Your Moves, Your Device: Establishing Behavior Profiles Using Tensors
暂无分享,去创建一个
[1] Marlies Rybnicek,et al. A roadmap to continuous biometric authentication on mobile devices , 2014, 2014 International Wireless Communications and Mobile Computing Conference (IWCMC).
[2] R. A. Leibler,et al. On Information and Sufficiency , 1951 .
[3] Frank Stajano,et al. The Quest to Replace Passwords: A Framework for Comparative Evaluation of Web Authentication Schemes , 2012, 2012 IEEE Symposium on Security and Privacy.
[4] Jon Louis Bentley,et al. Multidimensional binary search trees used for associative searching , 1975, CACM.
[5] H. Sebastian Seung,et al. Learning the parts of objects by non-negative matrix factorization , 1999, Nature.
[6] Max Welling,et al. Positive tensor factorization , 2001, Pattern Recognit. Lett..
[7] Roberto Di Pietro,et al. A two-factor mobile authentication scheme for secure financial transactions , 2005, International Conference on Mobile Business (ICMB'05).
[8] James M. Keller,et al. A fuzzy K-nearest neighbor algorithm , 1985, IEEE Transactions on Systems, Man, and Cybernetics.
[9] J. Chang,et al. Analysis of individual differences in multidimensional scaling via an n-way generalization of “Eckart-Young” decomposition , 1970 .
[10] Bülent Yener,et al. Modeling and Multiway Analysis of Chatroom Tensors , 2005, ISI.
[11] L. Tucker,et al. Some mathematical notes on three-mode factor analysis , 1966, Psychometrika.
[12] Wenyao Xu,et al. EyeVeri: A secure and usable approach for smartphone user authentication , 2016, IEEE INFOCOM 2016 - The 35th Annual IEEE International Conference on Computer Communications.
[13] Adrian Burns,et al. SHIMMER™ – A Wireless Sensor Platform for Noninvasive Biomedical Research , 2010, IEEE Sensors Journal.
[14] Péter Várlaki,et al. Image Processing on Tensor-Product Basis , 2011 .
[15] Arun Ross,et al. MasterPrint: Exploring the Vulnerability of Partial Fingerprint-Based Authentication Systems , 2017, IEEE Transactions on Information Forensics and Security.
[16] Gustavo E. A. P. A. Batista,et al. Speeding Up All-Pairwise Dynamic Time Warping Matrix Calculation , 2016, SDM.
[17] Christos Faloutsos,et al. Location based Social Network analysis using Tensors and Signal Processing tools , 2015, 2015 IEEE 6th International Workshop on Computational Advances in Multi-Sensor Adaptive Processing (CAMSAP).
[18] Tamara G. Kolda,et al. Tensor Decompositions and Applications , 2009, SIAM Rev..
[19] Bernhard E. Boser,et al. A training algorithm for optimal margin classifiers , 1992, COLT '92.
[20] Qun Li,et al. GlassGesture: Exploring head gesture interface of smart glasses , 2016, 2016 IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS).
[21] Amro Louay Al-Bajjari,et al. Optimized Authentication Scheme for Web Application , 2016, 2016 IEEE 9th International Conference on Service-Oriented Computing and Applications (SOCA).
[22] Evangelos Kalogerakis,et al. RisQ: recognizing smoking gestures with inertial sensors on a wristband , 2014, MobiSys.
[23] Christoph Busch,et al. Authentication of Smartphone Users Based on the Way They Walk Using k-NN Algorithm , 2012, 2012 Eighth International Conference on Intelligent Information Hiding and Multimedia Signal Processing.
[24] Jwu-Sheng Hu,et al. A Robust Orientation Estimation Algorithm Using MARG Sensors , 2015, IEEE Transactions on Instrumentation and Measurement.
[25] Leo Breiman,et al. Random Forests , 2001, Machine Learning.
[26] Tao Feng,et al. Continuous mobile authentication using touchscreen gestures , 2012, 2012 IEEE Conference on Technologies for Homeland Security (HST).
[27] Shan Chang,et al. ShakeIn: Secure User Authentication of Smartphones with Single-Handed Shakes , 2017, IEEE Transactions on Mobile Computing.
[28] Hayder Radha,et al. Compression of image ensembles using tensor decomposition , 2013, 2013 Picture Coding Symposium (PCS).
[29] Richard A. Harshman,et al. Foundations of the PARAFAC procedure: Models and conditions for an "explanatory" multi-model factor analysis , 1970 .