Hand Dynamics for Behavioral User Authentication
暂无分享,去创建一个
[1] Wenyuan Xu,et al. AccelPrint: Imperfections of Accelerometers Make Smartphones Trackable , 2014, NDSS.
[2] Tao Feng,et al. TIPS: context-aware implicit user identification using touch screen in uncontrolled environments , 2014, HotMobile.
[3] Nikita Borisov,et al. Do You Hear What I Hear?: Fingerprinting Smart Devices Through Embedded Acoustic Components , 2014, CCS.
[4] Mi Zhang,et al. Motion primitive-based human activity recognition using a bag-of-features approach , 2012, IHI '12.
[5] Yuansong Qiao,et al. Experimental evaluation of mobile phone sensors , 2013 .
[6] Christoph Busch,et al. Unobtrusive User-Authentication on Mobile Phones Using Biometric Gait Recognition , 2010, 2010 Sixth International Conference on Intelligent Information Hiding and Multimedia Signal Processing.
[7] Chih-Jen Lin,et al. A Comparison of Methods for Multi-class Support Vector Machines , 2015 .
[8] Woo Chaw Seng,et al. A review of biometric technology along with trends and prospects , 2014, Pattern Recognit..
[9] Luis A. Hernández Gómez,et al. Usability evaluation of multi-modal biometric verification systems , 2006, Interact. Comput..
[10] Luminita Vasiu,et al. Biometric Recognition - Security and Privacy Concerns , 2004, ICETE.
[11] Deokjai Choi,et al. Arm's Flex when Responding Call for Implicit User Authentication in Smartphone , 2012 .
[12] Blase Ur,et al. How Does Your Password Measure Up? The Effect of Strength Meters on Password Creation , 2012, USENIX Security Symposium.
[13] Xiaoxin Shang,et al. Local Absolute Binary Patterns as Image Preprocessing for Grip-Pattern Recognition in Smart Gun , 2007, 2007 First IEEE International Conference on Biometrics: Theory, Applications, and Systems.
[14] Gérard Dreyfus,et al. Single-layer learning revisited: a stepwise procedure for building and training a neural network , 1989, NATO Neurocomputing.
[15] Blase Ur,et al. Measuring password guessability for an entire university , 2013, CCS.
[16] Moshe Kam,et al. User Authentication Through Biometric Sensors and Decision Fusion , 2015, 2013 47th Annual Conference on Information Sciences and Systems (CISS).
[17] Bernt Schiele,et al. A tutorial on human activity recognition using body-worn inertial sensors , 2014, CSUR.
[18] Héctor Pomares,et al. Dealing with the Effects of Sensor Displacement in Wearable Activity Recognition , 2014, Sensors.
[19] Ivan Martinovic,et al. Preventing Lunchtime Attacks: Fighting Insider Threats With Eye Movement Biometrics , 2015, NDSS.
[20] Michael L. Littman,et al. Activity Recognition from Accelerometer Data , 2005, AAAI.
[21] Bernt Schiele,et al. Analyzing features for activity recognition , 2005, sOc-EUSAI '05.
[22] Mi Zhang,et al. A feature selection-based framework for human activity recognition using wearable multimodal sensors , 2011, BODYNETS.
[23] Chih-Jen Lin,et al. LIBSVM: A library for support vector machines , 2011, TIST.
[24] Gabi Nakibly,et al. Mobile Device Identification via Sensor Fingerprinting , 2014, ArXiv.
[25] Patrick Bours,et al. Gait and activity recognition using commercial phones , 2013, Comput. Secur..
[26] Emiliano Miluzzo,et al. A survey of mobile phone sensing , 2010, IEEE Communications Magazine.
[27] Frank Stajano,et al. The Quest to Replace Passwords: A Framework for Comparative Evaluation of Web Authentication Schemes , 2012, 2012 IEEE Symposium on Security and Privacy.
[28] Gabi Nakibly,et al. Gyrophone: Recognizing Speech from Gyroscope Signals , 2014, USENIX Security Symposium.
[29] Ling Bao,et al. Activity Recognition from User-Annotated Acceleration Data , 2004, Pervasive.
[30] Moshe Kam,et al. Decision Fusion for Multimodal Active Authentication , 2013, IT Professional.