Keystroke Dynamics User Authentication Based on Gaussian Mixture Model and Deep Belief Nets
暂无分享,去创建一个
[1] Sharath Pankanti,et al. Biometrics: a grand challenge , 2004, Proceedings of the 17th International Conference on Pattern Recognition, 2004. ICPR 2004..
[2] Sungzoon Cho,et al. GA-SVM wrapper approach for feature subset selection in keystroke dynamics identity verification , 2003, Proceedings of the International Joint Conference on Neural Networks, 2003..
[3] Sharath Pankanti,et al. Biometric Recognition: Security and Privacy Concerns , 2003, IEEE Secur. Priv..
[4] Arun Ross,et al. An introduction to biometric recognition , 2004, IEEE Transactions on Circuits and Systems for Video Technology.
[5] Claudia Picardi,et al. Keystroke analysis of free text , 2005, TSEC.
[6] Jeffrey D. Allen,et al. An analysis of pressure-based keystroke dynamics algorithms , 2010 .
[7] B. Hussien,et al. Computer-Access Security Systems Using Keystroke Dynamics , 1990, IEEE Trans. Pattern Anal. Mach. Intell..
[8] Anil K. Jain,et al. Keystroke dynamics for user authentication , 2012, 2012 IEEE Computer Society Conference on Computer Vision and Pattern Recognition Workshops.
[9] Geoffrey E. Hinton. Training Products of Experts by Minimizing Contrastive Divergence , 2002, Neural Computation.
[10] Douglas A. Reynolds,et al. Comparison of background normalization methods for text-independent speaker verification , 1997, EUROSPEECH.
[11] Lee Luan Ling,et al. User authentication through typing biometrics features , 2004, IEEE Transactions on Signal Processing.
[12] Michael K. Reiter,et al. Password hardening based on keystroke dynamics , 2002, International Journal of Information Security.
[13] Roy A. Maxion,et al. Comparing anomaly-detection algorithms for keystroke dynamics , 2009, 2009 IEEE/IFIP International Conference on Dependable Systems & Networks.
[14] Sajjad Haider,et al. A multi-technique approach for user identification through keystroke dynamics , 2000, Smc 2000 conference proceedings. 2000 ieee international conference on systems, man and cybernetics. 'cybernetics evolving to systems, humans, organizations, and their complex interactions' (cat. no.0.
[15] Gopal K. Gupta,et al. Identity authentication based on keystroke latencies , 1990, Commun. ACM.
[16] Jugurta R. Montalvão Filho,et al. On the equalization of keystroke timing histograms , 2006, Pattern Recognit. Lett..
[17] Sungzoon Cho,et al. Continual Retraining of Keystroke Dynamics Based Authenticator , 2007, ICB.
[18] Lee Luan Ling,et al. User authentication through typing biometrics features , 2005 .
[19] Yee Whye Teh,et al. A Fast Learning Algorithm for Deep Belief Nets , 2006, Neural Computation.
[20] Terence Sim,et al. Are Digraphs Good for Free-Text Keystroke Dynamics? , 2007, 2007 IEEE Conference on Computer Vision and Pattern Recognition.
[21] Venu Govindaraju,et al. Behavioural biometrics: a survey and classification , 2008, Int. J. Biom..
[22] Raymond J Staron,et al. Personal Attributes Authentication Techniques. , 1977 .
[23] Damon L. Woodard,et al. Biometric Authentication and Identification using Keystroke Dynamics: A Survey , 2012 .
[24] Ruslan Salakhutdinov,et al. Learning Deep Generative Models , 2009 .
[25] Sungzoon Cho,et al. Web-Based Keystroke Dynamics Identity Verification Using Neural Network , 2000, J. Organ. Comput. Electron. Commer..
[26] Danoush Hosseinzadeh,et al. Gaussian Mixture Modeling of Keystroke Patterns for Biometric Applications , 2008, IEEE Transactions on Systems, Man, and Cybernetics, Part C (Applications and Reviews).
[27] Christophe Rosenberger,et al. GREYC keystroke: A benchmark for keystroke dynamics biometric systems , 2009, 2009 IEEE 3rd International Conference on Biometrics: Theory, Applications, and Systems.
[28] Marcelo Cipriano,et al. Collection and Publication of a Fixed Text Keystroke Dynamics Dataset , 2010 .
[29] John J. Leggett,et al. Verifying Identity via Keystroke Characteristics , 1988, Int. J. Man Mach. Stud..
[30] Fabian Monrose,et al. Keystroke dynamics as a biometric for authentication , 2000, Future Gener. Comput. Syst..
[31] Claudia Picardi,et al. User authentication through keystroke dynamics , 2002, TSEC.
[32] Norman Shapiro,et al. Authentication by Keystroke Timing: Some Preliminary Results , 1980 .
[33] Feng Zhou,et al. Keyboard acoustic emanations revisited , 2005, CCS '05.
[34] Chee Peng Lim,et al. Keystroke Patterns Classification Using the ARTMAP-FD Neural Network , 2007, Third International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2007).