Beyond Speech: Generalizing D-Vectors for Biometric Verification
暂无分享,去创建一个
[1] Ming Yang,et al. DeepFace: Closing the Gap to Human-Level Performance in Face Verification , 2014, 2014 IEEE Conference on Computer Vision and Pattern Recognition.
[2] Davide Anguita,et al. A Public Domain Dataset for Human Activity Recognition using Smartphones , 2013, ESANN.
[3] Chris Murphy,et al. Shared dataset on natural human-computer interaction to support continuous authentication research , 2017, 2017 IEEE International Joint Conference on Biometrics (IJCB).
[4] Geoffrey E. Hinton,et al. ImageNet classification with deep convolutional neural networks , 2012, Commun. ACM.
[5] Lama Nachman,et al. Unobtrusive gait verification for mobile phones , 2014, SEMWEB.
[6] Damon L. Woodard,et al. Biometric Authentication and Identification using Keystroke Dynamics: A Survey , 2012 .
[7] Erik McDermott,et al. Deep neural networks for small footprint text-dependent speaker verification , 2014, 2014 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP).
[8] Guigang Zhang,et al. Deep Learning , 2016, Int. J. Semantic Comput..
[9] Geoffrey E. Hinton,et al. Speech recognition with deep recurrent neural networks , 2013, 2013 IEEE International Conference on Acoustics, Speech and Signal Processing.
[10] Claudia Picardi,et al. Keystroke analysis of free text , 2005, TSEC.
[11] Roy A. Maxion,et al. Comparing anomaly-detection algorithms for keystroke dynamics , 2009, 2009 IEEE/IFIP International Conference on Dependable Systems & Networks.
[12] Georg Heigold,et al. End-to-end text-dependent speaker verification , 2015, 2016 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP).
[13] Rajesh Kumar,et al. Continuous authentication of smartphone users by fusing typing, swiping, and phone movement patterns , 2016, 2016 IEEE 8th International Conference on Biometrics Theory, Applications and Systems (BTAS).
[14] Patrick D. Schalk,et al. Remote suspect identification and the impact of demographic features on keystroke dynamics , 2013, Defense, Security, and Sensing.