a step toward building an affective computer , 2002, Interact. Comput..
[21] Russell Beale,et al. The Role of Affect and Emotion in HCI , 2008, Affect and Emotion in Human-Computer Interaction.
[22] Robert Sabourin,et al. An adaptive classification system for video-based face recognition , 2012, Inf. Sci..
[23] J. G. Taylor,et al. Emotion recognition in human-computer interaction , 2005, Neural Networks.
[24] André Ogliari,et al. Stimulating design team creativity based on emotional values: A study on idea generation in the early stages of new product development processes , 2019, International Journal of Industrial Ergonomics.
[25] S. Tomkins,et al. Affect Imagery Consciousness: The Positive Affects , 1963 .
[26] Biao Wang,et al. Measuring Network User Trust via Mouse Behavior Characteristics Under Different Emotions , 2019, HCI.
[27] Patrick Bours,et al. A Login System Using Mouse Dynamics , 2009, 2009 Fifth International Conference on Intelligent Information Hiding and Multimedia Signal Processing.
[28] H. N. Wieman. The Unique in Human Behavior. , 1922 .
[29] M. den Uyl,et al. The FaceReader: Online facial expression recognition , 2006 .
[30] George N. Votsis,et al. Emotion recognition in human-computer interaction , 2001, IEEE Signal Process. Mag..
[31] Robin L. Wakefield,et al. Social media network behavior: A study of user passion and affect , 2016, J. Strateg. Inf. Syst..
[32] P. Zimmermann,et al. Affective Computing—A Rationale for Measuring Mood With Mouse and Keyboard , 2003, International journal of occupational safety and ergonomics : JOSE.
[33] Leon Straker,et al. Mouse versus keyboard use: A comparison of shoulder muscle load , 1998 .
[34] Peter J. Lang,et al. Gaze Patterns When Looking at Emotional Pictures: Motivationally Biased Attention , 2004 .
[35] M. Bradley,et al. Measuring emotion: Behavior, feeling, and physiology , 2000 .
[36] Jiankun Hu,et al. Global Ridge Orientation Modeling for Partial Fingerprint Identification , 2011, IEEE Transactions on Pattern Analysis and Machine Intelligence.
[37] Tom Fawcett,et al. Data Science and its Relationship to Big Data and Data-Driven Decision Making , 2013, Big Data.
[38] C. Darwin,et al. The Expression of the Emotions in Man and Animals , 1872 .
[39] M Hagberg,et al. Differences between work methods and gender in computer mouse use. , 2000, Scandinavian journal of work, environment & health.
[40] Thierry Pun,et al. Multimodal Emotion Recognition in Response to Videos , 2012, IEEE Transactions on Affective Computing.
[41] Johannes Götzfried,et al. Hardware-Based Trusted Computing Architectures for Isolation and Attestation , 2018, IEEE Transactions on Computers.
[42] Wolfgang Maehr. eMotion: Estimation of User's Emotional State by Mouse Motions , 2008 .
[43] L. Mises,et al. Human Action: A Treatise on Economics , 1949 .
[44] Sannyuya Liu,et al. Temporal emotion-aspect modeling for discovering what students are concerned about in online course forums , 2019, Interact. Learn. Environ..
[45] Ana L. N. Fred,et al. A behavioral biometric system based on human-computer interaction , 2004, SPIE Defense + Commercial Sensing.
[46] Giovanni Pezzulo,et al. How do you hold your mouse? Tracking the compatibility effect between hand posture and stimulus size , 2015, Psychological research.
[47] Dieter Gollmann,et al. Why Trust is Bad for Security , 2006, Electron. Notes Theor. Comput. Sci..
[48] Steven B. Lipner,et al. The trustworthy computing security development lifecycle , 2004, 20th Annual Computer Security Applications Conference.
[49] Will Tao,et al. Trusted interaction approach for dynamic service selection using multi-criteria decision making technique , 2012, Knowl. Based Syst..
[50] I. Ajzen. The theory of planned behavior , 1991 .
[51] Lior Rokach,et al. User identity verification via mouse dynamics , 2012, Inf. Sci..
[52] J. Gross,et al. The tie that binds? Coherence among emotion experience, behavior, and physiology. , 2005, Emotion.
[53] Peter W. McOwan,et al. Java-Based Internet Biometric Authentication System , 2003, IEEE Trans. Pattern Anal. Mach. Intell..
[54] Katarzyna Harezlak,et al. Fusion of eye movement and mouse dynamics for reliable behavioral biometrics , 2018, Pattern Analysis and Applications.
[55] Mats Hagberg,et al. Computer mouse use in two different hand positions: exposure, comfort, exertion and productivity. , 2003, Applied ergonomics.
[56] Soumik Mondal,et al. A computational approach to the continuous authentication biometric system , 2015, Inf. Sci..
[57] Takashi Yamauchi,et al. Mouse Trajectories and State Anxiety: Feature Selection with Random Forest , 2013, 2013 Humaine Association Conference on Affective Computing and Intelligent Interaction.
[58] FragopanagosN.,et al. 2005 Special Issue , 2005 .