Time-frequency analysis of keystroke dynamics for user authentication
暂无分享,去创建一个
[1] Po-Hao Huang,et al. Keyword-based approach for recognizing fraudulent messages by keystroke dynamics , 2020, Pattern Recognit..
[2] Arun Ross,et al. Long range iris recognition: A survey , 2017, Pattern Recognit..
[3] Jiwen Lu,et al. Discriminative Deep Metric Learning for Face and Kinship Verification , 2017, IEEE Transactions on Image Processing.
[4] Orcan Alpar,et al. Frequency spectrograms for biometric keystroke authentication using neural network based classifier , 2017, Knowl. Based Syst..
[5] Yuan Feng,et al. User Identification and Authentication Using Keystroke Dynamics with Acoustic Signal , 2016, 2016 12th International Conference on Mobile Ad-Hoc and Sensor Networks (MSN).
[6] Zhong Lin Wang,et al. Keystroke dynamics enabled authentication and identification using triboelectric nanogenerator array , 2018 .
[7] Alexey E. Sulavko,et al. Users' identification through keystroke dynamics based on vibration parameters and keyboard pressure , 2017, 2017 Dynamics of Systems, Mechanisms and Machines (Dynamics).
[8] Alessandro Vinciarelli,et al. Type Like a Man! Inferring Gender from Keystroke Dynamics in Live-Chats , 2019, IEEE Intelligent Systems.
[9] Kevin Warwick,et al. Non-conventional keystroke dynamics for user authentication , 2017, Pattern Recognit. Lett..
[10] Dae-Ki Kang,et al. One-class naïve Bayes with duration feature ranking for accurate user authentication using keystroke dynamics , 2017, Applied Intelligence.
[11] Shanthi Sivakumar,et al. Biometric Authentication Techniques and Its Future , 2019, Biometric Authentication in Online Learning Environments.
[12] Andrey Makrushin,et al. Automatic Template Update Strategies for Biometrics , 2007 .
[13] Arun Ross,et al. Investigating the Discriminative Power of Keystroke Sound , 2015, IEEE Transactions on Information Forensics and Security.
[14] Claudia Picardi,et al. Keystroke analysis of free text , 2005, TSEC.
[15] Claudia Picardi,et al. User authentication through keystroke dynamics , 2002, TSEC.
[16] Yoshihiro Kaneko,et al. A hamming distance-like filtering in keystroke dynamics , 2011, 2011 Ninth Annual International Conference on Privacy, Security and Trust.
[17] Lior Rokach,et al. Keystroke dynamics obfuscation using key grouping , 2020, Expert Syst. Appl..
[18] Christophe Rosenberger,et al. Web-Based Benchmark for Keystroke Dynamics Biometric Systems: A Statistical Analysis , 2012, 2012 Eighth International Conference on Intelligent Information Hiding and Multimedia Signal Processing.
[19] Alan Bundy,et al. Dynamic Time Warping , 1984 .
[20] Sungzoon Cho,et al. Web-Based Keystroke Dynamics Identity Verification Using Neural Network , 2000, J. Organ. Comput. Electron. Commer..
[21] Dae-Ki Kang,et al. Mini-batch bagging and attribute ranking for accurate user authentication in keystroke dynamics , 2017, Pattern Recognit..
[22] Panyam Narahari Sastry,et al. CLASSIFICATION AND IDENTIFICATION OF TELUGU HANDWRITTEN CHARACTERS EXTRACTED FROM PALM LEAVES USING DECISION TREE APPROACH , 2010 .
[23] Robert E. Kalaba,et al. On adaptive control processes , 1959 .
[24] Abhishek Vaish,et al. Feature extraction using emprical mode decomposition for biometric system , 2014, 2014 International Conference on Signal Propagation and Computer Technology (ICSPCT 2014).
[25] Xudong Lin,et al. Deep Adversarial Metric Learning , 2018, 2018 IEEE/CVF Conference on Computer Vision and Pattern Recognition.
[26] Agata Kolakowska,et al. Usefulness of Keystroke Dynamics Features in User Authentication and Emotion Recognition , 2018 .
[27] Victor Carbune,et al. Multi-Language Online Handwriting Recognition , 2017, IEEE Transactions on Pattern Analysis and Machine Intelligence.
[28] Roy A. Maxion,et al. Comparing anomaly-detection algorithms for keystroke dynamics , 2009, 2009 IEEE/IFIP International Conference on Dependable Systems & Networks.
[29] Junhong Kim,et al. Freely typed keystroke dynamics-based user authentication for mobile devices based on heterogeneous features , 2020, Pattern Recognit..
[30] T. Santhanam,et al. Keystroke dynamics for biometric authentication — A survey , 2013, 2013 International Conference on Pattern Recognition, Informatics and Mobile Engineering.
[31] Heather Crawford. Keystroke dynamics: Characteristics and opportunities , 2010, 2010 Eighth International Conference on Privacy, Security and Trust.
[32] John V. Monaco,et al. The partially observable hidden Markov model and its application to keystroke dynamics , 2016, Pattern Recognit..
[33] Issa Traoré,et al. Biometric Recognition Based on Free-Text Keystroke Dynamics , 2014, IEEE Transactions on Cybernetics.
[34] Saurabh Singh,et al. Key Classification: A New Approach in Free Text Keystroke Authentication System , 2011, 2011 Third Pacific-Asia Conference on Circuits, Communications and System (PACCS).
[35] Anil K. Jain,et al. Automated Latent Fingerprint Recognition , 2017, IEEE Transactions on Pattern Analysis and Machine Intelligence.
[36] Lee Luan Ling,et al. Biometric Access Control Through Numerical Keyboards Based on Keystroke Dynamics , 2006, ICB.
[37] Christophe Rosenberger,et al. Analysis of template update strategies for keystroke dynamics , 2011, 2011 IEEE Workshop on Computational Intelligence in Biometrics and Identity Management (CIBIM).
[38] H P EloffJan,et al. Enhanced Password Authentication through Fuzzy Logic , 1997 .
[39] Mauro Conti,et al. I Sensed It Was You: Authenticating Mobile Users with Sensor-Enhanced Keystroke Dynamics , 2014, DIMVA.
[40] Tzafilkou Katerina,et al. Mouse behavioral patterns and keystroke dynamics in End-User Development: What can they tell us about users’ behavioral attributes? , 2018, Computers in Human Behavior.
[41] M. Akila,et al. Biometric personal authentication using keystroke dynamics: A review , 2011, Appl. Soft Comput..
[42] Gian Luca Marcialis,et al. Replacement Algorithms for Fingerprint Template Update , 2008, ICIAR.
[43] Sungzoon Cho,et al. GA-SVM wrapper approach for feature subset selection in keystroke dynamics identity verification , 2003, Proceedings of the International Joint Conference on Neural Networks, 2003..
[44] Anil K. Jain,et al. Keystroke dynamics for user authentication , 2012, 2012 IEEE Computer Society Conference on Computer Vision and Pattern Recognition Workshops.
[45] Orcan Alpar. TAPSTROKE: A novel intelligent authentication system using tap frequencies , 2019, Expert Syst. Appl..
[46] Soumik Mondal,et al. Person Identification by Keystroke Dynamics Using Pairwise User Coupling , 2017, IEEE Transactions on Information Forensics and Security.
[47] Sungzoon Cho,et al. Continual Retraining of Keystroke Dynamics Based Authenticator , 2007, ICB.
[48] Sungzoon Cho,et al. Keystroke dynamics-based user authentication using long and free text strings from various input devices , 2015, Inf. Sci..
[49] Xuan Wang,et al. User authentication via keystroke dynamics based on difference subspace and slope correlation degree , 2012, Digit. Signal Process..