Sensitivity analysis in keystroke dynamics using convolutional neural networks
暂无分享,去创建一个
[1] Shambhu J. Upadhyaya,et al. Enhanced recognition of keystroke dynamics using Gaussian mixture models , 2015, MILCOM 2015 - 2015 IEEE Military Communications Conference.
[2] Zhengrong Liang,et al. ROC operating point selection for classification of imbalanced data with application to computer-aided polyp detection in CT colonography , 2013, International Journal of Computer Assisted Radiology and Surgery.
[3] Nitish Srivastava,et al. Improving neural networks by preventing co-adaptation of feature detectors , 2012, ArXiv.
[4] Roy A. Maxion,et al. Comparing anomaly-detection algorithms for keystroke dynamics , 2009, 2009 IEEE/IFIP International Conference on Dependable Systems & Networks.
[5] Andrew Beng Jin Teoh,et al. A Survey of Keystroke Dynamics Biometrics , 2013, TheScientificWorldJournal.
[6] John J. Leggett,et al. Dynamic Identity Verification via Keystroke Characteristics , 1991, Int. J. Man Mach. Stud..
[7] Jeffrey Dean,et al. Distributed Representations of Words and Phrases and their Compositionality , 2013, NIPS.
[8] Geoffrey E. Hinton,et al. ImageNet classification with deep convolutional neural networks , 2012, Commun. ACM.
[9] Danoush Hosseinzadeh,et al. Gaussian Mixture Modeling of Keystroke Patterns for Biometric Applications , 2008, IEEE Transactions on Systems, Man, and Cybernetics, Part C (Applications and Reviews).
[10] Shambhu J. Upadhyaya,et al. User authentication with keystroke dynamics in long-text data , 2016, 2016 IEEE 8th International Conference on Biometrics Theory, Applications and Systems (BTAS).
[11] Deian Stefan,et al. Robustness of keystroke-dynamics based biometrics against synthetic forgeries , 2012, Comput. Secur..
[12] Upadhyaya Shambhu,et al. Adaptive techniques for intra-user variability in keystroke dynamics , 2016 .
[13] Ye Zhang,et al. A Sensitivity Analysis of (and Practitioners’ Guide to) Convolutional Neural Networks for Sentence Classification , 2015, IJCNLP.
[14] Christophe Rosenberger,et al. Web-Based Benchmark for Keystroke Dynamics Biometric Systems: A Statistical Analysis , 2012, 2012 Eighth International Conference on Intelligent Information Hiding and Multimedia Signal Processing.
[15] Jason Weston,et al. Natural Language Processing (Almost) from Scratch , 2011, J. Mach. Learn. Res..
[16] Claudia Picardi,et al. Keystroke analysis of free text , 2005, TSEC.
[17] Christophe Rosenberger,et al. GREYC keystroke: A benchmark for keystroke dynamics biometric systems , 2009, 2009 IEEE 3rd International Conference on Biometrics: Theory, Applications, and Systems.
[18] Tom Fawcett,et al. An introduction to ROC analysis , 2006, Pattern Recognit. Lett..
[19] Yan Lindsay Sun,et al. Shared keystroke dataset for continuous authentication , 2016, 2016 IEEE International Workshop on Information Forensics and Security (WIFS).
[20] Sungzoon Cho,et al. Keystroke dynamics-based user authentication using long and free text strings from various input devices , 2015, Inf. Sci..
[21] Damon L. Woodard,et al. Biometric Authentication and Identification using Keystroke Dynamics: A Survey , 2012 .
[22] Jimmy Ba,et al. Adam: A Method for Stochastic Optimization , 2014, ICLR.
[23] Cícero Nogueira dos Santos,et al. Deep Convolutional Neural Networks for Sentiment Analysis of Short Texts , 2014, COLING.
[24] Wendy Chen,et al. Applying hidden Markov models to keystroke pattern analysis for password verification , 2004, Proceedings of the 2004 IEEE International Conference on Information Reuse and Integration, 2004. IRI 2004..
[25] Rob Fergus,et al. Visualizing and Understanding Convolutional Networks , 2013, ECCV.
[26] Stephanie Schuckers,et al. Effect of data size on performance of free-text keystroke authentication , 2015, IEEE International Conference on Identity, Security and Behavior Analysis (ISBA 2015).
[27] Tara N. Sainath,et al. Deep Neural Networks for Acoustic Modeling in Speech Recognition: The Shared Views of Four Research Groups , 2012, IEEE Signal Processing Magazine.
[28] Sahin Albayrak,et al. Continuous and non-intrusive identity verification in real-time environments based on free-text keystroke dynamics , 2011, 2011 International Joint Conference on Biometrics (IJCB).