The partially observable hidden Markov model and its application to keystroke dynamics
暂无分享,去创建一个
[1] Lee Luan Ling,et al. Biometric Access Control Through Numerical Keyboards Based on Keystroke Dynamics , 2006, ICB.
[2] T. Salthouse. Perceptual, cognitive, and motoric aspects of transcription typing. , 1986, Psychological bulletin.
[3] Sandeep Kumar,et al. Continuous Verification Using Multimodal Biometrics , 2007, IEEE Trans. Pattern Anal. Mach. Intell..
[4] Rik Farrow. TIMING ANALYSIS OF KEYSTROKES AND TIMING ATTACKS ON SSH , 2001 .
[5] Adilson E. Motter,et al. A Poissonian explanation for heavy tails in e-mail communication , 2008, Proceedings of the National Academy of Sciences.
[6] Robert P. W. Duin,et al. Component-based discriminative classification for hidden Markov models , 2009, Pattern Recognit..
[7] Sung-Hyuk Cha,et al. Keystroke Biometric Studies on Password and Numeric Keypad Input , 2013, 2013 European Intelligence and Security Informatics Conference.
[8] Albert-László Barabási,et al. The origin of bursts and heavy tails in human dynamics , 2005, Nature.
[9] Junji Yamato,et al. Recognizing human action in time-sequential images using hidden Markov model , 1992, Proceedings 1992 IEEE Computer Society Conference on Computer Vision and Pattern Recognition.
[10] L. Baum,et al. A Maximization Technique Occurring in the Statistical Analysis of Probabilistic Functions of Markov Chains , 1970 .
[11] Jugurta R. Montalvão Filho,et al. Contributions to empirical analysis of keystroke dynamics in passwords , 2015, Pattern Recognit. Lett..
[12] Oendrila Samanta,et al. Smoothing of HMM parameters for efficient recognition of online handwriting , 2014, Pattern Recognit..
[13] Soumik Mondal,et al. Performance evaluation of continuous authentication systems , 2015, IET Biom..
[14] Rakesh Agrawal,et al. Keyboard acoustic emanations , 2004, IEEE Symposium on Security and Privacy, 2004. Proceedings. 2004.
[15] Huseyin Ozkan,et al. A novel and robust parameter training approach for HMMs under noisy and partial access to states , 2014, Signal Process..
[16] Søren Forchhammer,et al. Adaptive partially hidden Markov models with application to bilevel image coding , 1999, IEEE Trans. Image Process..
[17] Patrick Bours. Continuous keystroke dynamics: A different perspective towards biometric evaluation , 2012, Inf. Secur. Tech. Rep..
[18] Bernard Mérialdo,et al. Tagging English Text with a Probabilistic Model , 1994, CL.
[19] Pau-Choo Chung,et al. A daily behavior enabled hidden Markov model for human behavior understanding , 2008, Pattern Recognit..
[20] Chafic Mokbel,et al. Dynamic and Contextual Information in HMM Modeling for Handwritten Word Recognition , 2011, IEEE Transactions on Pattern Analysis and Machine Intelligence.
[21] Lawrence R. Rabiner,et al. A tutorial on hidden Markov models and selected applications in speech recognition , 1989, Proc. IEEE.
[22] Salvador España Boquera,et al. Improving Offline Handwritten Text Recognition with Hybrid HMM/ANN Models , 2011, IEEE Transactions on Pattern Analysis and Machine Intelligence.
[23] Sung-Hyuk Cha,et al. Recent Advances in the Development of a Long-Text-Input Keystroke Biometric Authentication System for Arbitrary Text Input , 2013, 2013 European Intelligence and Security Informatics Conference.
[24] Piet Van Mieghem,et al. Are human interactivity times lognormal? , 2016, ArXiv.
[25] Hsiao-Wuen Hon,et al. Speaker-independent phone recognition using hidden Markov models , 1989, IEEE Trans. Acoust. Speech Signal Process..
[26] Ling Shao,et al. Deep Dynamic Neural Networks for Multimodal Gesture Segmentation and Recognition , 2016, IEEE Transactions on Pattern Analysis and Machine Intelligence.
[27] He Wang,et al. MoLe: Motion Leaks through Smartwatch Sensors , 2015, MobiCom.
[28] T. Kobayashi,et al. Partly-hidden Markov model and its application to gesture recognition , 1997, 1997 IEEE International Conference on Acoustics, Speech, and Signal Processing.
[29] Tara N. Sainath,et al. Deep Neural Networks for Acoustic Modeling in Speech Recognition: The Shared Views of Four Research Groups , 2012, IEEE Signal Processing Magazine.
[30] Yi Lu,et al. A Nonhomogeneous Poisson Hidden Markov Model for Claim Counts , 2012, ASTIN Bulletin.
[31] Jugurta R. Montalvão Filho,et al. On the equalization of keystroke timing histograms , 2006, Pattern Recognit. Lett..
[32] John V. Monaco,et al. Passcode Keystroke Biometric Performance on Smartphone Touchscreens is Superior to that on Hardware Keyboards , 2014 .
[33] Jianying Hu,et al. HMM Based On-Line Handwriting Recognition , 1996, IEEE Trans. Pattern Anal. Mach. Intell..
[34] Christophe Rosenberger,et al. Soft biometrics for keystroke dynamics: Profiling individuals while typing passwords , 2014, Comput. Secur..
[35] L. R. Rabiner,et al. An introduction to the application of the theory of probabilistic functions of a Markov process to automatic speech recognition , 1983, The Bell System Technical Journal.
[36] Yujian Li. Hidden Markov models with states depending on observations , 2005, Pattern Recognit. Lett..
[37] Wei Wang,et al. Keystroke Recognition Using WiFi Signals , 2015, MobiCom.
[38] Sung-Hyuk Cha,et al. A Keystroke Biometric System for Long-Text Input , 2013 .
[39] Stefanos Zafeiriou,et al. Use of random time-intervals (RTIs) generation for biometric verification , 2009, Pattern Recognit..
[40] L. Prasanth,et al. HMM-Based Online Handwriting Recognition System for Telugu Symbols , 2007 .
[41] Rupert G. Miller. Simultaneous Statistical Inference , 1966 .
[42] James H. Martin,et al. Speech and language processing: an introduction to natural language processing , 2000 .
[43] R. L. Stratonovich. CONDITIONAL MARKOV PROCESSES , 1960 .
[44] Roy A. Maxion,et al. The Effect of Clock Resolution on Keystroke Dynamics , 2008, RAID.
[45] W. Newey,et al. Large sample estimation and hypothesis testing , 1986 .
[46] Vasanthan Raghavan,et al. Hidden Markov Models for the Activity Profile of Terrorist Groups , 2012, ArXiv.
[47] H. Zelaznik,et al. Dissociation of explicit and implicit timing in repetitive tapping and drawing movements. , 2002 .
[48] Dan Tsafrir,et al. Effects of clock resolution on the scheduling of interactive and soft real-time processes , 2003, SIGMETRICS '03.
[49] Roy A. Maxion,et al. Comparing anomaly-detection algorithms for keystroke dynamics , 2009, 2009 IEEE/IFIP International Conference on Dependable Systems & Networks.
[50] John V. Monaco,et al. Obfuscating Keystroke Time Intervals to Avoid Identification and Impersonation , 2016, ArXiv.
[51] Shunzheng Yu,et al. Hidden semi-Markov models , 2010, Artif. Intell..
[52] Damon L. Woodard,et al. Biometric Authentication and Identification using Keystroke Dynamics: A Survey , 2012 .
[53] Nikolaus Mutsam,et al. Maximum margin hidden Markov models for sequence classification , 2016, Pattern Recognit. Lett..
[54] Tetsunori Kobayashi,et al. Partly hidden Markov model and its application to speech recognition , 1999, 1999 IEEE International Conference on Acoustics, Speech, and Signal Processing. Proceedings. ICASSP99 (Cat. No.99CH36258).
[55] Andrew Y. Ng,et al. Offering Verified Credentials in Massive Open Online Courses: MOOCs and technology to advance learning and learning research (Ubiquity symposium) , 2014, UBIQ.
[56] Thorsten Dickhaus,et al. Simultaneous Statistical Inference , 2014, Springer Berlin Heidelberg.
[57] L. Baum,et al. Statistical Inference for Probabilistic Functions of Finite State Markov Chains , 1966 .
[58] James H. Martin,et al. Speech and Language Processing: An Introduction to Natural Language Processing, Computational Linguistics, and Speech Recognition , 2000 .
[59] Vir V. Phoha,et al. Utilizing linguistically enhanced keystroke dynamics to predict typist cognition and demographics , 2015, Int. J. Hum. Comput. Stud..
[60] Sung-Hyuk Cha,et al. Keystroke Biometric Recognition Studies on Long-Text Input under Ideal and Application-Oriented Conditions , 2006, 2006 Conference on Computer Vision and Pattern Recognition Workshop (CVPRW'06).
[61] John V. Monaco,et al. Keystroke biometric studies with short numeric input on smartphones , 2016, 2016 IEEE 8th International Conference on Biometrics Theory, Applications and Systems (BTAS).
[62] Anneli Folkesson. European Intelligence and Security Informatics Conference (EISIC 2013) , 2015 .
[63] Jorma Rissanen,et al. Partially hidden Markov models , 1996, IEEE Trans. Inf. Theory.
[64] Sung-Hyuk Cha,et al. Keystroke Biometric Identification and Authentication on Long-Text Input , 2010 .