Multimodal Continuous Authentication Based on Match Level Fusion
暂无分享,去创建一个
Xin Liu | Kai Lin | Yang Huifeng | Qimeng Li | Pengpeng Lv | Lifang Gao | Zhuozhi Yu | Wenwei Chen | Zhu Yukun | Ou Qinghai | Lian Yangyang | Xin Liu | Zhu Yukun | Kai Lin | Wenwei Chen | Pengpeng Lv | Zhuozhi Yu | Ou Qinghai | Yang Huifeng | Lifang Gao | Liang Yangyang | Qimeng Li
[1] René Mayrhofer,et al. Smartphone-Based Gait Recognition: From Authentication to Imitation , 2017, IEEE Transactions on Mobile Computing.
[2] Leo Breiman,et al. Random Forests , 2001, Machine Learning.
[3] Mengjun Xie,et al. MotionAuth: Motion-based authentication for wrist worn smart devices , 2015, 2015 IEEE International Conference on Pervasive Computing and Communication Workshops (PerCom Workshops).
[4] Chih-Jen Lin,et al. LIBSVM: A library for support vector machines , 2011, TIST.
[5] Xiaohong Guan,et al. Performance Analysis of Touch-Interaction Behavior for Active Smartphone Authentication , 2016, IEEE Transactions on Information Forensics and Security.
[6] Gregory D. Abowd,et al. A gesture-based authentication scheme for untrusted public terminals , 2004, UIST '04.
[7] Hongyuan Zha,et al. LatentGesture: active user authentication through background touch analysis , 2014, Chinese CHI '14.
[8] Hai Huang,et al. You Are How You Touch: User Verification on Smartphones via Tapping Behaviors , 2014, 2014 IEEE 22nd International Conference on Network Protocols.
[9] Yufei Chen,et al. Performance evaluation of implicit smartphones authentication via sensor-behavior analysis , 2018, Inf. Sci..
[10] Heinrich Hußmann,et al. Touch me once and i know it's you!: implicit authentication based on touch screen patterns , 2012, CHI.
[11] Andrea F. Abate,et al. I-Am: Implicitly Authenticate Me—Person Authentication on Mobile Devices Through Ear Shape and Arm Gesture , 2019, IEEE Transactions on Systems, Man, and Cybernetics: Systems.
[12] Christoph Busch,et al. Unobtrusive User-Authentication on Mobile Phones Using Biometric Gait Recognition , 2010, 2010 Sixth International Conference on Intelligent Information Hiding and Multimedia Signal Processing.
[13] Nasir D. Memon,et al. Biometric-rich gestures: a novel approach to authentication on multi-touch devices , 2012, CHI.
[14] Xiaoli Zhang,et al. User Identification Based on Touch Dynamics , 2012, 2012 9th International Conference on Ubiquitous Intelligence and Computing and 9th International Conference on Autonomic and Trusted Computing.
[15] Christoph Busch,et al. Authentication of Smartphone Users Based on the Way They Walk Using k-NN Algorithm , 2012, 2012 Eighth International Conference on Intelligent Information Hiding and Multimedia Signal Processing.
[16] Ivan Martinovic,et al. When Your Fitness Tracker Betrays You: Quantifying the Predictability of Biometric Features Across Contexts , 2018, 2018 IEEE Symposium on Security and Privacy (SP).
[17] Guoliang Xue,et al. Unobservable Re-authentication for Smartphones , 2013, NDSS.
[18] Arun Ross,et al. Information fusion in biometrics , 2003, Pattern Recognit. Lett..