暂无分享,去创建一个
[1] John D. Woodward,et al. Biometrics: privacy's foe or privacy's friend? , 1997, Proc. IEEE.
[2] Christopher M. Bishop,et al. Pattern Recognition and Machine Learning (Information Science and Statistics) , 2006 .
[3] Wael Louis,et al. On evaluating human recognition using electrocardiogram signals: From rest to exercise , 2016, 2016 IEEE Canadian Conference on Electrical and Computer Engineering (CCECE).
[4] Ana L. N. Fred,et al. Check Your Biosignals Here: A new dataset for off-the-person ECG biometrics , 2014, Comput. Methods Programs Biomed..
[5] Shridatt Sugrim,et al. User-generated free-form gestures for authentication: security and memorability , 2014, MobiSys.
[6] Nikita Borisov,et al. The Tangled Web of Password Reuse , 2014, NDSS.
[7] Helmut Schneider,et al. The domino effect of password reuse , 2004, CACM.
[8] Steven Furnell,et al. Password Replacement: Replacing passwords: in search of the secret remedy , 2006 .
[9] Karan Singh,et al. Dry contact fingertip ECG-based authentication system using time, frequency domain features and support vector machine , 2015, 2015 37th Annual International Conference of the IEEE Engineering in Medicine and Biology Society (EMBC).
[10] Jeffrey M. Hausdorff,et al. Physionet: Components of a New Research Resource for Complex Physiologic Signals". Circu-lation Vol , 2000 .
[11] Ana L. N. Fred,et al. ECG-based Biometrics using a Deep Autoencoder for Feature Learning - An Empirical Study on Transferability , 2017, ICPRAM.
[12] Brenda K. Wiederhold,et al. ECG to identify individuals , 2005, Pattern Recognit..
[13] Mark Stamp,et al. Handbook of Information and Communication Security , 2010, Handbook of Information and Communication Security.
[14] Ana L. N. Fred,et al. ECG-based Continuous Authentication System using Adaptive String Matching , 2011, BIOSIGNALS.
[15] Teri A. Crosby,et al. How to Detect and Handle Outliers , 1993 .
[16] Mario Baum,et al. Handbook Of Biometrics , 2016 .
[17] Irena Jekova,et al. Human Identification by Cross-Correlation and Pattern Matching of Personalized Heartbeat: Influence of ECG Leads and Reference Database Size , 2018, Sensors.
[18] Ana L. N. Fred,et al. Finger ECG signal for user authentication: Usability and performance , 2013, 2013 IEEE Sixth International Conference on Biometrics: Theory, Applications and Systems (BTAS).
[19] A. Uchiyama,et al. Development of an ECG identification system , 2001, 2001 Conference Proceedings of the 23rd Annual International Conference of the IEEE Engineering in Medicine and Biology Society.
[20] Ola Pettersson,et al. ECG analysis: a new approach in human identification , 2001, IEEE Trans. Instrum. Meas..
[21] G.B. Moody,et al. The impact of the MIT-BIH Arrhythmia Database , 2001, IEEE Engineering in Medicine and Biology Magazine.
[22] Friso De Boer,et al. Frequency Bands Effects on QRS Detection , 2010, BIOSIGNALS.
[23] Dimitrios Hatzinakos,et al. Heart Biometrics: Theory, Methods and Applications , 2011 .
[24] M. Angela Sasse,et al. Making Passwords Secure and Usable , 1997, BCS HCI.
[25] Jaime S. Cardoso,et al. Towards a Continuous Biometric System Based on ECG Signals Acquired on the Steering Wheel , 2017, Sensors.
[26] Willis J. Tompkins,et al. A Real-Time QRS Detection Algorithm , 1985, IEEE Transactions on Biomedical Engineering.
[27] Albert Ali Salah,et al. Machine Learning for Biometrics , 2010 .
[28] Ivan Martinovic,et al. Broken Hearted: How To Attack ECG Biometrics , 2017, NDSS.
[29] Ana L. N. Fred,et al. CardioWheel: ECG Biometrics on the Steering Wheel , 2015, ECML/PKDD.
[30] Frank Stajano,et al. The Quest to Replace Passwords: A Framework for Comparative Evaluation of Web Authentication Schemes , 2012, 2012 IEEE Symposium on Security and Privacy.
[31] Nasir D. Memon,et al. PassPoints: Design and longitudinal evaluation of a graphical password system , 2005, Int. J. Hum. Comput. Stud..
[32] Abdulmotaleb El-Saddik,et al. ECG Authentication for Mobile Devices , 2016, IEEE Transactions on Instrumentation and Measurement.
[33] Ana L. N. Fred,et al. Evaluating Template Uniqueness in ECG Biometrics , 2014, ICINCO.
[34] Luminita Vasiu,et al. Biometric Recognition - Security and Privacy Concerns , 2004, ICETE.
[35] Ivan Martinovic,et al. Evaluating Behavioral Biometrics for Continuous Authentication: Challenges and Metrics , 2017, AsiaCCS.
[36] Joseph A. O'Sullivan,et al. ECG Biometric Recognition: A Comparative Analysis , 2012, IEEE Transactions on Information Forensics and Security.