Faking it, Making it: Fooling and Improving Brain-Based Authentication with Generative Adversarial Networks
暂无分享,去创建一个
[1] W. M. Gentleman,et al. Fast Fourier Transforms: for fun and profit , 1966, AFIPS '66 (Fall).
[2] John C.-I. Chuang,et al. Passthoughts authentication with low cost EarEEG , 2016, 2016 38th Annual International Conference of the IEEE Engineering in Medicine and Biology Society (EMBC).
[3] Vishal M. Patel,et al. Generative adversarial network-based synthesis of visible faces from polarimetrie thermal faces , 2017, 2017 IEEE International Joint Conference on Biometrics (IJCB).
[4] Julie Thorpe,et al. Pass-thoughts: authenticating with our minds , 2005, NSPW '05.
[5] Mubarak Shah,et al. Generative Adversarial Networks Conditioned by Brain Signals , 2017, 2017 IEEE International Conference on Computer Vision (ICCV).
[6] Tianqi Chen,et al. XGBoost: A Scalable Tree Boosting System , 2016, KDD.
[7] Richard Matovu,et al. Your substance abuse disorder is an open secret! Gleaning sensitive personal information from templates in an EEG-based authentication system , 2016, 2016 IEEE 8th International Conference on Biometrics Theory, Applications and Systems (BTAS).
[8] Corinna Cortes,et al. Support-Vector Networks , 1995, Machine Learning.
[9] Yoshua Bengio,et al. Generative Adversarial Networks , 2014, ArXiv.
[10] Sepp Hochreiter,et al. The Vanishing Gradient Problem During Learning Recurrent Neural Nets and Problem Solutions , 1998, Int. J. Uncertain. Fuzziness Knowl. Based Syst..
[11] Andrew B. Schwartz,et al. Brain-Controlled Interfaces: Movement Restoration with Neural Prosthetics , 2006, Neuron.
[12] Bernard Widrow,et al. The basic ideas in neural networks , 1994, CACM.
[13] John C.-I. Chuang,et al. Is the Future of Authenticity All In Our Heads?: Moving Passthoughts From the Lab to the World , 2017, NSPW.
[14] Charles Wang,et al. I Think, Therefore I Am: Usability and Security of Authentication Using Brainwaves , 2013, Financial Cryptography Workshops.
[15] Benjamin Johnson,et al. My thoughts are not your thoughts , 2014, UbiComp Adjunct.
[16] Zhigang Li,et al. Generate Identity-Preserving Faces by Generative Adversarial Networks , 2017, ArXiv.
[17] Tianqi Chen,et al. Empirical Evaluation of Rectified Activations in Convolutional Network , 2015, ArXiv.