Multimodal Continuous Authentication Based on Match Level Fusion

[1]  René Mayrhofer,et al.  Smartphone-Based Gait Recognition: From Authentication to Imitation , 2017, IEEE Transactions on Mobile Computing.

[2]  Leo Breiman,et al.  Random Forests , 2001, Machine Learning.

[3]  Mengjun Xie,et al.  MotionAuth: Motion-based authentication for wrist worn smart devices , 2015, 2015 IEEE International Conference on Pervasive Computing and Communication Workshops (PerCom Workshops).

[4]  Chih-Jen Lin,et al.  LIBSVM: A library for support vector machines , 2011, TIST.

[5]  Xiaohong Guan,et al.  Performance Analysis of Touch-Interaction Behavior for Active Smartphone Authentication , 2016, IEEE Transactions on Information Forensics and Security.

[6]  Gregory D. Abowd,et al.  A gesture-based authentication scheme for untrusted public terminals , 2004, UIST '04.

[7]  Hongyuan Zha,et al.  LatentGesture: active user authentication through background touch analysis , 2014, Chinese CHI '14.

[8]  Hai Huang,et al.  You Are How You Touch: User Verification on Smartphones via Tapping Behaviors , 2014, 2014 IEEE 22nd International Conference on Network Protocols.

[9]  Yufei Chen,et al.  Performance evaluation of implicit smartphones authentication via sensor-behavior analysis , 2018, Inf. Sci..

[10]  Heinrich Hußmann,et al.  Touch me once and i know it's you!: implicit authentication based on touch screen patterns , 2012, CHI.

[11]  Andrea F. Abate,et al.  I-Am: Implicitly Authenticate Me—Person Authentication on Mobile Devices Through Ear Shape and Arm Gesture , 2019, IEEE Transactions on Systems, Man, and Cybernetics: Systems.

[12]  Christoph Busch,et al.  Unobtrusive User-Authentication on Mobile Phones Using Biometric Gait Recognition , 2010, 2010 Sixth International Conference on Intelligent Information Hiding and Multimedia Signal Processing.

[13]  Nasir D. Memon,et al.  Biometric-rich gestures: a novel approach to authentication on multi-touch devices , 2012, CHI.

[14]  Xiaoli Zhang,et al.  User Identification Based on Touch Dynamics , 2012, 2012 9th International Conference on Ubiquitous Intelligence and Computing and 9th International Conference on Autonomic and Trusted Computing.

[15]  Christoph Busch,et al.  Authentication of Smartphone Users Based on the Way They Walk Using k-NN Algorithm , 2012, 2012 Eighth International Conference on Intelligent Information Hiding and Multimedia Signal Processing.

[16]  Ivan Martinovic,et al.  When Your Fitness Tracker Betrays You: Quantifying the Predictability of Biometric Features Across Contexts , 2018, 2018 IEEE Symposium on Security and Privacy (SP).

[17]  Guoliang Xue,et al.  Unobservable Re-authentication for Smartphones , 2013, NDSS.

[18]  Arun Ross,et al.  Information fusion in biometrics , 2003, Pattern Recognit. Lett..