Typing Pattern Analysis for Fake Profile Detection in Social Media

[1]  Philip S. Yu,et al.  Sequential Keystroke Behavioral Biometrics for Mobile User Identification via Multi-view Deep Learning , 2017, ECML/PKDD.

[2]  Issa Traoré,et al.  Biometric Recognition Based on Free-Text Keystroke Dynamics , 2014, IEEE Transactions on Cybernetics.

[3]  Jun Yang,et al.  mFingerprint: Privacy-Preserving User Modeling with Multimodal Mobile Device Footprints , 2014, SBP.

[4]  Alex Sherstinsky,et al.  Fundamentals of Recurrent Neural Network (RNN) and Long Short-Term Memory (LSTM) Network , 2018, Physica D: Nonlinear Phenomena.

[5]  Yee Whye Teh,et al.  A Fast Learning Algorithm for Deep Belief Nets , 2006, Neural Computation.

[6]  Rituparna Chaki,et al.  U-Stroke Pattern Modeling for End User Identity Verification Through Ubiquitous Input Device , 2015, CISIM.

[7]  Yu Zhong,et al.  A Survey on Keystroke Dynamics Biometrics: Approaches, Advances, and Evaluations , 2015 .

[8]  Naomi S. Altman,et al.  Points of Significance: Principal component analysis , 2017, Nature Methods.

[9]  Rituparna Chaki,et al.  Modular logic of authentication using dynamic keystroke pattern analysis , 2016 .

[10]  Mohammad S. Obaidat,et al.  Verification of computer users using keystroke dynamics , 1997, IEEE Trans. Syst. Man Cybern. Part B.

[11]  Jürgen Schmidhuber,et al.  Long Short-Term Memory , 1997, Neural Computation.

[12]  Fan Liu,et al.  Determine the Number of Unknown Targets in Open World Based on Elbow Method , 2021, IEEE Transactions on Fuzzy Systems.

[13]  Roy A. Maxion,et al.  Free vs. transcribed text for keystroke-dynamics evaluations , 2012, LASER '12.