SCANet
暂无分享,去创建一个
Yantao Li | Hailong Hu | Gang Zhou | Zhangqian Zhu | Gang Zhou | Yantao Li | Hailong Hu | Zhangqian Zhu
[1] Matteo Gadaleta,et al. IDNet: Smartphone-based Gait Recognition with Convolutional Neural Networks , 2016, Pattern Recognit..
[2] Guoliang Xue,et al. Unobservable Re-authentication for Smartphones , 2013, NDSS.
[3] Oral Büyüköztürk,et al. Deep Learning‐Based Crack Damage Detection Using Convolutional Neural Networks , 2017, Comput. Aided Civ. Infrastructure Eng..
[4] Yu Guan,et al. Mobile Based Continuous Authentication Using Deep Features , 2018, EMDL@MobiSys.
[5] Gene Tsudik,et al. Authentication using pulse-response biometrics , 2017, NDSS.
[6] Kang G. Shin,et al. Continuous Authentication for Voice Assistants , 2017, MobiCom.
[7] Sun-Yuan Kung,et al. Cost-effective kernel ridge regression implementation for keystroke-based active authentication system , 2017, 2014 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP).
[8] Prasant Mohapatra,et al. Sensor-assisted facial recognition: an enhanced biometric authentication system for smartphones , 2014, MobiSys.
[9] Xiang-Yang Li,et al. SilentSense: silent user identification via touch and movement behavioral biometrics , 2013, MobiCom.
[10] Shuangquan Wang,et al. Continuous Authentication With Touch Behavioral Biometrics and Voice on Wearable Glasses , 2017, IEEE Transactions on Human-Machine Systems.
[11] Leif E. Peterson. K-nearest neighbor , 2009, Scholarpedia.
[12] Yufei Chen,et al. Performance Analysis of Multi-Motion Sensor Behavior for Active Smartphone Authentication , 2018, IEEE Transactions on Information Forensics and Security.
[13] Yantao Li,et al. Using Feature Fusion Strategies in Continuous Authentication on Smartphones , 2020, IEEE Internet Computing.
[14] Yantao Li,et al. Touch-based Smartphone Authentication Using Import Vector Domain Description , 2018, 2018 IEEE 29th International Conference on Application-specific Systems, Architectures and Processors (ASAP).
[15] Andrea Lagorio,et al. On the Use of SIFT Features for Face Authentication , 2006, 2006 Conference on Computer Vision and Pattern Recognition Workshop (CVPRW'06).
[16] Agathoniki Trigoni,et al. Deepauth: in-situ authentication for smartwatches via deeply learned behavioural biometrics , 2018, UbiComp.
[17] Tao Feng,et al. TIPS: context-aware implicit user identification using touch screen in uncontrolled environments , 2014, HotMobile.
[18] Jasper Snoek,et al. Spectral Representations for Convolutional Neural Networks , 2015, NIPS.
[19] Stéphane Mallat,et al. Rigid-Motion Scattering for Texture Classification , 2014, ArXiv.
[20] Gang Zhou,et al. Sensor-Based Continuous Authentication Using Cost-Effective Kernel Ridge Regression , 2018, IEEE Access.
[21] Anil K. Jain,et al. Integrating Faces and Fingerprints for Personal Identification , 1998, IEEE Trans. Pattern Anal. Mach. Intell..
[22] François Chollet,et al. Xception: Deep Learning with Depthwise Separable Convolutions , 2016, 2017 IEEE Conference on Computer Vision and Pattern Recognition (CVPR).
[23] Gang Zhou,et al. Using Data Augmentation in Continuous Authentication on Smartphones , 2019, IEEE Internet of Things Journal.
[24] Tsuyoshi Isshiki,et al. Fingerprint authentication on touch sensor using Phase-Only Correlation method , 2016, 2016 7th International Conference of Information and Communication Technology for Embedded Systems (IC-ICTES).
[25] Geoffrey E. Hinton,et al. ImageNet classification with deep convolutional neural networks , 2012, Commun. ACM.
[26] Xiaohong Guan,et al. Performance Analysis of Motion-Sensor Behavior for User Authentication on Smartphones , 2016, Sensors.
[27] C. Sanchez-Avilaa,et al. Two different approaches for iris recognition using Gabor filters and multiscale zero-crossing representation , 2004 .
[28] Malik Yousef,et al. One-Class SVMs for Document Classification , 2002, J. Mach. Learn. Res..
[29] Gang Zhou,et al. CNNAuth: Continuous Authentication via Two-Stream Convolutional Neural Networks , 2018, 2018 IEEE International Conference on Networking, Architecture and Storage (NAS).
[30] Kyriakos C. Chatzidimitriou,et al. BrainRun: A Behavioral Biometrics Dataset towards Continuous Implicit Authentication , 2019, Data.
[31] Jian Sun,et al. Deep Residual Learning for Image Recognition , 2015, 2016 IEEE Conference on Computer Vision and Pattern Recognition (CVPR).
[32] Matti Pietikäinen,et al. Face and Eye Detection for Person Authentication in Mobile Phones , 2007, 2007 First ACM/IEEE International Conference on Distributed Smart Cameras.
[33] Susmita Sur-Kolay,et al. CABA: Continuous Authentication Based on BioAura , 2017, IEEE Transactions on Computers.
[34] Andrew Zisserman,et al. Two-Stream Convolutional Networks for Action Recognition in Videos , 2014, NIPS.
[35] Aaron C. Courville,et al. Recurrent Batch Normalization , 2016, ICLR.
[36] Bo Chen,et al. MobileNets: Efficient Convolutional Neural Networks for Mobile Vision Applications , 2017, ArXiv.
[37] ChaYoung-Jin,et al. Deep Learning-Based Crack Damage Detection Using Convolutional Neural Networks , 2017 .
[38] Heikki Ailisto,et al. Identifying users of portable devices from gait pattern with accelerometers , 2005, Proceedings. (ICASSP '05). IEEE International Conference on Acoustics, Speech, and Signal Processing, 2005..
[39] Jimmy Ba,et al. Adam: A Method for Stochastic Optimization , 2014, ICLR.
[40] Oral Büyüköztürk,et al. Autonomous Structural Visual Inspection Using Region‐Based Deep Learning for Detecting Multiple Damage Types , 2018, Comput. Aided Civ. Infrastructure Eng..
[41] Anil K. Jain,et al. Soft Biometric Traits for Continuous User Authentication , 2010, IEEE Transactions on Information Forensics and Security.
[42] Xiang-Yang Li,et al. Continuous user identification via touch and movement behavioral biometrics , 2014, 2014 IEEE 33rd International Performance Computing and Communications Conference (IPCCC).
[43] Andrew Beng Jin Teoh,et al. A Survey of Keystroke Dynamics Biometrics , 2013, TheScientificWorldJournal.
[44] Xue-wen Chen,et al. Comparison of One-Class SVM and Two-Class SVM for Fold Recognition , 2006, ICONIP.
[45] Rama Chellappa,et al. Partial face detection for continuous authentication , 2016, 2016 IEEE International Conference on Image Processing (ICIP).
[46] Andrew Zisserman,et al. Very Deep Convolutional Networks for Large-Scale Image Recognition , 2014, ICLR.
[47] Douglas A. Reynolds,et al. A Tutorial on Text-Independent Speaker Verification , 2004, EURASIP J. Adv. Signal Process..
[48] Mark Sandler,et al. MobileNetV2: Inverted Residuals and Linear Bottlenecks , 2018, 2018 IEEE/CVF Conference on Computer Vision and Pattern Recognition.
[49] Qing Yang,et al. HMOG: New Behavioral Biometric Features for Continuous Authentication of Smartphone Users , 2015, IEEE Transactions on Information Forensics and Security.
[50] Ruby B. Lee,et al. Implicit Sensor-based Authentication of Smartphone Users with Smartwatch , 2016, HASP 2016.
[51] Shaohan Hu,et al. DeepSense: A Unified Deep Learning Framework for Time-Series Mobile Sensing Data Processing , 2016, WWW.
[52] Ying Zhang,et al. n-Gram Geo-trace Modeling , 2011, Pervasive.
[53] Aad van Moorsel,et al. Smartphone Continuous Authentication Using Deep Learning Autoencoders , 2017, 2017 15th Annual Conference on Privacy, Security and Trust (PST).
[54] Xiangyu Zhang,et al. ShuffleNet: An Extremely Efficient Convolutional Neural Network for Mobile Devices , 2017, 2018 IEEE/CVF Conference on Computer Vision and Pattern Recognition.
[55] Nasir D. Memon,et al. An HMM-based multi-sensor approach for continuous mobile authentication , 2015, MILCOM 2015 - 2015 IEEE Military Communications Conference.