CrossBehaAuth: Cross-Scenario Behavioral Biometrics Authentication Using Keystroke Dynamics
暂无分享,去创建一个
Chenhao Lin | Chao Shen | Qi Li | Qian Wang | Jingyi He
[1] Stephen Flowerday,et al. Passphrase and keystroke dynamics authentication: Usable security , 2020, Comput. Secur..
[2] Xiaofeng Lu,et al. Continuous authentication by free-text keystroke based on CNN plus RNN , 2018, IIKI.
[3] Brendan Dolan-Gavitt,et al. Automatic Uncovering of Hidden Behaviors From Input Validation in Mobile Apps , 2020, 2020 IEEE Symposium on Security and Privacy (SP).
[4] John V. Monaco,et al. TypeNet: Scaling up Keystroke Biometrics , 2020, 2020 IEEE International Joint Conference on Biometrics (IJCB).
[5] Vir V. Phoha,et al. Discriminative Power of Typing Features on Desktops, Tablets, and Phones for User Identification , 2020, ACM Trans. Priv. Secur..
[6] Vir V. Phoha,et al. DoubleType: Authentication Using Relationship Between Typing Behavior on Multiple Devices , 2020, 2020 International Conference on Artificial Intelligence and Signal Processing (AISP).
[7] Ivan Martinovic,et al. 28 Blinks Later: Tackling Practical Challenges of Eye Movement Biometrics , 2019, CCS.
[8] Alberto Botana López,et al. Deep Learning in Biometrics: A Survey , 2019, ADCAIJ: Advances in Distributed Computing and Artificial Intelligence Journal.
[9] Fabio Martinelli,et al. Keystroke Analysis for User Identification using Deep Neural Networks , 2019, 2019 International Joint Conference on Neural Networks (IJCNN).
[10] Zheng Wang,et al. CrossSense: Towards Cross-Site and Large-Scale WiFi Sensing , 2018, MobiCom.
[11] Tao Li,et al. EyeTell: Video-Assisted Touchscreen Keystroke Inference from Eye Movements , 2018, 2018 IEEE Symposium on Security and Privacy (SP).
[12] Patrick Bours,et al. Cross Keyboard Keystroke Dynamics , 2018, 2018 1st International Conference on Computer Applications & Information Security (ICCAIS).
[13] Philip S. Yu,et al. Stratified Transfer Learning for Cross-domain Activity Recognition , 2017, 2018 IEEE International Conference on Pervasive Computing and Communications (PerCom).
[14] Shambhu J. Upadhyaya,et al. Sensitivity analysis in keystroke dynamics using convolutional neural networks , 2017, 2017 IEEE Workshop on Information Forensics and Security (WIFS).
[15] Kevin Warwick,et al. Improving the performance of free-text keystroke dynamics authentication by fusion , 2017, Appl. Soft Comput..
[16] Lukasz Kaiser,et al. Attention is All you Need , 2017, NIPS.
[17] Zhi-Li Zhang,et al. Multi-touch Authentication Using Hand Geometry and Behavioral Information , 2017, 2017 IEEE Symposium on Security and Privacy (SP).
[18] Shambhu J. Upadhyaya,et al. Continuous Authentication Using Behavioral Biometrics , 2017, IWSPA@CODASPY.
[19] Shambhu J. Upadhyaya,et al. Transfer learning in long-text keystroke dynamics , 2017, 2017 IEEE International Conference on Identity, Security and Behavior Analysis (ISBA).
[20] Yan Lindsay Sun,et al. Shared keystroke dataset for continuous authentication , 2016, 2016 IEEE International Workshop on Information Forensics and Security (WIFS).
[21] Shambhu J. Upadhyaya,et al. User authentication with keystroke dynamics in long-text data , 2016, 2016 IEEE 8th International Conference on Biometrics Theory, Applications and Systems (BTAS).
[22] Shambhu J. Upadhyaya,et al. Adaptive techniques for intra-user variability in keystroke dynamics , 2016, 2016 IEEE 8th International Conference on Biometrics Theory, Applications and Systems (BTAS).
[23] John V. Monaco,et al. The partially observable hidden Markov model and its application to keystroke dynamics , 2016, Pattern Recognit..
[24] Jugal K. Kalita,et al. Authentication of Smartphone Users Using Behavioral Biometrics , 2016, IEEE Communications Surveys & Tutorials.
[25] Shambhu J. Upadhyaya,et al. Enhanced recognition of keystroke dynamics using Gaussian mixture models , 2015, MILCOM 2015 - 2015 IEEE Military Communications Conference.
[26] Stephanie Schuckers,et al. Effect of data size on performance of free-text keystroke authentication , 2015, IEEE International Conference on Identity, Security and Behavior Analysis (ISBA 2015).
[27] Yoshua Bengio,et al. Learning Phrase Representations using RNN Encoder–Decoder for Statistical Machine Translation , 2014, EMNLP.
[28] Issa Traoré,et al. Biometric Recognition Based on Free-Text Keystroke Dynamics , 2014, IEEE Transactions on Cybernetics.
[29] Sahin Albayrak,et al. Continuous and non-intrusive identity verification in real-time environments based on free-text keystroke dynamics , 2011, 2011 International Joint Conference on Biometrics (IJCB).
[30] Yiqiang Chen,et al. Cross-People Mobile-Phone Based Activity Recognition , 2011, IJCAI.
[31] Sung-Hyuk Cha,et al. Performance of a long-text-input keystroke biometric authentication system using an improved k-nearest-neighbor classification method , 2010, 2010 Fourth IEEE International Conference on Biometrics: Theory, Applications and Systems (BTAS).
[32] Andrew Beng Jin Teoh,et al. Statistical Fusion Approach on Keystroke Dynamics , 2007, 2007 Third International IEEE Conference on Signal-Image Technologies and Internet-Based System.
[33] Xuelong Li,et al. General Tensor Discriminant Analysis and Gabor Features for Gait Recognition , 2007, IEEE Transactions on Pattern Analysis and Machine Intelligence.
[34] Steven Furnell,et al. Authenticating mobile phone users using keystroke analysis , 2006, International Journal of Information Security.
[35] Sharath Pankanti,et al. Biometrics: a tool for information security , 2006, IEEE Transactions on Information Forensics and Security.
[36] Claudia Picardi,et al. Keystroke analysis of free text , 2005, TSEC.
[37] Wendy Chen,et al. Applying hidden Markov models to keystroke pattern analysis for password verification , 2004, Proceedings of the 2004 IEEE International Conference on Information Reuse and Integration, 2004. IRI 2004..
[38] Fabian Monrose,et al. Keystroke dynamics as a biometric for authentication , 2000, Future Gener. Comput. Syst..
[39] S. Hochreiter,et al. Long Short-Term Memory , 1997, Neural Computation.
[40] Yoshua Bengio,et al. Learning long-term dependencies with gradient descent is difficult , 1994, IEEE Trans. Neural Networks.
[41] Yann LeCun,et al. Signature Verification Using A "Siamese" Time Delay Neural Network , 1993, Int. J. Pattern Recognit. Artif. Intell..
[42] John J. Leggett,et al. Dynamic Identity Verification via Keystroke Characteristics , 1991, Int. J. Man Mach. Stud..
[43] Young D. Kwon,et al. ContAuth: Continual Learning Framework for Behavioral-based User Authentication , 2020, Proc. ACM Interact. Mob. Wearable Ubiquitous Technol..
[44] Mahbub Hassan,et al. KEH-Gait: Towards a Mobile Healthcare User Authentication System by Kinetic Energy Harvesting , 2017, NDSS.
[45] Vikram Pudi,et al. Deep Secure : A Fast and Simple Neural Network based approach for User Authentication and Identification via Keystroke Dynamics , 2017 .
[46] Khalid Saeed,et al. Application of Recurrent Neural Networks for User Verification based on Keystroke Dynamics , 2016 .
[47] Andrew Zisserman,et al. Deep Face Recognition , 2015, BMVC.
[48] Yu Zhong,et al. Keystroke Dynamics Advances for Mobile Devices Using Deep Neural Network , 2015 .