BrainRun: A Behavioral Biometrics Dataset towards Continuous Implicit Authentication
暂无分享,去创建一个
Kyriakos C. Chatzidimitriou | Michail D. Papamichail | Andreas L. Symeonidis | Thomas Karanikiotis | Michail Papamichail | Napoleon-Christos I. Oikonomou | Sashi K. Saripalle | A. Symeonidis | S. Saripalle | Thomas Karanikiotis
[1] Hai Huang,et al. You Are How You Touch: User Verification on Smartphones via Tapping Behaviors , 2014, 2014 IEEE 22nd International Conference on Network Protocols.
[2] Venu Govindaraju,et al. Behavioural biometrics: a survey and classification , 2008, Int. J. Biom..
[3] Jonathan Loo,et al. Continuous authentication of smartphone users based on activity pattern recognition using passive mobile sensing , 2018, J. Netw. Comput. Appl..
[4] Alex Fridman,et al. Learning Human Identity from Motion Patterns , 2015, IEEE Access.
[5] Sunny Consolvo,et al. Are You Ready to Lock? Understanding User Motivations for Smartphone Locking Behaviors , 2014 .
[6] Tao Feng,et al. Continuous mobile authentication using touchscreen gestures , 2012, 2012 IEEE Conference on Technologies for Homeland Security (HST).
[7] Steven Furnell,et al. Continuous user authentication using multi-modal biometrics , 2015, Comput. Secur..
[8] Ruby B. Lee,et al. Sensor-Based Implicit Authentication of Smartphone Users , 2017, 2017 47th Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN).
[9] Jugal K. Kalita,et al. Authentication of Smartphone Users Using Behavioral Biometrics , 2016, IEEE Communications Surveys & Tutorials.
[10] Mathias Payer,et al. Towards Forgery-Resistant Touch-based Biometric Authentication on Mobile Devices , 2015, ArXiv.
[11] Rama Chellappa,et al. Active user authentication for smartphones: A challenge data set and benchmark results , 2016, 2016 IEEE 8th International Conference on Biometrics Theory, Applications and Systems (BTAS).
[12] Dawn Xiaodong Song,et al. Touchalytics: On the Applicability of Touchscreen Input as a Behavioral Biometric for Continuous Authentication , 2012, IEEE Transactions on Information Forensics and Security.
[13] Heinrich Hußmann,et al. Touch me once and i know it's you!: implicit authentication based on touch screen patterns , 2012, CHI.