iType: Using eye gaze to enhance typing privacy
暂无分享,去创建一个
Mo Li | Prasant Mohapatra | Jinsong Han | Zhenjiang Li | Shuaiyu Chen | P. Mohapatra | Mo Li | Jinsong Han | Zhenjiang Li | Shuaiyu Chen
[1] S. Kullback,et al. Information Theory and Statistics , 1959 .
[2] Michael K. Reiter,et al. Password hardening based on keystroke dynamics , 2002, International Journal of Information Security.
[3] Nikos Paragios,et al. Handbook of Mathematical Models in Computer Vision , 2005 .
[4] Romit Roy Choudhury,et al. Using mobile phones to write in air , 2011, MobiSys '11.
[5] Mauro Conti,et al. Mind how you answer me!: transparently authenticating the user of a smartphone when answering or placing a call , 2011, ASIACCS '11.
[6] Romit Roy Choudhury,et al. Tapprints: your finger taps have fingerprints , 2012, MobiSys '12.
[7] Nasir D. Memon,et al. Biometric-rich gestures: a novel approach to authentication on multi-touch devices , 2012, CHI.
[8] Alex X. Liu,et al. Secure unlocking of mobile touch screen devices by simple gestures: you can see it but you can not do it , 2013, MobiCom.
[9] Gang Wang,et al. Northeastern University , 2021, IEEE Pulse.
[10] Oleg V. Komogortsev,et al. Usability evaluation of eye tracking on an unmodified common tablet , 2013, CHI Extended Abstracts.
[11] Xinyu Zhang,et al. Ubiquitous keyboard for small mobile devices: harnessing multipath fading for fine-grained keystroke localization , 2014, MobiSys.
[12] Fernando Vilariño,et al. A cheap portable eye-tracker solution for common setups , 2014 .
[13] Yunhao Liu,et al. It starts with iGaze: visual attention driven networking with smart glasses , 2014, MobiCom.
[14] M. Ahsanullah,et al. Student’s t Distribution , 2014 .
[15] Prasant Mohapatra,et al. Sensor-assisted facial recognition: an enhanced biometric authentication system for smartphones , 2014, MobiSys.
[16] Pan Hu,et al. iShadow: design of a wearable, real-time mobile gaze tracker , 2014, MobiSys.
[17] Wei Wang,et al. Keystroke Recognition Using WiFi Signals , 2015, MobiCom.
[18] Shejin Thavalengal,et al. Evaluation of combined visible/NIR camera for iris authentication on smartphones , 2015, 2015 IEEE Conference on Computer Vision and Pattern Recognition Workshops (CVPRW).
[19] Bo Chen,et al. Tracking Keystrokes Using Wireless Signals , 2015, MobiSys.
[20] Deepak Ganesan,et al. CIDER: Enabling Robustness-Power Tradeoffs on a Computational Eyeglass , 2015, MobiCom.
[21] Jie Yang,et al. Snooping Keystrokes with mm-level Audio Ranging on a Single Phone , 2015, MobiCom.
[22] Xi Chen,et al. Privacy-Aware High-Quality Map Generation with Participatory Sensing , 2016, IEEE Transactions on Mobile Computing.
[23] Shaojie Tang,et al. VADS: Visual attention detection with a smartphone , 2016, IEEE INFOCOM 2016 - The 35th Annual IEEE International Conference on Computer Communications.
[24] Wenyao Xu,et al. EyeVeri: A secure and usable approach for smartphone user authentication , 2016, IEEE INFOCOM 2016 - The 35th Annual IEEE International Conference on Computer Communications.
[25] Rong Li,et al. Privacy Leakage in Mobile Sensing: Your Unlock Passwords Can Be Leaked through Wireless Hotspot Functionality , 2016, Mob. Inf. Syst..
[26] Florian Alt,et al. GazeTouchPass: Multimodal Authentication Using Gaze and Touch on Mobile Devices , 2016, CHI Extended Abstracts.
[27] Mo Li,et al. Travi-Navi: Self-Deployable Indoor Navigation System , 2017, TNET.