Smart User Authentication through Actuation of Daily Activities Leveraging WiFi-enabled IoT
暂无分享,去创建一个
Hongbo Liu | Yingying Chen | Cong Shi | Jian Liu | Yingying Chen | Jian Liu | Hongbo Liu | Cong Shi
[1] Ken Thompson,et al. Password security: a case history , 1979, CACM.
[2] Xiang Wang,et al. WFID: Passive Device-free Human Identification Using WiFi Signal , 2016, MobiQuitous.
[3] Xu Chen,et al. Tracking Vital Signs During Sleep Leveraging Off-the-shelf WiFi , 2015, MobiHoc.
[4] Ajay Kumar,et al. Comparison and combination of iris matchers for reliable personal authentication , 2010, Pattern Recognit..
[5] R. Keys. Cubic convolution interpolation for digital image processing , 1981 .
[6] Kenneth Revett. A bioinformatics based approach to user authentication via keystroke dynamics , 2009 .
[7] B. Ripley,et al. Pattern Recognition , 1968, Nature.
[8] Adrian Perrig,et al. This copyright notice must be included in the reproduced paper. USENIX acknowledges all trademarks herein. Déjà Vu: A User Study Using Images for Authentication , 2000 .
[9] B. Skinner,et al. Science and human behavior , 1953 .
[10] Wei Wang,et al. Gait recognition using wifi signals , 2016, UbiComp.
[11] Manuel G. Penedo,et al. Personal authentication using digital retinal images , 2006, Pattern Analysis and Applications.
[12] Haining Wang,et al. An efficient user verification system via mouse movements , 2011, CCS '11.
[13] Jie Yang,et al. E-eyes: device-free location-oriented activity identification using fine-grained WiFi signatures , 2014, MobiCom.
[14] Corinna Cortes,et al. Support-Vector Networks , 1995, Machine Learning.
[15] Pascal Vincent,et al. Stacked Denoising Autoencoders: Learning Useful Representations in a Deep Network with a Local Denoising Criterion , 2010, J. Mach. Learn. Res..
[16] Jie Yang,et al. Smartphone based user verification leveraging gait recognition for mobile healthcare systems , 2013, 2013 IEEE International Conference on Sensing, Communications and Networking (SECON).
[17] Yoshua Bengio,et al. Why Does Unsupervised Pre-training Help Deep Learning? , 2010, AISTATS.
[18] Parth H. Pathak,et al. WiWho: WiFi-Based Person Identification in Smart Spaces , 2016, 2016 15th ACM/IEEE International Conference on Information Processing in Sensor Networks (IPSN).
[19] Stefan Fischer,et al. Face authentication with Gabor information on deformable graphs , 1999, IEEE Trans. Image Process..
[20] Juhi Ranjan,et al. Object hallmarks: identifying object users using wearable wrist sensors , 2015, UbiComp.
[21] Sachin Katti,et al. SpotFi: Decimeter Level Localization Using WiFi , 2015, SIGCOMM.
[22] Dan Wu,et al. WiDir: walking direction estimation using wireless signals , 2016, UbiComp.
[23] Wei Wang,et al. Understanding and Modeling of WiFi Signal Based Human Activity Recognition , 2015, MobiCom.
[24] C. K. Yuen,et al. Theory and Application of Digital Signal Processing , 1978, IEEE Transactions on Systems, Man, and Cybernetics.
[25] Jin Zhang,et al. WiFi-ID: Human Identification Using WiFi Signal , 2016, 2016 International Conference on Distributed Computing in Sensor Systems (DCOSS).
[26] David Wetherall,et al. Tool release: gathering 802.11n traces with channel state information , 2011, CCRV.