Detection of spoofed identities on smartphones via sociability metrics
暂无分享,去创建一个
[1] Wen-Yuan Wang,et al. Biologic verification based on pressure sensor keyboards and classifier fusion techniques , 2006, IEEE Transactions on Consumer Electronics.
[2] Mingyue Li,et al. Security vulnerabilities of an remote password authentication scheme with smart card , 2011, 2011 International Conference on Consumer Electronics, Communications and Networks (CECNet).
[3] Stephen S. Yau,et al. An Effective Approach to Continuous User Authentication for Touch Screen Smart Devices , 2015, 2015 IEEE International Conference on Software Quality, Reliability and Security.
[4] Moon-Seog Jun,et al. Home IoT device certification through speaker recognition , 2015, 2015 17th International Conference on Advanced Communication Technology (ICACT).
[5] Kenji Mase,et al. Recognition of walking behaviors for pedestrian navigation , 2001, Proceedings of the 2001 IEEE International Conference on Control Applications (CCA'01) (Cat. No.01CH37204).
[6] Marina L. Gavrilova,et al. Online User Interaction Traits in Web-Based Social Biometrics , 2014 .
[7] Marina L. Gavrilova,et al. Social Behavioral Biometrics: An Emerging Trend , 2015, Int. J. Pattern Recognit. Artif. Intell..
[8] Burak Kantarci,et al. Mobile behaviometric framework for sociability assessment and identification of smartphone users , 2016, 2016 IEEE Symposium on Computers and Communication (ISCC).
[9] Steven Furnell,et al. Surveying the Development of Biometric User Authentication on Mobile Phones , 2015, IEEE Communications Surveys & Tutorials.
[10] Rama Chellappa,et al. Activity recognition using the dynamics of the configuration of interacting objects , 2003, 2003 IEEE Computer Society Conference on Computer Vision and Pattern Recognition, 2003. Proceedings..
[11] Venu Govindaraju,et al. Behavioural biometrics: a survey and classification , 2008, Int. J. Biom..
[12] Diane J. Cook,et al. Behaviometrics for Identifying Smart Home Residents , 2013 .
[13] Koduvayur P. Subbalakshmi,et al. Scam Detection in Twitter , 2014 .
[14] Fadi Al-Turjman,et al. Impact of user's habits on smartphones' sensors: An overview , 2016, 2016 HONET-ICT.
[15] Santhanakrishnan Anand,et al. Identification of Source of Rumors in Social Networks with Incomplete Information , 2015, ArXiv.
[16] Burak Kantarci,et al. Towards secure cloud-centric Internet of Biometric Things , 2015, 2015 IEEE 4th International Conference on Cloud Networking (CloudNet).
[17] Arun Ross,et al. What Else Does Your Biometric Data Reveal? A Survey on Soft Biometrics , 2016, IEEE Transactions on Information Forensics and Security.
[18] Marina L. Gavrilova,et al. A Concept of Social Behavioral Biometrics: Motivation, Current Developments, and Future Trends , 2014, 2014 International Conference on Cyberworlds.