Vulnerability Analysis Challenges of the Mouse Data Based on Machine Learning for Image-Based User Authentication
暂无分享,去创建一个
[1] Kim-Kwang Raymond Choo,et al. Cyber-physical systems information gathering: A smart home case study , 2018, Comput. Networks.
[2] Kim-Kwang Raymond Choo,et al. The Role of the Adversary Model in Applied Security Research , 2019, IACR Cryptol. ePrint Arch..
[3] Eyke Hüllermeier,et al. Combining Instance-Based Learning and Logistic Regression for Multilabel Classification , 2009, ECML/PKDD.
[4] Kyungroul Lee,et al. A Protection Technique for Screen Image-Based Authentication Protocols Utilizing the SetCursorPos Function , 2017, WISA.
[5] Kyungroul Lee,et al. Keyboard Security: A Technological Review , 2011, 2011 Fifth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing.
[6] R.E. Newman,et al. Security analysis of and proposal for image-based authentication , 2005, Proceedings 39th Annual 2005 International Carnahan Conference on Security Technology.
[7] Lawrence O. Hall,et al. A Comparison of Decision Tree Ensemble Creation Techniques , 2007 .
[8] Alexander J. Smola,et al. Learning with kernels , 1998 .
[9] Zhi-Hua Zhou,et al. ML-KNN: A lazy learning approach to multi-label learning , 2007, Pattern Recognit..
[10] Kyungroul Lee,et al. Vulnerability Analysis on the Image-Based Authentication Through the PS/2 Interface , 2018, IMIS.
[11] Insoo Koo,et al. Sensor Fault Classification Based on Support Vector Machine and Statistical Time-Domain Features , 2017, IEEE Access.
[12] Sara Matzner,et al. An application of machine learning to network intrusion detection , 1999, Proceedings 15th Annual Computer Security Applications Conference (ACSAC'99).
[13] Hideki Koike,et al. Awase-E: Image-Based Authentication for Mobile Phones Using User's Favorite Images , 2003, Mobile HCI.
[14] Ajinkya Pawar,et al. Secure Authentication using Anti-Screenshot Virtual Keyboard , 2011 .
[15] Yuefei Zhu,et al. A Deep Learning Approach for Intrusion Detection Using Recurrent Neural Networks , 2017, IEEE Access.
[16] Kyungroul Lee,et al. Security Assessment on the Mouse Data using Mouse Loggers , 2016, BWCCA.
[17] Wm. Arthur Conklin,et al. Password-based authentication: a system perspective , 2004, 37th Annual Hawaii International Conference on System Sciences, 2004. Proceedings of the.