Biometric-Enabled Authentication Machines: A Survey of Open-Set Real-World Applications
暂无分享,去创建一个
Dmitry O. Gorodnichy | Shawn Eastwood | Svetlana N. Yanushkevich | Vlad P. Shmerko | Martin Drahanský | Shawn C. Eastwood | D. Gorodnichy | S. Yanushkevich | V. Shmerko | M. Drahanský
[1] Veneta MacLeod,et al. Methodology for the Evaluation of an International Airport Automated Border Control Processing System , 2011 .
[2] Arun Ross,et al. Multibiometric systems , 2004, CACM.
[3] Serge Gutwirth,et al. Profiling the European Citizen, Cross-Disciplinary Perspectives , 2008 .
[4] Brendan J. Frey,et al. A comparison of algorithms for inference and learning in probabilistic graphical models , 2005, IEEE Transactions on Pattern Analysis and Machine Intelligence.
[5] Sheldon H. Jacobson,et al. Risk-Based Policies for Airport Security Checkpoint Screening , 2010, Transp. Sci..
[6] Andrea F. Abate,et al. MUBAI: multiagent biometrics for ambient intelligence , 2011, J. Ambient Intell. Humaniz. Comput..
[7] George W. Quinn,et al. Report on the Evaluation of 2D Still-Image Face Recognition Algorithms , 2011 .
[8] Jörn Ostermann,et al. User evaluation: Synthetic talking faces for interactive services , 1999, The Visual Computer.
[9] Barbara Messing,et al. An Introduction to MultiAgent Systems , 2002, Künstliche Intell..
[10] Jonghun Baek,et al. Posture Monitoring System for Context Awareness in Mobile Computing , 2010, IEEE Transactions on Instrumentation and Measurement.
[11] Marina L. Gavrilova,et al. Situational Awareness through Biometrics , 2013, Computer.
[12] George N. Votsis,et al. Emotion recognition in human-computer interaction , 2001, IEEE Signal Process. Mag..
[13] Stephen Coulthart. Using social media for global security , 2016 .
[14] Dmitry O. Gorodnichy,et al. Automated border control: Problem formalization , 2014, 2014 IEEE Symposium on Computational Intelligence in Biometrics and Identity Management (CIBIM).
[15] Marvin Rausand,et al. Risk Assessment: Theory, Methods, and Applications , 2011 .
[16] Bir Bhanu,et al. Computer Vision Beyond the Visible Spectrum , 2004 .
[17] Gonzalo Bailador,et al. Secure access control by means of human stress detection , 2011, 2011 Carnahan Conference on Security Technology.
[18] John Daugman,et al. Iris Recognition at Airports and Border-Crossings , 2009, Encyclopedia of Biometrics.
[19] Bojan Cukic,et al. Combined performance and risk analysis for border management applications , 2010, 2010 IEEE/IFIP International Conference on Dependable Systems & Networks (DSN).
[20] Lynette I. Millett,et al. Biometric Recognition: Challenges and Opportunities , 2010 .
[21] Bartholomew Elias. Airport Passenger Screening: Background and Issues for Congress , 2009 .
[22] Marina L. Gavrilova,et al. Facial biometrics for situational awareness systems , 2013, IET Biom..
[23] C. Pelachaud,et al. Emotion-Oriented Systems: The Humaine Handbook , 2011 .
[24] Shawn Eastwood,et al. Risk profiler in automated human authentication , 2014, 2014 IEEE Symposium on Computational Intelligence for Engineering Solutions (CIES).
[25] S.N. Yanushkevich,et al. Experience of Design and Prototyping of a Multi-Biometric Early Warning Physical Access Control Security System (PASS) and a Training System (T-PASS) , 2006, IECON 2006 - 32nd Annual Conference on IEEE Industrial Electronics.
[26] Terje Aven,et al. Foundations of Risk Analysis: Aven/Foundations of Risk Analysis , 2012 .
[27] Robert W Poole,et al. A Risk-based Airport Security Policy , 2003 .
[28] Ronald R. Yager,et al. Dempster–Shafer belief structures with interval valued focal weights , 2001, Int. J. Intell. Syst..
[29] Glenn Shafer,et al. A Mathematical Theory of Evidence , 2020, A Mathematical Theory of Evidence.
[30] Giulio Sandini,et al. Cognitive Systems , 2005 .
[31] Tsutomu Sasao,et al. Hahoe KAIST Robot Theatre: learning rules of interactive robot behavior as a multiple-valued logic synthesis problem , 2005, 35th International Symposium on Multiple-Valued Logic (ISMVL'05).
[32] B. Miller,et al. Vital signs of identity [biometrics] , 1994, IEEE Spectrum.
[33] Andry Tanoto,et al. FaceBots: Steps towards enhanced long-term human-robot interaction by utilizing and publishing online social information , 2009, Paladyn J. Behav. Robotics.
[34] Himanshu S. Bhatt,et al. Recognizing Surgically Altered Face Images Using Multiobjective Evolutionary Algorithm , 2013, IEEE Transactions on Information Forensics and Security.
[35] Konstantinos N. Plataniotis,et al. DecisionMaking Support in BiometricBased Physical Access Control Systems: Design Concept, Architecture, and Applications , 2010 .
[36] Kathryn B. Laskey,et al. Terrorism Risk Management , 2008 .
[37] Anthony J. Palmer,et al. Ten Reasons Why IRIS Needed 20:20 Foresight: Some Lessons for Introducing Biometric Border Control Systems , 2012, 2012 European Intelligence and Security Informatics Conference.
[38] Li Lin,et al. Passenger grouping with risk levels in an airport security system , 2009, Eur. J. Oper. Res..
[39] Marvin Rausand,et al. Risk Assessment: Rausand/Risk Assessment , 2011 .
[40] Karin Rothschild. Computer Vision Beyond The Visible Spectrum , 2016 .
[41] N. Poh,et al. Multibiometrics for Identity Authentication: Issues, Benefits and Challenges , 2008, 2008 IEEE Second International Conference on Biometrics: Theory, Applications and Systems.
[42] Michael S. Hsiao,et al. Hardware Trojan Attacks: Threat Analysis and Countermeasures , 2014, Proceedings of the IEEE.
[43] Ronald R. Yager,et al. On the valuation of alternatives for decision‐making under uncertainty , 2002, Int. J. Intell. Syst..
[44] Ronald R. Yager,et al. Uncertainty modeling and decision support , 2004, Reliab. Eng. Syst. Saf..
[45] L. Fiondella,et al. Security and performance analysis of a passenger screening checkpoint for mass-transit systems , 2012, 2012 IEEE Conference on Technologies for Homeland Security (HST).
[46] Daniel Cuesta Cantarero,et al. A Multi-modal Biometric Fusion Implementation for ABC Systems , 2013, 2013 European Intelligence and Security Informatics Conference.
[47] Russell Beale,et al. Affective interaction: How emotional agents affect users , 2009, Int. J. Hum. Comput. Stud..
[48] Jon M. Kleinberg,et al. Networks, Crowds, and Markets: Reasoning about a Highly Connected World [Book Review] , 2013, IEEE Technol. Soc. Mag..
[49] Danny Weyns,et al. Multi-Agent Systems , 2009 .
[50] Marina L. Gavrilova,et al. Belief trees and networks for biometric applications , 2011, Soft Comput..
[51] Sharath Pankanti,et al. Biometrics: Personal Identification in Networked Society , 2013 .
[52] Didier Bigo,et al. Justice and Home Affairs databases and a Smart Borders System at EU external borders. An evaluation of current and forthcoming proposals. CEPS Paper in Liberty and Security No. 52/December 2012 , 2012 .
[53] I. Pavlidis,et al. Thermal image analysis for polygraph testing. , 2002, IEEE engineering in medicine and biology magazine : the quarterly magazine of the Engineering in Medicine & Biology Society.
[54] Adrian Stoica,et al. Support of Interviewing Techniques in Physical Access Control Systems , 2008, IWCF.
[55] Matthew L. Jensen,et al. Detecting Concealment of Intent in Transportation Screening: A Proof of Concept , 2009, IEEE Transactions on Intelligent Transportation Systems.
[56] Mark S. Nixon,et al. Targeted impersonation as a tool for the detection of biometric system vulnerabilities , 2013, 2013 IEEE Sixth International Conference on Biometrics: Theory, Applications and Systems (BTAS).
[57] Jay F. Nunamaker,et al. Embodied Conversational Agent-Based Kiosk for Automated Interviewing , 2011, J. Manag. Inf. Syst..
[58] Finn V. Jensen,et al. Bayesian Networks and Decision Graphs , 2001, Statistics for Engineering and Information Science.
[59] Adrian Stoica,et al. Fundamentals of Biometric-Based Training System Design , 2007, Image Pattern Recognition.
[60] Eddie Y K Ng,et al. Analysis of IR thermal imager for mass blind fever screening. , 2004, Microvascular research.
[61] Sadie Creese,et al. Tools for understanding identity , 2013, 2013 IEEE International Conference on Technologies for Homeland Security (HST).
[62] Ronald R. Yager,et al. Uncertainty representation using fuzzy measures , 2002, IEEE Trans. Syst. Man Cybern. Part B.
[63] Mervyn A. Jack,et al. Evaluating humanoid synthetic agents in e-retail applications , 2001, IEEE Trans. Syst. Man Cybern. Part A.
[64] Norbert Reithinger,et al. The SmartKom Architecture: A Framework for Multimodal Dialogue Systems , 2006, SmartKom.
[65] Svetlana N. Yanushkevich,et al. Biometric Intelligence in Authentication Machines: from Talking Faces to Talking Robots , 2014, 2014 IIAI 3rd International Conference on Advanced Applied Informatics.
[66] I. Pavlidis,et al. Noncontact measurement of breathing function , 2006, IEEE Engineering in Medicine and Biology Magazine.