Sensor-Based Continuous Authentication Using Cost-Effective Kernel Ridge Regression
暂无分享,去创建一个
Gang Zhou | Yantao Li | Shaojiang Deng | Hailong Hu | Gang Zhou | Shaojiang Deng | Yantao Li | Hailong Hu
[1] Mauro Conti,et al. Mind how you answer me!: transparently authenticating the user of a smartphone when answering or placing a call , 2011, ASIACCS '11.
[2] Yantao Li,et al. Chaotic hash function based on circular shifts with variable parameters , 2016 .
[3] Tao Feng,et al. Continuous mobile authentication using touchscreen gestures , 2012, 2012 IEEE Conference on Technologies for Homeland Security (HST).
[4] A. Tikhonov. On the stability of inverse problems , 1943 .
[5] Christoph Busch,et al. Authentication of Smartphone Users Based on the Way They Walk Using k-NN Algorithm , 2012, 2012 Eighth International Conference on Intelligent Information Hiding and Multimedia Signal Processing.
[6] Shie Mannor,et al. The kernel recursive least-squares algorithm , 2004, IEEE Transactions on Signal Processing.
[7] Heikki Ailisto,et al. Identifying users of portable devices from gait pattern with accelerometers , 2005, Proceedings. (ICASSP '05). IEEE International Conference on Acoustics, Speech, and Signal Processing, 2005..
[8] Dawn Xiaodong Song,et al. Touchalytics: On the Applicability of Touchscreen Input as a Behavioral Biometric for Continuous Authentication , 2012, IEEE Transactions on Information Forensics and Security.
[9] Ying Zhang,et al. n-Gram Geo-trace Modeling , 2011, Pervasive.
[10] Hai Huang,et al. You Are How You Touch: User Verification on Smartphones via Tapping Behaviors , 2014, 2014 IEEE 22nd International Conference on Network Protocols.
[11] Sun-Yuan Kung,et al. On efficient learning and classification kernel methods , 2012, 2012 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP).
[12] Ivan Martinovic,et al. Evaluating Behavioral Biometrics for Continuous Authentication: Challenges and Metrics , 2017, AsiaCCS.
[13] Aad van Moorsel,et al. Smartphone Continuous Authentication Using Deep Learning Autoencoders , 2017, 2017 15th Annual Conference on Privacy, Security and Trust (PST).
[14] Xiaohui Xie,et al. Co-Occurrence Feature Learning for Skeleton Based Action Recognition Using Regularized Deep LSTM Networks , 2016, AAAI.
[15] Damon L. Woodard,et al. Biometric Authentication and Identification using Keystroke Dynamics: A Survey , 2012 .
[16] Lei Yang,et al. Unlocking Smart Phone through Handwaving Biometrics , 2015, IEEE Transactions on Mobile Computing.
[17] Matthias Trojahn,et al. Toward Mobile Authentication with Keystroke Dynamics on Mobile Phones and Tablets , 2013, 2013 27th International Conference on Advanced Information Networking and Applications Workshops.
[18] Xiaohong Guan,et al. Performance Analysis of Motion-Sensor Behavior for User Authentication on Smartphones , 2016, Sensors.
[19] Xiao Wang,et al. SenSec: Mobile security through passive sensing , 2013, 2013 International Conference on Computing, Networking and Communications (ICNC).
[20] Guoliang Xue,et al. Unobservable Re-authentication for Smartphones , 2013, NDSS.
[21] Qing Yang,et al. HMOG: New Behavioral Biometric Features for Continuous Authentication of Smartphone Users , 2015, IEEE Transactions on Information Forensics and Security.
[22] Ruby B. Lee,et al. Implicit Sensor-based Authentication of Smartphone Users with Smartwatch , 2016, HASP 2016.
[23] Laurence T. Yang,et al. Energy-Efficient Scheduling for Real-Time Systems Based on Deep Q-Learning Model , 2019, IEEE Transactions on Sustainable Computing.
[24] Arun Ross,et al. An introduction to biometric recognition , 2004, IEEE Transactions on Circuits and Systems for Video Technology.
[25] Zhikui Chen,et al. A Distributed Weighted Possibilistic c-Means Algorithm for Clustering Incomplete Big Sensor Data , 2014, Int. J. Distributed Sens. Networks.
[26] Yufei Chen,et al. Performance Analysis of Multi-Motion Sensor Behavior for Active Smartphone Authentication , 2018, IEEE Transactions on Information Forensics and Security.
[27] Tae Hwan Oh,et al. Analyzing User Awareness of Privacy Data Leak in Mobile Applications , 2015, Mob. Inf. Syst..
[28] Laurence T. Yang,et al. A survey on deep learning for big data , 2018, Inf. Fusion.
[29] Rama Chellappa,et al. Touch Gesture-Based Active User Authentication Using Dictionaries , 2015, 2015 IEEE Winter Conference on Applications of Computer Vision.
[30] Rama Chellappa,et al. Continuous User Authentication on Mobile Devices: Recent progress and remaining challenges , 2016, IEEE Signal Processing Magazine.
[31] Laurence T. Yang,et al. Privacy-Preserving Double-Projection Deep Computation Model With Crowdsourcing on Cloud for Big Data Feature Learning , 2018, IEEE Internet of Things Journal.
[32] Michael R. Lyu,et al. Towards Continuous and Passive Authentication via Touch Biometrics: An Experimental Study on Smartphones , 2014, SOUPS.
[33] Kang G. Shin,et al. Continuous Authentication for Voice Assistants , 2017, MobiCom.
[34] David Kotz,et al. ZEBRA: Zero-Effort Bilateral Recurring Authentication , 2014, IEEE Symposium on Security and Privacy.
[35] Gang Zhou,et al. Pedestrian walking safety system based on smartphone built-in sensors , 2018, IET Commun..
[36] Ruby B. Lee,et al. Implicit Smartphone User Authentication with Sensors and Contextual Machine Learning , 2017, 2017 47th Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN).
[37] Sheikh Iqbal Ahamed,et al. ePet: when cellular phone learns to recognize its owner , 2009, SafeConfig '09.
[38] Susmita Sur-Kolay,et al. CABA: Continuous Authentication Based on BioAura , 2017, IEEE Transactions on Computers.
[39] Alexander J. Smola,et al. Online learning with kernels , 2001, IEEE Transactions on Signal Processing.
[40] Ruby B. Lee,et al. Multi-sensor authentication to improve smartphone security , 2015, 2015 International Conference on Information Systems Security and Privacy (ICISSP).
[41] Shuangquan Wang,et al. Continuous Authentication With Touch Behavioral Biometrics and Voice on Wearable Glasses , 2017, IEEE Transactions on Human-Machine Systems.
[42] Wenyao Xu,et al. Cardiac Scan: A Non-contact and Continuous Heart-based User Authentication System , 2017, MobiCom.
[43] Laurence T. Yang,et al. PPHOPCM: Privacy-Preserving High-Order Possibilistic c-Means Algorithm for Big Data Clustering with Cloud Computing , 2017, IEEE Transactions on Big Data.
[44] Robert F. Harrison,et al. A kernel based adaline , 1999, ESANN.
[45] Tsuyoshi Isshiki,et al. Fingerprint authentication on touch sensor using Phase-Only Correlation method , 2016, 2016 7th International Conference of Information and Communication Technology for Embedded Systems (IC-ICTES).
[46] Zhao Wang,et al. Modeling interactive sensor-behavior with smartphones for implicit and active user authentication , 2017, 2017 IEEE International Conference on Identity, Security and Behavior Analysis (ISBA).
[47] Ruby B. Lee,et al. Sensor-Based Implicit Authentication of Smartphone Users , 2017, 2017 47th Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN).
[48] J. Mercer. Functions of positive and negative type, and their connection with the theory of integral equations , 1909 .