暂无分享,去创建一个
Sen Wang | Agathoniki Trigoni | Ivan Martinovic | Bowen Du | Chris Xiaoxuan Lu | Andrew Markham | Hongkai Wen | Yiran Shen | I. Martinovic | A. Markham | Sen Wang | Hongkai Wen | A. Trigoni | Yiran Shen | Bowen Du
[1] Jürgen Schmidhuber,et al. Long Short-Term Memory , 1997, Neural Computation.
[2] Yoshua Bengio,et al. Zoneout: Regularizing RNNs by Randomly Preserving Hidden Activations , 2016, ICLR.
[3] J. Massey. Guessing and entropy , 1994, Proceedings of 1994 IEEE International Symposium on Information Theory.
[4] He Wang,et al. MoLe: Motion Leaks through Smartwatch Sensors , 2015, MobiCom.
[5] Geoffrey E. Hinton,et al. Deep Learning , 2015, Nature.
[6] Quoc V. Le,et al. Sequence to Sequence Learning with Neural Networks , 2014, NIPS.
[7] Xiangyu Liu,et al. When Good Becomes Evil: Keystroke Inference with Smartwatch , 2015, CCS.
[8] Marte Dybevik Løge,et al. Tell Me Who You Are and I Will Tell You Your Unlock Pattern , 2015 .
[9] Yunhao Liu,et al. Lasagna: towards deep hierarchical understanding and searching over mobile sensing data , 2016, MobiCom.
[10] Markus Dürmuth,et al. Quantifying the security of graphical passwords: the case of android unlock patterns , 2013, CCS.
[11] Alexander De Luca,et al. Patterns in the wild: a field study of the usability of pattern and pin-based authentication on mobile devices , 2013, MobileHCI '13.
[12] Adam J. Aviv,et al. Smudge Attacks on Smartphone Touch Screens , 2010, WOOT.
[13] Rajesh Kumar,et al. Beware, Your Hands Reveal Your Secrets! , 2014, CCS.
[14] Hao Chen,et al. TouchLogger: Inferring Keystrokes on Touch Screen from Smartphone Motion , 2011, HotSec.
[15] Yoshua Bengio,et al. Gradient Flow in Recurrent Nets: the Difficulty of Learning Long-Term Dependencies , 2001 .
[16] Wei Wang,et al. Keystroke Recognition Using WiFi Signals , 2015, MobiCom.
[17] François Chollet,et al. TensorFlow for R: Deep Learning for Text Classification with Keras , 2017 .
[18] Adam J. Aviv,et al. Practicality of accelerometer side channels on smartphones , 2012, ACSAC '12.
[19] Guigang Zhang,et al. Deep Learning , 2016, Int. J. Semantic Comput..
[20] Romit Roy Choudhury,et al. Tapprints: your finger taps have fingerprints , 2012, MobiSys '12.
[21] Hai Huang,et al. You Are How You Touch: User Verification on Smartphones via Tapping Behaviors , 2014, 2014 IEEE 22nd International Conference on Network Protocols.
[22] Yoram Singer,et al. Adaptive Subgradient Methods for Online Learning and Stochastic Optimization , 2011, J. Mach. Learn. Res..
[23] Xiaohui Liang,et al. When CSI Meets Public WiFi: Inferring Your Mobile Phone Password via WiFi Signals , 2016, CCS.
[24] Hao Chen,et al. On the Practicality of Motion Based Keystroke Inference Attack , 2012, TRUST.
[25] Barbara S. Chaparro,et al. Text Input on a Smartwatch QWERTY Keyboard: Tap vs. Trace , 2017, Int. J. Hum. Comput. Interact..
[26] Patrick Traynor,et al. (sp)iPhone: decoding vibrations from nearby keyboards using mobile phone accelerometers , 2011, CCS '11.
[27] Alex X. Liu,et al. Secure unlocking of mobile touch screen devices by simple gestures: you can see it but you can not do it , 2013, MobiCom.
[28] Xiaojiang Chen,et al. Cracking Android Pattern Lock in Five Attempts , 2017, NDSS.
[29] Feng Hao,et al. Stealing PINs via mobile sensors: actual risk versus user perception , 2016, International Journal of Information Security.
[30] Phil Blunsom,et al. Teaching Machines to Read and Comprehend , 2015, NIPS.
[31] Anindya Maiti,et al. Smartwatch-Based Keystroke Inference Attacks and Context-Aware Protection Mechanisms , 2016, AsiaCCS.
[32] Jun Han,et al. ACCessory: password inference using accelerometers on smartphones , 2012, HotMobile '12.
[33] Gabi Nakibly,et al. Gyrophone: Recognizing Speech from Gyroscope Signals , 2014, USENIX Security Symposium.
[34] Wojciech Zaremba,et al. Recurrent Neural Network Regularization , 2014, ArXiv.
[35] Elizabeth Stobert,et al. The Password Life Cycle: User Behaviour in Managing Passwords , 2014, SOUPS.
[36] Zhi Xu,et al. TapLogger: inferring user inputs on smartphone touchscreens using on-board motion sensors , 2012, WISEC '12.
[37] Serge Egelman,et al. The Anatomy of Smartphone Unlocking: A Field Study of Android Lock Screens , 2016, CHI.
[38] Agathoniki Trigoni,et al. Lightweight map matching for indoor localisation using conditional random fields , 2014, IPSN-14 Proceedings of the 13th International Symposium on Information Processing in Sensor Networks.