Human Trait Analysis via Machine Learning Techniques for User Authentication
暂无分享,去创建一个
[1] M. Amaç Güvensan,et al. Network intrusion detection using machine learning anomaly detection algorithms , 2017, 2017 25th Signal Processing and Communications Applications Conference (SIU).
[2] Lei Pan,et al. Generating Repudiable, Memorizable, and Privacy Preserving Security Questions Using the Propp Theory of Narrative , 2014, 2014 International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery.
[3] Wenqiang Cui,et al. Anomaly detection and visualization of school electricity consumption data , 2017, 2017 IEEE 2nd International Conference on Big Data Analysis (ICBDA)(.
[4] Jocelyn Chanussot,et al. Robust anomaly detection in Hyperspectral Imaging , 2014, 2014 IEEE Geoscience and Remote Sensing Symposium.
[5] Qun Jin,et al. Detection of Anomaly Health Data by Specifying Latent Factors with SEM and Estimating Hidden States with HMM , 2018, 2018 9th International Conference on Information Technology in Medicine and Education (ITME).
[6] Weishi Zhang,et al. An Anomaly Intrusion Detection Method Based on Improved K-Means of Cloud Computing , 2016, 2016 Sixth International Conference on Instrumentation & Measurement, Computer, Communication and Control (IMCCC).
[7] Mark Cheung,et al. Contrastive Structured Anomaly Detection for Gaussian Graphical Models , 2018, 2018 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining (ASONAM).
[8] S. Varuna,et al. An integration of k-means clustering and naïve bayes classifier for Intrusion Detection , 2015, 2015 3rd International Conference on Signal Processing, Communication and Networking (ICSCN).
[9] M. Bahrololum,et al. Anomaly Intrusion Detection System Using Gaussian Mixture Model , 2008, 2008 Third International Conference on Convergence and Hybrid Information Technology.
[10] Ali Yazdian Varjani,et al. Intrusion detection based on MinMax K-means clustering , 2014, 7'th International Symposium on Telecommunications (IST'2014).
[11] Jeong-Uk Kim,et al. An Improved K-Means Using in Anomaly Detection , 2015, 2015 First International Conference on Computational Intelligence Theory, Systems and Applications (CCITSA).
[12] Abdelkader H. Ouda,et al. Data Analytics Methods for Anomaly Detection: Evolution and Recommendations , 2018, 2018 International Conference on Signal Processing and Information Security (ICSPIS).
[13] Yu Cui,et al. A Convolutional Auto-Encoder Method for Anomaly Detection on System Logs , 2018, 2018 IEEE International Conference on Systems, Man, and Cybernetics (SMC).
[14] Mohamad Jeragh,et al. Combining Auto Encoders and One Class Support Vectors Machine for Fraudulant Credit Card Transactions Detection , 2018, 2018 Second World Conference on Smart Trends in Systems, Security and Sustainability (WorldS4).
[15] S. E. Yüksel,et al. Comparison of RX-based anomaly detectors on synthetic and real hyperspectral data , 2015, 2015 7th Workshop on Hyperspectral Image and Signal Processing: Evolution in Remote Sensing (WHISPERS).
[16] Darpan Anand,et al. Dynamic Id Based Remote User Authentication in Multi Server Environment Using Smart Cards: A Review , 2015, 2015 International Conference on Computational Intelligence and Communication Networks (CICN).
[17] Mohammad Teshnehlab,et al. An anomaly detection method to detect web attacks using Stacked Auto-Encoder , 2018, 2018 6th Iranian Joint Congress on Fuzzy and Intelligent Systems (CFIS).
[18] Axel Küpper,et al. Anomaly Detection with HMM Gauge Likelihood Analysis , 2019, 2019 IEEE Fifth International Conference on Big Data Computing Service and Applications (BigDataService).
[19] Huiquan Wang,et al. Optimization of Reconstruction Accuracy of Anomaly Position Based on Stacked Auto-Encoder Neural Networks , 2019, IEEE Access.
[20] Vineeth Vijayaraghavan,et al. Current peak based device classification in NILM on a low-cost embedded platform using extra-trees , 2017, 2017 IEEE MIT Undergraduate Research Technology Conference (URTC).
[21] Qi Wang,et al. A sparse dictionary learning method for hyperspectral anomaly detection with capped norm , 2017, 2017 IEEE International Geoscience and Remote Sensing Symposium (IGARSS).
[22] Shisheng Zhong,et al. Gas turbine engine gas path anomaly detection using deep learning with Gaussian distribution , 2017, 2017 Prognostics and System Health Management Conference (PHM-Harbin).
[23] Abdelkader H. Ouda,et al. A hybrid-based filtering approach for user authentication , 2017, 2017 IEEE 30th Canadian Conference on Electrical and Computer Engineering (CCECE).
[24] Li Han. Using a Dynamic K-means Algorithm to Detect Anomaly Activities , 2011, 2011 Seventh International Conference on Computational Intelligence and Security.
[25] Mehran Fazeli,et al. Knowledge based dynamic password , 2017, 2017 IEEE 4th International Conference on Knowledge-Based Engineering and Innovation (KBEI).
[26] Zhao Chen,et al. Anomaly detection methods for bankruptcy prediction , 2017, 2017 4th International Conference on Systems and Informatics (ICSAI).
[27] Soon-Nyean Cheong,et al. LSTM and HMM Comparison for Home Activity Anomaly Detection , 2019, 2019 IEEE 3rd Information Technology, Networking, Electronic and Automation Control Conference (ITNEC).
[28] Anas Ibrahim,et al. Innovative Data Authentication Model , 2016, 2016 IEEE 7th Annual Information Technology, Electronics and Mobile Communication Conference (IEMCON).
[29] Beizhan Wang,et al. Survey on HMM based anomaly intrusion detection using system calls , 2010, 2010 5th International Conference on Computer Science & Education.
[30] Abdelkader Ouda,et al. The importance of human dynamics in the future user authentication , 2017, 2017 IEEE 30th Canadian Conference on Electrical and Computer Engineering (CCECE).
[31] Divya M. Menon,et al. Anomaly detection in smart grid traffic data for home area network , 2016, 2016 International Conference on Circuit, Power and Computing Technologies (ICCPCT).
[32] Mohamed Zohdy,et al. Network Anomaly Detection Using Two-Dimensional Hidden Markov Model Based Viterbi Algorithm , 2019, 2019 IEEE International Conference On Artificial Intelligence Testing (AITest).
[33] Li Han. Research of K-MEANS Algorithm Based on Information Entropy in Anomaly Detection , 2012, 2012 Fourth International Conference on Multimedia Information Networking and Security.
[34] Mahmood Fathy,et al. Video anomaly detection and localisation based on the sparsity and reconstruction error of auto-encoder , 2016 .
[35] Fahimeh Farahnakian,et al. A deep auto-encoder based approach for intrusion detection system , 2018, 2018 20th International Conference on Advanced Communication Technology (ICACT).
[36] Naixue Xiong,et al. Learning Sparse Representation With Variational Auto-Encoder for Anomaly Detection , 2018, IEEE Access.
[37] Nicholas Micallef,et al. Changing users' security behaviour towards security questions: A game based learning approach , 2017, 2017 Military Communications and Information Systems Conference (MilCIS).
[38] Francesco Cricri,et al. Clustering and Unsupervised Anomaly Detection with l2 Normalized Deep Auto-Encoder Representations , 2018, 2018 International Joint Conference on Neural Networks (IJCNN).
[39] Majid Sarrafzadeh,et al. Unsupervised Prediction of Negative Health Events Ahead of Time , 2019, 2019 IEEE EMBS International Conference on Biomedical & Health Informatics (BHI).
[40] Fei Wang,et al. A novel framework for anomaly detection based on hybrid HMM-SVM model , 2011, 2011 4th IEEE International Conference on Broadband Network and Multimedia Technology.
[41] Abdelkader Ouda,et al. User Modeling via Anomaly Detection Techniques for User Authentication , 2019, 2019 IEEE 10th Annual Information Technology, Electronics and Mobile Communication Conference (IEMCON).
[42] Beizhan Wang,et al. A method for HMM-based system calls intrusion detection based on hybrid training algorithm , 2011, 2011 IEEE International Conference on Information and Automation.
[43] Tsai-Hua Kang,et al. Random graphic user password authentication scheme in mobile devices , 2017, 2017 International Conference on Applied System Innovation (ICASI).
[44] Fei Wang,et al. A HMM-based method for anomaly detection , 2011, 2011 4th IEEE International Conference on Broadband Network and Multimedia Technology.
[45] Fuyou Miao,et al. A new dynamic user authentication scheme using smart cards for wireless sensor network , 2011, 2011 IEEE 2nd International Conference on Computing, Control and Industrial Engineering.
[46] Heinrich Hußmann,et al. I Know What You Did Last Week! Do You?: Dynamic Security Questions for Fallback Authentication on Smartphones , 2015, CHI.
[47] Jörg Schwenk,et al. Secure Fallback Authentication and the Trusted Friend Attack , 2014, 2014 IEEE 34th International Conference on Distributed Computing Systems Workshops (ICDCSW).
[48] Wang Lei,et al. Spectrum anomalies autonomous detection in cognitive radio using Hidden Markov Models , 2015, 2015 IEEE Advanced Information Technology, Electronic and Automation Control Conference (IAEAC).
[49] Abdelkader Ouda. A framework for next generation user authentication , 2016, 2016 3rd MEC International Conference on Big Data and Smart City (ICBDSC).