WiFi-Enabled User Authentication through Deep Learning in Daily Activities
暂无分享,去创建一个
Yingying Chen | Jian Liu | Hongbo Liu | Cong Shi | Yingying Chen | Jian Liu | Hongbo Liu | Cong Shi
[1] Jitendra Malik,et al. Region-Based Convolutional Networks for Accurate Object Detection and Segmentation , 2016, IEEE Transactions on Pattern Analysis and Machine Intelligence.
[2] Yu Sun,et al. WiAU: An Accurate Device-Free Authentication System with ResNet , 2018, 2018 15th Annual IEEE International Conference on Sensing, Communication, and Networking (SECON).
[3] Daniel P. Lopresti,et al. Secure speech biometric templates for user authentication , 2012, IET Biom..
[4] Adrian Perrig,et al. This copyright notice must be included in the reproduced paper. USENIX acknowledges all trademarks herein. Déjà Vu: A User Study Using Images for Authentication , 2000 .
[5] Dan Wu,et al. WiDir: walking direction estimation using wireless signals , 2016, UbiComp.
[6] Mo Li,et al. Precise Power Delay Profiling with Commodity Wi-Fi , 2015, IEEE Transactions on Mobile Computing.
[7] Geoffrey E. Hinton,et al. Learning representations by back-propagating errors , 1986, Nature.
[8] B. Ripley,et al. Pattern Recognition , 1968, Nature.
[9] Adam J. Aviv,et al. Smudge Attacks on Smartphone Touch Screens , 2010, WOOT.
[10] Manuel G. Penedo,et al. Personal authentication using digital retinal images , 2006, Pattern Analysis and Applications.
[11] Stefan Fischer,et al. Face authentication with Gabor information on deformable graphs , 1999, IEEE Trans. Image Process..
[12] R. Keys. Cubic convolution interpolation for digital image processing , 1981 .
[13] Haining Wang,et al. An efficient user verification system via mouse movements , 2011, CCS '11.
[14] Jie Yang,et al. Smartphone based user verification leveraging gait recognition for mobile healthcare systems , 2013, 2013 IEEE International Conference on Sensing, Communications and Networking (SECON).
[15] Yoshua Bengio,et al. Why Does Unsupervised Pre-training Help Deep Learning? , 2010, AISTATS.
[16] Parth H. Pathak,et al. WiWho: WiFi-Based Person Identification in Smart Spaces , 2016, 2016 15th ACM/IEEE International Conference on Information Processing in Sensor Networks (IPSN).
[17] David Wetherall,et al. Tool release: gathering 802.11n traces with channel state information , 2011, CCRV.
[18] Xu Chen,et al. Tracking Vital Signs During Sleep Leveraging Off-the-shelf WiFi , 2015, MobiHoc.
[19] Minglu Li,et al. FingerPass: Finger Gesture-based Continuous User Authentication for Smart Homes Using Commodity WiFi , 2019, MobiHoc.
[20] Jin Zhang,et al. WiFi-ID: Human Identification Using WiFi Signal , 2016, 2016 International Conference on Distributed Computing in Sensor Systems (DCOSS).
[21] Sachin Katti,et al. SpotFi: Decimeter Level Localization Using WiFi , 2015, SIGCOMM.
[22] Ping Wang,et al. Two Birds with One Stone: Two-Factor Authentication with Security Beyond Conventional Bound , 2018, IEEE Transactions on Dependable and Secure Computing.
[23] Wei Wang,et al. Understanding and Modeling of WiFi Signal Based Human Activity Recognition , 2015, MobiCom.
[24] Pascal Vincent,et al. Stacked Denoising Autoencoders: Learning Useful Representations in a Deep Network with a Local Denoising Criterion , 2010, J. Mach. Learn. Res..
[25] Ajay Kumar,et al. Comparison and combination of iris matchers for reliable personal authentication , 2010, Pattern Recognit..
[26] Kenneth Revett. A bioinformatics based approach to user authentication via keystroke dynamics , 2009 .
[27] C. K. Yuen,et al. Theory and Application of Digital Signal Processing , 1978, IEEE Transactions on Systems, Man, and Cybernetics.
[28] Hongbo Liu,et al. Smart User Authentication through Actuation of Daily Activities Leveraging WiFi-enabled IoT , 2017, MobiHoc.
[29] David Tse,et al. Fundamentals of Wireless Communication , 2005 .
[30] Maria Adler,et al. Science and human behavior , 2017 .
[31] Jie Yang,et al. E-eyes: device-free location-oriented activity identification using fine-grained WiFi signatures , 2014, MobiCom.
[32] Ken Thompson,et al. Password security: a case history , 1979, CACM.
[33] Qiang Yang,et al. A Survey on Transfer Learning , 2010, IEEE Transactions on Knowledge and Data Engineering.
[34] Juhi Ranjan,et al. Object hallmarks: identifying object users using wearable wrist sensors , 2015, UbiComp.
[35] Geoffrey E. Hinton,et al. ImageNet classification with deep convolutional neural networks , 2012, Commun. ACM.
[36] Corinna Cortes,et al. Support-Vector Networks , 1995, Machine Learning.
[37] Wei Wang,et al. Gait recognition using wifi signals , 2016, UbiComp.